Home  >  Article  >  Backend Development  >  Summary of repair methods for Trojans hanging on PHP websites_PHP Tutorial

Summary of repair methods for Trojans hanging on PHP websites_PHP Tutorial

WBOY
WBOYOriginal
2016-07-13 10:47:481381browse

Repairing a PHP website with Trojans is secondary. The most important thing is how to prevent Trojans from injecting into your website after repairing it. Next, I will summarize the repair of PHP websites with Trojans and preventing the website in the future. Give me the method of hanging Trojan again.

In Linux, we can use commands to search for Trojan files. Go to the code installation directory and execute the following command

The code is as follows Copy code
 代码如下 复制代码

find ./ -iname "*.php" | xargs grep -H -n "eval(base64_decode"

find ./ -iname "*.php" | xargs grep -H -n "eval(base64_decode"

Nearly 100 results were found. This list of results is very important. Trojans are all in it. You need to open the files one by one to verify whether they are Trojans. If so, delete them immediately

Finally, 10 Trojan files were found, stored in various directories, all of which are php webshells with complete functions and encoded in base64

If you are looking for a directory in Windows, just use Windows file search. You can search for eval or recently modified files. Then if it is dedecms, we need to check the latest dedecms vulnerability and then patch it.


Here is a PHP Trojan search tool, which can be placed directly in the root directory of your site

";

//echo $key . "-" . $path . $file ."(" . $arr[0] . ")" ."
";

//echo $path . $file ."
";

break;

}

}

}

}

}

}

closedir( $dh );

}

function getSetting()

{

$Ssetting = array();

if(isset($_COOKIE['t00ls_s']))

{

$Ssetting = unserialize(base64_decode($_COOKIE['t00ls_s']));

$Ssetting['user']=isset($Ssetting['user'])?$Ssetting['user']:"php | php? | phtml | shtml";

$Ssetting['all']=isset($Ssetting['all'])?intval($Ssetting['all']):0;

$Ssetting['hta']=isset($Ssetting['hta'])?intval($Ssetting['hta']):1;

}

else

{

$Ssetting['user']="php | php? | phtml | shtml";

$Ssetting['all']=0;

$Ssetting['hta']=1;

setcookie("t00ls_s", base64_encode(serialize($Ssetting)), time()+60*60*24*365,"/");

}

return $Ssetting;

}

function getCode()

{

return array(

'后门特征->cha88.cn'=>'cha88.cn',

'后门特征->c99shell'=>'c99shell',

'后门特征->phpspy'=>'phpspy',

'后门特征->Scanners'=>'Scanners',

'后门特征->cmd.php'=>'cmd.php',

'后门特征->str_rot13'=>'str_rot13',

'后门特征->webshell'=>'webshell',

'后门特征->EgY_SpIdEr'=>'EgY_SpIdEr',

'后门特征->tools88.com'=>'tools88.com',

'后门特征->SECFORCE'=>'SECFORCE',

'后门特征->eval("?>'=>'eval(('|")?>',

'可疑代码特征->system('=>'system(',

'可疑代码特征->passthru('=>'passthru(',

'可疑代码特征->shell_exec('=>'shell_exec(',

'可疑代码特征->exec('=>'exec(',

'可疑代码特征->popen('=>'popen(',

'可疑代码特征->proc_open'=>'proc_open',

'Suspicious code characteristics->eval($'=>'eval(('|"|s*)$',

'Suspicious code characteristics->assert($'=>'assert(('|"|s*)$',

'Dangerous MYSQL code->returns string soname'=>'returnsstringsoname',

'Dangerous MYSQL code->into outfile'=>'intooutfile',

'Dangerous MYSQL code->load_file'=>'select(s+)(.*)load_file',

'Encryption backdoor characteristics->eval(gzinflate('=>'eval(gzinflate(',

'Encryption backdoor characteristics->eval(base64_decode('=>'eval(base64_decode(',

'Encryption backdoor characteristics->eval(gzuncompress('=>'eval(gzuncompress(',

'Encryption backdoor characteristics->eval(gzdecode('=>'eval(gzdecode(',

'Encryption backdoor characteristics->eval(str_rot13('=>'eval(str_rot13(',

'Encryption backdoor characteristics->gzuncompress(base64_decode('=>'gzuncompress(base64_decode(',

'Encryption backdoor characteristics->base64_decode(gzuncompress('=>'base64_decode(gzuncompress(',

