The files included in this repository are a reverse engineered version of the files which were used against my site during the Drupalgeddon attacks. Read more at http://mattkorostoff.com/article/I-survived-drupalgeddon-how-hackers-took-over-my-site
exploit.php: the main attack file. This injects some SQL and installs 2 backdoors.deobfuscate.php: for reference only. A deobfuscated version of the file which is uploaded on line 60 of exploit.phpexecute-php.php: must be used in conjunction with exploit.php. Once exploit.php has finished running,execute-php.phpcan be used to run any php on the exploited server.inject-sql.php: a stand alone client for SQL injection. This file may be used on its own without running any other file.uploader.php: for reference only. a local version of the file which is fetched on line 175 of exploit.php
secure_file_permissions.sh: A shell script which will set your file permissions to safe valuesvarnish_config.vcl: an example VCL file which will drop all post traffic in Varnishhtaccess.txt: works with the above VCL file. creates a list of IP which are permitted to access apache directly without going through varnish.
exploited_code: an exact copy of my code base, after it was attacked.exploited_db.sql.zip: an exact copy of my database, after it was attacked (passwords removed)
