题目描述 #
关卡描述:黑客获取webshell时查询当前shell的权限是什么?
Flag #
ip.addr == 202.1.1.66 && http.request.method == "POST" && http.request.uri contains "s74e7vwmzs21d5x6"
刚才已经通过第一条数据流获得密码、密钥。
接着看第三条数据吧
使用[蓝队分析工具箱v1.08](https://github.com/abc123info/BlueTeamTools/releases/tag/v1.08)得到BehinderDecode.class
tcp.stream eq 153
ASCII
ZiSHAB3Z2oK3uIOtBx2rDCVa7RtT2YdDZ0Ljvu3JpUeSaNPquz+aDEJrwQJKNeq …… lBKt8w3fdzymRjccrXs8p8kHr4=
使用
jadx-gui打开BehinderDecode.class
/* loaded from: BehinderDecode.class */
public class Cmd {
public static String cmd = "whoami";
private ServletRequest Request;
private ServletResponse Response;
private HttpSession Session;
解密返回数据包cbbebbe1f6164c8a6c288d854209ef6993d00a9ef35094199b9bee1a3a997e30159b2d4a8ee221fa03f7be5e35e16c4c
获得tomcat