本文实例讲述了PHP实现webshell扫描文件木马的方法。分享给大家供大家参考,具体如下:
可扫描 weevelyshell 生成 或加密的shell 及各种变异webshell
目前仅支持php
支持扫描 weevelyshell 生成 或加密的shell
支持扫描callback一句话shell
支持各种php大马
?
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
|
<!DOCTYPE html>
<html>
<head>
<meta charset='gb2312'>
<title>PHP web shell scan</title>
</head>
<body>
</body>
<?php
define("SELF",php_self());
error_reporting(E_ERROR);
ini_set('max_execution_time',20000);
ini_set('memory_limit','512M');
header("content-Type: text/html; charset=gb2312");
function weevelyshell($file){
$content=file_get_contents($file);
if(
(
preg_match('#(\\$\\w{2,4}\\s?=\\s?str_replace\\("\\w+","","[\\w_]+"\\);\\s?)+#s',$content)&&
preg_match('#(\\$\\w{2,4}\\s?=\\s?"[\\w\\d\\+\\/\\=]+";\\s?)+#',$content)&& preg_match('#\\$[\\w]{2,4}\\s?=\\s\\$[\\w]{2,4}\\(\\'\\',\\s?\\$\\w{2,4}\\(\\$\\w{2,4}\\("\\w{1,4}",\\s?"",\\s?\\$\\w{2,4}\\.\\$\\w{2,4}\\.\\$\\w{2,4}\\.\\$\\w{2,4}\\)\\)\\);\\s+?\\$\\w{2,4}\\(\\)\\;#',$content))
||
(preg_match('#\\$\\w+\\d\\s?=\\s?str_replace\\(\\"[\\w\\d]+\\",\\"\\",\\"[\\w\\d]+\\"\\);#s',$content)&&
preg_match('#\\$\\w+\\s?=\\s?\\$[\\w\\d]+\\(\\'\\',\\s?\\$[\\w\\d]+\\(\\$\\w+\\(\\$\\w+\\(\\"[[:punct:]]+\\",\\s?\\"\\",\\s?\\$\\w+\\.\\$\\w+\\.\\$\\w+\\.\\$\\w+\\)\\)\\)\\);\\s?\\$\\w+\\(\\);#s',$content))
){
return true;
}
}
function callbackshell($file){
$content=file_get_contents($file);
if(
preg_match('#\\$\\w+\\s?=\\s?\\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\\[.*?\\]#is',$content)&&
preg_match('#\\$\\w+\\s?=\\s?(?:new)?\\s?array\\w*\\s?\\(.*?_(?:GET|POST|REQUEST|COOKIE|SERVER)\\[.*?\\].*?\\)+#is',$content)&&
preg_match('#(?:array_(?:reduce|map|udiff|walk|walk_recursive|filter)|u[ak]sort)\\s?\\(.*?\\)+?#is',$content)
)
return true;
}
function php_self(){
$php_self=substr($_SERVER['PHP_SELF'],strrpos($_SERVER['PHP_SELF'],'/')+1);
return $php_self;
}
$matches = array(
'/mb_ereg_replace\\([\\'\\*\\s\\,\\.\\"]+\\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\\[[\\'\\"].*?[\\'\\"][\\]][\\,\\s\\'\\"]+e[\\'\\"]'/is,
'/preg_filter\\([\\'\\"\\|\\.\\*e]+.*\\$_(?:GET|POST|REQUEST|COOKIE|SERVER)/is',
'/create_function\\s?\\(.*assert\\(/is',
'/ini_get\\(\\'safe_mode\\'\\)/i',
'/get_current_user\\(.*?\\)/i',
'/@?assert\\s?\\(\\$.*?\\)/i',
'/proc_open\\s?\\(.*?pipe\\',\\s?\\'w\\'\\)/is',
'/sTr_RepLaCe\\s?\\([\\'\\"].*?[\\'\\"],[\\'\\"].*?[\\'\\"]\\s?,\\s?\\'a[[:alnum:][:punct:]]+?s[[:alnum:][:punct:]]+?s[[:alnum:][:punct:]]+?e[[:alnum:][:punct:]]+?r[[:alnum:][:punct:]]+?t[[:alnum:][:punct:]]+?\\)/i',
'/preg_replace_callback\\(.*?create_function\\(/is',
'/filter_var(?:_array)?\\s?.*?\\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\\[[\\'\\"][[:punct:][:alnum:]]+[\\'\\"]\\][[:punct:][:alnum:][:space:]]+?assert[\\'\\"]\\)/is',
