正文  软件开发 > PHP编程技术 >

PHP实现webshell扫描文件木马的方法,

PHP实现webshell扫描文件木马的方法,本文实例讲述了PHP实现webshell扫描文件木马的方法。分享给大家供大家参考,具体如下: 可扫描 weevelyshell 生成 或加密的shel...

PHP实现webshell扫描文件木马的方法,

本文实例讲述了PHP实现webshell扫描文件木马的方法。分享给大家供大家参考,具体如下:

可扫描 weevelyshell 生成 或加密的shell 及各种变异webshell

目前仅支持php

支持扫描 weevelyshell 生成 或加密的shell
支持扫描callback一句话shell
支持各种php大马

<!DOCTYPE html>
<html>
<head>
    <meta charset=‘gb2312‘>
    <title>PHP web shell scan</title>
</head>
<body>
</body>
<?php
define("SELF",php_self());
error_reporting(E_ERROR);
ini_set(‘max_execution_time‘,20000);
ini_set(‘memory_limit‘,‘512M‘);
header("content-Type: text/html; charset=gb2312");
function weevelyshell($file){
    $content=file_get_contents($file);
    if(
        (
        preg_match(‘#($w{2,4}s?=s?str_replace("w+","","[w_]+");s?)+#s‘,$content)&&
      preg_match(‘#($w{2,4}s?=s?"[wd+/=]+";s?)+#‘,$content)&&               preg_match(‘#$[w]{2,4}s?=s$[w]{2,4}(‘\‘,s?$w{2,4}($w{2,4}("w{1,4}",s?"",s?$w{2,4}.$w{2,4}.$w{2,4}.$w{2,4})));s+?$w{2,4}();#‘,$content))
          ||
          (preg_match(‘#$w+ds?=s?str_replace("[wd]+","","[wd]+");#s‘,$content)&&
        preg_match(‘#$w+s?=s?$[wd]+(‘\‘,s?$[wd]+($w+($w+("[[:punct:]]+",s?"",s?$w+.$w+.$w+.$w+))));s?$w+();#s‘,$content))
        ){
        return true;
    }
}
function callbackshell($file){
    $content=file_get_contents($file);
    if(
        preg_match(‘#$w+s?=s?$_(?:GET|POST|REQUEST|COOKIE|SERVER)[.*?]#is‘,$content)&&
        preg_match(‘#$w+s?=s?(?:new)?s?arrayw*s?(.*?_(?:GET|POST|REQUEST|COOKIE|SERVER)[.*?].*?)+#is‘,$content)&&
        preg_match(‘#(?:array_(?:reduce|map|udiff|walk|walk_recursive|filter)|u[ak]sort)s?(.*?)+?#is‘,$content)
        )
            return true;
}
function php_self(){
  $php_self=substr($_SERVER[‘PHP_SELF‘],strrpos($_SERVER[‘PHP_SELF‘],‘/‘)+1);
  return $php_self;
}
$matches = array(
        ‘/mb_ereg_replace([‘\*s,."]+$_(?:GET|POST|REQUEST|COOKIE|SERVER)[[‘\"].*?[‘\"][]][,s‘\"]+e[‘\"]‘/is,
        ‘/preg_filter([‘\"|.*e]+.*$_(?:GET|POST|REQUEST|COOKIE|SERVER)/is‘,
        ‘/create_functions?(.*assert(/is‘,
        ‘/ini_get(‘safe_mode‘\)/i‘,
        ‘/get_current_user(.*?)/i‘,
        ‘/@?asserts?($.*?)/i‘,
        ‘/proc_opens?(.*?pipe‘,s?‘w‘\)/is‘,
    ‘/sTr_RepLaCes?([‘\"].*?[‘\"],[‘\"].*?[‘\"]s?,s?‘a[[:alnum:][:punct:]]+?s[[:alnum:][:punct:]]+?s[[:alnum:][:punct:]]+?e[[:alnum:][:punct:]]+?r[[:alnum:][:punct:]]+?t[[:alnum:][:punct:]]+?)/i‘,
        ‘/preg_replace_callback(.*?create_function(/is‘,
        ‘/filter_var(?:_array)?s?.*?$_(?:GET|POST|REQUEST|COOKIE|SERVER)[[‘\"][[:punct:][:alnum:]]+[‘\"]][[:punct:][:alnum:][:space:]]+?assert[‘\"])/is‘,
        ‘/ob_start([‘\"]+assert[‘\"]+)/is‘,
