Page 1 of 1

New hack script format (cxs may need update)

Posted: 02 Oct 2011, 18:14
by tvcnet
Hi folks,
I've just started observing a relatively new format for the gzinflate/base64 hacks, now starting with:
<?php $D=strrev('edoced_46esab');$s=gzinflate

Here is a picture snippet of a hack I observed this past week, which CXS does not pick up as a hack (when it should have).
It's a pretty egregious web orb / filesman type hack which CXS should have caught:
http://tvcnet.net/images/tutorials/2011-10-02_1008.png

You folks need anything further from me to improve CXS in catching these from now on?

You'll find a discussion on this script which CXS missed here. Search on page for: gzinflate($D('7X1te9s2suh3
http://ksforum.inboxrevenge.com/viewtop ... 5&start=15


-Jim

Re: New hack script format (cxs may need update)

Posted: 03 Oct 2011, 02:08
by Sergio
If you have the file of this script, you can contribute and send it to ConfigServer using the option --wttw to send it, then CXS will include this on the next update.

Read the documentation.txt for more details.

Sergio

Re: New hack script format (cxs may need update)

Posted: 13 Oct 2011, 10:53
by chirpy
That is probably too complex an encoding method for cxs to easily decode. However, if you find exploits using such a method that cxs does not detect, then submit them to us as explained by Sergio above.