'/ob_start\\([\\'\\"]+assert[\\'\\"]+\\)/is',
'/new\\s?ReflectionFunction\\(.*?->invoke\\(/is',
'/PDO::FETCH_FUNC/',
'/\\$\\w+.*\\s?(?:=|->)\\s?.*?[\\'\\"]assert[\\'\\"]\\)?/i',
'/\\$\\w+->(?:sqlite)?createFunction\\(.*?\\)/i',
'/eval\\([\\"\\']?\\\\\\?\\$\\w+\\s?=\\s?.*?\\)/i',
'/eval\\(.*?gzinflate\\(base64_decode\\(/i',
'/copy\\(\\$HTTP_POST_FILES\\[\\'\\w+\\'\\]\\s?\\[\\'tmp_name\\'\\]/i',
'/register_(?:shutdown|tick)_function\\s?\\(\\$\\w+,\\s\\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\\[.*?\\]\\)/is',
'/register_(?:shutdown|tick)_function\\s?\\(?[\\'\\"]assert[\\"\\'].*?\\)/i',
'/call_user_func.*?\\([\\"|\\']assert[\\"|\\'],.*\\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\\[[\\'|\\"].*\\]\\)+/is',
'/preg_replace\\(.*?e.*?\\'\\s?,\\s?.*?\\w+\\(.*?\\)/i',
'/function_exists\\s*\\(\\s*[\\'|\\"](popen|exec|proc_open|system|passthru)+[\\'|\\"]\\s*\\)/i',
'/(exec|shell_exec|system|passthru)+\\s*\\(\\s*\\$_(\\w+)\\[(.*)\\]\\s*\\)/i',
'/(exec|shell_exec|system|passthru)+\\s*\\(\\$\\w+\\)/i',
'/(exec|shell_exec|system|passthru)\\s?\\(\\w+\\(\\"http_.*\\"\\)\\)/i',
'/(?:john\\.barker446@gmail\\.com|xb5@hotmail\\.com|shopen@aventgrup\\.net|milw0rm\\.com|www\\.aventgrup\\.net|mgeisler@mgeisler\\.net)/i',
'/Php\\s*?Shell/i',
'/((udp|tcp)\\:\\/\\/(.*)\\;)+/i',
'/preg_replace\\s*\\((.*)\\/e(.*)\\,\\s*\\$_(.*)\\,(.*)\\)/i',
'/preg_replace\\s*\\((.*)\\(base64_decode\\(\\$/i',
'/(eval|assert|include|require|include_once|require_once)+\\s*\\(\\s*(base64_decode|str_rot13|gz(\\w+)|file_(\\w+)_contents|(.*)php\\:\\/\\/input)+/i',
'/(eval|assert|include|require|include_once|require_once|array_map|array_walk)+\\s*\\(.*?\\$_(?:GET|POST|REQUEST|COOKIE|SERVER|SESSION)+\\[(.*)\\]\\s*\\)/i',
'/eval\\s*\\(\\s*\\(\\s*\\$\\$(\\w+)/i',
'/((?:include|require|include_once|require_once)+\\s*\\(?\\s*[\\'|\\"]\\w+\\.(?!php).*[\\'|\\"])/i',
'/\\$_(\\w+)(.*)(eval|assert|include|require|include_once|require_once)+\\s*\\(\\s*\\$(\\w+)\\s*\\)/i',
'/\\(\\s*\\$_FILES\\[(.*)\\]\\[(.*)\\]\\s*\\,\\s*\\$_(GET|POST|REQUEST|FILES)+\\[(.*)\\]\\[(.*)\\]\\s*\\)/i',
'/(fopen|fwrite|fputs|file_put_contents)+\\s*\\((.*)\\$_(GET|POST|REQUEST|COOKIE|SERVER)+\\[(.*)\\](.*)\\)/i',
'/echo\\s*curl_exec\\s*\\(\\s*\\$(\\w+)\\s*\\)/i',
'/new com\\s*\\(\\s*[\\'|\\"]shell(.*)[\\'|\\"]\\s*\\)/i',
'/\\$(.*)\\s*\\((.*)\\/e(.*)\\,\\s*\\$_(.*)\\,(.*)\\)/i',
'/\\$_\\=(.*)\\$_/i',
'/\\$_(GET|POST|REQUEST|COOKIE|SERVER)+\\[(.*)\\]\\(\\s*\\$(.*)\\)/i',
'/\\$(\\w+)\\s*\\(\\s*\\$_(GET|POST|REQUEST|COOKIE|SERVER)+\\[(.*)\\]\\s*\\)/i',
'/\\$(\\w+)\\s*\\(\\s*\\$\\{(.*)\\}/i',
'/\\$(\\w+)\\s*\\(\\s*chr\\(\\d+\\)/i'
);
function antivirus($dir,$exs,$matches) {
if(($handle = @opendir($dir)) == NULL) return false;
