PHP EXIF Backdoors generator using custom shellcode - Projeto TI
Headlines News :

.

Home » » PHP EXIF Backdoors generator using custom shellcode

PHP EXIF Backdoors generator using custom shellcode

Written By x86_g on 2013-08-07 | 1:48 PM

PHPEB is a small tool that generates and stores obfuscated shellcode in user specified EXIF handlers. The backdoor is divided into two parts. The first part is a mix of the exif_read_data function to read the image headers and the preg_replace function to execute the content and the second is the real payload obfuscated in EXIF a JPG/TIFF file headers.

Both functions are harmless by themselves. Exif_read_data is commonly used to read images and preg_replace to replace the content of strings. However, preg_replace has a hidden and tricky option where if you pass the “/e” modifier it will execute the content (eval), instead of just searching/replacing.

Another interesting point is that the image that we generate still loads and works properly.

Started from Sucuri Research.

If you have any other cool ideas for obfuscating the shellcode, feel free to commit.

Details: https://github.com/CCSIR/PHP-EXIF-Ba...stom-shellcode

LE: Can anyone move this thread to PHP & Python & Perl or in any other place that will fit better? Thank you
Share this article :

0 comentários:

Postar um comentário