        ‘/news?ReflectionFunction(.*?->invoke(/is‘,
      ‘/PDO::FETCH_FUNC/‘,
        ‘/$w+.*s?(?:=|->)s?.*?[‘\"]assert[‘\"])?/i‘,
        ‘/$w+->(?:sqlite)?createFunction(.*?)/i‘,
        ‘/eval(["‘]?\?$w+s?=s?.*?)/i‘,
        ‘/eval(.*?gzinflate(base64_decode(/i‘,
        ‘/copy($HTTP_POST_FILES[‘\w+‘\]s?[‘tmp_name‘\]/i‘,
        ‘/register_(?:shutdown|tick)_functions?($w+,s$_(?:GET|POST|REQUEST|COOKIE|SERVER)[.*?])/is‘,
        ‘/register_(?:shutdown|tick)_functions?(?[‘\"]assert["‘].*?)/i‘,
        ‘/call_user_func.*?(["|‘]assert["|‘],.*$_(?:GET|POST|REQUEST|COOKIE|SERVER)[[‘|"].*])+/is‘,
      ‘/preg_replace(.*?e.*?‘\s?,s?.*?w+(.*?)/i‘,
    ‘/function_existss*(s*[‘|"](popen|exec|proc_open|system|passthru)+[‘|"]s*)/i‘,
    ‘/(exec|shell_exec|system|passthru)+s*(s*$_(w+)[(.*)]s*)/i‘,
    ‘/(exec|shell_exec|system|passthru)+s*($w+)/i‘,
    ‘/(exec|shell_exec|system|passthru)s?(w+("http_.*"))/i‘,
         ‘/(?:john.barker446@gmail.com|xb5@hotmail.com|shopen@aventgrup.net|milw0rm.com|www.aventgrup.net|mgeisler@mgeisler.net)/i‘,
      ‘/Phps*?Shell/i‘,
    ‘/((udp|tcp)://(.*);)+/i‘,
    ‘/preg_replaces*((.*)/e(.*),s*$_(.*),(.*))/i‘,
    ‘/preg_replaces*((.*)(base64_decode($/i‘,
    ‘/(eval|assert|include|require|include_once|require_once)+s*(s*(base64_decode|str_rot13|gz(w+)|file_(w+)_contents|(.*)php://input)+/i‘,
    ‘/(eval|assert|include|require|include_once|require_once|array_map|array_walk)+s*(.*?$_(?:GET|POST|REQUEST|COOKIE|SERVER|SESSION)+[(.*)]s*)/i‘,
    ‘/evals*(s*(s*$$(w+)/i‘,
      ‘/((?:include|require|include_once|require_once)+s*(?s*[‘|"]w+.(?!php).*[‘|"])/i‘,
    ‘/$_(w+)(.*)(eval|assert|include|require|include_once|require_once)+s*(s*$(w+)s*)/i‘,
    ‘/(s*$_FILES[(.*)][(.*)]s*,s*$_(GET|POST|REQUEST|FILES)+[(.*)][(.*)]s*)/i‘,
    ‘/(fopen|fwrite|fputs|file_put_contents)+s*((.*)$_(GET|POST|REQUEST|COOKIE|SERVER)+[(.*)](.*))/i‘,
    ‘/echos*curl_execs*(s*$(w+)s*)/i‘,
    ‘/new coms*(s*[‘|"]shell(.*)[‘|"]s*)/i‘,
    ‘/$(.*)s*((.*)/e(.*),s*$_(.*),(.*))/i‘,
    ‘/$_=(.*)$_/i‘,
    ‘/$_(GET|POST|REQUEST|COOKIE|SERVER)+[(.*)](s*$(.*))/i‘,
    ‘/$(w+)s*(s*$_(GET|POST|REQUEST|COOKIE|SERVER)+[(.*)]s*)/i‘,
    ‘/$(w+)s*(s*${(.*)}/i‘,
    ‘/$(w+)s*(s*chr(d+)/i‘
);
function antivirus($dir,$exs,$matches) {
    if(($handle = @opendir($dir)) == NULL) return false;
    while(false !== ($name = readdir($handle))) {
        if($name == ‘.‘ || $name == ‘..‘) continue;
        $path = $dir.$name;
        if(strstr($name,SELF)) continue;
        //$path=iconv("UTF-8","gb2312",$path);
        if(is_dir($path)) {
            //chmod($path,0777);/*主要针对一些0111的目录*/
            if(is_readable($path)) antivirus($path.‘/‘,$exs,$matches);
