PHP实现webshell扫描文件木马的方法

2025-05-27 0 72

本文实例讲述了PHP实现webshell扫描文件木马的方法。分享给大家供大家参考,具体如下:

可扫描 weevelyshell 生成 或加密的shell 及各种变异webshell

目前仅支持php

支持扫描 weevelyshell 生成 或加密的shell
支持扫描callback一句话shell
支持各种php大马

?

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143
<!DOCTYPE html>

<html>

<head>

<meta charset='gb2312'>

<title>PHP web shell scan</title>

</head>

<body>

</body>

<?php

define("SELF",php_self());

error_reporting(E_ERROR);

ini_set('max_execution_time',20000);

ini_set('memory_limit','512M');

header("content-Type: text/html; charset=gb2312");

function weevelyshell($file){

$content=file_get_contents($file);

if(

(

preg_match('#(\\$\\w{2,4}\\s?=\\s?str_replace\\("\\w+","","[\\w_]+"\\);\\s?)+#s',$content)&&

preg_match('#(\\$\\w{2,4}\\s?=\\s?"[\\w\\d\\+\\/\\=]+";\\s?)+#',$content)&& preg_match('#\\$[\\w]{2,4}\\s?=\\s\\$[\\w]{2,4}\\(\\'\\',\\s?\\$\\w{2,4}\\(\\$\\w{2,4}\\("\\w{1,4}",\\s?"",\\s?\\$\\w{2,4}\\.\\$\\w{2,4}\\.\\$\\w{2,4}\\.\\$\\w{2,4}\\)\\)\\);\\s+?\\$\\w{2,4}\\(\\)\\;#',$content))

||

(preg_match('#\\$\\w+\\d\\s?=\\s?str_replace\\(\\"[\\w\\d]+\\",\\"\\",\\"[\\w\\d]+\\"\\);#s',$content)&&

preg_match('#\\$\\w+\\s?=\\s?\\$[\\w\\d]+\\(\\'\\',\\s?\\$[\\w\\d]+\\(\\$\\w+\\(\\$\\w+\\(\\"[[:punct:]]+\\",\\s?\\"\\",\\s?\\$\\w+\\.\\$\\w+\\.\\$\\w+\\.\\$\\w+\\)\\)\\)\\);\\s?\\$\\w+\\(\\);#s',$content))

){

return true;

}

}

function callbackshell($file){

$content=file_get_contents($file);

if(

preg_match('#\\$\\w+\\s?=\\s?\\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\\[.*?\\]#is',$content)&&

preg_match('#\\$\\w+\\s?=\\s?(?:new)?\\s?array\\w*\\s?\\(.*?_(?:GET|POST|REQUEST|COOKIE|SERVER)\\[.*?\\].*?\\)+#is',$content)&&

preg_match('#(?:array_(?:reduce|map|udiff|walk|walk_recursive|filter)|u[ak]sort)\\s?\\(.*?\\)+?#is',$content)

)

return true;

}

function php_self(){

$php_self=substr($_SERVER['PHP_SELF'],strrpos($_SERVER['PHP_SELF'],'/')+1);

return $php_self;

}

$matches = array(

'/mb_ereg_replace\\([\\'\\*\\s\\,\\.\\"]+\\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\\[[\\'\\"].*?[\\'\\"][\\]][\\,\\s\\'\\"]+e[\\'\\"]'/is,

'/preg_filter\\([\\'\\"\\|\\.\\*e]+.*\\$_(?:GET|POST|REQUEST|COOKIE|SERVER)/is',

'/create_function\\s?\\(.*assert\\(/is',

'/ini_get\\(\\'safe_mode\\'\\)/i',

'/get_current_user\\(.*?\\)/i',

'/@?assert\\s?\\(\\$.*?\\)/i',

'/proc_open\\s?\\(.*?pipe\\',\\s?\\'w\\'\\)/is',

'/sTr_RepLaCe\\s?\\([\\'\\"].*?[\\'\\"],[\\'\\"].*?[\\'\\"]\\s?,\\s?\\'a[[:alnum:][:punct:]]+?s[[:alnum:][:punct:]]+?s[[:alnum:][:punct:]]+?e[[:alnum:][:punct:]]+?r[[:alnum:][:punct:]]+?t[[:alnum:][:punct:]]+?\\)/i',

