explore a Wordpress PHP BACKDOOR webshell

Поділитися
Вставка
  • Опубліковано 1 гру 2022
  • Learn even more malware analysis with 0ffset's Zero2Auto training! j-h.io/z2a And pre-register for their updated Beginner course! j-h.io/z2a-beginner
    Help the channel grow with a Like, Comment, & Subscribe!
    ❤️ Support ➡ j-h.io/patreon ↔ j-h.io/paypal ↔ j-h.io/buymeacoffee
    Check out the affiliates below for more free or discounted learning!
    🖥️ Zero-Point Security ➡ Certified Red Team Operator j-h.io/crto
    💻Zero-Point Security ➡ C2 Development with C# j-h.io/c2dev
    🐜Zero2Automated ➡ Ultimate Malware Reverse Engineering j-h.io/zero2auto
    ⛳Point3 ESCALATE ➡ Top-Notch Capture the Flag Training j-h.io/escalate
    👨🏻‍💻7aSecurity ➡ Hacking Courses & Pentesting j-h.io/7asecurity
    📗Humble Bundle ➡ j-h.io/humblebundle
    🐶Snyk ➡ j-h.io/snyk
    🤹‍♀️SkillShare ➡ j-h.io/skillshare
    🌎Follow me! ➡ j-h.io/discord ↔ j-h.io/twitter ↔ j-h.io/linkedin ↔ j-h.io/instagram ↔ j-h.io/tiktok
    📧Contact me! (I may be very slow to respond or completely unable to)
    🤝Sponsorship Inquiries ➡ j-h.io/sponsorship
    🚩 CTF Hosting Requests ➡ j-h.io/ctf
    🎤 Speaking Requests ➡ j-h.io/speaking
    💥 Malware Submission ➡ j-h.io/malware
    ❓ Everything Else ➡ j-h.io/etc

КОМЕНТАРІ • 112

  • @sumurai8
    @sumurai8 Рік тому +114

    Hello Dolly is included in Wordpress by default. It's actually a pretty nice way to hide code, as a lot of people will not delete the default plugins... I suppose it is a way to remotely execute code on every website as an admin. The stuff in the worker file is possibly to delete competing webshells, then probably to read base64 code from the wp_options table and execute it.

    • @Xewl
      @Xewl Рік тому +13

      A decent security plugin will check the hash of the plugin files to note changed files
      A decent developer removes those plugins altogether, they're bloat.

    • @OneOfThePetes
      @OneOfThePetes Рік тому +1

      I was just about to write this.

    • @januzi2
      @januzi2 Рік тому +5

      A few weeks ago I've deleted webshell from the dolly plugin. The operator of that webshell also uploaded a fake template with some more code. He forgot to attach the screen shot to that fake template.

    • @logiciananimal
      @logiciananimal Рік тому

      So in this case it has been repurposed into a trojan, rather than just being one by itself (my guess). Good to know!

    • @Dooglet
      @Dooglet Рік тому +2

      @@Xewl someone ordered the bloat? *laughs in node modules*

  • @gregsayshi
    @gregsayshi Рік тому +1

    Finally! A walkthrough for the rest of us. Your practical insight per minute spend is bar none. Well done man. Been searching for a long time for something like this👏👏

  • @metavore7790
    @metavore7790 Рік тому +7

    That was fun! The rabbit holes had rabbit holes. Kudos to you, and I'm patting myself on the back for being able to follow all of that. Study and practice pay off!

  • @IrdinataWijayanto
    @IrdinataWijayanto Рік тому +4

    I literally smile on 4:08 and thanks, I really learn a lot from you sir, its all a big chunk of knowledge that you share. took me a lot of time to understand a single video since I always try to look around and google anything that I don't know from what you've said. this is another great video content

  • @tubehelpr
    @tubehelpr Рік тому +2

    I love these types of videos - just going through the crazy. Thanks John.

  • @imranthoufeeque165
    @imranthoufeeque165 Рік тому +1

    Advanced congratulations on reaching half a million family members.... You are the best john....💗

  • @ThereWillBeCake
    @ThereWillBeCake Рік тому

    Great sponsor on this video man. Something I will deff look into after my current cert path. Cheers for the video.

