作者热门文章
- ubuntu12.04环境下使用kvm ioctl接口实现最简单的虚拟机
- Ubuntu 通过无线网络安装Ubuntu Server启动系统后连接无线网络的方法
- 在Ubuntu上搭建网桥的方法
- ubuntu 虚拟机上网方式及相关配置详解
CFSDN坚持开源创造价值,我们致力于搭建一个资源共享平台,让每一个IT人在这里找到属于你的精彩世界.
这篇CFSDN的博客文章PHP实现webshell扫描文件木马的方法由作者收集整理,如果你对这篇文章有兴趣,记得点赞哟.
本文实例讲述了PHP实现webshell扫描文件木马的方法。分享给大家供大家参考,具体如下:
可扫描 weevelyshell 生成 或加密的shell 及各种变异webshell 。
目前仅支持php 。
支持扫描 weevelyshell 生成 或加密的shell 支持扫描callback一句话shell 支持各种php大马 。
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
|
<!DOCTYPE html>
<html>
<head>
<meta charset=
'gb2312'
>
<title>PHP web shell scan</title>
</head>
<body>
</body>
<?php
define(
"SELF"
,php_self());
error_reporting
(E_ERROR);
ini_set
(
'max_execution_time'
,20000);
ini_set
(
'memory_limit'
,
'512M'
);
header(
"content-Type: text/html; charset=gb2312"
);
function
weevelyshell(
$file
){
$content
=
file_get_contents
(
$file
);
if
(
(
preg_match(
'#(\$\w{2,4}\s?=\s?str_replace\("\w+","","[\w_]+"\);\s?)+#s'
,
$content
)&&
preg_match(
'#(\$\w{2,4}\s?=\s?"[\w\d\+\/\=]+";\s?)+#'
,
$content
)&& preg_match(
'#\$[\w]{2,4}\s?=\s\$[\w]{2,4}\(\'\',\s?\$\w{2,4}\(\$\w{2,4}\("\w{1,4}",\s?"",\s?\$\w{2,4}\.\$\w{2,4}\.\$\w{2,4}\.\$\w{2,4}\)\)\);\s+?\$\w{2,4}\(\)\;#'
,
$content
))
||
(preg_match(
'#\$\w+\d\s?=\s?str_replace\(\"[\w\d]+\",\"\",\"[\w\d]+\"\);#s'
,
$content
)&&
preg_match(
'#\$\w+\s?=\s?\$[\w\d]+\(\'\',\s?\$[\w\d]+\(\$\w+\(\$\w+\(\"[[:punct:]]+\",\s?\"\",\s?\$\w+\.\$\w+\.\$\w+\.\$\w+\)\)\)\);\s?\$\w+\(\);#s'
,
$content
))
){
return
true;
}
}
function
callbackshell(
$file
){
$content
=
file_get_contents
(
$file
);
if
(
preg_match(
'#\$\w+\s?=\s?\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\[.*?\]#is'
,
$content
)&&
preg_match(
'#\$\w+\s?=\s?(?:new)?\s?array\w*\s?\(.*?_(?:GET|POST|REQUEST|COOKIE|SERVER)\[.*?\].*?\)+#is'
,
$content
)&&
preg_match(
'#(?:array_(?:reduce|map|udiff|walk|walk_recursive|filter)|u[ak]sort)\s?\(.*?\)+?#is'
,
$content
)
)
return
true;
}
function
php_self(){
$php_self
=
substr
(
$_SERVER
[
'PHP_SELF'
],
strrpos
(
$_SERVER
[
'PHP_SELF'
],
'/'
)+1);
return
$php_self
;
}
$matches
=
array
(
'/mb_ereg_replace\([\'\*\s\,\.\"]+\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\[[\'\"].*?[\'\"][\]][\,\s\'\"]+e[\'\"]'
/is,
'/preg_filter\([\'\"\|\.\*e]+.*\$_(?:GET|POST|REQUEST|COOKIE|SERVER)/is'
,
'/create_function\s?\(.*assert\(/is'
,
'/ini_get\(\'safe_mode\'\)/i'
,
'/get_current_user\(.*?\)/i'
,
'/@?assert\s?\(\$.*?\)/i'
,
'/proc_open\s?\(.*?pipe\',\s?\'w\'\)/is'
,
'/sTr_RepLaCe\s?\([\'\"].*?[\'\"],[\'\"].*?[\'\"]\s?,\s?\'a[[:alnum:][:punct:]]+?s[[:alnum:][:punct:]]+?s[[:alnum:][:punct:]]+?e[[:alnum:][:punct:]]+?r[[:alnum:][:punct:]]+?t[[:alnum:][:punct:]]+?\)/i'
,
'/preg_replace_callback\(.*?create_function\(/is'
,
