phpstudyºóÃÅÖ²ÈëÊÂÎñ°²È«¹«¸æ
°ä²¼¹¦·ò 2019-09-21¡ñÊÂÎñ²¼¾°
PhpstudyÈí¼þÊǹúÄÚµÄÒ»¿îÃâ·ÑµÄPHPµ÷ÊÔ»·¾³µÄ·¨Ê½¼¯³É°ü£¬Í¨¹ý¼¯³ÉApache¡¢PHP¡¢MySQL¡¢phpMyAdmin¡¢ZendOptimizer¶à¿îÈí¼þÒ»´ÎÐÔ×°Öã¬ÎÞÐèÅäÖü´¿ÉÖ±½Ó×°ÖÃʹÓã¬ÓµÓÐPHP»·¾³µ÷ÊÔºÍPHP¿ª·¢Ö°ÄÜ£¬ÔÚ¹úÄÚÓÐ׎ü°ÙÍòPHP˵»°½ø½¨Õß¡¢¿ª·¢ÕßÓû§¡£
½üÈÕ£¬º¼Öݹ«°²±¨Â·ÁËһ·³Á´ó°²È«ÊÂÎñº¼Öݾ¯·½´«µÝ½ø¹¥ÉæÍøÎ¥·¨·¸×ïôß¡°¾»Íø2019¡±×¨ÏîÐж¯Õ½¹û£¬ÆäÖоßÌå˵ÁËȻһ·¹©¸øÁ´¹¥»÷ÊÂÎñ¡£
¡ñÊÂÎñÃèÊö
2018Äê12ÔÂ4ÈÕ£¬Î÷ºþÇø¹«°²·Ö¾ÖÍø¾¯´ó¶Ó½Ó±¨°¸³Æ£¬Ä³¹«Ë¾·¢ÏÖ¹«Ë¾ÄÚÓÐ20ÓàÌ¨ÍÆËã»ú±»Ö´ÐÐΣÏÕºÅÁÒÉËÆÔ¶³Ì½ÚÔìץȡÕ˺ÅÃÜÂëµÈÍÆËã»úÊý¾Ý»Ø´«´óÁ¿Ãô¸ÐÐÅÏ¢¡£
Î÷ºþÍø¾¯µ±¼´¶Ô¸Ã°¸Á¢°¸¿úËÅ£¬²¢ÔÚÊÐÍø¾¯·Ö¾ÖǣͷÏ£¬×éÖ¯¾«×³¾¯Á¦³ÉÁ¢×¨°¸×éѸ¿ì·¢Õ¹¿úËÅȡ֤¹¤×÷¡£
ÓÚ2019Äê1ÔÂ4ÈÕÖÁ5ÈÕ£¬±ø·ÖËÄ·£¬±ðÀëÔÚº£ÄÏÁêË®¡¢ËÄ´¨³É¶¼¡¢³ÁÇì¡¢¹ã¶«¹ãÖÝ×¥»ñÂíij¡¢Ñîij¡¢Ì·Ä³¡¢ÖÜijijµÈ7Ãû·¸×ïÏÓÒÉÈË£¬ÏÖ³¡½É»ñ´óÁ¿Éæ°¸ÎïÆ·£¬²¢ÔÚÏÓÒÉÈ˵ĵç×ÓÉ豸ÖÐÕÒµ½ÁËÖ±½ÓµÄ·¸×ïÖ¤¾Ý¡£¾Ýͳ¼Æ£¬½ØÖ¹×¥»ñ¹¦·ò£¬·¸×ïÏÓÒÉÈ˹²·¸·¨½ÚÔìÍÆËã»ú67ÍòÓą̀£¬·¸·¨»ñÈ¡Õ˺ÅÃÜÂëÀࡢ̸ÌìÊý¾ÝÀà¡¢É豸ÂëÀàµÈÊý¾Ý10ÍòÓà×é¡£
¾ÝÖØÒª·¸×ïÏÓÒÉÈËÂíij¹©Êö£¬ÆäÓÚ2016Äê±àдÁË¡°ºóÃÅ¡±£¬Ê¹Óúڿͼ¿Á©·¸·¨ÇÖÈëÁËPhpStudyÈí¼þ¹ÙÍø£¬´Û¸ÄÁËÈí¼þ×°ÖðüÄÚÈÝ¡£¸Ã¡°ºóÃÅ¡±ÎÞ·¨±»É±¶¾Èí¼þɨÃèɾ³ý£¬²¢ÇÒÒþÄäÓÚÈí¼þijְÄÜÐÔ´úÂëÖУ¬¼«Äѱ»·¢ÏÖ¡£
ÔÚר°¸×éµÄ¿úËŹý³ÌÖУ¬Í¬Ê±·¢ÏÖÂíijµÈÈËͨ¹ý¶ÈÎö¡°µÁÈ¡¡±µÄÊý¾Ý£¬µÃµ½Á˶à¸ö¾³±íÍøÕ¾µÄÖÎÀíºó¶ÜÕ˺ÅÃÜÂ룬²¢Í¨¹ýÅú¸Ä·þÎñÆ÷Êý¾ÝµÄ·½Ê½Ö´ÐÐÚ¿Æ£¬·¸·¨Ä²Àû¹²¼Æ600ÓàÍòÔª¡£
Ŀǰ£¬¹Ù·½·¢¹«¸æ³Æ£¬±»´Û¸ÄµÄÈí¼þ°æ±¾ÎªPhpStudy2016°æ±¾ÖеÄphp5.4°æ±¾£¬ÈôÊÇÄãÊÇ´ÓÆäËüÏÂÔØÕ¾»ñÈ¡µÄ¸Ã°æ±¾£¬Çë×ÔÐв鳲¢É¾³ýÆäÖеÄphp5.4°æ±¾¡£
¡ñÊÂÎñ·ÖÎö
±»Ï°È¾ºóÃŵÄÊÇ /php/php-5.4.45/ext/php_xmlrpc.dll
md5£ºC339482FD2B233FB0A555B629C0EA5D5
²¿ÃÅ·ÖÎö»ØÁ¬´úÂ룬ÆäÖÐÌá¼°ÁË»ØÁ¬C2
¡ñ¼ì²â²½Öè
pcheck.shÎļþ£¬ÔËÐкóÄܹ»µÝ¹é¼ì²âµ±Ç°Ä¿Â¼ÏÂËùÓÐdllÎļþÖÐÊÇ·ñÔ̺¬Ä¾ÂíÎļþµÄÌØµãÖµ¡£
#! /bin/bash
# author: pcat@chamd5.org
# http://pcat.cc
# trojan feature
trojan=@eval
