X-Git-Url: https://git.mxchange.org/?a=blobdiff_plain;f=libs%2Flib_detector.php;h=1a932ba40a253422b1f4722204704cff098c57cd;hb=7136865ca398b41614a80d57ae397bc1fff63c10;hp=7d7836eaa5af1c5196d6edd48c21e0674dc018a3;hpb=7fa424e2fb3bb33a79ba1d793f1785809f99c508;p=ctracker.git diff --git a/libs/lib_detector.php b/libs/lib_detector.php index 7d7836e..1a932ba 100644 --- a/libs/lib_detector.php +++ b/libs/lib_detector.php @@ -2,11 +2,11 @@ /** * Detector library * - * @author Roland Haeder + * @author Roland Haeder * @version 3.0.0 - * @copyright Copyright (c) 2009 Cracker Tracker Team + * @copyright Copyright (c) 2009 - 2017 Cracker Tracker Team * @license GNU GPL 3.0 or any newer version - * @link http://www.ship-simu.org + * @link http://www.shipsimu.org * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by @@ -27,98 +27,291 @@ function initCrackerTrackerArrays () { // Set error_reporting if (isCrackerTrackerDebug()) { // For debugging purposes, this is fine - @error_reporting(E_ALL, E_STRICT); + @error_reporting(E_ALL | E_STRICT); } else { // No output @error_reporting(0); } + // Base path + $GLOBALS['ctracker_base_path'] = dirname(dirname(__FILE__)); + // Whitelist some absolute query strings (see below) - $GLOBALS['ctracker_whitelist'] = array( - 'cmd=new', // LinPHA - 'cmd=edit', // LinPHA - 'cmd=lostpw' // LinPHA - ); + $GLOBALS['ctracker_whitelist'] = [ + 'cmd=new', // LinPHA + 'cmd=edit', // LinPHA + 'cmd=lostpw', // LinPHA + '/css/status_config.php', // MantisBT + '/css/common_config.php', // MantisBT + '/javascript_config.php', // MantisBT + ]; + + // Attacks we should detect and block + $GLOBALS['ctracker_get_blacklist'] = [ + // SQL injections + 'union ', ' union', 'insert ', + 'select ', ' like', 'like ', 'drop ', 'update ', + 'union(', 'union=', + + // $GLOBAL/$_SERVER array elements + 'HTTP_USER_AGENT', 'HTTP_HOST', 'HTTP_PHP', '_SESSION', 'CFG_ROOT', + 'DOCUMENT_ROOT', '_SERVER', + + // Sensitive files + '/environ', 'etc/shadow', 'etc/gshadow', 'etc/passwd', 'etc/group', + 'etc/./shadow', 'etc/./gshadow', 'etc/./passwd', 'etc/./group', + '.htaccess', '.htpasswd', '.htgroup', '.history', 'bash_history', + 'bashrc', + + // Other Linux/FreeBSD/??? programs (sometimes with space) + 'traceroute ', 'ping ', 'bin/xterm', 'bin/./xterm', 'lsof ', + 'telnet ', 'wget ', 'bin/perl', 'bin/id', 'uname\x20', 'uname ', + 'killall', 'diff ', 'kill ', 'locate ', 'grep ', 'vi ', 'mv ', + 'rmdir ', 'mcd ', 'mrd ', 'rm ', ' mcd', ' mrd', ' rm', + 'passwd ', ' passwd', 'mdir ', ' mdir', 'cp ', ' cp', + 'esystem ', 'chr ', ' chr', 'wget ', ' wget', ' cmd', + 'cmd ', ' rush', 'rush ', ' echr', 'echr ', ' getenv', + 'getenv', 'reboot ', 'halt ', 'powerdown ', + + // Other Linux programs (+ brace) + 'locate(', 'grep(', 'kill(', 'mcd(', 'mrd(', 'rm(', 'mv(', 'rmdir(', + 'chmod(', 'chmod(', 'chown(', 'chgrp(', 'passwd(', 'vi(', 'cp(', + 'mdir(', 'system(', 'chr(', 'wget(', 'rush(', 'echr(', + + // Other Linux programs (+ equal) + 'mcd=', 'mrd=', 'chmod=', 'chr=', 'rush=', 'echr=', + + // Paths + '/etc/', '/bin/', '/sbin/', '/self/', '/proc/', '../../','..