        } elseif(strpos($name,‘;‘) > -1 || strpos($name,‘%00‘) > -1 || strpos($name,‘/‘) > -1) {
            echo ‘特征 <input type="text" style="width:250px;" value="解析漏洞">     ‘.$path.‘<div></div>‘; flush(); ob_flush();
        }
        else {
            if(!preg_match($exs,$name)) continue;
            if(filesize($path) > 10000000) continue;
            $fp = fopen($path,‘r‘);
            $code = fread($fp,filesize($path));
            fclose($fp);
            if(empty($code)) continue;
            if(weevelyshell($path)){
            echo ‘特征 <input type="text" style="width:250px;" value="weevely 加密shell">     ‘.$path.‘<div></div>‘; flush(); ob_flush();
        }elseif(callbackshell($path)){
                echo ‘特征 <input type="text" style="width:250px;" value="Callback shell">     ‘.$path.‘<div></div>‘; flush(); ob_flush();
        }
            foreach($matches as $matche) {
                $array = array();
                preg_match($matche,$code,$array);
                if(!$array) continue;
                if(strpos($array[0],"x24x74x68x69x73x2dx3e")) continue;
                $len = strlen($array[0]);
                if($len > 6 && $len < 200) {
                    echo ‘特征 <input type="text" style="width:250px;" value="‘.htmlspecialchars($array[0]).‘">    ‘.$path.‘<div></div>‘;
                    flush(); ob_flush(); break;
                }
            }
            unset($code,$array);
        }
    }
    closedir($handle);
    return true;
}
function strdir($str) { return str_replace(array(‘\‘,‘//‘,‘//‘),array(‘/‘,‘/‘,‘/‘),chop($str)); }
echo ‘<form method="POST">‘;
echo ‘路径: <input type="text" name="dir" value="‘.($_POST[‘dir‘] ? strdir($_POST[‘dir‘].‘/‘) : strdir($_SERVER[‘DOCUMENT_ROOT‘].‘/‘)).‘" style="width:398px;"><div></div>‘;
echo ‘后缀: <input type="text" name="exs" value="‘.($_POST[‘exs‘] ? $_POST[‘exs‘] : ‘.php|.inc|.phtml‘).‘" style="width:398px;"><div></div>‘;
echo ‘操作: <input type="submit" style="width:80px;" value="scan"><div></div>‘;
echo ‘</form>‘;
if(file_exists($_POST[‘dir‘]) && $_POST[‘exs‘]) {
    $dir = strdir($_POST[‘dir‘].‘/‘);
    $exs = ‘/(‘.str_replace(‘.‘,‘\.‘,$_POST[‘exs‘]).‘)/i‘;
    echo antivirus($dir,$exs,$matches) ? ‘</br ><div></div>扫描完毕!‘ : ‘</br > <div></div>扫描中断‘;
}
?>
</html>

更多关于PHP相关内容感兴趣的读者可查看本站专题:《php程序设计安全教程》、《php安全过滤技巧总结》、《PHP运算与运算符用法总结》、《PHP网络编程技巧总结》、《PHP基本语法入门教程》、《php面向对象程序设计入门教程》、《php字符串(string)用法总结》、《php+mysql数据库操作入门教程》及《php常见数据库操作技巧汇总》

希望本文所述对大家PHP程序设计有所帮助。

http://www.bkjia.com/PHPjc/1221849.htmlwww.bkjia.comtruehttp://www.bkjia.com/PHPjc/1221849.htmlTechArticlePHP实现webshell扫描文件木马的方法, 本文实例讲述了PHP实现webshell扫描文件木马的方法。分享给大家供大家参考,具体如下: 可扫描 weeve...