phpstudyºóÃÅÖ²ÈëÊÂÎñÇ徲ͨ¸æ
Ðû²¼Ê±¼ä 2019-09-21¡ñÊÂÎñÅä¾°
PhpstudyÈí¼þÊǺ£ÄÚµÄÒ»¿îÃâ·ÑµÄPHPµ÷ÊÔÇéÐεijÌÐò¼¯³É°ü£¬£¬£¬£¬£¬Í¨¹ý¼¯³ÉApache¡¢PHP¡¢MySQL¡¢phpMyAdmin¡¢ZendOptimizer¶à¿îÈí¼þÒ»´ÎÐÔ×°Ö㬣¬£¬£¬£¬ÎÞÐèÉèÖü´¿ÉÖ±½Ó×°ÖÃʹÓ㬣¬£¬£¬£¬¾ßÓÐPHPÇéÐε÷ÊÔºÍPHP¿ª·¢¹¦Ð§£¬£¬£¬£¬£¬ÔÚº£ÄÚÓÐ׎ü°ÙÍòPHPÓïÑÔѧϰÕß¡¢¿ª·¢ÕßÓû§¡£¡£¡£¡£
¿ËÈÕ£¬£¬£¬£¬£¬º¼Öݹ«°²±¨µÀÁËÒ»ÆðÖØ´óÇå¾²ÊÂÎñº¼Öݾ¯·½×ª´ï¹¥»÷ÉæÍøÎ¥·¨·¸·¨ôß¡°¾»Íø2019¡±×¨ÏîÐж¯Õ½¹û£¬£¬£¬£¬£¬ÆäÖÐÏêϸ˵Ã÷ÎúÒ»Æð¹©Ó¦Á´¹¥»÷ÊÂÎñ¡£¡£¡£¡£
¡ñÊÂÎñÐÎò
2018Äê12ÔÂ4ÈÕ£¬£¬£¬£¬£¬Î÷ºþÇø¹«Ñ·Ö¾ÖÍø¾¯´ó¶Ó½Ó±¨°¸³Æ£¬£¬£¬£¬£¬Ä³¹«Ë¾·¢Ã÷¹«Ë¾ÄÚÓÐ20Óą̀ÅÌËã»ú±»Ö´ÐÐΣÏÕÏÂÁ£¬£¬£¬£¬ÒÉËÆÔ¶³Ì¿ØÖÆ×¥È¡Õ˺ÅÃÜÂëµÈÅÌËã»úÊý¾Ý»Ø´«´ó×ÚÃô¸ÐÐÅÏ¢¡£¡£¡£¡£
Î÷ºþÍø¾¯Á¬Ã¦¶Ô¸Ã°¸Á¢°¸Õì²é£¬£¬£¬£¬£¬²¢ÔÚÊÐÍø¾¯·Ö¾ÖǣͷÏ£¬£¬£¬£¬£¬×éÖ¯¾«º·¾¯Á¦½¨Éèר°¸×éѸËÙ¿ªÕ¹Õì²éȡ֤ÊÂÇé¡£¡£¡£¡£
ÓÚ2019Äê1ÔÂ4ÈÕÖÁ5ÈÕ£¬£¬£¬£¬£¬±ø·ÖËÄ·£¬£¬£¬£¬£¬»®·ÖÔÚº£ÄÏÁêË®¡¢ËÄ´¨³É¶¼¡¢ÖØÇì¡¢¹ã¶«¹ãÖÝ×¥»ñÂíij¡¢Ñîij¡¢Ì·Ä³¡¢ÖÜijijµÈ7Ãû·¸·¨ÏÓÒÉÈË£¬£¬£¬£¬£¬ÏÖ³¡½É»ñ´ó×ÚÉæ°¸ÎïÆ·£¬£¬£¬£¬£¬²¢ÔÚÏÓÒÉÈ˵ĵç×Ó×°±¸ÖÐÕÒµ½ÁËÖ±½ÓµÄ·¸·¨Ö¤¾Ý¡£¡£¡£¡£¾Ýͳ¼Æ£¬£¬£¬£¬£¬×èÖ¹×¥»ñʱ¼ä£¬£¬£¬£¬£¬·¸·¨ÏÓÒÉÈ˹²²»·¨¿ØÖÆÅÌËã»ú67ÍòÓą̀£¬£¬£¬£¬£¬²»·¨»ñÈ¡Õ˺ÅÃÜÂëÀࡢ̸ÌìÊý¾ÝÀà¡¢×°±¸ÂëÀàµÈÊý¾Ý10ÍòÓà×é¡£¡£¡£¡£
¾ÝÖ÷Òª·¸·¨ÏÓÒÉÈËÂíij¹©Êö£¬£¬£¬£¬£¬ÆäÓÚ2016Äê±àдÁË¡°ºóÃÅ¡±£¬£¬£¬£¬£¬Ê¹ÓúڿÍÊֶβ»·¨ÇÖÈëÁËPhpStudyÈí¼þ¹ÙÍø£¬£¬£¬£¬£¬¸Ä¶¯ÁËÈí¼þ×°ÖðüÄÚÈÝ¡£¡£¡£¡£¸Ã¡°ºóÃÅ¡±ÎÞ·¨±»É±¶¾Èí¼þɨÃèɾ³ý£¬£¬£¬£¬£¬²¢ÇÒÒþ²ØÓÚÈí¼þij¹¦Ð§ÐÔ´úÂëÖУ¬£¬£¬£¬£¬¼«Äѱ»·¢Ã÷¡£¡£¡£¡£
ÔÚר°¸×éµÄÕì²éÀú³ÌÖУ¬£¬£¬£¬£¬Í¬Ê±·¢Ã÷ÂíijµÈÈË̫ͨ¹ýÎö¡°ÍµÈ¡¡±µÄÊý¾Ý£¬£¬£¬£¬£¬»ñµÃÁ˶à¸ö¾³ÍâÍøÕ¾µÄÖÎÀíºǫ́Õ˺ÅÃÜÂ룬£¬£¬£¬£¬²¢Í¨¹ýÐÞ¸ÄЧÀÍÆ÷Êý¾ÝµÄ·½·¨ÊµÑéÕ©Æ£¬£¬£¬£¬£¬²»·¨Ä²Àû¹²¼Æ600ÓàÍòÔª¡£¡£¡£¡£
ÏÖÔÚ£¬£¬£¬£¬£¬¹Ù·½·¢Í¨¸æ³Æ£¬£¬£¬£¬£¬±»¸Ä¶¯µÄÈí¼þ°æ±¾ÎªPhpStudy2016°æ±¾ÖеÄphp5.4°æ±¾£¬£¬£¬£¬£¬ÈôÊÇÄãÊÇ´ÓÆäËüÏÂÔØÕ¾»ñÈ¡µÄ¸Ã°æ±¾£¬£¬£¬£¬£¬Çë×ÔÐмì²é²¢É¾³ýÆäÖеÄphp5.4°æ±¾¡£¡£¡£¡£
¡ñÊÂÎñÆÊÎö
±»Ñ¬È¾ºóÃŵÄÊÇ /php/php-5.4.45/ext/php_xmlrpc.dll
md5£ºC339482FD2B233FB0A555B629C0EA5D5
²¿·ÖÆÊÎö»ØÁ¬´úÂ룬£¬£¬£¬£¬ÆäÖÐÌá¼°ÁË»ØÁ¬C2
¡ñ¼ì²âÒªÁì