//', '././', + '/home/ftp', '/home/./ftp', '/home/./www', '/home/www', '/www/virtual/', + '/www/./virtual/', + + // Uni* commands: + '/chgrp', '/chown', '/chmod', 'chown ', 'chmod ', 'chgrp ', + + // Compiler/interpreter + 'bin/g++ ', 'bin/c++ ', 'cc ', 'bin/python', 'bin/python', 'bin/tclsh', + 'bin/tclsh', 'bin/nasm', '/perl', + + // Windows-related + 'cmd.exe', 'nc.exe', 'ftp.exe', 'powershell', 'system.net.webclient', + + // php.ini settings + 'allow_url_fopen', 'allow_url_include', 'auto_prepend_file', 'disable_functions', 'safe_mode', + 'open_basedir', 'suhosin', 'cgi.force_redirect', 'cgi.redirect_status_env', + + // PHP commands/scripts + 'fopen', 'fwrite', 'phpinfo()', '\', 'base64_decode', 'file_put_contents', + 'set_magic_quotes_runtime', 'set_magic_quotes_runtime', 'display_errors', 'passthru', + 'call_user_func', + + // Typical PHP script remote-inclusions and typical include file names + '.inc.php', '.lib.php', '.class.php', 'config.php', '.inc', '_php', + 'php_', 'class_', '_class.php', 'db_mysql.inc', + + // PHP arrays + '_phplib', '__callbackparam', + + // Generic remote inclusion + '=http://', '=https://', '=php://', + 'path=', 'sql=', + '=%7BQUOT%7D', '=%5C', '=%22http','=%22ftp','=%22file','=%27http','=%27ftp', + '=%27file', + + // Wrappers + 'data://', 'tcp://', 'udp://', 'raw://', 'javascript://', 'file://', 'ftp://', + + // Blocked "users" + 'nigga(', ' nigga', 'nigga ', 'starhack', 'busca', + + // Hidden HTML stuff + ' style=', 'style =', + 'overflow:auto', 'overflow: auto', + 'overflow :auto', 'overflow : auto', + 'display:hidden', 'display: hidden', + 'display :hidden', 'display : hidden', + 'height:0px', 'height: 0px','height:1px', 'height: 1px', + 'width:0px', 'width: 0px','width:1px', 'width: 1px', + + // Uncommon user websites + '~root', '~ftp', '~nobody', + + // Windows XP (?) hacks + 'xp_enumdsn', 'xp_availablemedia', 'xp_filelist', 'xp_cmdshell', + + // Attempts to insert links into a badly secured URL + '%3E%3C', + + // Request header being inserted + 'content-type', + + // /proc/ and other forbidden paths + 'proc/self/environ', + + // MySQL internal functions + 'name_const', + + // Server configuration (e.g. Apache) + 'application/x-httpd-php', 'addtype', 'server-info', 'server-status', + + // Annoying script name + 'vuln.php', + + // @TODO Misc/unsorted + 'cgi-', '.eml', '$_request', '$_get', '$request', '$get', '.system', + '&aim', 'new_password', '&icq', '.conf', 'motd ', 'HTTP/1.', + 'window.open', 'img src', 'img src', '.jsp', 'servlet', 'org.apache', + 'wwwacl', '/servlet/con', 'http_', 'secure_site, ok', 'chunked', + '', 'base64_decode', 