'/preg_replace_callback\\(.*?create_function\\(/is',

'/filter_var(?:_array)?\\s?.*?\\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\\[[\\'\\"][[:punct:][:alnum:]]+[\\'\\"]\\][[:punct:][:alnum:][:space:]]+?assert[\\'\\"]\\)/is',

'/ob_start\\([\\'\\"]+assert[\\'\\"]+\\)/is',

'/new\\s?ReflectionFunction\\(.*?->invoke\\(/is',

'/PDO::FETCH_FUNC/',

'/\\$\\w+.*\\s?(?:=|->)\\s?.*?[\\'\\"]assert[\\'\\"]\\)?/i',

'/\\$\\w+->(?:sqlite)?createFunction\\(.*?\\)/i',

'/eval\\([\\"\\']?\\\\\\?\\$\\w+\\s?=\\s?.*?\\)/i',

'/eval\\(.*?gzinflate\\(base64_decode\\(/i',

'/copy\\(\\$HTTP_POST_FILES\\[\\'\\w+\\'\\]\\s?\\[\\'tmp_name\\'\\]/i',

'/register_(?:shutdown|tick)_function\\s?\\(\\$\\w+,\\s\\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\\[.*?\\]\\)/is',

'/register_(?:shutdown|tick)_function\\s?\\(?[\\'\\"]assert[\\"\\'].*?\\)/i',

'/call_user_func.*?\\([\\"|\\']assert[\\"|\\'],.*\\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\\[[\\'|\\"].*\\]\\)+/is',

'/preg_replace\\(.*?e.*?\\'\\s?,\\s?.*?\\w+\\(.*?\\)/i',

'/function_exists\\s*\\(\\s*[\\'|\\"](popen|exec|proc_open|system|passthru)+[\\'|\\"]\\s*\\)/i',

'/(exec|shell_exec|system|passthru)+\\s*\\(\\s*\\$_(\\w+)\\[(.*)\\]\\s*\\)/i',

'/(exec|shell_exec|system|passthru)+\\s*\\(\\$\\w+\\)/i',

'/(exec|shell_exec|system|passthru)\\s?\\(\\w+\\(\\"http_.*\\"\\)\\)/i',

'/(?:john\\.barker446@gmail\\.com|xb5@hotmail\\.com|shopen@aventgrup\\.net|milw0rm\\.com|www\\.aventgrup\\.net|mgeisler@mgeisler\\.net)/i',

'/Php\\s*?Shell/i',

'/((udp|tcp)\\:\\/\\/(.*)\\;)+/i',

'/preg_replace\\s*\\((.*)\\/e(.*)\\,\\s*\\$_(.*)\\,(.*)\\)/i',

'/preg_replace\\s*\\((.*)\\(base64_decode\\(\\$/i',

'/(eval|assert|include|require|include_once|require_once)+\\s*\\(\\s*(base64_decode|str_rot13|gz(\\w+)|file_(\\w+)_contents|(.*)php\\:\\/\\/input)+/i',

'/(eval|assert|include|require|include_once|require_once|array_map|array_walk)+\\s*\\(.*?\\$_(?:GET|POST|REQUEST|COOKIE|SERVER|SESSION)+\\[(.*)\\]\\s*\\)/i',

'/eval\\s*\\(\\s*\\(\\s*\\$\\$(\\w+)/i',

'/((?:include|require|include_once|require_once)+\\s*\\(?\\s*[\\'|\\"]\\w+\\.(?!php).*[\\'|\\"])/i',

'/\\$_(\\w+)(.*)(eval|assert|include|require|include_once|require_once)+\\s*\\(\\s*\\$(\\w+)\\s*\\)/i',

'/\\(\\s*\\$_FILES\\[(.*)\\]\\[(.*)\\]\\s*\\,\\s*\\$_(GET|POST|REQUEST|FILES)+\\[(.*)\\]\\[(.*)\\]\\s*\\)/i',

'/(fopen|fwrite|fputs|file_put_contents)+\\s*\\((.*)\\$_(GET|POST|REQUEST|COOKIE|SERVER)+\\[(.*)\\](.*)\\)/i',

