本文实例讲述了PHP实现webshell扫描文件木马的方法。分享给大家供大家参考,具体如下:
可扫描 weevelyshell 生成 或加密的shell 及各种变异webshell
目前仅支持php
支持扫描 weevelyshell 生成 或加密的shell
支持扫描callback一句话shell
支持各种php大马
<!DOCTYPE html>
<html>
<head>
<meta charset="gb2312">
<title>PHP web shell scan</title>
</head>
<body>
</body>
<?php
define("SELF",php_self());
error_reporting(E_ERROR);
ini_set("max_execution_time",20000);
ini_set("memory_limit","512M");
header("content-Type: text/html; charset=gb2312");
function weevelyshell($file){
$content=file_get_contents($file);
if(
(
preg_match("#($w{2,4}s?=s?str_replace("w+","","[w_]+");s?)+#s",$content)&&
preg_match("#($w{2,4}s?=s?"[wd+/=]+";s?)+#",$content)&& preg_match("#$[w]{2,4}s?=s$[w]{2,4}("",s?$w{2,4}($w{2,4}("w{1,4}",s?"",s?$w{2,4}.$w{2,4}.$w{2,4}.$w{2,4})));s+?$w{2,4}();#",$content))
||
(preg_match("#$w+ds?=s?str_replace("[wd]+","","[wd]+");#s",$content)&&
preg_match("#$w+s?=s?$[wd]+("",s?$[wd]+($w+($w+("[[:punct:]]+",s?"",s?$w+.$w+.$w+.$w+))));s?$w+();#s",$content))
){
return true;
}
}
function callbackshell($file){
$content=file_get_contents($file);
if(
preg_match("#$w+s?=s?$_(?:GET|POST|REQUEST|COOKIE|SERVER)[.*?]#is",$content)&&
preg_match("#$w+s?=s?(?:new)?s?arrayw*s?(.*?_(?:GET|POST|REQUEST|COOKIE|SERVER)[.*?].*?)+#is",$content)&&
preg_match("#(?:array_(?:reduce|map|udiff|walk|walk_recursive|filter)|u[ak]sort)s?(.*?)+?#is",$content)
)
return true;
}
function php_self(){
$php_self=substr($_SERVER["PHP_SELF"],strrpos($_SERVER["PHP_SELF"],"/")+1);
return $php_self;
}
$matches = array(
"/mb_ereg_replace(["*s,."]+$_(?:GET|POST|REQUEST|COOKIE|SERVER)[[""].*?[""][]][,s""]+e[""]"/is,
"/preg_filter([""|.*e]+.*$_(?:GET|POST|REQUEST|COOKIE|SERVER)/is",
"/create_functions?(.*assert(/is",
"/ini_get("safe_mode")/i",
"/get_current_user(.*?)/i",
"/@?asserts?($.*?)/i",
"/proc_opens?(.*?pipe",s?"w")/is",
"/sTr_RepLaCes?([""].*?[""],[""].*?[""]s?,s?"a[[:alnum:][:punct:]]+?s[[:alnum:][:punct:]]+?s[[:alnum:][:punct:]]+?e[[:alnum:][:punct:]]+?r[[:alnum:][:punct:]]+?t[[:alnum:][:punct:]]+?)/i",
"/preg_replace_callback(.*?create_function(/is",
"/filter_var(?:_array)?s?.*?$_(?:GET|POST|REQUEST|COOKIE|SERVER)[[""][[:punct:][:alnum:]]+[""]][[:punct:][:alnum:][:space:]]+?assert[""])/is",
"/ob_start([""]+assert[""]+)/is",
"/news?ReflectionFunction(.*?->invoke(/is",
"/PDO::FETCH_FUNC/",
"/$w+.*s?(?:=|->)s?.*?[""]assert[""])?/i",
"/$w+->(?:sqlite)?createFunction(.*?)/i",
"/eval([""]?\?$w+s?=s?.*?)/i",
"/eval(.*?gzinflate(base64_decode(/i",
"/copy($HTTP_POST_FILES["w+"]s?["tmp_name"]/i",
"/register_(?:shutdown|tick)_functions?($w+,s$_(?:GET|POST|REQUEST|COOKIE|SERVER)[.*?])/is",
"/register_(?:shutdown|tick)_functions?(?[""]assert[""].*?)/i",
"/call_user_func.*?(["|"]assert["|"],.*$_(?:GET|POST|REQUEST|COOKIE|SERVER)[["|"].*])+/is",
"/preg_replace(.*?e.*?"s?,s?.*?w+(.*?)/i",
"/function_existss*(s*["|"](popen|exec|proc_open|system|passthru)+["|"]s*)/i",
"/(exec|shell_exec|system|passthru)+s*(s*$_(w+)[(.*)]s*)/i",
"/(exec|shell_exec|system|passthru)+s*($w+)/i",
"/(exec|shell_exec|system|passthru)s?(w+("http_.*"))/i",
"/(?:john.barker446@gmail.com|xb5@hotmail.com|shopen@aventgrup.net|milw0rm.com|www.aventgrup.net|mgeisler@mgeisler.net)/i",
"/Phps*?Shell/i",
"/((udp|tcp)://(.*);)+/i",
"/preg_replaces*((.*)/e(.*),s*$_(.*),(.*))/i",
"/preg_replaces*((.*)(base64_decode($/i",