'One sentence backdoor characteristics->eval($_'=>'eval(('|"|s*)$_(POST|GET|REQUEST|COOKIE)',

'One sentence backdoor characteristics->assert($_'=>'assert(('|"|s*)$_(POST|GET|REQUEST|COOKIE)',

'One sentence backdoor characteristics->require($_'=>'require(('|"|s*)$_(POST|GET|REQUEST|COOKIE)',

'One sentence backdoor characteristics->require_once($_'=>'require_once(('|"|s*)$_(POST|GET|REQUEST|COOKIE)',

'One sentence backdoor characteristics->include($_'=>'include(('|"|s*)$_(POST|GET|REQUEST|COOKIE)',

'One sentence backdoor characteristics->include_once($_'=>'include_once(('|"|s*)$_(POST|GET|REQUEST|COOKIE)',

'One sentence backdoor characteristics->call_user_func("assert"'=>'call_user_func(("|')assert("|')',

'One sentence backdoor characteristics->call_user_func($_'=>'call_user_func(('|"|s*)$_(POST|GET|REQUEST|COOKIE)',

'One sentence backdoor characteristics->$_POST/GET/REQUEST/COOKIE[?]($_POST/GET/REQUEST/COOKIE[?]'=>'$_(POST|GET|REQUEST|COOKIE) [([^]]+)](('|"|s*)$_(POST|GET|REQUEST|COOKIE)[',

'One sentence backdoor characteristics->echo(file_get_contents($_POST/GET/REQUEST/COOKIE'=>'echo(file_get_contents(('|"|s*)$_(POST|GET|REQUEST|COOKIE )',

'Upload backdoor characteristics->file_put_contents($_POST/GET/REQUEST/COOKIE,$_POST/GET/REQUEST/COOKIE'=>'file_put_contents(('|"|s*)$_(POST|GET |REQUEST|COOKIE)[([^]]+)],('|"|s*)$_(POST|GET|REQUEST|COOKIE)',

'Upload backdoor features->fputs(fopen("?","w"),$_POST/GET/REQUEST/COOKIE['=>'fputs(fopen((.+),('|" )w('|")),('|"|s*)$_(POST|GET|REQUEST|COOKIE)[',

'.htaccess plug-in feature->SetHandler application/x-httpd-php'=>'SetHandlerapplication/x-httpd-php',

'.htaccess plug-in feature->php_value auto_prepend_file'=>'php_valueauto_prepend_file',

'.htaccess plug-in feature->php_value auto_append_file'=>'php_valueauto_append_file'

);

}

?>

The code is as follows Copy code

/**************PHP Web Trojan Scanner***********************/

/* [+] Author: alibaba */

/* [+] QQ: 1499281192 * www.bKjia.c0m/

/* [+] MSN: weeming21@hotmail.com */

/* [+] First published: t00ls.net, please indicate t00ls when reprinting */

/* [+] Version: v1.0 */

/* [+] Function: web version php Trojan scanning tool*/

/* [+] Note: The scanned files are not necessarily backdoors, */

/* Please judge, review and compare the original documents by yourself. */

/* If you are not sure whether the scanned file is a backdoor, */

/* You are welcome to send this file to me for analysis. */

/*******************************************************/

ob_start();

set_time_limit(0);

$username = "t00ls"; //Set username

$password = "t00ls"; //Set password

$md5 = md5(md5($username).md5($password));

$version = "PHP Web Trojan Scanner v1.0";

PHP Web Trojan Scanner

$realpath = realpath('./');

$selfpath = $_SERVER['PHP_SELF'];

$selfpath = substr($selfpath, 0, strrpos($selfpath,'/'));

define('REALPATH', str_replace('//','/',str_replace('','/',substr($realpath, 0, strlen($realpath) - strlen($selfpath)))) );

define('MYFILE', basename(__FILE__));

define('MYPATH', str_replace('', '/', dirname(__FILE__)).'/');

define('MYFULLPATH', str_replace('', '/', (__FILE__)));

define('HOST', "http://".$_SERVER['HTTP_HOST']);

?>

<?php echo $version?>

if(!(isset($_COOKIE['t00ls']) && $_COOKIE['t00ls'] == $md5) && !(isset($_POST['username']) && isset($_POST[' password']) && (md5(md5($_POST['username']).md5($_POST['password']))==$md5)))

{

echo '

Username: Password:
';