'/echo\\s*curl_exec\\s*\\(\\s*\\$(\\w+)\\s*\\)/i',

'/new com\\s*\\(\\s*[\\'|\\"]shell(.*)[\\'|\\"]\\s*\\)/i',

'/\\$(.*)\\s*\\((.*)\\/e(.*)\\,\\s*\\$_(.*)\\,(.*)\\)/i',

'/\\$_\\=(.*)\\$_/i',

'/\\$_(GET|POST|REQUEST|COOKIE|SERVER)+\\[(.*)\\]\\(\\s*\\$(.*)\\)/i',

'/\\$(\\w+)\\s*\\(\\s*\\$_(GET|POST|REQUEST|COOKIE|SERVER)+\\[(.*)\\]\\s*\\)/i',

'/\\$(\\w+)\\s*\\(\\s*\\$\\{(.*)\\}/i',

'/\\$(\\w+)\\s*\\(\\s*chr\\(\\d+\\)/i'

);

function antivirus($dir,$exs,$matches) {

if(($handle = @opendir($dir)) == NULL) return false;

while(false !== ($name = readdir($handle))) {

if($name == '.' || $name == '..') continue;

$path = $dir.$name;

if(strstr($name,SELF)) continue;

//$path=iconv("UTF-8","gb2312",$path);

if(is_dir($path)) {

//chmod($path,0777);/*主要针对一些0111的目录*/

if(is_readable($path)) antivirus($path.'/',$exs,$matches);

} elseif(strpos($name,';') > -1 || strpos($name,'%00') > -1 || strpos($name,'/') > -1) {

echo '特征 <input type="text" style="width:250px;" value="解析漏洞"> '.$path.'<div></div>'; flush(); ob_flush();

}

else {

if(!preg_match($exs,$name)) continue;

if(filesize($path) > 10000000) continue;

$fp = fopen($path,'r');

$code = fread($fp,filesize($path));

fclose($fp);

if(empty($code)) continue;

if(weevelyshell($path)){

echo '特征 <input type="text" style="width:250px;" value="weevely 加密shell"> '.$path.'<div></div>'; flush(); ob_flush();

}elseif(callbackshell($path)){

echo '特征 <input type="text" style="width:250px;" value="Callback shell"> '.$path.'<div></div>'; flush(); ob_flush();

}

foreach($matches as $matche) {

$array = array();

preg_match($matche,$code,$array);

if(!$array) continue;

if(strpos($array[0],"\\x24\\x74\\x68\\x69\\x73\\x2d\\x3e")) continue;

$len = strlen($array[0]);

if($len > 6 && $len < 200) {

echo '特征 <input type="text" style="width:250px;" value="'.htmlspecialchars($array[0]).'"> '.$path.'<div></div>';

flush(); ob_flush(); break;

}

}

unset($code,$array);

}

}

closedir($handle);

return true;

}

function strdir($str) { return str_replace(array('\\\\','//','//'),array('/','/','/'),chop($str)); }

echo '<form method="POST">';

echo '路径: <input type="text" name="dir" value="'.($_POST['dir'] ? strdir($_POST['dir'].'/') : strdir($_SERVER['DOCUMENT_ROOT'].'/')).'" style="width:398px;"><div></div>';

echo '后缀: <input type="text" name="exs" value="'.($_POST['exs'] ? $_POST['exs'] : '.php|.inc|.phtml').'" style="width:398px;"><div></div>';

echo '操作: <input type="submit" style="width:80px;" value="scan"><div></div>';

echo '</form>';

if(file_exists($_POST['dir']) && $_POST['exs']) {

$dir = strdir($_POST['dir'].'/');

$exs = '/('.str_replace('.','\\\\.',$_POST['exs']).')/i';

echo antivirus($dir,$exs,$matches) ? '</br ><div></div>扫描完毕!' : '</br > <div></div>扫描中断';

}

?>

</html>

希望本文所述对大家PHP程序设计有所帮助。

收藏 (0) 打赏

感谢您的支持,我会继续努力的!

打开微信/支付宝扫一扫,即可进行扫码打赏哦,分享从这里开始,精彩与您同在
点赞 (0)

声明:本站所有文章,如无特殊说明或标注,均为本站原创发布。任何个人或组织,在未征得本站同意时,禁止复制、盗用、采集、发布本站内容到任何网站、书籍等各类媒体平台。如若本站内容侵犯了原著者的合法权益,可联系我们进行处理。

快网idc优惠网 建站教程 PHP实现webshell扫描文件木马的方法 https://www.kuaiidc.com/72219.html

相关文章

发表评论
暂无评论