HEX
Server: Apache
System: Linux vpshost0650.publiccloud.com.br 4.4.79-grsec-1.lc.x86_64 #1 SMP Wed Aug 2 14:18:21 -03 2017 x86_64
User: bandeirantesbomb3 (10068)
PHP: 8.0.7
Disabled: apache_child_terminate,dl,escapeshellarg,escapeshellcmd,exec,link,mail,openlog,passthru,pcntl_alarm,pcntl_exec,pcntl_fork,pcntl_get_last_error,pcntl_getpriority,pcntl_setpriority,pcntl_signal,pcntl_signal_dispatch,pcntl_sigprocmask,pcntl_sigtimedwait,pcntl_sigwaitinfo,pcntl_strerror,pcntl_wait,pcntl_waitpid,pcntl_wexitstatus,pcntl_wifexited,pcntl_wifsignaled,pcntl_wifstopped,pcntl_wstopsig,pcntl_wtermsig,php_check_syntax,php_strip_whitespace,popen,proc_close,proc_open,shell_exec,symlink,system
Upload Files
File: //proc/self/root/proc/thread-self/root/usr/share/doc/m2crypto-0.21.1/demo/medusa/poison_handler.py
import string
import whrandom

RESP_HEAD="""\
<HTML><BODY BGCOLOR=\"#ffffff\">
"""

RESP_MIDDLE="""
<h2>M2Crypto https server demonstration</h2>

This web page is generated by the "poison" http request handler. 
<br>
The links just go on and on and on...
<br><br>
"""

RESP_TAIL="""
</BODY></HTML>
"""

charset='012345678/90ABCDEFGHIJKLM/NOPQRSTUVWXYZabcd/efghijklmnopqrs/tuvwxyz'
numchar=len(charset)

def makepage(numlinks):

    title='<title>'
    for u in range(whrandom.randint(3, 15)):
        pick=whrandom.randint(0, numchar-1)
        title=title+charset[pick]
    title=title+'</title>'

    url='\r\n'
    numlinks=whrandom.randint(2, numlinks)
    for i in range(numlinks): 
        url=url+'<a href="/poison/'
        for u in range(whrandom.randint(3, 15)):
            pick=whrandom.randint(0, numchar-1)
            ch=charset[pick]
            if ch=='/' and url[-1]=='/':
                ch=charset[pick+1]
            url=url+ch
        url=url+'/">'
        for u in range(whrandom.randint(3, 15)):
            pick=whrandom.randint(0, numchar-1)
            url=url+charset[pick]
        url=url+'</a><br>\r\n'

    url=RESP_HEAD+title+RESP_MIDDLE+url+RESP_TAIL
    return url


class poison_handler:
    """This is a clone of webpoison - every URL returns a page of URLs, each of which 
    returns a page of URLs, each of _which_ returns a page of URLs, ad infinitum.
    The objective is to sucker address-harvesting bots run by spammers."""

    def __init__(self, numlinks=10):
        self.numlinks = numlinks
        self.poison_level = 0

    def match(self, request):
        return  (request.uri[:7] == '/poison')

    def handle_request(self, request):
        if request.command == 'get':
            request.push(makepage(self.numlinks))
        request.done()