while(false !== ($name = readdir($handle))) {
if($name == '.' || $name == '..') continue;
$path = $dir.$name;
if(strstr($name,SELF)) continue;
//$path=iconv("UTF-8","gb2312",$path);
if(is_dir($path)) {
//chmod($path,0777);/*主要针对一些0111的目录*/
if(is_readable($path)) antivirus($path.'/',$exs,$matches);
} elseif(strpos($name,';') > -1 || strpos($name,'%00') > -1 || strpos($name,'/') > -1) {
echo '特征 <input type="text" style="width:250px;" value="解析漏洞"> '.$path.'<div></div>'; flush(); ob_flush();
}
else {
if(!preg_match($exs,$name)) continue;
if(filesize($path) > 10000000) continue;
$fp = fopen($path,'r');
$code = fread($fp,filesize($path));
fclose($fp);
if(empty($code)) continue;
if(weevelyshell($path)){
echo '特征 <input type="text" style="width:250px;" value="weevely 加密shell"> '.$path.'<div></div>'; flush(); ob_flush();
}elseif(callbackshell($path)){
echo '特征 <input type="text" style="width:250px;" value="Callback shell"> '.$path.'<div></div>'; flush(); ob_flush();
}
foreach($matches as $matche) {
$array = array();
preg_match($matche,$code,$array);
if(!$array) continue;
if(strpos($array[0],"\\x24\\x74\\x68\\x69\\x73\\x2d\\x3e")) continue;
$len = strlen($array[0]);
if($len > 6 && $len < 200) {
echo '特征 <input type="text" style="width:250px;" value="'.htmlspecialchars($array[0]).'"> '.$path.'<div></div>';
flush(); ob_flush(); break;
}
}
unset($code,$array);
}
}
closedir($handle);
return true;
}
function strdir($str) { return str_replace(array('\\\\','//','//'),array('/','/','/'),chop($str)); }
echo '<form method="POST">';
echo '路径: <input type="text" name="dir" value="'.($_POST['dir'] ? strdir($_POST['dir'].'/') : strdir($_SERVER['DOCUMENT_ROOT'].'/')).'" style="width:398px;"><div></div>';
echo '后缀: <input type="text" name="exs" value="'.($_POST['exs'] ? $_POST['exs'] : '.php|.inc|.phtml').'" style="width:398px;"><div></div>';
echo '操作: <input type="submit" style="width:80px;" value="scan"><div></div>';
echo '</form>';
if(file_exists($_POST['dir']) && $_POST['exs']) {
$dir = strdir($_POST['dir'].'/');
$exs = '/('.str_replace('.','\\\\.',$_POST['exs']).')/i';
echo antivirus($dir,$exs,$matches) ? '</br ><div></div>扫描完毕!' : '</br > <div></div>扫描中断';
}
?>
</html>
|
希望本文所述对大家PHP程序设计有所帮助。
相关文章
猜你喜欢
- 64M VPS建站:怎样选择合适的域名和SSL证书? 2025-06-10
- 64M VPS建站:怎样优化以提高网站加载速度? 2025-06-10
- 64M VPS建站:是否适合初学者操作和管理? 2025-06-10
- ASP.NET自助建站系统中的用户注册和登录功能定制方法 2025-06-10
- ASP.NET自助建站系统的域名绑定与解析教程 2025-06-10
TA的动态
- 2025-07-10 怎样使用阿里云的安全工具进行服务器漏洞扫描和修复?
- 2025-07-10 怎样使用命令行工具优化Linux云服务器的Ping性能?
- 2025-07-10 怎样使用Xshell连接华为云服务器,实现高效远程管理?
- 2025-07-10 怎样利用云服务器D盘搭建稳定、高效的网站托管环境?
- 2025-07-10 怎样使用阿里云的安全组功能来增强服务器防火墙的安全性?
快网idc优惠网
QQ交流群
您的支持,是我们最大的动力!
热门文章
-
2025-06-04 49
-
2025-06-04 77
-
2025-06-04 39
-
2025-05-29 60
-
2025-06-04 78
热门评论

