$ cat code_audit.yar
rule PHP_INFOLEAK
{
strings:
$leak1 = /phpinfo\s?\(|show_source\s?\(|highlight_file\s?\(/
condition:
$leak1
}
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| > db.payloads.find({codename: 'shrill-bread'}).pretty() | |
| { | |
| "_id" : ObjectId("58a7b6935bfab60010aaf5de"), | |
| "requests" : { | |
| "1427a2c8-f585-11e6-b9ae-0242ac11000d" : { | |
| "attack_meta" : { | |
| "target_type" : "wp-login", | |
| "target_name" : "unknown" | |
| }, | |
| "time" : "1487386259", |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /* cargo.toml | |
| [package] | |
| name = "clicker" | |
| version = "0.1.0" | |
| authors = ["dustyfresh"] | |
| [dependencies] | |
| keystroke = "*" | |
| kernel32-sys = "*" | |
| user32-sys = "*" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env python3 | |
| import argparse | |
| import threading | |
| from threading import Thread | |
| from scapy.all import * | |
| import logging | |
| import socket | |
| import chardet | |
| def listen(): |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env python3 | |
| from scapy.all import * | |
| import logging | |
| logging.getLogger("scapy.runtime").setLevel(logging.ERROR) | |
| import re | |
| def packet_callback(packet): | |
| if packet[TCP].payload: | |
| pkt = str(packet[TCP].payload) | |
| if packet[IP].dport == 80: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Martian ranges | |
| 0.0.0.0/8 | |
| 10.0.0.0/8 | |
| 100.64.0.0/10 | |
| 127.0.0.0/8 | |
| 127.0.53.53 | |
| 169.254.0.0/16 | |
| 172.16.0.0/12 | |
| 192.0.0.0/24 | |
| 192.0.2.0/24 |
> db.payloads.find({ip: '176.94.194.90'}).pretty()
{
"_id" : ObjectId("577f2c88247fe0000e2831a8"),
"Tor" : false,
"ip" : "176.94.194.90",
"user-agent" : "Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)",
"triggered_url" : "http://178.62.224.8/phppath/php?-d+allow_url_include%3Don+-d+safe_mode%3Doff+-d+suhosin.simulation%3Don+-d+disable_functions%3D\"\"+-d+open_basedir%3Dnone+-d+auto_prepend_file%3Dphp%3A%2F%2Finput+-n",
"time" : "1467952264",
Payload found to be unrelated to WordPress. Seems to be trying to build a botnet by exploiting Linksys E-Series routers
> db.payloads.find({'ip': '179.158.120.213'}).pretty()
{
"_id" : ObjectId("576a421f83932a00168098be"),
"Tor" : false,
"ip" : "179.158.120.213",
"user-agent" : "Wget(linux)",
"triggered_url" : "http://178.62.224.8/hndUnblock.cgi",
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env python | |
| import requests | |
| import re | |
| def checkTor(ip): | |
| headers = {'user-agent': 'checkTor'} | |
| exit_nodes = requests.get('https://check.torproject.org/exit-addresses', headers=headers) | |
| exit_nodes = exit_nodes.text | |
| if re.search(ip, exit_nodes): | |
| return True |