当前位置:首页 > PHP教程 > PHP高级教程

PHP实现webshell扫描文件木马的方法

本文实例讲述了php实现webshell扫描文件木马的方法。分享给大家供大家参考,具体如下:

可扫描 weevelyshell 生成 或加密的shell 及各种变异webshell

目前仅支持php

支持扫描 weevelyshell 生成 或加密的shell
支持扫描callback一句话shell
支持各种php大马

<!doctype html> <html> <head> <meta charset='gb2312'> <title>php web shell scan</title> </head> <body> </body> <?php define("self",php_self()); error_reporting(e_error); ini_set('max_execution_time',20000); ini_set('memory_limit','512m'); header("content-type: text/html; charset=gb2312"); function weevelyshell($file){ $content=file_get_contents($file); if( ( preg_match('#($w{2,4}s?=s?str_replace("w+","","[w_]+");s?)+#s',$content)&& preg_match('#($w{2,4}s?=s?"[wd+/=]+";s?)+#',$content)&& preg_match('#$[w]{2,4}s?=s$[w]{2,4}('',s?$w{2,4}($w{2,4}("w{1,4}",s?"",s?$w{2,4}.$w{2,4}.$w{2,4}.$w{2,4})));s+?$w{2,4}();#',$content)) || (preg_match('#$w+ds?=s?str_replace("[wd]+","","[wd]+");#s',$content)&& preg_match('#$w+s?=s?$[wd]+('',s?$[wd]+($w+($w+("[[:punct:]]+",s?"",s?$w+.$w+.$w+.$w+))));s?$w+();#s',$content)) ){ return true; } } function callbackshell($file){ $content=file_get_contents($file); if( preg_match('#$w+s?=s?$_(?:get|post|request|cookie|server)[.*?]#is',$content)&& preg_match('#$w+s?=s?(?:new)?s?arrayw*s?(.*?_(?:get|post|request|cookie|server)[.*?].*?)+#is',$content)&& preg_match('#(?:array_(?:reduce|map|udiff|walk|walk_recursive|filter)|u[ak]sort)s?(.*?)+?#is',$content) ) return true; } function php_self(){ $php_self=substr($_server['php_self'],strrpos($_server['php_self'],'/')+1); return $php_self; } $matches = array( '/mb_ereg_replace(['*s,."]+$_(?:get|post|request|cookie|server)[['"].*?['"][]][,s'"]+e['"]'/is, '/preg_filter(['"|.*e]+.*$_(?:get|post|request|cookie|server)/is', '/create_functions?(.*assert(/is', '/ini_get('safe_mode')/i', '/get_current_user(.*?)/i', '/@?asserts?($.*?)/i', '/proc_opens?(.*?pipe',s?'w')/is', '/str_replaces?(['"].*?['"],['"].*?['"]s?,s?'a[[:alnum:][:punct:]]+?s[[:alnum:][:punct:]]+?s[[:alnum:][:punct:]]+?e[[:alnum:][:punct:]]+?r[[:alnum:][:punct:]]+?t[[:alnum:][:punct:]]+?)/i', '/preg_replace_callback(.*?create_function(/is', '/filter_var(?:_array)?s?.*?$_(?:get|post|request|cookie|server)[['"][[:punct:][:alnum:]]+['"]][[:punct:][:alnum:][:space:]]+?assert['"])/is', '/ob_start(['"]+assert['"]+)/is', '/news?reflectionfunction(.*?->invoke(/is', '/pdo::fetch_func/', '/$w+.*s?(?:=|->)s?.*?['"]assert['"])?/i', '/$w+->(?:sqlite)?createfunction(.*?)/i', '/eval(["']?\?$w+s?=s?.*?)/i', '/eval(.*?gzinflate(base64_decode(/i', '/copy($http_post_files['w+']s?['tmp_name']/i', '/register_(?:shutdown|tick)_functions?($w+,s$_(?:get|post|request|cookie|server)[.*?])/is', '/register_(?:shutdown|tick)_functions?(?['"]assert["'].*?)/i', '/call_user_func.*?(["|']assert["|'],.*$_(?:get|post|request|cookie|server)[['|"].*])+/is', '/preg_replace(.*?e.*?'s?,s?.*?w+(.*?)/i', '/function_existss*(s*['|"](popen|exec|proc_open|system|passthru)+['|"]s*)/i', '/(exec|shell_exec|system|passthru)+s*(s*$_(w+)[(.*)]s*)/i', '/(exec|shell_exec|system|passthru)+s*($w+)/i', '/(exec|shell_exec|system|passthru)s?(w+("http_.*"))/i', '/(?:john.barker446@gmail.com|xb5@hotmail.com|shopen@aventgrup.net|milw0rm.com|www.aventgrup.net|mgeisler@mgeisler.net)/i', '/phps*?shell/i', '/((udp|tcp)://(.*);)+/i', '/preg_replaces*((.*)/e(.*),s*$_(.*),(.*))/i', '/preg_replaces*((.*)(base64_decode($/i', '/(eval|assert|include|require|include_once|require_once)+s*(s*(base64_decode|str_rot13|gz(w+)|file_(w+)_contents|(.