半开放扫描
端口开放状态

tcp.flags.syn==1 and ip.dst == 192.168.162.188

全部加密

导出全部文件,df报毒

哥斯拉webshell得到key748007e861908c03

匹配状态码为200的数据包


0d0a0d0a
b5c1fadbb7e28da08572486d8e6933a84c5144463f178b352c5bda71cff4e8ffe919f0f115a528ebfc4a79b03aea0e31cb22d460ada998c7657d4d0f1be71ffa



import requests
import hashlib
dic = "abcdefghijklmnopqrstuvwxyz0123456789"
for i in dic:
for j in dic:
for k in dic:
for l in dic:
s='1'+i+j+k+l+'y'
md5=hashlib.md5(s.encode('utf-8')).hexdigest()
if '748007e861908c03' in md5[:16]:
print(s)
print(md5)
break







误导

沙箱




DOGE:DRXz1q6ys8Ao2KnPbtb7jQhPjDSqtwmNN9





题目内容:你是公司的一名安全运营工程师,今日接到外部监管部门通报,你公司网络出口存在请求挖矿域名的行为。需要立即整改。经过与网络组配合,你们定位到了请求挖矿域名的内网 IP 是 10.221.36.21。查询 CMDB 后得知该 IP 运行了公司的工时系统。(虚拟机账号密码为:root/IncidentResponsePasswd)(答案中如有空格均需去除,如有大写均需变为小写,使用 echo -n ‘strings’|md5sum|cut -d ’ ’ -f1 获取 md5 值作为答案)


.viminfo




shiro反序列化




awk status ==200



find / -newermt '2023-07-23 16:30:10' ! -newermt '2023-07-23 19:10:10'
stat /etc/redis/redis.conf






exe头





方法2
修改exe后缀后发现为python打包程序的ico

反编译

将2.pyc反编译

d00r执行了命令

ViewMore写了d00r









方法2


方法3
拖到diskgenius,发现bitlocker锁

https://arsenalrecon.com/downloads
ArsenalImageMounter挂载
只读打开










./volatility_2.6_lin64_standalone -f ../baby_forensics.raw --profile=Win7SP1x64 psscan

./volatility_2.6_lin64_standalone -f ../baby_forensics.raw --profile=Win7SP1x64 memdump -p 2844 -D ./tmp

修改data后缀,用GIMP调

方法2
./volatility_2.6_lin64_standalone -f ../baby_forensics.raw --profile=Win7SP1x64 windows > ./tmp/win
dows






替换打开
U2FsdGVkX195MCsw0ANs6/Vkjibq89YlmnDdY/dCNKRkixvAP6+B5ImXr2VIqBSp94qfIcjQhDxPgr9G4u++pA==

使用RS打开找到key


方法2:
继续分析上题文件,找到密文,找到key线索


提取文件
./volatility_2.6_lin64_standalone -f ../baby_forensics.raw --profile=Win7SP1x64 filescan > filescan.txt
cat filescan.txt| grep i4ak
./volatility_2.6_lin64_standalone -f ../baby_forensics.raw --profile=Win7SP1x64 dumpfiles -Q 0x000000003ef3a310 -D ./tmp


根据一题重新过滤,从41654后的数据包,其中有一个post包

jdbc走tcp协议






往前翻

解出后不对

添加条件继续翻






开始以为是这个,不对,然后往后看

Flask Session Cookie Decoder
https://www.kirsle.net/wizards/flask-session.cgi




bf-ezweb-hacked-hardweb-smallsword-wireshark1-tcpdump
https://download.csdn.net/download/qq_38626043/88311550
bf
https://download.csdn.net/download/qq_38626043/88311494
ss
https://download.csdn.net/download/qq_38626043/88311492
ir过大,采用的分段压缩,需要全部下载后才能解压
https://download.csdn.net/download/qq_38626043/88315724
https://download.csdn.net/download/qq_38626043/88315728
https://download.csdn.net/download/qq_38626043/88315730
https://mp.weixin.qq.com
https://mp.weixin.qq.com
https://mp.weixin.qq.com
https://blog.csdn.net/NDASH
https://blog.csdn.net/m0_52484587