  • @jeanramos8253
    @jeanramos8253 Рік тому

    Hey John, today at work I noticed an event that I followed up on, and I found a similar webshell, I was able to revert a part, but I watched your video again and used one of the techniques you showed and I was able to revert all of it code, thank you very much for these videos 🤜🏻🤛🏻 ✌🏻

  • @januzi2
    @januzi2 Рік тому +5

    Finally, a wordpress shell. Can't wait to see what it does.

  • @KoromaTech
    @KoromaTech Рік тому

    That "Tripped over" comment got me laughing. 😂 Just so you know, I'm constantly tripping over your channel. Thanks for all you do. 🙏🏽

  • @pinobeppo9287
    @pinobeppo9287 Рік тому +25

    Hi, great video. Could it be that the array in "worker.php" at 32:11 is a set of code snippets used in the ""Fast()" function at 16:35 in "stage2_modified.php" to remove "competing" webshells? Would be pretty neat! 😀 My second wild guess is that the Paranoid function does a wider RE based search, but just warns the user instead of automatically deleting files.

  • @Jennn
    @Jennn Рік тому

    I love everything about this video's thumbnail, especially the T-shirt John is wearing XD

  • @robconnor2013
    @robconnor2013 Рік тому

    Dude, this was such an intreaguing video! 👍

  • @Counterhackingsafe
    @Counterhackingsafe Рік тому +1

    This video is a must-see for anyone interested in exploring Wordpress PHP backdoors and webshells. JohnHammond does an excellent job of breaking down the concepts and explaining them in a clear and concise way. Thank You!

  • @user-qt3bd3mx4h
    @user-qt3bd3mx4h Рік тому +1

    Always great content

  • @ronanru
    @ronanru Рік тому

    love these deobfuscation vids

  • @liudvikasstankus
    @liudvikasstankus Рік тому

    Thanks. This was super interesting.

  • @faker-scambait
    @faker-scambait Рік тому +1

    Nice one John great video

  • @visualmodo
    @visualmodo Рік тому

    Truly good work!

  • @eyephpmyadmin6988
    @eyephpmyadmin6988 Рік тому +1

    Love this, please do a video using AFL to find a exploit then get code execution, I can't find a good video at all and I'm really wanting something simple that I can follow along with, I learn from being hands on

  • @SomeUniqueHandle
    @SomeUniqueHandle Рік тому +2

    32:35 (line 59) includes a reference to "Leaf PHP Mailer" which is a legit mailer script but it can be loaded on to people's sites to send tons of spam. The code at 32:54 might be the email payload for the Leaf PHP Mailer. You can see things like "SUBJECT", "AMAZON|ADOBE|AZURE" and "BILLING|LOGIN" close together so I'd guess it's creating messages with subject lines stating either Amazon, Adobe or Azure plus Billing or Login, so it could be phishing spam. (On a side note, I want to copy your, "This is a disaster" and use it as my ringtone for work calls.)

  • @YT_Watcher
    @YT_Watcher Рік тому +2

    I had many of these on my WordPress ❤️

  • @joshw3539
    @joshw3539 11 днів тому

    You are my “IT Seth Rogan” !

  • @LegendSpam
    @LegendSpam Рік тому +2

    Ok I need this

  • @sudoer92
    @sudoer92 Рік тому

    you are the best💯

  • @joshuaterrill3089
    @joshuaterrill3089 Рік тому +2

    One of my friends had this happen to several sites, and didn't have good backups. It took me several hours last night to write scripts to go through and clean up all the files. It makes updates to .htaccess files, prepends all index.php files, etc. so writing a bash script was tedious

  • @user-ds5ty8mk4j
    @user-ds5ty8mk4j Рік тому +1

    you are the best

  • @gotdamnsoup2727
    @gotdamnsoup2727 Рік тому

    The book you were reading was Volume 28 on Shelf 4 of Wall 1 of Hexagon: 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

  • @Zed0086
    @Zed0086 Рік тому +1

    My man!

  • @Lambda.Function
    @Lambda.Function Рік тому

    How easy it is to pop web shells is why every web developer needs to take things like OWASP and security training seriously. About 20 years ago, it was common to see websites that had an image upload feature for community images. A lot of these were using PHP because there was commonly available code that did it for you, except the built-in filename handling logic in PHP didn't handle null bytes in filenames correctly (e.g. it would consider screenshot.jpg\0.php just screenshot.jpg). Coupled with the fact that these files were just casually placed inside a web root somewhere meant with a clever file name you could toss a PHP web shell out and own any of these servers.

