Reverse engineering and backdooring a JAR file is the order of the day. You can bet reading and writing Java code is the central theme throughout the machine.
Awesome write up.
This was a super hard box - it took me about a month I think! Every single step seemed to create another problem.
Your write up does an excellent job of breaking down each of these issues into a sensible flow. Very impressive.
It’s a nice write-up. I was stuck after inducing path traversal.
Thanks for sharing.