<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Webshell on 知识带给我们自由</title>
    <link>https://yuexuan521.github.io/zh/tags/webshell/</link>
    <description>Recent content in Webshell on 知识带给我们自由</description>
    <image>
      <title>知识带给我们自由</title>
      <url>https://yuexuan521.github.io/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</url>
      <link>https://yuexuan521.github.io/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</link>
    </image>
    <generator>Hugo -- 0.160.1</generator>
    <language>en-us</language>
    <copyright>See this site&amp;rsquo;s source code here, licensed under GPLv3 ·</copyright>
    <lastBuildDate>Sat, 24 Aug 2024 16:35:40 +0000</lastBuildDate>
    <atom:link href="https://yuexuan521.github.io/zh/tags/webshell/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>BUUCTF webshell后门 1</title>
      <link>https://yuexuan521.github.io/zh/posts/buuctf-webshell%E5%90%8E%E9%97%A8-1/</link>
      <pubDate>Sat, 24 Aug 2024 16:35:40 +0000</pubDate>
      <guid>https://yuexuan521.github.io/zh/posts/buuctf-webshell%E5%90%8E%E9%97%A8-1/</guid>
      <description>&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190351253.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190351253.png&#34; 
             alt=&#34;&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;BUUCTF: &lt;a href=&#34;https://buuoj.cn/challenges&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;https://buuoj.cn/challenges&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;相关阅读
&lt;a href=&#34;https://ctf-wiki.org/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;CTF Wiki&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190353358.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190353358.png&#34; 
             alt=&#34;在这里插入图片描述&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;h3 id=&#34;题目描述&#34;&gt;题目描述：&lt;/h3&gt;
&lt;p&gt;朋友的网站被黑客上传了webshell后门，他把网站打包备份了，你能帮忙找到黑客的webshell在哪吗？(Webshell中的密码(md5)即为答案)&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190351253.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190351253.png" 
             alt="" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>BUUCTF: <a href="https://buuoj.cn/challenges"target="_blank" rel="noopener noreferrer">https://buuoj.cn/challenges</a></strong></p>
<hr>
<p>相关阅读
<a href="https://ctf-wiki.org/"target="_blank" rel="noopener noreferrer">CTF Wiki</a></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190353358.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190353358.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="题目描述">题目描述：</h3>
<p>朋友的网站被黑客上传了webshell后门，他把网站打包备份了，你能帮忙找到黑客的webshell在哪吗？(Webshell中的密码(md5)即为答案)</p>
<h3 id="密文">密文：</h3>
<p>下载附件，解压得到一个网站文件夹。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190355298.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190355298.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<hr>
<h3 id="解题思路">解题思路：</h3>
<p>1、使用工具扫描附件所给的文件夹，可以使用D盾、火绒安全之类的工具，这里我使用D盾。
打开D盾，点击自定义扫描，选择附件给的网站文件夹，点击确定。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190358121.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190358121.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>检查出两个文件，我们来挨个查看。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190400155.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190400155.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>2、第一个文件没有flag，但我们在第二个文件中找到了Webshell中的密码，密码也符合md5的格式，这个就是flag值。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190402659.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228190402659.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="flag">flag：</h3>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">flag<span class="o">{</span>ba8e6c6f35a53933b871480bb9a9545c<span class="o">}</span>
</span></span></code></pre></td></tr></table>
</div>
</div>]]></content:encoded>
    </item>
    <item>
      <title>BUUCTF 后门查杀 1</title>
      <link>https://yuexuan521.github.io/zh/posts/buuctf-%E5%90%8E%E9%97%A8%E6%9F%A5%E6%9D%80-1/</link>
      <pubDate>Mon, 24 Jun 2024 16:36:45 +0000</pubDate>
      <guid>https://yuexuan521.github.io/zh/posts/buuctf-%E5%90%8E%E9%97%A8%E6%9F%A5%E6%9D%80-1/</guid>
      <description>&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192720667.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192720667.png&#34; 
             alt=&#34;&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;BUUCTF: &lt;a href=&#34;https://buuoj.cn/challenges&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;https://buuoj.cn/challenges&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;相关阅读
&lt;a href=&#34;https://ctf-wiki.org/&#34;target=&#34;_blank&#34; rel=&#34;noopener noreferrer&#34;&gt;CTF Wiki&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192722932.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192722932.png&#34; 
             alt=&#34;在这里插入图片描述&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;h3 id=&#34;题目描述&#34;&gt;题目描述：&lt;/h3&gt;
&lt;p&gt;小白的网站被小黑攻击了，并且上传了Webshell，你能帮小白找到这个后门么？(Webshell中的密码(md5)即为答案)。&lt;/p&gt;</description>
      <content:encoded><![CDATA[<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192720667.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192720667.png" 
             alt="" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>BUUCTF: <a href="https://buuoj.cn/challenges"target="_blank" rel="noopener noreferrer">https://buuoj.cn/challenges</a></strong></p>
<hr>
<p>相关阅读