  • @coolestguy94
    @coolestguy94 Рік тому

    Awesome!

  • @DefconUnicorn
    @DefconUnicorn Рік тому +1

    When attempted to CURL some of the URL and got redirects, it occoured to me that they are already using user agent detection and that my be implemented on these urls as well. @40:00

  • @peterwestin1874
    @peterwestin1874 Рік тому

    Nice analyze and acutally inpressive code. Like to know who has made it. Of course, awfull when used with criminal intents but fun to play around with for white hats ❤

  • @LostInTheRush
    @LostInTheRush Рік тому +1

    The Hello Dolly plugin is included by default in WordPress for some reason.

  • @seif9923
    @seif9923 Рік тому

    I was making alot of resaerch about this topic just yesterday.

  • @mradamdavies
    @mradamdavies Рік тому +10

    I'd like to have the source to play with myself. I am a PHP dev. Edit: wow, at around 33:00 he references the b374k shell... that's about 8 years old!

  • @Boolap1337
    @Boolap1337 Рік тому

    Its time for some 4k videos John! :)

  • @dxnxz53
    @dxnxz53 Рік тому

    I'd love to see it in action :D

  • @skull_cyber
    @skull_cyber Рік тому

    how to send you malware? I Found upl.php and index.php named files on linux servers. I need help because i want to know from where they are coming

  • @fakeacount1479
    @fakeacount1479 Рік тому +7

    hey john, i watched the malware analysis videos for you but its so complex ...
    can you make video about simple malware for begineres

    • @Optable
      @Optable Рік тому

      Network Chuck, Black Hat keynotes on YT, w3, and PC Security Channel all have great beginner content or advanced topics explained in simple to understand terms. I think John does a great job for entry level to intermediate, but may be hard to understand sometimes if you're a total beginner. Check them out.

  • @jeoi
    @jeoi Рік тому +1

    Have You Never Heard About Internet Archive (The WayBack Machine)? 😅

  • @AndyMyers
    @AndyMyers Рік тому

    Look up Fishpig Magento 2 supply chain attack.

  • @fredrikeliasson5875
    @fredrikeliasson5875 Рік тому

    8:34 - I am not any good at coding, but why is the malware trying to switch sperms on line 24 in stage2_modified.php? 🧐

  • @lavavex
    @lavavex Рік тому +1

    Keep sending me malware is not something you hear everyday lol 😂

  • @couldbejake
    @couldbejake Рік тому

    Would have been cool if you showed us the interface

  • @Spelter
    @Spelter Рік тому

    Man, stopping mid deciphering was a bummer. The Take-Yourprizes URL had Shellcode it seems. When you curled it, we saw something. But the URL is down it seems, I get nothing anymore. Now, we will never know how deep this rabbit hole was.

  • @bluesquare23
    @bluesquare23 Рік тому +3

    Spin up a little php server and open that file up in a web browser! Show us what it looks like! Just turn off networking on the VM first. Also snip out that check for that hash so the page loads. It's probably got a sorta cool looking interface!

  • @kerhabplays
    @kerhabplays Рік тому

    Ok.. I'll follow you on Twitter

  • @Operaatoors
    @Operaatoors Рік тому

    How this cpl.php ended up on some of their servers? Was it uploaded via some form, and attacker tried to execute this somehow, but hopefully failed? And just left trace of this junk file on the server?

    • @Operaatoors
      @Operaatoors Рік тому

      Yeah, thanks to the gist comment and WordFence, I understood...
      But basically - to protect against this to happen, just should not allow execute PHP files in uploads folder, I guess.

  • @dr_ned_flanders
    @dr_ned_flanders Рік тому

    The hello dolly plugin is part of WordPress

    • @jacksoncremean1664
      @jacksoncremean1664 Рік тому

      I'm pretty sure it's included for new wordpress developers to learn about how to develop plugins. it's expected to be removed on a production site.