*)php://input)+/i', '/(eval|assert|include|require|include_once|require_once|array_map|array_walk)+s*(.*?$_(?:get|post|request|cookie|server|session)+[(.*)]s*)/i', '/evals*(s*(s*$$(w+)/i', '/((?:include|require|include_once|require_once)+s*(?s*['|"]w+.(?!php).*['|"])/i', '/$_(w+)(.*)(eval|assert|include|require|include_once|require_once)+s*(s*$(w+)s*)/i', '/(s*$_files[(.*)][(.*)]s*,s*$_(get|post|request|files)+[(.*)][(.*)]s*)/i', '/(fopen|fwrite|fputs|file_put_contents)+s*((.*)$_(get|post|request|cookie|server)+[(.*)](.*))/i', '/echos*curl_execs*(s*$(w+)s*)/i', '/new coms*(s*['|"]shell(.*)['|"]s*)/i', '/$(.*)s*((.*)/e(.*),s*$_(.*),(.*))/i', '/$_=(.*)$_/i', '/$_(get|post|request|cookie|server)+[(.*)](s*$(.*))/i', '/$(w+)s*(s*$_(get|post|request|cookie|server)+[(.*)]s*)/i', '/$(w+)s*(s*${(.*)}/i', '/$(w+)s*(s*chr(d+)/i' ); function antivirus($dir,$exs,$matches) { if(($handle = @opendir($dir)) == null) return false; while(false !== ($name = readdir($handle))) { if($name == '.' || $name == '..') continue; $path = $dir.$name; if(strstr($name,self)) continue; //$path=iconv("utf-8","gb2312",$path); if(is_dir($path)) { //chmod($path,0777);/*主要针对一些0111的目录*/ if(is_readable($path)) antivirus($path.'/',$exs,$matches); } elseif(strpos($name,';') > -1 || strpos($name,'%00') > -1 || strpos($name,'/') > -1) { echo '特征 <input type="text" style="width:250px;" value="解析漏洞"> '.$path.'<div></div>'; flush(); ob_flush(); } else { if(!preg_match($exs,$name)) continue; if(filesize($path) > 10000000) continue; $fp = fopen($path,'r'); $code = fread($fp,filesize($path)); fclose($fp); if(empty($code)) continue; if(weevelyshell($path)){ echo '特征 <input type="text" style="width:250px;" value="weevely 加密shell"> '.$path.'<div></div>'; flush(); ob_flush(); }elseif(callbackshell($path)){ echo '特征 <input type="text" style="width:250px;" value="callback shell"> '.$path.'<div></div>'; flush(); ob_flush(); } foreach($matches as $matche) { $array = array(); preg_match($matche,$code,$array); if(!$array) continue; if(strpos($array[0],"x24x74x68x69x73x2dx3e")) continue; $len = strlen($array[0]); if($len > 6 && $len < 200) { echo '特征 <input type="text" style="width:250px;" value="'.htmlspecialchars($array[0]).'"> '.$path.'<div></div>'; flush(); ob_flush(); break; } } unset($code,$array); } } closedir($handle); return true; } function strdir($str) { return str_replace(array('\','//','//'),array('/','/','/'),chop($str)); } echo '<form method="post">'; echo '路径: <input type="text" name="dir" value="'.($_post['dir'] ? strdir($_post['dir'].'/') : strdir($_server['document_root'].'/')).'" style="width:398px;"><div></div>'; echo '后缀: <input type="text" name="exs" value="'.($_post['exs'] ? $_post['exs'] : '.php|.inc|.phtml').'" style="width:398px;"><div></div>'; echo '操作: <input type="submit" style="width:80px;" value="scan"><div></div>'; echo '</form>'; if(file_exists($_post['dir']) && $_post['exs']) { $dir = strdir($_post['dir'].'/'); $exs = '/('.str_replace('.','\.',$_post['exs']).')/i'; echo antivirus($dir,$exs,$matches) ? '</br ><div></div>扫描完毕!' : '</br > <div></div>扫描中断'; } ?> </html>

更多关于php相关内容感兴趣的读者可查看本站专题:《php程序设计安全教程》、《php安全过滤技巧总结》、《php运算与运算符用法总结》、《php网络编程技巧总结》、《php基本语法入门教程》、《php面向对象程序设计入门教程》、《php字符串(string)用法总结》、《php+mysql数据库操作入门教程》及《php常见数据库操作技巧汇总》

希望本文所述对大家php程序设计有所帮助。



【说明】本文章由站长整理发布,文章内容不代表本站观点,如文中有侵权行为,请与本站客服联系(QQ:)!