);
// Attacks we should detect and blok
- $GLOBALS['ctracker_wormprotector'] = array(
+ $GLOBALS['ctracker_get_blacklist'] = array(
'chr(', 'chr=', 'chr%20', '%20chr', 'wget%20', '%20wget', 'wget(',
'cmd=', '%20cmd', 'cmd%20', 'rush=', '%20rush', 'rush%20',
'union%20', '%20union', 'union(', 'union=', 'echr(', '%20echr', 'echr%20', 'echr=',
'insert%20into', 'select%20', 'nigga(', '%20nigga', 'nigga%20', 'fopen', 'fwrite', '%20like', 'like%20',
'$_request', '$_get', '$request', '$get', '.system', 'HTTP_PHP', '&aim', '%20getenv', 'getenv%20',
'new_password', '&icq','/etc/passwd','/etc/shadow', '/etc/groups', '/etc/gshadow',
- 'HTTP_USER_AGENT', 'HTTP_HOST', 'wget%20', 'uname\x20-a', 'bin/id', '/bin/', '/chgrp',
+ 'HTTP_USER_AGENT', 'HTTP_HOST', 'wget%20', 'uname\x20-', 'uname%20-', 'bin/id', '/bin/', '/chgrp',
'/chown', '/usr/bin', 'g\+\+', 'bin/python', 'bin/tclsh', 'bin/nasm', 'perl%20', 'traceroute%20',
'ping%20', '.pl', 'bin/xterm', 'lsof%20', '.conf', 'motd%20', 'HTTP/1.', '.inc.php', '.lib.php',
'config.php', 'file\://', 'window.open', '<SCRIPT>', 'javascript\://', 'img src', 'img%20src', '.jsp',
'select from', 'drop%20', '.system', 'getenv', 'http_', '_php', 'php_', 'phpinfo()', '\<?php', '?\>', 'sql=',
'div style=', 'overflow: auto', 'height: 1px', 'cc%20', 'admin_action=', 'path=', 'action=http',
'page=http', 'module=http', 'op=http', 'id=http', 'id%3Dhttp', 'action%3Dhttp', 'page%3Dhttp',
- 'module%3Dhttp', 'op%3Dhttp', 'starhack', '../../', 'directory=http', 'dir=http', 'busca', 'uol.com',
- '=http://', '=https://','=ftp://','_SESSION','CFG_ROOT','/proc/'
+ 'module%3Dhttp', 'op%3Dhttp', 'starhack', '../../','..//', 'directory=http', 'dir=http', 'busca',
+ 'uol.com', '=http://', '=https://','=ftp://','=file://','_SESSION','CFG_ROOT','/proc/'
);
// Block these words found in POST requests
// Checks for worms
function isCrackerTrackerWormDetected () {
// Check against the whole list
- $GLOBALS['ctracker_checkworm'] = str_replace($GLOBALS['ctracker_wormprotector'], '*', crackerTrackerQueryString());
+ $GLOBALS['ctracker_checkworm'] = str_replace($GLOBALS['ctracker_get_blacklist'], '*', crackerTrackerQueryString());
// If it differs to original and the *whole* request string is not in whitelist
// then blog the attempt
// Prepares a mail and send it out
function sendCrackerTrackerMail () {
+ // Log the attack
+ crackerTrackerLogAttack();
+
// Mail content
$mail = "Attack detected:
-----------------------------------------------------
-----------------------------------------------------
";
- // Log the attack
- crackerTrackerLogAttack();
-
// Send it out
crackerTrackerSendMail($mail);
// Sends a detected POST attack mail
function sendCrackerTrackerPostMail () {
+ // Log the attack
+ crackerTrackerLogAttack();
+
// Mail text
$mail = "POST-Attack detected:
-----------------------------------------------------
-----------------------------------------------------
";
- // Log the attack
- crackerTrackerLogAttack();
-
// Send it out
crackerTrackerSendMail($mail);
// Close database link
crackerTrackerCloseDatabaseLink();
- // Sleep a little to waste the attacker's time
- if (!isCrackerTrackerDebug()) sleep(mt_rand(10,30));
+ // Do only sleep if debug/developer mode is not enabled
+ if (!isCrackerTrackerDebug()) {
+ // Sleep a little to waste the attacker's time
+ sleep(mt_rand(10,30));
+ } // END - if
// Bye, bye...
if (isCrackerTrackerDebug()) {
- // With debug backtrace
+ // With debug backtrace in debug/developer mode
print '<pre>';
debug_print_backtrace();
die('</pre>');
} else {
- // Simple die()
+ // Simple die() call
die();
}
}