changed globals
This commit is contained in:
56
sc.php
56
sc.php
@@ -130,10 +130,10 @@ $error = "Fatal error: Allowed memory size of 134217728 bytes exhausted (tried t
|
|||||||
<?php
|
<?php
|
||||||
|
|
||||||
/* let's define the paths first */
|
/* let's define the paths first */
|
||||||
$GLOBALS["userdir"] = system('whoami');
|
$processUser = posix_getpwuid(posix_geteuid());
|
||||||
$GLOBALS["public_html"] = '/home/'.$GLOBALS["userdir"].'/public_html';
|
$this->user = $processUser['name'];
|
||||||
$GLOBALS["doc_root"] = '/home/'.$GLOBALS["userdir"].'/';
|
$this->top_dir = '/home/'.$this->user.'/';
|
||||||
$GLOBALS["findcmd"] = 'find '.$GLOBALS["public_html"].'/';
|
$this->web_dir = '/home/'.$this->user.'/public_html/';
|
||||||
|
|
||||||
$GLOBALS["red"] = "<span style='color: #FF0000';>";
|
$GLOBALS["red"] = "<span style='color: #FF0000';>";
|
||||||
$GLOBALS["br"] = "<br />";
|
$GLOBALS["br"] = "<br />";
|
||||||
@@ -164,7 +164,7 @@ system ("w | grep load");
|
|||||||
function cleanupl(){
|
function cleanupl(){
|
||||||
system("find ../*/wp-content/uploads/ -type f -name '*.php' -print -exec rm -rf {} \;"); /* clear PHP files from wp-content/uploads */
|
system("find ../*/wp-content/uploads/ -type f -name '*.php' -print -exec rm -rf {} \;"); /* clear PHP files from wp-content/uploads */
|
||||||
system('find ../ -type f -name "*.php.suspected" -print -exec rm -rf {} \;'); /* clear files renamed as *.suspected by the server AV */
|
system('find ../ -type f -name "*.php.suspected" -print -exec rm -rf {} \;'); /* clear files renamed as *.suspected by the server AV */
|
||||||
system($GLOBALS["findcmd"].' -type f -size 0 -print -exec rm -rf {} \;'); /* clear files with 0 bytes size */
|
system('find '.$this->web_dir.'./ -type f -size 0 -print -exec rm -rf {} \;'); /* clear files with 0 bytes size */
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -177,9 +177,9 @@ function vulntheme(){
|
|||||||
|
|
||||||
/* cleaning the backdoor files of the Gravity Forms Exploit */
|
/* cleaning the backdoor files of the Gravity Forms Exploit */
|
||||||
function cleangravity(){
|
function cleangravity(){
|
||||||
system($GLOBALS["findcmd"].' -type f -name "*_input__test*" -print -exec rm -rf {} \;');
|
system('find '.$this->web_dir.'./ -type f -name "*_input__test*" -print -exec rm -rf {} \;');
|
||||||
system($GLOBALS["findcmd"].' -type f -name "*_input_*.php*" -print -exec rm -rf {} \;');
|
system('find '.$this->web_dir.'./ -type f -name "*_input_*.php*" -print -exec rm -rf {} \;');
|
||||||
system($GLOBALS["findcmd"].' -type f -name "*_input_*.txt*" -print -exec rm -rf {} \;');
|
system('find '.$this->web_dir.'./ -type f -name "*_input_*.txt*" -print -exec rm -rf {} \;');
|
||||||
}
|
}
|
||||||
|
|
||||||
/* use a modified version of Spamhaus's findbot.pl to identify left over backdoors */
|
/* use a modified version of Spamhaus's findbot.pl to identify left over backdoors */
|
||||||
@@ -233,7 +233,7 @@ system("./malware.pl");
|
|||||||
|
|
||||||
/* EXIF scanner */
|
/* EXIF scanner */
|
||||||
function checkexif(){
|
function checkexif(){
|
||||||
define('IMAGEPATH', $GLOBALS["public_html"]);
|
define('IMAGEPATH', $this->web_dir);
|
||||||
|
|
||||||
$directory = new RecursiveDirectoryIterator(IMAGEPATH);
|
$directory = new RecursiveDirectoryIterator(IMAGEPATH);
|
||||||
$iterator = new RecursiveIteratorIterator($directory);
|
$iterator = new RecursiveIteratorIterator($directory);
|
||||||
@@ -275,7 +275,7 @@ function insecplug(){
|
|||||||
|
|
||||||
foreach ($plugins_list as $plugin){
|
foreach ($plugins_list as $plugin){
|
||||||
|
|
||||||
system($GLOBALS["findcmd"].' -type d -name '.$plugin.' -print');
|
system('find '.$this->web_dir.'./ -type d -name '.$plugin.' -print');
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -336,7 +336,7 @@ function reshog(){
|
|||||||
|
|
