Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/4lph4shell/alphashell-terminal-bash

AlphaShell Host Terminal bash v7.4.7 grom
https://github.com/4lph4shell/alphashell-terminal-bash

base64 brute-force bypass cms database-access ddos ddos-attack-tools decoder dumper eval fake-data hashing-algorithm perl sha256-hash shell shellscript sql terminal-based terminal-emulator whmcs

Last synced: 2 months ago
JSON representation

AlphaShell Host Terminal bash v7.4.7 grom

Awesome Lists containing this project

README

        

# AlphaShell-Terminal-bash
# Orginal files

AlphaShell-Host/Server-Terminal-bash



# Full Package



Depending on the scope of changes and feature enhancements that are added to an existing web shell’s source code, these updates can be tedious and time consuming for bad actors. For this reason, it’s common to see code for web shells reused among different, unaffiliated attackers.



# Alfa-Shell-v7.4.7-GROM



The ALFA-TEaM shell contains an enormous number of features, the latest version v7.4.7.
When comparing v7.47’s PHP code, we can see the following new features, which are not present in v3 of the web shell:



The first three are just variations of existing features (e.g coldumper) and relatively common among multi-featured PHP web shells.
Let’s focus on the behavior of the last three features: ** fakepage, config_grabber, and archive_manager. **

# Fake Page
In my opinion, ** fakepage ** is of the most interesting new features added to v7.4.7. It allows the attacker to create an on-the-fly phishing page for the two most common hosting control panels: cPanel and DirectAdmin.




As demonstrated above, there are a few parameters that the attacker can input when setting up the fake control panel page from the web shell. I’ve explained them in more detail below to help you understand what is going on here.
# config_grabber



This feature is used to recursively search for configuration files. It uses two functions; alfaconfig_grabber for the display in the web shell and Alfa_ConfigGrabber for performing the search.

While in theory this could be a potentially helpful feature, these searches return many files (as seen above), including those that don’t contain any MySQL database user login information whatsoever. This is due to greedy search terms contained in the $pattern function, causing it to return a lot of unneeded results.

# Archive Manager




The Archive Manager feature allows the attacker to quickly unpack archive files (e.g .zip, .tar.gz, .gz, etc) into the server’s memory by generating a Phar PHP resource. The attacker can then manage the contents as if they had unpacked the archive in a file manager, but it is instead loaded into memory and doesn’t unpack to a directory.

## ⚠️ WARNING: LEGAL DISCLAIMER

This tool is intended for **educational and ethical use only**. The author is not liable for any illegal use or misuse of this tool. Users are solely responsible for their actions and must ensure they have explicit permission to scan the target systems.



** ALFA TEaM Shell ~ v7.4.7-GROM ** contains a lot of features useful to an attacker and is also polished in terms of its interface. What is especially interesting is to observe the evolution of the tool and see what features have been added with each new version. This also helps give someone insight into what is important to an attacker, not solely from a website owner’s perspective.


# US



![Alt](https://repobeats.axiom.co/api/embed/c6c5d8c6f802c26c7dcb4d5f7bbda6a4fcd28bdc.svg "Repobeats analytics image")

## 🌐 Socials:
[![website](https://img.shields.io/badge/🐺-website-4EA94B.svg?&logo=web&logoColor=white)](https://www.4lph4.ir)

[![Instagram](https://img.shields.io/badge/Instagram-%23E4405F.svg?logo=Instagram&logoColor=white)](https://instagram.com/4lph4.co)

[![telegram](https://img.shields.io/badge/Telegram-2CA5E0.svg?&logo=telegram&logoColor=white)](https://t.me/ALPH4Co)
[![telegram](https://img.shields.io/badge/Telegram-Topic-2CA5E0.svg?&logo=telegram&logoColor=white)](https://t.me/ALPH4ir)

[![youtube](https://img.shields.io/badge/You-tube-%23E4405F.svg?logo=youtube&logoColor=white)](https://www.youtube.com/@4lph4co)