Class Activity 8.1 - Weevely
Wireshark Capture of traditional webshell
sudo curl http://10.0.5.25:80/upload/simple-backdoor.php?cmd=cat+/etc/passwdDeliverable 1. Provide a screenshot that shows the relevant TCP stream similar to the one below. Create a capture filter on port 80 when you do so.


Weevely
Deliverable 2. Investigate weevely (a tool in kali). Create a php agent that is uniquely named, upload the agent to pippin and carry on a session.

Generate Weevely Agent


Put the file in the Pippin server

Start a Session

Wireshark capture of /etc/passwd
Deliverable 3. Show a dump of /etc/passwd on wireshark. Make sure to use a capture filter for port 80.




Last updated