'/filter_var(?:_array)?\s?.*?\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\[[\'\"][[:punct:][:alnum:]]+[\'\"]\][[:punct:][:alnum:][:space:]]+?assert[\'\"]\)/is'
,
'/ob_start\([\'\"]+assert[\'\"]+\)/is'
,
'/new\s?ReflectionFunction\(.*?->invoke\(/is'
,
'/PDO::FETCH_FUNC/'
,
'/\$\w+.*\s?(?:=|->)\s?.*?[\'\"]assert[\'\"]\)?/i'
,
'/\$\w+->(?:sqlite)?createFunction\(.*?\)/i'
,
'/eval\([\"\']?\\\?\$\w+\s?=\s?.*?\)/i'
,
'/eval\(.*?gzinflate\(base64_decode\(/i'
,
'/copy\(\$HTTP_POST_FILES\[\'\w+\'\]\s?\[\'tmp_name\'\]/i'
,
'/register_(?:shutdown|tick)_function\s?\(\$\w+,\s\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\[.*?\]\)/is'
,
'/register_(?:shutdown|tick)_function\s?\(?[\'\"]assert[\"\'].*?\)/i'
,
'/call_user_func.*?\([\"|\']assert[\"|\'],.*\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\[[\'|\"].*\]\)+/is'
,
'/preg_replace\(.*?e.*?\'\s?,\s?.*?\w+\(.*?\)/i'
,
'/function_exists\s*\(\s*[\'|\"](popen|exec|proc_open|system|passthru)+[\'|\"]\s*\)/i'
,
'/(exec|shell_exec|system|passthru)+\s*\(\s*\$_(\w+)\[(.*)\]\s*\)/i'
,
'/(exec|shell_exec|system|passthru)+\s*\(\$\w+\)/i'
,
'/(exec|shell_exec|system|passthru)\s?\(\w+\(\"http_.*\"\)\)/i'
,
'/(?:john\.barker446@gmail\.com|xb5@hotmail\.com|shopen@aventgrup\.net|milw0rm\.com|www\.aventgrup\.net|mgeisler@mgeisler\.net)/i'
,
'/Php\s*?Shell/i'
,
'/((udp|tcp)\:\/\/(.*)\;)+/i'
,
'/preg_replace\s*\((.*)\/e(.*)\,\s*\$_(.*)\,(.*)\)/i'
,
'/preg_replace\s*\((.*)\(base64_decode\(\$/i'
,
'/(eval|assert|include|require|include_once|require_once)+\s*\(\s*(base64_decode|str_rot13|gz(\w+)|file_(\w+)_contents|(.*)php\:\/\/input)+/i'
,
'/(eval|assert|include|require|include_once|require_once|array_map|array_walk)+\s*\(.*?\$_(?:GET|POST|REQUEST|COOKIE|SERVER|SESSION)+\[(.*)\]\s*\)/i'
,
'/eval\s*\(\s*\(\s*\$\$(\w+)/i'
,
'/((?:include|require|include_once|require_once)+\s*\(?\s*[\'|\"]\w+\.(?!php).*[\'|\"])/i'
,
'/\$_(\w+)(.*)(eval|assert|include|require|include_once|require_once)+\s*\(\s*\$(\w+)\s*\)/i'
,
'/\(\s*\$_FILES\[(.*)\]\[(.*)\]\s*\,\s*\$_(GET|POST|REQUEST|FILES)+\[(.*)\]\[(.*)\]\s*\)/i'
,
'/(fopen|fwrite|fputs|file_put_contents)+\s*\((.*)\$_(GET|POST|REQUEST|COOKIE|SERVER)+\[(.*)\](.*)\)/i'
,
'/echo\s*curl_exec\s*\(\s*\$(\w+)\s*\)/i'
,
'/new com\s*\(\s*[\'|\"]shell(.*)[\'|\"]\s*\)/i'
,
'/\$(.*)\s*\((.*)\/e(.*)\,\s*\$_(.*)\,(.*)\)/i'
,
'/\$_\=(.*)\$_/i'
,
'/\$_(GET|POST|REQUEST|COOKIE|SERVER)+\[(.*)\]\(\s*\$(.*)\)/i'
,
'/\$(\w+)\s*\(\s*\$_(GET|POST|REQUEST|COOKIE|SERVER)+\[(.*)\]\s*\)/i'
,
'/\$(\w+)\s*\(\s*\$\{(.*)\}/i'
,
'/\$(\w+)\s*\(\s*chr\(\d+\)/i'
);
function
antivirus(
$dir
,
$exs
,
$matches
) {
if
((
$handle
= @opendir(
$dir
)) == NULL)
return
false;
while
(false !== (
$name
= readdir(
$handle
))) {
if
(
$name
==
'.'
||
$name
==
'..'
