phpstudyºóÃÅÖ²ÈëÊÂÎñ°²È«¹«¸æ

°ä²¼¹¦·ò 2019-09-21

¡ñÊÂÎñ²¼¾°


PhpstudyÈí¼þÊǹúÄÚµÄÒ»¿îÃâ·ÑµÄPHPµ÷ÊÔ»·¾³µÄ·¨Ê½¼¯³É°ü £¬Í¨¹ý¼¯³ÉApache¡¢PHP¡¢MySQL¡¢phpMyAdmin¡¢ZendOptimizer¶à¿îÈí¼þÒ»´ÎÐÔ×°Öà £¬ÎÞÐèÅäÖü´¿ÉÖ±½Ó×°ÖÃʹÓà £¬ÓµÓÐPHP»·¾³µ÷ÊÔºÍPHP¿ª·¢Ö°ÄÜ £¬ÔÚ¹úÄÚÓÐ׎ü°ÙÍòPHP˵»°½ø½¨Õß¡¢¿ª·¢ÕßÓû§¡£


½üÈÕ £¬º¼Öݹ«°²±¨Â·ÁËһ·³Á´ó°²È«ÊÂÎñº¼Öݾ¯·½´«µÝ½ø¹¥ÉæÍøÎ¥·¨·¸×ïôß¡°¾»Íø2019¡±×¨ÏîÐж¯Õ½¹û £¬ÆäÖоßÌå˵ÁËȻһ·¹©¸øÁ´¹¥»÷ÊÂÎñ¡£


¡ñÊÂÎñÃèÊö


2018Äê12ÔÂ4ÈÕ £¬Î÷ºþÇø¹«°²·Ö¾ÖÍø¾¯´ó¶Ó½Ó±¨°¸³Æ £¬Ä³¹«Ë¾·¢ÏÖ¹«Ë¾ÄÚÓÐ20ÓàÌ¨ÍÆËã»ú±»Ö´ÐÐΣÏÕºÅÁî £¬ÒÉËÆÔ¶³Ì½ÚÔìץȡÕ˺ÅÃÜÂëµÈÍÆËã»úÊý¾Ý»Ø´«´óÁ¿Ãô¸ÐÐÅÏ¢¡£


Î÷ºþÍø¾¯µ±¼´¶Ô¸Ã°¸Á¢°¸¿úËÅ £¬²¢ÔÚÊÐÍø¾¯·Ö¾ÖǣͷÏ £¬×éÖ¯¾«×³¾¯Á¦³ÉÁ¢×¨°¸×éѸ¿ì·¢Õ¹¿úËÅȡ֤¹¤×÷¡£


ÓÚ2019Äê1ÔÂ4ÈÕÖÁ5ÈÕ £¬±ø·ÖËÄ· £¬±ðÀëÔÚº£ÄÏÁêË®¡¢ËÄ´¨³É¶¼¡¢³ÁÇì¡¢¹ã¶«¹ãÖÝ×¥»ñÂíij¡¢Ñîij¡¢Ì·Ä³¡¢ÖÜijijµÈ7Ãû·¸×ïÏÓÒÉÈË £¬ÏÖ³¡½É»ñ´óÁ¿Éæ°¸ÎïÆ· £¬²¢ÔÚÏÓÒÉÈ˵ĵç×ÓÉ豸ÖÐÕÒµ½ÁËÖ±½ÓµÄ·¸×ïÖ¤¾Ý¡£¾Ýͳ¼Æ £¬½ØÖ¹×¥»ñ¹¦·ò £¬·¸×ïÏÓÒÉÈ˹²·¸·¨½ÚÔìÍÆËã»ú67ÍòÓą̀ £¬·¸·¨»ñÈ¡Õ˺ÅÃÜÂëÀࡢ̸ÌìÊý¾ÝÀà¡¢É豸ÂëÀàµÈÊý¾Ý10ÍòÓà×é¡£


¾ÝÖØÒª·¸×ïÏÓÒÉÈËÂíij¹©Êö £¬ÆäÓÚ2016Äê±àдÁË¡°ºóÃÅ¡± £¬Ê¹Óúڿͼ¿Á©·¸·¨ÇÖÈëÁËPhpStudyÈí¼þ¹ÙÍø £¬´Û¸ÄÁËÈí¼þ×°ÖðüÄÚÈÝ¡£¸Ã¡°ºóÃÅ¡±ÎÞ·¨±»É±¶¾Èí¼þɨÃèɾ³ý £¬²¢ÇÒÒþÄäÓÚÈí¼þijְÄÜÐÔ´úÂëÖÐ £¬¼«Äѱ»·¢ÏÖ¡£