function check_dir(){
for file in `ls $1`
do
f2=$1"/"$file
if [ -d $f2 ]
then
check_dir $f2
# just check dll file
elif [ "${file##*.}"x = "dll"x ]
then
strings $f2 |grep -q $trojan
if [ $? == 0 ]
then
echo "===" $f2 "===="
strings $f2 |grep $trojan
fi
fi
done
}
# . stand for current directory
check_dir .
windowsϵͳ£¬Ö´ÐÐpcheck.py
# -*- coding:utf8 -*-
__author__='pcat@chamd5.org'
__blog__='http://pcat.cc'
import os
import string
import re
def strings(file) :
chars = string.printable[:94]
shortestReturnChar = 4
regExp = '[%s]{%d,}' % (chars, shortestReturnChar)
pattern = re.compile(regExp)
with open(file, 'rb') as f:
return pattern.findall(f.read())
def grep(lines,pattern):
for line in lines:
if pattern in line:
yield line
def pcheck(filename):
# trojan feature
trojan='@eval'
# just check dll file
if filename.endswith('.dll'):
lines=strings(filename)
try:
grep(lines,trojan).next()
except:
return
print '=== {0} ==='.format(filename)
for line in grep(lines,trojan):
print line
pass
def foo():
# . stand for current directory
for path, dirs, files in os.walk(".", topdown=False):
for name in files:
pcheck(os.path.join(path, name))
for name in dirs:
pcheck(os.path.join(path, name))
pass
if __name__ == '__main__':
foo()
¡ñ½¨¸´½¨Òé
ĿǰPhpStudy¹Ù·½µÄ×îа汾Öв»´æÔÚ¶ûºóÃÅ£¬Çë½Ó¼û¹Ù·½Á´½Ó¸üе½×îÐÂÈí¼þ£º
https://www.xp.cn/
¡ñIOC
IP
133.130.101.150
ÓòÃû
360se.net
bbs.360se.net
www.360se.net
up.360se.net
down.360se.net
cms.360se.net
file.360se.net
ftp.360se.net
MD5
C339482FD2B233FB0A555B629C0EA5D5
0f7ad38e7a9857523dfbce4bce43a9e9
¡ñ²Î¿¼Á´½Ó
http://baijiahao.www.alibaba-yz.com/s?id=1645182793211249695&wfr=spider&for=pc
https://mp.weixin.qq.com/s/xikzveCJqkKAu1MnMRCYPw


¾©¹«Íø°²±¸11010802024551ºÅ