PHP Shell code: Difference between revisions

From Pessin randon wiki
Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page"
 
Line 1: Line 1:
===Description===
===Description===
You have to investigate recent attack on your web server.
Since attackers were very skilled, they used specially designed PHP shell to access the server.
Your friends from Incident Response Department managed to get network capture file with malicious traffic.
Secret flag, which attackers used, is in PCAP file.
All evidences (including php shell code) are here: <nowiki>http://shared.target05/shell_code.zip</nowiki>
200pts


===Question===
===Question===
Can you decrypt web shell command responses?


===Solution===
===Solution===

Revision as of 12:42, 14 September 2022

Description

You have to investigate recent attack on your web server.

Since attackers were very skilled, they used specially designed PHP shell to access the server.

Your friends from Incident Response Department managed to get network capture file with malicious traffic.

Secret flag, which attackers used, is in PCAP file.

All evidences (including php shell code) are here: http://shared.target05/shell_code.zip

200pts

Question

Can you decrypt web shell command responses?

Solution

Tools

Flag