本文实例讲述了PHP实现webshell扫描文件木马的方法。分享给大家供大家参考,具体如下:
可扫描 weevelyshell 生成 或加密的shell 及各种变异webshell
目前仅支持php
支持扫描 weevelyshell 生成 或加密的shell
支持扫描callback一句话shell
支持各种php大马
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
|
<!DOCTYPE html>
<html>
<head>
<meta charset= 'gb2312' >
<title>PHP web shell scan</title>
</head>
<body>
</body>
<?php
define( "SELF" ,php_self());
error_reporting (E_ERROR);
ini_set ( 'max_execution_time' ,20000);
ini_set ( 'memory_limit' , '512M' );
header( "content-Type: text/html; charset=gb2312" );
function weevelyshell( $file ){
$content = file_get_contents ( $file );
if (
(
preg_match( '#(\$\w{2,4}\s?=\s?str_replace\("\w+","","[\w_]+"\);\s?)+#s' , $content )&&
preg_match( '#(\$\w{2,4}\s?=\s?"[\w\d\+\/\=]+";\s?)+#' , $content )&& preg_match( '#\$[\w]{2,4}\s?=\s\$[\w]{2,4}\(\'\',\s?\$\w{2,4}\(\$\w{2,4}\("\w{1,4}",\s?"",\s?\$\w{2,4}\.\$\w{2,4}\.\$\w{2,4}\.\$\w{2,4}\)\)\);\s+?\$\w{2,4}\(\)\;#' , $content ))
||
(preg_match( '#\$\w+\d\s?=\s?str_replace\(\"[\w\d]+\",\"\",\"[\w\d]+\"\);#s' , $content )&&
preg_match( '#\$\w+\s?=\s?\$[\w\d]+\(\'\',\s?\$[\w\d]+\(\$\w+\(\$\w+\(\"[[:punct:]]+\",\s?\"\",\s?\$\w+\.\$\w+\.\$\w+\.\$\w+\)\)\)\);\s?\$\w+\(\);#s' , $content ))
){
return true;
}
}
function callbackshell( $file ){
$content = file_get_contents ( $file );
if (
preg_match( '#\$\w+\s?=\s?\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\[.*?\]#is' , $content )&&
preg_match( '#\$\w+\s?=\s?(?:new)?\s?array\w*\s?\(.*?_(?:GET|POST|REQUEST|COOKIE|SERVER)\[.*?\].*?\)+#is' , $content )&&
preg_match( '#(?:array_(?:reduce|map|udiff|walk|walk_recursive|filter)|u[ak]sort)\s?\(.*?\)+?#is' , $content )
)
return true;
}
function php_self(){
$php_self = substr ( $_SERVER [ 'PHP_SELF' ], strrpos ( $_SERVER [ 'PHP_SELF' ], '/' )+1);
return $php_self ;
}
$matches = array (
'/mb_ereg_replace\([\'\*\s\,\.\"]+\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\[[\'\"].*?[\'\"][\]][\,\s\'\"]+e[\'\"]' /is,
'/preg_filter\([\'\"\|\.\*e]+.*\$_(?:GET|POST|REQUEST|COOKIE|SERVER)/is' ,
'/create_function\s?\(.*assert\(/is' ,
'/ini_get\(\'safe_mode\'\)/i' ,
'/get_current_user\(.*?\)/i' ,
'/@?assert\s?\(\$.*?\)/i' ,
'/proc_open\s?\(.*?pipe\',\s?\'w\'\)/is' ,
'/sTr_RepLaCe\s?\([\'\"].*?[\'\"],[\'\"].*?[\'\"]\s?,\s?\'a[[:alnum:][:punct:]]+?s[[:alnum:][:punct:]]+?s[[:alnum:][:punct:]]+?e[[:alnum:][:punct:]]+?r[[:alnum:][:punct:]]+?t[[:alnum:][:punct:]]+?\)/i' ,
'/preg_replace_callback\(.*?create_function\(/is' ,