pcheck.shÎļþ£¬£¬£¬£¬£¬ÔËÐкó¿ÉÒԵݹé¼ì²âÄ¿½ñĿ¼ÏÂËùÓÐdllÎļþÖÐÊÇ·ñ°üÀ¨Ä¾ÂíÎļþµÄÌØÕ÷Öµ¡£¡£¡£¡£
#! /bin/bash
# author: pcat@chamd5.org
# http://pcat.cc
# trojan feature
trojan=@eval
function check_dir(){
for file in `ls $1`
do
f2=$1"/"$file
if [ -d $f2 ]
then
check_dir $f2
# just check dll file
elif [ "${file##*.}"x = "dll"x ]
then
strings $f2 |grep -q $trojan
if [ $? == 0 ]
then
echo "===" $f2 "===="
strings $f2 |grep $trojan
fi
fi
done
}
# . stand for current directory
check_dir .
windowsϵͳ£¬£¬£¬£¬£¬Ö´ÐÐpcheck.py
# -*- coding:utf8 -*-
__author__='pcat@chamd5.org'
__blog__='http://pcat.cc'
import os
import string
import re
def strings(file) :
chars = string.printable[:94]
shortestReturnChar = 4
regExp = '[%s]{%d,}' % (chars, shortestReturnChar)
pattern = re.compile(regExp)
with open(file, 'rb') as f:
return pattern.findall(f.read())
def grep(lines,pattern):
for line in lines:
if pattern in line:
yield line
def pcheck(filename):
# trojan feature
trojan='@eval'
# just check dll file
if filename.endswith('.dll'):
lines=strings(filename)
try:
grep(lines,trojan).next()
except:
return
print '=== {0} ==='.format(filename)
for line in grep(lines,trojan):
print line
pass
def foo():
# . stand for current directory
for path, dirs, files in os.walk(".", topdown=False):
for name in files:
pcheck(os.path.join(path, name))
for name in dirs:
pcheck(os.path.join(path, name))
pass
if __name__ == '__main__':
foo()
¡ñÐÞ¸´½¨Òé
ÏÖÔÚPhpStudy¹Ù·½µÄ×îа汾Öв»±£´æÒÔºóÃÅ£¬£¬£¬£¬£¬Çë»á¼û¹Ù·½Á´½Ó¸üе½×îÐÂÈí¼þ£º
https://www.xp.cn/
¡ñIOC
IP
133.130.101.150
ÓòÃû
360se.net
bbs.360se.net
www.360se.net
up.360se.net
down.360se.net
cms.360se.net
file.360se.net
ftp.360se.net
MD5
C339482FD2B233FB0A555B629C0EA5D5
0f7ad38e7a9857523dfbce4bce43a9e9
¡ñ²Î¿¼Á´½Ó
http://baijiahao.m.daganlwjx.com/s?id=1645182793211249695&wfr=spider&for=pc
https://mp.weixin.qq.com/s/xikzveCJqkKAu1MnMRCYPw