关卡8

题目描述 #

关卡描述:黑客获取webshell时查询当前shell的权限是什么?

Flag #

ip.addr == 202.1.1.66 && http.request.method == "POST" && http.request.uri contains "s74e7vwmzs21d5x6"

刚才已经通过第一条数据流获得密码、密钥。

接着看第三条数据吧

使用[蓝队分析工具箱v1.08](https://github.com/abc123info/BlueTeamTools/releases/tag/v1.08)得到BehinderDecode.class

tcp.stream eq 153
ASCII

ZiSHAB3Z2oK3uIOtBx2rDCVa7RtT2YdDZ0Ljvu3JpUeSaNPquz+aDEJrwQJKNeq …… lBKt8w3fdzymRjccrXs8p8kHr4=

使用 jadx-gui打开BehinderDecode.class

/* loaded from: BehinderDecode.class */
public class Cmd {
    public static String cmd = "whoami";
    private ServletRequest Request;
    private ServletResponse Response;
    private HttpSession Session;

解密返回数据包cbbebbe1f6164c8a6c288d854209ef6993d00a9ef35094199b9bee1a3a997e30159b2d4a8ee221fa03f7be5e35e16c4c获得tomcat