Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

2.9.3 Is there a backdoor Trojan? #637

Open
buchun2 opened this issue Mar 1, 2025 · 1 comment
Open

2.9.3 Is there a backdoor Trojan? #637

buchun2 opened this issue Mar 1, 2025 · 1 comment
Assignees
Labels
question Further information is requested

Comments

@buchun2
Copy link

buchun2 commented Mar 1, 2025

Question

Is there a backdoor Trojan? There is a callback at the end of the run

Environment

  • Dalfox Version: 2.9.3
    Releases [v2.9.3]
    read tcp 192.168.128.128:36006->44.228.249.3:80

[*] [duration: 13.682142618s][issues: 5] Finish Scan! [*] 🦊 Start scan [SID:4][4/6][66.67%%] / URL: http://testphp.vulnweb.com/listproducts.php?cat= [E] not running Get "http://testphp.vulnweb.com/listproducts.php?cat=": read tcp 192.168.128.128:36006->44.228.249.3:80: read: connection reset by peer [*] 🦊 Start scan [SID:5][5/6][83.33%%] / URL: http://testphp.vulnweb.com/product.php?pic= [I] Content-Type is text/html; charset=UTF-8 [W] Reflected Payload in HTML: pic="><a href=javas&#99;ript:alert(1)/class=dalfox>click 56 line: syntax to use near '"><a href=javas&#99;ript:alert(1)/class=dalfox>click' at lin [POC][R][GET][inHTML-URL] http://testphp.vulnweb.com/product.php?pic=%22%3E%3Ca+href%3Djavas%26%2399%3Bript%3Aalert%281%29%2Fclass%3Ddalfox%3Eclick [V] Triggered XSS Payload (found DOM Object): pic='"><img/src/onerror=.1|alert`` class=dalfox> 56 line: syntax to use near ''"><img/src/onerror=.1|alert`` class=dalfox>' at line 1 [POC][V][GET][inHTML-URL] http://testphp.vulnweb.com/product.php?pic=%27%22%3E%3Cimg%2Fsrc%2Fonerror%3D.1%7Calert%60%60+class%3Ddalfox%3E [*] -------------------------------------------------------------------------------------------------------------- [*] [duration: 11.775009686s][issues: 2] Finish Scan!

@buchun2 buchun2 added the question Further information is requested label Mar 1, 2025
@hahwul hahwul self-assigned this Mar 1, 2025
@hahwul
Copy link
Owner

hahwul commented Mar 1, 2025

@buchun2
Hi! Thanks for your question. Are you referring to the connection to 44.228.249.3:80 that you mentioned? From what I can see, that IP seems to correspond to the target you scanned, testphp.vulnweb.com. If I’ve misunderstood the situation, please feel free to let me know!

Just for reference, unless you’ve specified additional options, Dalfox typically doesn’t send requests to any addresses other than the scan target. The only exception would be if you’re using the remote payload option, in which case it would send a request to assets.hahwul.com. Let me know if you’d like me to dig deeper or clarify anything further!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
question Further information is requested
Projects
None yet
Development

No branches or pull requests

2 participants