ÔÚר°¸×éµÄ¿úËŹý³ÌÖÐ £¬Í¬Ê±·¢ÏÖÂíijµÈÈËͨ¹ý¶ÈÎö¡°µÁÈ¡¡±µÄÊý¾Ý £¬µÃµ½Á˶à¸ö¾³±íÍøÕ¾µÄÖÎÀíºó¶ÜÕ˺ÅÃÜÂë £¬²¢Í¨¹ýÅú¸Ä·þÎñÆ÷Êý¾ÝµÄ·½Ê½Ö´ÐÐÚ¿Æ­ £¬·¸·¨Ä²Àû¹²¼Æ600ÓàÍòÔª¡£


Ŀǰ £¬¹Ù·½·¢¹«¸æ³Æ £¬±»´Û¸ÄµÄÈí¼þ°æ±¾ÎªPhpStudy2016°æ±¾ÖеÄphp5.4°æ±¾ £¬ÈôÊÇÄãÊÇ´ÓÆäËüÏÂÔØÕ¾»ñÈ¡µÄ¸Ã°æ±¾ £¬Çë×ÔÐв鳭²¢É¾³ýÆäÖеÄphp5.4°æ±¾¡£


¡ñÊÂÎñ·ÖÎö


±»Ï°È¾ºóÃŵÄÊÇ /php/php-5.4.45/ext/php_xmlrpc.dll

md5£ºC339482FD2B233FB0A555B629C0EA5D5


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


²¿ÃÅ·ÖÎö»ØÁ¬´úÂë £¬ÆäÖÐÌá¼°ÁË»ØÁ¬C2


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¡ñ¼ì²â²½Öè


pcheck.shÎļþ £¬ÔËÐкóÄܹ»µÝ¹é¼ì²âµ±Ç°Ä¿Â¼ÏÂËùÓÐdllÎļþÖÐÊÇ·ñÔ̺¬Ä¾ÂíÎļþµÄÌØµãÖµ¡£


#! /bin/bash

# author: pcat@chamd5.org

# http://pcat.cc

# trojan feature

trojan=@eval

function check_dir(){

   for file in `ls $1`

   do

       f2=$1"/"$file

       if [ -d $f2 ]

       then

           check_dir $f2

       # just check dll file

       elif [ "${file##*.}"x = "dll"x ]

       then

           strings $f2 |grep -q $trojan

           if [ $? == 0 ]

           then

               echo "===" $f2 "===="

               strings $f2 |grep $trojan

           fi

       fi

   done

}

# . stand for current directory

check_dir .


windowsϵͳ £¬Ö´ÐÐpcheck.py


# -*- coding:utf8 -*-

__author__='pcat@chamd5.org'

__blog__='http://pcat.cc'


import os

import string

import re


def strings(file) :

   chars = string.printable[:94]

   shortestReturnChar = 4

   regExp = '[%s]{%d,}' % (chars, shortestReturnChar)

   pattern = re.compile(regExp)

   with open(file, 'rb') as f:

       return pattern.findall(f.read())


def grep(lines,pattern):

   for line in lines:

       if pattern in line:

           yield line


def pcheck(filename):

   # trojan feature

   trojan='@eval'

   # just check dll file

   if filename.endswith('.dll'):        

       lines=strings(filename)

       try:

           grep(lines,trojan).next()

       except:

           return

       print '=== {0} ==='.format(filename)

       for line in grep(lines,trojan):

           print line

   pass


def foo():

   # . stand for current directory

   for path, dirs, files in os.walk(".", topdown=False):

       for name in files:

           pcheck(os.path.join(path, name))

       for name in dirs:

           pcheck(os.path.join(path, name))

   pass


if __name__ == '__main__':

   foo()


¡ñ½¨¸´½¨Òé


ĿǰPhpStudy¹Ù·½µÄ×îа汾Öв»´æÔÚ¶ûºóÃÅ £¬Çë½Ó¼û¹Ù·½Á´½Ó¸üе½×îÐÂÈí¼þ£º

https://www.xp.cn/


¡ñIOC


IP

133.130.101.150


ÓòÃû

360se.net

bbs.360se.net

www.360se.net

up.360se.net

down.360se.net

cms.360se.net

file.360se.net

ftp.360se.net


MD5

C339482FD2B233FB0A555B629C0EA5D5

0f7ad38e7a9857523dfbce4bce43a9e9


¡ñ²Î¿¼Á´½Ó


http://baijiahao.www.alibaba-yz.com/s?id=1645182793211249695&wfr=spider&for=pc

https://mp.weixin.qq.com/s/xikzveCJqkKAu1MnMRCYPw