)
continue
;
$path
=
$dir
.
$name
;
if
(
strstr
(
$name
,SELF))
continue
;
//$path=iconv("UTF-8","gb2312",$path);
if
(
is_dir
(
$path
)) {
//chmod($path,0777);/*主要针对一些0111的目录*/
if
(
is_readable
(
$path
)) antivirus(
$path
.
'/'
,
$exs
,
$matches
);
}
elseif
(
strpos
(
$name
,
';'
) > -1 ||
strpos
(
$name
,
'%00'
) > -1 ||
strpos
(
$name
,
'/'
) > -1) {
echo
'特征 <input type="text" style="width:250px;" value="解析漏洞"> '
.
$path
.
'<div></div>'
;
flush
(); ob_flush();
}
else
{
if
(!preg_match(
$exs
,
$name
))
continue
;
if
(
filesize
(
$path
) > 10000000)
continue
;
$fp
=
fopen
(
$path
,
'r'
);
$code
=
fread
(
$fp
,
filesize
(
$path
));
fclose(
$fp
);
if
(
empty
(
$code
))
continue
;
if
(weevelyshell(
$path
)){
echo
'特征 <input type="text" style="width:250px;" value="weevely 加密shell"> '
.
$path
.
'<div></div>'
;
flush
(); ob_flush();
}
elseif
(callbackshell(
$path
)){
echo
'特征 <input type="text" style="width:250px;" value="Callback shell"> '
.
$path
.
'<div></div>'
;
flush
(); ob_flush();
}
foreach
(
$matches
as
$matche
) {
$array
=
array
();
preg_match(
$matche
,
$code
,
$array
);
if
(!
$array
)
continue
;
if
(
strpos
(
$array
[0],
"\x24\x74\x68\x69\x73\x2d\x3e"
))
continue
;
$len
=
strlen
(
$array
[0]);
if
(
$len
> 6 &&
$len
< 200) {
echo
'特征 <input type="text" style="width:250px;" value="'
.htmlspecialchars(
$array
[0]).
'"> '
.
$path
.
'<div></div>'
;
flush
(); ob_flush();
break
;
}
}
unset(
$code
,
$array
);
}
}
closedir
(
$handle
);
return
true;
}
function
strdir(
$str
) {
return
str_replace
(
array
(
'\\'
,
'//'
,
'//'
),
array
(
'/'
,
'/'
,
'/'
),
chop
(
$str
)); }
echo
'<form method="POST">'
;
echo
'路径: <input type="text" name="dir" value="'
.(
$_POST
[
'dir'
] ? strdir(
$_POST
[
'dir'
].
'/'
) : strdir(
$_SERVER
[
'DOCUMENT_ROOT'
].
'/'
)).
'" style="width:398px;"><div></div>'
;
echo
'后缀: <input type="text" name="exs" value="'
.(
$_POST
[
'exs'
] ?
$_POST
[
'exs'
] :
'.php|.inc|.phtml'
).
'" style="width:398px;"><div></div>'
;
echo
'操作: <input type="submit" style="width:80px;" value="scan"><div></div>'
;
echo
'</form>'
;
if
(
file_exists
(
$_POST
[
'dir'
]) &&
$_POST
[
'exs'
]) {
$dir
= strdir(
$_POST
[
'dir'
].
'/'
);
$exs
=
'/('
.
str_replace
(
'.'
,
'\\.'
,
$_POST
[
'exs'
]).
')/i'
;
echo
antivirus(
$dir
,
$exs
,
$matches
) ?
'</br ><div></div>扫描完毕!'
:
'</br > <div></div>扫描中断'
;
}
?>
</html>
|
希望本文所述对大家PHP程序设计有所帮助.
最后此篇关于PHP实现webshell扫描文件木马的方法的文章就讲到这里了,如果你想了解更多关于PHP实现webshell扫描文件木马的方法的内容请搜索CFSDN的文章或继续浏览相关文章,希望大家以后支持我的博客! 。
引言 一波未平,一波又起。金融公司的业务实在是太引人耳目,何况我们公司的业处正处于风口之上(区块链金融),并且每天有大量现金交易,所以不知道有多少躲在暗处一直在盯着你的系统,让你防不胜防,并且想方
关闭。这个问题需要details or clarity .它目前不接受答案。 想改进这个问题?通过 editing this post 添加详细信息并澄清问题. 2年前关闭。 Improve this
我是一名优秀的程序员,十分优秀!