<a href="https://ctf-wiki.org/"target="_blank" rel="noopener noreferrer">CTF Wiki</a></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192722932.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192722932.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="题目描述">题目描述：</h3>
<p>小白的网站被小黑攻击了，并且上传了Webshell，你能帮小白找到这个后门么？(Webshell中的密码(md5)即为答案)。</p>
<h3 id="密文">密文：</h3>
<p>下载附件，解压得到一个网站文件夹。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192724587.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192724587.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<hr>
<h3 id="解题思路">解题思路：</h3>
<p>1、使用工具扫描附件所给的文件夹，可以使用D盾、火绒安全之类的工具，这里我使用D盾。
打开D盾，点击自定义扫描，选择附件给的网站文件夹，点击确定。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192727358.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192727358.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>检查出两个文件，我们挨个查看。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192729441.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192729441.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>2、第一个文件没有flag，但我们在第二个文件中找到了Webshell中的密码，密码也符合md5的格式，这个就是flag值。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192731588.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192731588.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192733491.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228192733491.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="flag">flag：</h3>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">flag<span class="o">{</span>6ac45fb83b3bc355c024f5034b947dd3<span class="o">}</span>
</span></span></code></pre></td></tr></table>
</div>
</div>]]></content:encoded>
    </item>
    <item>
      <title>中国蚁剑 安装教程 2024年5月</title>
      <link>https://yuexuan521.github.io/zh/posts/%E4%B8%AD%E5%9B%BD%E8%9A%81%E5%89%91-%E5%AE%89%E8%A3%85%E6%95%99%E7%A8%8B-2024%E5%B9%B45%E6%9C%88/</link>
      <pubDate>Mon, 10 Jun 2024 09:32:56 +0000</pubDate>
      <guid>https://yuexuan521.github.io/zh/posts/%E4%B8%AD%E5%9B%BD%E8%9A%81%E5%89%91-%E5%AE%89%E8%A3%85%E6%95%99%E7%A8%8B-2024%E5%B9%B45%E6%9C%88/</guid>
      <description>&lt;h2 id=&#34;2024511中国蚁剑安装教程&#34;&gt;2024/5/11中国蚁剑安装教程&lt;/h2&gt;
&lt;p&gt;一、下载中国蚁剑的加载器和核心源码（两个都要用到）&lt;/p&gt;
&lt;p&gt;github官方下载地址：https://github.com/AntSwordProject/&lt;/p&gt;</description>
      <content:encoded><![CDATA[<h2 id="2024511中国蚁剑安装教程">2024/5/11中国蚁剑安装教程</h2>
<p>一、下载中国蚁剑的加载器和核心源码（两个都要用到）</p>
<p>github官方下载地址：https://github.com/AntSwordProject/</p>
<p>参考文档： <a href="https://github.com/AntSwordProject/antSword/blob/master/README_CN.md"target="_blank" rel="noopener noreferrer">antSword/README_CN.md at master · AntSwordProject/antSword · GitHub</a></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829872.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829872.png" 
             alt="屏幕截图 2024-05-11 092201" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><a href="https://github.com/AntSwordProject/antSword?tab=readme-ov-file"target="_blank" rel="noopener noreferrer">核心源码下载：</a></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829873.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829873.png" 
             alt="image-20240511093710574" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><a href="https://github.com/AntSwordProject/AntSword-Loader"target="_blank" rel="noopener noreferrer">加载器下载：</a></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829874.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829874.png" 
             alt="image-20240511092300458" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>二、在完成两个文件的下载后，进行解压缩。接下来，到名为“AntSword-Loader-v4.0.3-win32-x64”的加载器文件夹，然后启动该文件夹内的AntSword.exe应用程序。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829875.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829875.png" 
             alt="image-20240511092358026" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>加载器页面：</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829876.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829876.png" 
             alt="image-20240511092512504" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>三、假如依照指示，用户选定一个空白目录来进行初始化操作，系统将自动执行源代码的下载任务。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829877.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829877.png" 
             alt="image-20240511092646557" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>不过，我们已经将源代码下载好了，选择源代码的文件夹路径。文件夹内如下所示：</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829878.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829878.png" 
             alt="image-20240511093202183" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>初始化进程完毕后，系统会自动重新启动。再次开启程序时，即可直接开始使用。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829879.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829879.png" 
             alt="image-20240511093323854" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>小问题：</p>
<p>下载中国蚁剑的核心源码时，可能因为检测到病毒无法下载，或文件被防火墙删除。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829880.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829880.png" 
             alt="image-20240511095320246" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>前往“Windows防护中心”–&gt;“保护历史记录”，选择“操作”中的“还原”，就可以解决问题。</p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829882.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251217144829882.png" 
             alt="image-20240511095656181" 
              
             loading="lazy"
        />
    </a>
</div></p>
]]></content:encoded>
    </item>
  </channel>
</rss>
