File: c99-shell.rb

package info (click to toggle)
whatweb 0.4.8~git20161009-1
  • links: PTS, VCS
  • area: main
  • in suites: stretch
  • size: 8,588 kB
  • ctags: 540
  • sloc: ruby: 33,376; sh: 612; makefile: 42
file content (40 lines) | stat: -rw-r--r-- 1,241 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
##
# This file is part of WhatWeb and may be subject to
# redistribution and commercial restrictions. Please see the WhatWeb
# web site for more information on licensing and terms of use.
# http://www.morningstarsecurity.com/research/whatweb
##
Plugin.define "c99-Shell" do
author "Brendan Coles <bcoles@gmail.com>" # 2010-10-08
version "0.1"
description "c99 PHP Backdoor"

# Google results as at 2010-10-08 #
# 272 for inurl:c99.php ext:php
# 117 for inurl:c99.php ext:php +uname



matches [

# Form HTML # Identifies both c99 source and working c99 shells
{ :text=>'Dir: <input type="text" name="directory" method="get"> <input type="submit" value="List Directory"><br><br> eg: /etc/<br>' },
{ :text=>'<center>Php Safe-Mode Bypass (List Directories):     <form action="' },

]

# Passive #
def passive
        m=[]

	# Get local file path # Must start with "/" to avoid c99 source
	if @body =~ /<input type=hidden name=act value="cmd"><input type=hidden name="d" value="\//
		m << { :filepath=>@body.scan(/<input type=hidden name=act value="cmd"><input type=hidden name="d" value="([^\"]+)/) } if @body =~ /<input type=hidden name=act value="cmd"><input type=hidden name="d" value="([^\"]+)/
	end

	# Return passive matches
	m
end

end