"/(eval|assert|include|require|include_once|require_once)+s*(s*(base64_decode|str_rot13|gz(w+)|file_(w+)_contents|(.*)php://input)+/i",
"/(eval|assert|include|require|include_once|require_once|array_map|array_walk)+s*(.*?$_(?:GET|POST|REQUEST|COOKIE|SERVER|SESSION)+[(.*)]s*)/i",
"/evals*(s*(s*$$(w+)/i",
"/((?:include|require|include_once|require_once)+s*(?s*["|"]w+.(?!php).*["|"])/i",
"/$_(w+)(.*)(eval|assert|include|require|include_once|require_once)+s*(s*$(w+)s*)/i",
"/(s*$_FILES[(.*)][(.*)]s*,s*$_(GET|POST|REQUEST|FILES)+[(.*)][(.*)]s*)/i",
"/(fopen|fwrite|fputs|file_put_contents)+s*((.*)$_(GET|POST|REQUEST|COOKIE|SERVER)+[(.*)](.*))/i",
"/echos*curl_execs*(s*$(w+)s*)/i",
"/new coms*(s*["|"]shell(.*)["|"]s*)/i",
"/$(.*)s*((.*)/e(.*),s*$_(.*),(.*))/i",
"/$_=(.*)$_/i",
"/$_(GET|POST|REQUEST|COOKIE|SERVER)+[(.*)](s*$(.*))/i",
"/$(w+)s*(s*$_(GET|POST|REQUEST|COOKIE|SERVER)+[(.*)]s*)/i",
"/$(w+)s*(s*${(.*)}/i",
"/$(w+)s*(s*chr(d+)/i"
);
function antivirus($dir,$exs,$matches) {
if(($handle = @opendir($dir)) == NULL) return false;
while(false !== ($name = readdir($handle))) {
if($name == "." || $name == "..") continue;
$path = $dir.$name;
if(strstr($name,SELF)) continue;
//$path=iconv("UTF-8","gb2312",$path);
if(is_dir($path)) {
//chmod($path,0777);/*主要针对一些0111的目录*/
if(is_readable($path)) antivirus($path."/",$exs,$matches);
} elseif(strpos($name,";") > -1 || strpos($name,"%00") > -1 || strpos($name,"/") > -1) {
echo "特征 <input type="text" style="width:250px;" value="解析漏洞"> ".$path."<div></div>"; flush(); ob_flush();
}
else {
if(!preg_match($exs,$name)) continue;
if(filesize($path) > 10000000) continue;
$fp = fopen($path,"r");
$code = fread($fp,filesize($path));
fclose($fp);
if(empty($code)) continue;
if(weevelyshell($path)){
echo "特征 <input type="text" style="width:250px;" value="weevely 加密shell"> ".$path."<div></div>"; flush(); ob_flush();
}elseif(callbackshell($path)){
echo "特征 <input type="text" style="width:250px;" value="Callback shell"> ".$path."<div></div>"; flush(); ob_flush();
}
foreach($matches as $matche) {
$array = array();
preg_match($matche,$code,$array);
if(!$array) continue;
if(strpos($array[0],"x24x74x68x69x73x2dx3e")) continue;
$len = strlen($array[0]);
if($len > 6 && $len < 200) {
echo "特征 <input type="text" style="width:250px;" value="".htmlspecialchars($array[0]).""> ".$path."<div></div>";
flush(); ob_flush(); break;
}
}
unset($code,$array);
}
}
closedir($handle);
return true;
}
function strdir($str) { return str_replace(array("\","//","//"),array("/","/","/"),chop($str)); }
echo "<form method="POST">";
echo "路径: <input type="text" name="dir" value="".($_POST["dir"] ? strdir($_POST["dir"]."/") : strdir($_SERVER["DOCUMENT_ROOT"]."/"))."" style="width:398px;"><div></div>";
echo "后缀: <input type="text" name="exs" value="".($_POST["exs"] ? $_POST["exs"] : ".php|.inc|.phtml")."" style="width:398px;"><div></div>";
echo "操作: <input type="submit" style="width:80px;" value="scan"><div></div>";
echo "</form>";
if(file_exists($_POST["dir"]) && $_POST["exs"]) {
$dir = strdir($_POST["dir"]."/");
$exs = "/(".str_replace(".","\.",$_POST["exs"]).")/i";
echo antivirus($dir,$exs,$matches) ? "</br ><div></div>扫描完毕!" : "</br > <div></div>扫描中断";
}
?>
</html>
更多关于PHP相关内容感兴趣的读者可查看本站专题:《php程序设计安全教程》、《php安全过滤技巧总结》、《PHP运算与运算符用法总结》、《PHP网络编程技巧总结》、《PHP基本语法入门教程》、《php面向对象程序设计入门教程》、《php字符串(string)用法总结》、《php+mysql数据库操作入门教程》及《php常见数据库操作技巧汇总》
希望本文所述对大家PHP程序设计有所帮助。