Shell - SMP CTF 2024 - Selection Round
while analyzing the tcp packets I searched a keyword flag
found a traffic where the attacker already got a shell and running arbitrary commands. there the attacker was enumerating about system and searching for something. there i saw a php file called Simple-Backdoor-One-Liner.php
was present.
so as the challenge required the shell file name and the parameter, i searched it on wireshark with a ?
in the end so that i can find out the specific request which contains the parameter.
And Here we got the parameters name which was cmd