||||||
foreach ($plugin_list as $plugins){
|
foreach ($plugin_list as $plugins){
|
||||||
|
|
||||||
system($GLOBALS["findcmd"].' -type d -name '.$plugins.' -print');
|
system('find '.$this->web_dir.'./ -type d -name '.$plugins.' -print');
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -344,7 +344,7 @@ function reshog(){
|
|||||||
|
|
||||||
/* EXIF cleaner */
|
/* EXIF cleaner */
|
||||||
function cleanexif(){
|
function cleanexif(){
|
||||||
define('IMAGEPATH', $GLOBALS["public_html"]);
|
define('IMAGEPATH', $this->web_dir);
|
||||||
|
|
||||||
$directory = new RecursiveDirectoryIterator(IMAGEPATH);
|
$directory = new RecursiveDirectoryIterator(IMAGEPATH);
|
||||||
$iterator = new RecursiveIteratorIterator($directory);
|
$iterator = new RecursiveIteratorIterator($directory);
|
||||||
@@ -470,9 +470,9 @@ echo "Removing Files With Zero Size";
|
|||||||
|
|
||||||
function findchmod(){
|
function findchmod(){
|
||||||
echo "Finding All Files With Chmod Set To 0000<br /><br />";
|
echo "Finding All Files With Chmod Set To 0000<br /><br />";
|
||||||
system($GLOBALS["findcmd"].' -type f -perm 0000 -exec ls -al');
|
system('find '.$this->web_dir.'./ -type f -perm 0000 -exec ls -al');
|
||||||
echo "Finding All Directories With Chmod Set To 0000<br /><br />";
|
echo "Finding All Directories With Chmod Set To 0000<br /><br />";
|
||||||
system($GLOBALS["findcmd"].' -type d -perm 0000 -exec ls -al');
|
system('find '.$this->web_dir.'./ -type d -perm 0000 -exec ls -al');
|
||||||
}
|
}
|
||||||
|
|
||||||
function trimblanklines($str) {
|
function trimblanklines($str) {
|
||||||
@@ -485,12 +485,12 @@ function trimblanklines($str) {
|
|||||||
|
|
||||||
function fixperms(){
|
function fixperms(){
|
||||||
echo("To save time (and money) we're going to locate the files and directories with improper permissions and fix just those:\n");
|
echo("To save time (and money) we're going to locate the files and directories with improper permissions and fix just those:\n");
|
||||||
system($GLOBALS["findcmd"].' -perm +og+w -follow -type d -print -exec chmod 755 {} \;');
|
system('find '.$this->web_dir.'./ -perm +og+w -follow -type d -print -exec chmod 755 {} \;');
|
||||||
system($GLOBALS["findcmd"].' -perm 0000 -follow -type d -print -exec chmod 755 {} \;');
|
system('find '.$this->web_dir.'./ -perm 0000 -follow -type d -print -exec chmod 755 {} \;');
|
||||||
system($GLOBALS["findcmd"].' -perm +og+w -follow -type f -print -exec chmod 644 {} \;');
|
system('find '.$this->web_dir.'./ -perm +og+w -follow -type f -print -exec chmod 644 {} \;');
|
||||||
system($GLOBALS["findcmd"].' -perm 0000 -follow -type f -print -exec chmod 644 {} \;');
|
system('find '.$this->web_dir.'./ -perm 0000 -follow -type f -print -exec chmod 644 {} \;');
|
||||||
system($GLOBALS["findcmd"].' -perm +og+w -follow -type f -name "*.cgi" -print -exec chmod 755 {} \;');
|
system('find '.$this->web_dir.'./ -perm +og+w -follow -type f -name "*.cgi" -print -exec chmod 755 {} \;');
|
||||||
system($GLOBALS["findcmd"].' -perm +og+w -follow -type f -name "*.pl" -print -exec chmod 755 {} \;');
|
system('find '.$this->web_dir.'./ -perm +og+w -follow -type f -name "*.pl" -print -exec chmod 755 {} \;');
|
||||||
}
|
}
|
||||||
|
|
||||||
function getcleaner(){
|
function getcleaner(){
|
||||||
@@ -505,7 +505,7 @@ fclose($fp);
|
|||||||
|
|
||||||
function addsec(){
|
function addsec(){
|
||||||
echo "securing .htaccess<br />";
|
echo "securing .htaccess<br />";
|
||||||
$htafile = $GLOBALS["public_html"].'/.htaccess';
|
$htafile = $this->web_dir.'/.htaccess';
|
||||||
$htaData = "
|
$htaData = "
|
||||||
# Protection agains XSS exploits added by Lunarpages MSH team
|
# Protection agains XSS exploits added by Lunarpages MSH team
|
||||||
Options +FollowSymLinks
|
Options +FollowSymLinks
|
||||||
@@ -526,7 +526,7 @@ file_put_contents($htafile, $htaData, FILE_APPEND | LOCK_EX);
