kritbit

kritbit Git Source Tree


Root/scripts/runcommand.py

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
#!/bin/python
 
import shlex
from subprocess import Popen, PIPE
import sys
import rijndael
import base64
import string
import random
import json
import time
import hashlib
import pycurl
from urllib import urlencode
 
try:
    from cStringIO import StringIO
except ImportError:
    try:
        from StringIO import StringIO
    except ImportError:
        from io import StringIO
 
#
#  REPLACE THESE VALUES
#
 
SHARED_KEY = ""
HASH = ""
URL = ""
 
#
#
#
 
KEY_SIZE = 16
BLOCK_SIZE = 32
# JamPAo52/smpiObKa8p/MY5WAeDww0cOg9KiG6gMAYQ=
 
def curl_post(url, postvals, header = []):
    buffer = StringIO()
    cobj = pycurl.Curl()
    cobj.setopt(pycurl.URL, url)
    cobj.setopt(pycurl.POST, 1)
    cobj.setopt(pycurl.WRITEDATA, buffer)
    postdata = urlencode(postvals)
    cobj.setopt(pycurl.POSTFIELDS, postdata)
    cobj.setopt(pycurl.HTTPHEADER, header)
    cobj.perform()
    cobj.close()
    return buffer
 
def get_exitcode_stdout_stderr(cmd):
    """
    Execute the external command and get its exitcode, stdout and stderr.
    """
    args = shlex.split(cmd)
 
    proc = Popen(args, stdout=PIPE, stderr=PIPE, shell=True)
    out, err = proc.communicate()
    exitcode = proc.returncode
    #
    return exitcode, out, err
 
def encrypt(key, plaintext):
    padded_key = key.ljust(KEY_SIZE, '\0')
    padded_text = plaintext + (BLOCK_SIZE - len(plaintext) % BLOCK_SIZE) * '\0'
 
    # could also be one of
    #if len(plaintext) % BLOCK_SIZE != 0:
    #    padded_text = plaintext.ljust((len(plaintext) / BLOCK_SIZE) + 1 * BLOCKSIZE), '\0')
    # -OR-
    #padded_text = plaintext.ljust((len(plaintext) + (BLOCK_SIZE - len(plaintext) % BLOCK_SIZE)), '\0')
 
    r = rijndael.rijndael(padded_key, BLOCK_SIZE)
 
    ciphertext = ''
    for start in range(0, len(padded_text), BLOCK_SIZE):
        ciphertext += r.encrypt(padded_text[start:start+BLOCK_SIZE])
 
    encoded = base64.b64encode(ciphertext)
 
    return encoded
 
 
def decrypt(key, encoded):
    padded_key = key.ljust(KEY_SIZE, '\0')
 
    ciphertext = base64.b64decode(encoded)
 
    r = rijndael.rijndael(padded_key, BLOCK_SIZE)
 
    padded_text = ''
    for start in range(0, len(ciphertext), BLOCK_SIZE):
        padded_text += r.decrypt(ciphertext[start:start+BLOCK_SIZE])
 
    plaintext = padded_text.split('\x00', 1)[0]
 
    return plaintext
     
 
start_time = time.time()
exitcode, out, err = get_exitcode_stdout_stderr(sys.argv[1])
total = time.time() - start_time
nonce = ''.join(random.SystemRandom().choice(string.hexdigits + string.digits) for _ in range(10))
message = {}
message["nonce"] = nonce
message["message"] = json.dumps({"output":out, "time_taken": total, "result": exitcode})
message["signature"] = hashlib.sha256(message["message"] + nonce + HASH).hexdigest()
message["message"] = encrypt(SHARED_KEY, message["message"])
print curl_post(URL, {"data": json.dumps(message)}).getvalue()

Archive Download this file

Branches

Number of commits:
Page rendered in 0.07943s using 11 queries.