'/filter_var(?:_array)?\s?.*?\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\[[\'\"][[:punct:][:alnum:]]+[\'\"]\][[:punct:][:alnum:][:space:]]+?assert[\'\"]\)/is' ,
'/ob_start\([\'\"]+assert[\'\"]+\)/is' ,
'/new\s?ReflectionFunction\(.*?->invoke\(/is' ,
'/PDO::FETCH_FUNC/' ,
'/\$\w+.*\s?(?:=|->)\s?.*?[\'\"]assert[\'\"]\)?/i' ,
'/\$\w+->(?:sqlite)?createFunction\(.*?\)/i' ,
'/eval\([\"\']?\\\?\$\w+\s?=\s?.*?\)/i' ,
'/eval\(.*?gzinflate\(base64_decode\(/i' ,
'/copy\(\$HTTP_POST_FILES\[\'\w+\'\]\s?\[\'tmp_name\'\]/i' ,
'/register_(?:shutdown|tick)_function\s?\(\$\w+,\s\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\[.*?\]\)/is' ,
'/register_(?:shutdown|tick)_function\s?\(?[\'\"]assert[\"\'].*?\)/i' ,
'/call_user_func.*?\([\"|\']assert[\"|\'],.*\$_(?:GET|POST|REQUEST|COOKIE|SERVER)\[[\'|\"].*\]\)+/is' ,
'/preg_replace\(.*?e.*?\'\s?,\s?.*?\w+\(.*?\)/i' ,
'/function_exists\s*\(\s*[\'|\"](popen|exec|proc_open|system|passthru)+[\'|\"]\s*\)/i' ,
'/(exec|shell_exec|system|passthru)+\s*\(\s*\$_(\w+)\[(.*)\]\s*\)/i' ,
'/(exec|shell_exec|system|passthru)+\s*\(\$\w+\)/i' ,
'/(exec|shell_exec|system|passthru)\s?\(\w+\(\"http_.*\"\)\)/i' ,
'/(?:john\.barker446@gmail\.com|xb5@hotmail\.com|shopen@aventgrup\.net|milw0rm\.com|www\.aventgrup\.net|mgeisler@mgeisler\.net)/i' ,
'/Php\s*?Shell/i' ,
'/((udp|tcp)\:\/\/(.*)\;)+/i' ,
'/preg_replace\s*\((.*)\/e(.*)\,\s*\$_(.*)\,(.*)\)/i' ,
'/preg_replace\s*\((.*)\(base64_decode\(\$/i' ,
'/(eval|assert|include|require|include_once|require_once)+\s*\(\s*(base64_decode|str_rot13|gz(\w+)|file_(\w+)_contents|(.*)php\:\/\/input)+/i' ,
'/(eval|assert|include|require|include_once|require_once|array_map|array_walk)+\s*\(.*?\$_(?:GET|POST|REQUEST|COOKIE|SERVER|SESSION)+\[(.*)\]\s*\)/i' ,
'/eval\s*\(\s*\(\s*\$\$(\w+)/i' ,
'/((?:include|require|include_once|require_once)+\s*\(?\s*[\'|\"]\w+\.(?!php).*[\'|\"])/i' ,
'/\$_(\w+)(.*)(eval|assert|include|require|include_once|require_once)+\s*\(\s*\$(\w+)\s*\)/i' ,
'/\(\s*\$_FILES\[(.*)\]\[(.*)\]\s*\,\s*\$_(GET|POST|REQUEST|FILES)+\[(.*)\]\[(.*)\]\s*\)/i' ,
'/(fopen|fwrite|fputs|file_put_contents)+\s*\((.*)\$_(GET|POST|REQUEST|COOKIE|SERVER)+\[(.*)\](.*)\)/i' ,
'/echo\s*curl_exec\s*\(\s*\$(\w+)\s*\)/i' ,
'/new com\s*\(\s*[\'|\"]shell(.*)[\'|\"]\s*\)/i' ,
'/\$(.*)\s*\((.*)\/e(.*)\,\s*\$_(.*)\,(.*)\)/i' ,
'/\$_\=(.*)\$_/i' ,
'/\$_(GET|POST|REQUEST|COOKIE|SERVER)+\[(.*)\]\(\s*\$(.*)\)/i' ,
'/\$(\w+)\s*\(\s*\$_(GET|POST|REQUEST|COOKIE|SERVER)+\[(.*)\]\s*\)/i' ,
'/\$(\w+)\s*\(\s*\$\{(.*)\}/i' ,
'/\$(\w+)\s*\(\s*chr\(\d+\)/i'
);
function antivirus( $dir , $exs , $matches ) {