'file_put_contents', + 'set_magic_quotes_runtime', 'set_magic_quotes_runtime', 'display_errors', 'passthru', + + // Typical PHP script remote-inclusions and typical include file names + '.inc.php', '.lib.php', '.class.php', 'config.php', '.inc', '_php', + 'php_', 'class_', '_class.php', 'db_mysql.inc', + + // PHP arrays + '_phplib', '__callbackparam', + + // Request header being inserted + 'content-type', + + // /proc/ and other forbidden paths + 'proc/self/environ', + ]; + + // BLock these words found in User-Agent + $GLOBALS['ctracker_ua_blacklist'] = array( + // Compiler/interpreter + 'bin/g++ ', 'bin/c++ ', 'cc ', 'bin/python', 'bin/python', 'bin/tclsh', + 'bin/tclsh', 'bin/nasm', '/perl', 'cmd.exe', + 'nc.exe', 'ftp.exe', 'wget ', 'system(', 'curl ', + + // php.ini settings + 'allow_url_fopen', 'allow_url_include', 'auto_prepend_file', 'disable_functions', 'safe_mode', + + // PHP commands/scripts + 'fopen', 'fwrite', 'phpinfo()', '\', 'base64_decode', 'file_put_contents', + 'set_magic_quotes_runtime', 'set_magic_quotes_runtime', 'display_errors', 'passthru', + + // Server configuration (e.g. Apache) + 'application/x-httpd-php', + + // Typical PHP script remote-inclusions and typical include file names + '.inc.php', '.lib.php', '.class.php', 'config.php', '.inc', '_php', + 'php_', 'class_', '_class.php', 'db_mysql.inc', + + // PHP arrays + '_phplib', '__callbackparam', + + // Request header being inserted + 'content-type', - // Attacks we should detect and blok - $GLOBALS['ctracker_wormprotector'] = array( - 'chr(', 'chr=', 'chr%20', '%20chr', 'wget%20', '%20wget', 'wget(', - 'cmd=', '%20cmd', 'cmd%20', 'rush=', '%20rush', 'rush%20', - 'union%20', '%20union', 'union(', 'union=', 'echr(', '%20echr', 'echr%20', 'echr=', - 'esystem(', 'esystem%20', 'cp%20', '%20cp', 'cp(', 'mdir%20', '%20mdir', 'mdir(', - 'mcd%20', 'mrd%20', 'rm%20', '%20mcd', '%20mrd', '%20rm', - 'mcd(', 'mrd(', 'rm(', 'mcd=', 'mrd=', 'mv%20', 'rmdir%20', 'mv(', 'rmdir(', - 'chmod(', 'chmod%20', '%20chmod', 'chmod(', 'chmod=', 'chown%20', 'chgrp%20', 'chown(', 'chgrp(', - 'locate%20', 'grep%20', 'locate(', 'grep(', 'diff%20', 'kill%20', 'kill(', 'killall', - 'passwd%20', '%20passwd', 'passwd(', 'telnet%20', 'vi(', 'vi%20', 'cgi-', '.eml', - 'insert%20into', 'select%20', 'nigga(', '%20nigga', 'nigga%20', 'fopen', 'fwrite', '%20like', 'like%20', - '$_request', '$_get', '$request', '$get', '.system', 'HTTP_PHP', '&aim', '%20getenv', 'getenv%20', - 'new_password', '&icq','/etc/passwd','/etc/shadow', '/etc/groups', '/etc/gshadow', - 'HTTP_USER_AGENT', 'HTTP_HOST', 'wget%20', 'uname\x20-a', 'bin/id', '/bin/', '/chgrp', - '/chown', '/usr/bin', 'g\+\+', 'bin/python', 'bin/tclsh', 'bin/nasm', 'perl%20', 'traceroute%20', - 'ping%20', '.pl', 'bin/xterm', 'lsof%20', '.conf', 'motd%20', 'HTTP/1.', '.inc.php', '.lib.php', - 'config.php', 'file\://', 'window.open', '