|
|||||||
show_source($htafile);
|
show_source($htafile);
|
||||||
echo "moving on to php.ini";
|
echo "moving on to php.ini";
|
||||||
|
|
||||||
$phpfile = $GLOBALS["public_html"].'/php.ini';
|
$phpfile = $this->web_dir.'/php.ini';
|
||||||
$phpData = '
|
$phpData = '
|
||||||
; Protection agains RFI exploits added by Lunarpages MSH team
|
; Protection agains RFI exploits added by Lunarpages MSH team
|
||||||
allow_url_fopen = Off
|
allow_url_fopen = Off
|
||||||
@@ -536,7 +536,7 @@ display_errors = Off
|
|||||||
display_startup_errors = Off
|
display_startup_errors = Off
|
||||||
error_reporting = E_ALL
|
error_reporting = E_ALL
|
||||||
mail.add_x_header = On
|
mail.add_x_header = On
|
||||||
mail.log = '.$GLOBALS["doc_root"].'/phpmail.log
|
mail.log = '.$this->top_dir.'/phpmail.log
|
||||||
';
|
';
|
||||||
|
|
||||||
file_put_contents($phpfile, $phpData, FILE_APPEND | LOCK_EX);
|
file_put_contents($phpfile, $phpData, FILE_APPEND | LOCK_EX);
|
||||||
@@ -551,7 +551,7 @@ file_put_contents($phpfile, $phpData, FILE_APPEND | LOCK_EX);
|
|||||||
echo '<input name="send" type="send" value="Remove it">';
|
echo '<input name="send" type="send" value="Remove it">';
|
||||||
if(($_POST['send']) == "Remove it") {
|
if(($_POST['send']) == "Remove it") {
|
||||||
$name= ($_POST["name"]);
|
$name= ($_POST["name"]);
|
||||||
system($GLOBALS["findcmd"].' -name "'.$name.'" -print -exec rm -fr {} \;');
|
system('find '.$this->web_dir.'./ -name "'.$name.'" -print -exec rm -fr {} \;');
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -820,12 +820,12 @@ echo '<input name="submit" type="submit" value="Go"><br /><br />';
|
|||||||
$username = system('whoami');
|
$username = system('whoami');
|
||||||
echo "insert the location you wish to get the size for: <br />";
|
echo "insert the location you wish to get the size for: <br />";
|
||||||
echo '<form method="post" enctype="multipart/form-data">';
|
echo '<form method="post" enctype="multipart/form-data">';
|
||||||
echo $GLOBALS["doc_root"].'<input name="path" id="path" type="text" size="100">';
|
echo $this->top_dir.'<input name="path" id="path" type="text" size="100">';
|
||||||
echo '<input name="send" type="submit" value="Get it">';
|
echo '<input name="send" type="submit" value="Get it">';
|
||||||
if(($_POST['send']) == "Get it") {
|
if(($_POST['send']) == "Get it") {
|
||||||
$path = ($_POST["path"]);
|
$path = ($_POST["path"]);
|
||||||
echo "<br />Getting size of: ".$path."<br/>";
|
echo "<br />Getting size of: ".$path."<br/>";
|
||||||
system('du -sh '.$GLOBALS["doc_root"].$path);
|
system('du -sh '.$this->top_dir.$path);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -834,7 +834,7 @@ echo '<input name="submit" type="submit" value="Go"><br /><br />';
|
|||||||
$ziparray = array("zip", "rar", "tgz", "tar.gz", "bz2", "tar");
|
$ziparray = array("zip", "rar", "tgz", "tar.gz", "bz2", "tar");
|
||||||
foreach ($ziparray as $i => $valzip) {
|
foreach ($ziparray as $i => $valzip) {
|
||||||
echo 'checking for backup files with extension: '.$valzip.'<br />';
|
echo 'checking for backup files with extension: '.$valzip.'<br />';
|
||||||
system($GLOBALS["findcmd"].'-name *.'.$valzip.' -exec du -sh {} \; | grep "backup"');
|
system('find '.$this->web_dir.'./-name *.'.$valzip.' -exec du -sh {} \; | grep "backup"');
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -1989,7 +1989,7 @@ default :
|
|||||||
}
|
}
|
||||||
|
|
||||||
$settings = array (
|
$settings = array (
|
||||||
'BASE_DIR' => $GLOBALS["public_html"],
|
'BASE_DIR' => $this->web_dir,
|
||||||
'USE_DEFINITIONS' => true,
|
'USE_DEFINITIONS' => true,
|
||||||
'SIZE_LIMIT' => ( 1024 * 1024 ) //size limit set to 1mb
|
'SIZE_LIMIT' => ( 1024 * 1024 ) //size limit set to 1mb
|
||||||
);
|
);
|
||||||
|
|||||||
Reference in New Issue
Block a user