mirror of
https://github.com/cliffe/SecGen.git
synced 2026-02-21 19:28:02 +00:00
proftp leak files
This commit is contained in:
@@ -1,6 +1,9 @@
|
||||
class proftpd_133c_backdoor::config {
|
||||
$secgen_parameters = secgen_functions::get_parameters($::base64_inputs_file)
|
||||
$raw_org = $secgen_parameters['organisation']
|
||||
$leaked_filenames = $secgen_parameters['leaked_filenames']
|
||||
$strings_to_leak = $secgen_parameters['strings_to_leak']
|
||||
|
||||
if $raw_org and $raw_org[0] and $raw_org[0] != '' {
|
||||
$organisation = parsejson($raw_org[0])
|
||||
} else {
|
||||
@@ -13,4 +16,12 @@ class proftpd_133c_backdoor::config {
|
||||
mode => '0644',
|
||||
content => template('proftpd_133c_backdoor/proftpd.erb')
|
||||
}
|
||||
}
|
||||
|
||||
::secgen_functions::leak_files { 'proftpd_133c_backdoor-file-leak':
|
||||
storage_directory => '/root',
|
||||
leaked_filenames => $leaked_filenames,
|
||||
strings_to_leak => $strings_to_leak,
|
||||
leaked_from => "proftpd_133c_backdoor",
|
||||
mode => '0600'
|
||||
}
|
||||
}
|
||||
|
||||
@@ -19,6 +19,7 @@
|
||||
|
||||
<read_fact>server_name</read_fact>
|
||||
<read_fact>strings_to_leak</read_fact>
|
||||
<read_fact>leaked_filenames</read_fact>
|
||||
<read_fact>welcome_msg</read_fact>
|
||||
<read_fact>port</read_fact>
|
||||
|
||||
@@ -35,8 +36,11 @@
|
||||
|
||||
<default_input into="strings_to_leak">
|
||||
<generator type="message_generator"/>
|
||||
<generator type="message_generator"/>
|
||||
</default_input>
|
||||
<default_input into="leaked_filenames">
|
||||
<generator type="filename_generator"/>
|
||||
</default_input>
|
||||
|
||||
|
||||
<default_input into="welcome_msg">
|
||||
<generator type="message_generator"/>
|
||||
@@ -64,4 +68,4 @@
|
||||
<type>update</type>
|
||||
</requires>
|
||||
|
||||
</vulnerability>
|
||||
</vulnerability>
|
||||
|
||||
Reference in New Issue
Block a user