if (( $handle = @opendir( $dir )) == NULL) return false;
while (false !== ( $name = readdir( $handle ))) {
if ( $name == '.' || $name == '..' ) continue ;
$path = $dir . $name ;
if ( strstr ( $name ,SELF)) continue ;
//$path=iconv("UTF-8","gb2312",$path);
if ( is_dir ( $path )) {
//chmod($path,0777);/*主要针对一些0111的目录*/
if ( is_readable ( $path )) antivirus( $path . '/' , $exs , $matches );
} elseif ( strpos ( $name , ';' ) > -1 || strpos ( $name , '%00' ) > -1 || strpos ( $name , '/' ) > -1) {
echo '特征 <input type="text" style="width:250px;" value="解析漏洞"> ' . $path . '<div></div>' ; flush (); ob_flush();
}
else {
if (!preg_match( $exs , $name )) continue ;
if ( filesize ( $path ) > 10000000) continue ;
$fp = fopen ( $path , 'r' );
$code = fread ( $fp , filesize ( $path ));
fclose( $fp );
if ( empty ( $code )) continue ;
if (weevelyshell( $path )){
echo '特征 <input type="text" style="width:250px;" value="weevely 加密shell"> ' . $path . '<div></div>' ; flush (); ob_flush();
} elseif (callbackshell( $path )){
echo '特征 <input type="text" style="width:250px;" value="Callback shell"> ' . $path . '<div></div>' ; flush (); ob_flush();
}
foreach ( $matches as $matche ) {
$array = array ();
preg_match( $matche , $code , $array );
if (! $array ) continue ;
if ( strpos ( $array [0], "\x24\x74\x68\x69\x73\x2d\x3e" )) continue ;
$len = strlen ( $array [0]);
if ( $len > 6 && $len < 200) {
echo '特征 <input type="text" style="width:250px;" value="' .htmlspecialchars( $array [0]). '"> ' . $path . '<div></div>' ;
flush (); ob_flush(); break ;
}
}
unset( $code , $array );
}
}
closedir ( $handle );
return true;
}
function strdir( $str ) { return str_replace ( array ( '\\' , '//' , '//' ), array ( '/' , '/' , '/' ), chop ( $str )); }
echo '<form method="POST">' ;
echo '路径: <input type="text" name="dir" value="' .( $_POST [ 'dir' ] ? strdir( $_POST [ 'dir' ]. '/' ) : strdir( $_SERVER [ 'DOCUMENT_ROOT' ]. '/' )). '" style="width:398px;"><div></div>' ;
echo '后缀: <input type="text" name="exs" value="' .( $_POST [ 'exs' ] ? $_POST [ 'exs' ] : '.php|.inc|.phtml' ). '" style="width:398px;"><div></div>' ;
echo '操作: <input type="submit" style="width:80px;" value="scan"><div></div>' ;
echo '</form>' ;
if ( file_exists ( $_POST [ 'dir' ]) && $_POST [ 'exs' ]) {
$dir = strdir( $_POST [ 'dir' ]. '/' );
$exs = '/(' . str_replace ( '.' , '\\.' , $_POST [ 'exs' ]). ')/i' ;
echo antivirus( $dir , $exs , $matches ) ? '</br ><div></div>扫描完毕!' : '</br > <div></div>扫描中断' ;
}
?>
</html>
|
希望本文所述对大家PHP程序设计有所帮助。