  • @monkaSisLife
    @monkaSisLife Рік тому

    Absolute classic. You know these shenanigans if you work in the Industry
    Open a File and see b64? Welp.... your site is probably hacked.
    Its such a pain to clean this shit up

  • @timmyzcorner
    @timmyzcorner Рік тому

    great video 👍

  • @guilherme5094
    @guilherme5094 Рік тому

    👍

  • @eeledahc
    @eeledahc Рік тому

    People of the comments inform me. ALL of the random emails that I get with PDFs. I'd like to tear into them and see what's inside. Please suggest a starting point.

  • @konfushon
    @konfushon Рік тому +2

    Wtf is with the "Hey you won a price" in the comments section
    The malware author looking at this like 👁️👄👁️

  • @ArSiddharth
    @ArSiddharth Рік тому

    How can I find bug in a webs' which using php old version (a website use php v5 🤩)

    • @lydianlights
      @lydianlights Рік тому +2

      "how to hack website pls I am script kiddie"

    • @ArSiddharth
      @ArSiddharth Рік тому

      @@lydianlightssure, ping me.
      i will guide you😊

  • @mevkok
    @mevkok Рік тому

    I've posted a tool that I created some time ago on your comment section... and it is just for that kind of malware... If you can't find it hit me up and I'll send it to you :) It basically retrieves the actual code and you don't go thru all the steps/stages... for the malware I was creating it it was 20+ stages ... so.... pain in the rear...

  • @alfred.clement
    @alfred.clement 11 місяців тому

    31:01 It could be a fake 404 to hide a webshell's presence

  • @coffinplayz
    @coffinplayz Рік тому +1

    Hello santa where is Cyber of Advent day 2 video ?

    • @coffinplayz
      @coffinplayz Рік тому

      @@axelvirtus2514 i like john hammond video 😌

  • @123norway
    @123norway Рік тому

    WordPress*

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Рік тому

    Biks maga biks ?

  • @thehistoryclass
    @thehistoryclass Рік тому

    My question is how does the hacker put this shell in the server without access???? That's the only question...who has the answer??

  • @parihar-shashwat
    @parihar-shashwat Рік тому

    Contact Form 7 is worst in security.

  • @angelg3986
    @angelg3986 Рік тому

    Damnit, my phone listens my conversations

  • @imdanielmartinez
    @imdanielmartinez Рік тому

    God Job hahahaha

  • @zer-kz8mb
    @zer-kz8mb Рік тому

    RIP VK.

  • @engineerscodes
    @engineerscodes Рік тому

    Php : No plz No

  • @sonofescobar1337
    @sonofescobar1337 Рік тому

    ada indonesia coyyy

  • @beautifulmoon6891
    @beautifulmoon6891 Рік тому +1

    thats was indonesian hacker

  • @maxbunnies
    @maxbunnies Рік тому

    $perms

  • @i.n.2899
    @i.n.2899 Рік тому

    first

  • @deancrypto5939
    @deancrypto5939 Рік тому

    please john click on this it is totally not malwareand you will totally not get infect coz of this

  • @pantekanda
    @pantekanda Рік тому

    🤣🤣🤣

  • @robertclark2607
    @robertclark2607 Рік тому

    People use microsoft, OMG dont they know linux is the go in 2022 and beyond!

  • @rafageist
    @rafageist Рік тому

    Wordpress sucks!

  • @timmyzcorner
    @timmyzcorner Рік тому +4

    at around 30 minutes in, i think the malware was looking for other webshells in the system to maybe remove them? quite confusing

    • @pinobeppo9287
      @pinobeppo9287 Рік тому +1

      Yep, just wrote it too, but you were first! 😀 Totally agree with you.

    • @timmyzcorner
      @timmyzcorner Рік тому

      @@pinobeppo9287 👍

  • @PR2000
    @PR2000 Рік тому

    I founded another one of these things in a website. What's your mail? I'll send you the files

    • @maksymilianlewinski8619
      @maksymilianlewinski8619 Рік тому

      @@PR2000 man that's obviously a scam comment

    • @PR2000
      @PR2000 Рік тому

      @@maksymilianlewinski8619 I know

    • @PR2000
      @PR2000 Рік тому

      @@maksymilianlewinski8619 I only wanted to see if he replies

    • @PR2000
      @PR2000 Рік тому

      @CalebHammer608 Wow. What a cool scam comment. Haha

  • @user-iy6ls2my2g
    @user-iy6ls2my2g Рік тому

    fikker有漏洞吗??