}

elseif(isset($_POST['username']) && isset($_POST['password']) && (md5(md5($_POST['username']).md5($_POST['password'] ))==$md5))

{

setcookie("t00ls", $md5, time()+60*60*24*365,"/");

echo "Login successful!";

header( 'refresh: 1; url='.MYFILE.'?action=scan' );

exit();

}

else

{

setcookie("t00ls", $md5, time()+60*60*24*365,"/");

$setting = getSetting();

$action = isset($_GET['action'])?$_GET['action']:"";

if($action=="logout")

{

setcookie ("t00ls", "", time() - 3600);

Header("Location: ".MYFILE);

exit();

}

if($action=="download" && isset($_GET['file']) && trim($_GET['file'])!="")

{

$file = $_GET['file'];

ob_clean();

if (@file_exists($file)) {

header("Content-type: application/octet-stream");

header("Content-Disposition: filename="".basename($file).""");

echo file_get_contents($file);

}

exit();

}

?>

$version"?>

扫描 |

设定 |

登出


if($action=="setting")

{

if(isset($_POST['btnsetting']))

{

$Ssetting = array();

$Ssetting['user']=isset($_POST['checkuser'])?$_POST['checkuser']:"php | php? | phtml";

$Ssetting['all']=isset($_POST['checkall'])&&$_POST['checkall']=="on"?1:0;

$Ssetting['hta']=isset($_POST['checkhta'])&&$_POST['checkhta']=="on"?1:0;

setcookie("t00ls_s", base64_encode(serialize($Ssetting)), time()+60*60*24*365,"/");

echo "设置完成!";

header( 'refresh: 1; url='.MYFILE.'?action=setting' );

exit();

}

?>

扫描设定

文件后缀:
>
>
 

}

else

{

$dir = isset($_POST['path'])?$_POST['path']:MYPATH;

$dir = substr($dir,-1)!="/"?$dir."/":$dir;

?>

扫描路径:

if(isset($_POST['btnScan']))

{

$start=mktime();

$is_user = array();

$is_ext = "";

$list = "";

if(trim($setting['user'])!="")

{

$is_user = explode("|",$setting['user']);

if(count($is_user)>0)

{

foreach($is_user as $key=>$value)

$is_user[$key]=trim(str_replace("?","(.)",$value));

$is_ext = "(.".implode("($|.))|(.",$is_user)."($|.))";

}

}

if($setting['hta']==1)

{

$is_hta=1;

$is_ext = strlen($is_ext)>0?$is_ext."|":$is_ext;

$is_ext.="(^.htaccess$)";

}

if($setting['all']==1 || (strlen($is_ext)==0 && $setting['hta']==0))

{

$is_ext="(.+)";

}

 

$php_code = getCode();

if(!is_readable($dir))

$dir = MYPATH;

$count=$scanned=0;

scan($dir,$is_ext);

$end=mktime();

$spent = ($end - $start);

?>

扫描: 文件| 发现: 可疑文件| 耗时:

No. 文件 更新时间 原因 特征 动作

}

}

}

ob_flush();

?>

function scan($path = '.',$is_ext){

global $php_code,$count,$scanned,$list;

$ignore = array('.', '..' );

$replace=array(" ","n","r","t");

$dh = @opendir( $path );

 

 

while(false!==($file=readdir($dh))){

if( !in_array( $file, $ignore ) ){

if( is_dir( "$path$file" ) ){

scan("$path$file/",$is_ext);

} else {

$current = $path.$file;

if(MYFULLPATH==$current) continue;

if(!preg_match("/$is_ext/i",$file)) continue;

if(is_readable($current))

{

$scanned++;

$content=file_get_contents($current);

$content= str_replace($replace,"",$content);

foreach($php_code as $key => $value)

{

if(preg_match("/$value/i",$content))

{

$count++;

$j = $count % 2 + 1;

$filetime = date('Y-m-d H:i:s',filemtime($current));

$reason = explode("->",$key);

$url = str_replace(REALPATH,HOST,$current);

preg_match("/$value/i",$content,$arr);

$list.="

$count $current $filetime $reason[0] $reason[1] 下载

www.bkjia.comtruehttp: //www.bkjia.com/PHPjc/632842.htmlTechArticleThe repair of the Trojan horse hanging on the PHP website is secondary. The most important thing is how to prevent the Trojan horse from being injected again after repair. Your website is the most important thing. Let me summarize how to repair the Trojan horse on the PHP website...
Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn