phpstudyºóÃÅÖ²ÈëÊÂÎñÇ徲ͨ¸æ
Ðû²¼Ê±¼ä 2019-09-21¡ñÊÂÎñÅä¾°
PhpstudyÈí¼þÊǺ£ÄÚµÄÒ»¿îÃâ·ÑµÄPHPµ÷ÊÔÇéÐεijÌÐò¼¯³É°ü£¬£¬£¬Í¨¹ý¼¯³ÉApache¡¢PHP¡¢MySQL¡¢phpMyAdmin¡¢ZendOptimizer¶à¿îÈí¼þÒ»´ÎÐÔ×°Ö㬣¬£¬ÎÞÐèÉèÖü´¿ÉÖ±½Ó×°ÖÃʹÓ㬣¬£¬¾ßÓÐPHPÇéÐε÷ÊÔºÍPHP¿ª·¢¹¦Ð§£¬£¬£¬ÔÚº£ÄÚÓÐ׎ü°ÙÍòPHPÓïÑÔѧϰÕß¡¢¿ª·¢ÕßÓû§¡£¡£¡£¡£¡£
¿ËÈÕ£¬£¬£¬º¼Öݹ«°²±¨µÀÁËÒ»ÆðÖØ´óÇå¾²ÊÂÎñº¼Öݾ¯·½×ª´ï¹¥»÷ÉæÍøÎ¥·¨·¸·¨ôß¡°¾»Íø2019¡±×¨ÏîÐж¯Õ½¹û£¬£¬£¬ÆäÖÐÏêϸ˵Ã÷ÎúÒ»Æð¹©Ó¦Á´¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£
¡ñÊÂÎñÐÎò
2018Äê12ÔÂ4ÈÕ£¬£¬£¬Î÷ºþÇø¹«Ñ·Ö¾ÖÍø¾¯´ó¶Ó½Ó±¨°¸³Æ£¬£¬£¬Ä³¹«Ë¾·¢Ã÷¹«Ë¾ÄÚÓÐ20Óą̀ÅÌËã»ú±»Ö´ÐÐΣÏÕÏÂÁ£¬£¬ÒÉËÆÔ¶³Ì¿ØÖÆ×¥È¡Õ˺ÅÃÜÂëµÈÅÌËã»úÊý¾Ý»Ø´«´ó×ÚÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£
Î÷ºþÍø¾¯Á¬Ã¦¶Ô¸Ã°¸Á¢°¸Õì²é£¬£¬£¬²¢ÔÚÊÐÍø¾¯·Ö¾ÖǣͷÏ£¬£¬£¬×éÖ¯¾«º·¾¯Á¦½¨Éèר°¸×éѸËÙ¿ªÕ¹Õì²éȡ֤ÊÂÇé¡£¡£¡£¡£¡£
ÓÚ2019Äê1ÔÂ4ÈÕÖÁ5ÈÕ£¬£¬£¬±ø·ÖËÄ·£¬£¬£¬»®·ÖÔÚº£ÄÏÁêË®¡¢ËÄ´¨³É¶¼¡¢ÖØÇì¡¢¹ã¶«¹ãÖÝ×¥»ñÂíij¡¢Ñîij¡¢Ì·Ä³¡¢ÖÜijijµÈ7Ãû·¸·¨ÏÓÒÉÈË£¬£¬£¬ÏÖ³¡½É»ñ´ó×ÚÉæ°¸ÎïÆ·£¬£¬£¬²¢ÔÚÏÓÒÉÈ˵ĵç×Ó×°±¸ÖÐÕÒµ½ÁËÖ±½ÓµÄ·¸·¨Ö¤¾Ý¡£¡£¡£¡£¡£¾Ýͳ¼Æ£¬£¬£¬×èÖ¹×¥»ñʱ¼ä£¬£¬£¬·¸·¨ÏÓÒÉÈ˹²²»·¨¿ØÖÆÅÌËã»ú67ÍòÓą̀£¬£¬£¬²»·¨»ñÈ¡Õ˺ÅÃÜÂëÀࡢ̸ÌìÊý¾ÝÀà¡¢×°±¸ÂëÀàµÈÊý¾Ý10ÍòÓà×é¡£¡£¡£¡£¡£
¾ÝÖ÷Òª·¸·¨ÏÓÒÉÈËÂíij¹©Êö£¬£¬£¬ÆäÓÚ2016Äê±àдÁË¡°ºóÃÅ¡±£¬£¬£¬Ê¹ÓúڿÍÊֶβ»·¨ÇÖÈëÁËPhpStudyÈí¼þ¹ÙÍø£¬£¬£¬¸Ä¶¯ÁËÈí¼þ×°ÖðüÄÚÈÝ¡£¡£¡£¡£¡£¸Ã¡°ºóÃÅ¡±ÎÞ·¨±»É±¶¾Èí¼þɨÃèɾ³ý£¬£¬£¬²¢ÇÒÒþ²ØÓÚÈí¼þij¹¦Ð§ÐÔ´úÂëÖУ¬£¬£¬¼«Äѱ»·¢Ã÷¡£¡£¡£¡£¡£
ÔÚר°¸×éµÄÕì²éÀú³ÌÖУ¬£¬£¬Í¬Ê±·¢Ã÷ÂíijµÈÈË̫ͨ¹ýÎö¡°ÍµÈ¡¡±µÄÊý¾Ý£¬£¬£¬»ñµÃÁ˶à¸ö¾³ÍâÍøÕ¾µÄÖÎÀíºǫ́Õ˺ÅÃÜÂ룬£¬£¬²¢Í¨¹ýÐÞ¸ÄЧÀÍÆ÷Êý¾ÝµÄ·½·¨ÊµÑéÕ©Æ£¬£¬£¬²»·¨Ä²Àû¹²¼Æ600ÓàÍòÔª¡£¡£¡£¡£¡£
ÏÖÔÚ£¬£¬£¬¹Ù·½·¢Í¨¸æ³Æ£¬£¬£¬±»¸Ä¶¯µÄÈí¼þ°æ±¾ÎªPhpStudy2016°æ±¾ÖеÄphp5.4°æ±¾£¬£¬£¬ÈôÊÇÄãÊÇ´ÓÆäËüÏÂÔØÕ¾»ñÈ¡µÄ¸Ã°æ±¾£¬£¬£¬Çë×ÔÐмì²é²¢É¾³ýÆäÖеÄphp5.4°æ±¾¡£¡£¡£¡£¡£
¡ñÊÂÎñÆÊÎö
±»Ñ¬È¾ºóÃŵÄÊÇ /php/php-5.4.45/ext/php_xmlrpc.dll
md5£ºC339482FD2B233FB0A555B629C0EA5D5
²¿·ÖÆÊÎö»ØÁ¬´úÂ룬£¬£¬ÆäÖÐÌá¼°ÁË»ØÁ¬C2
¡ñ¼ì²âÒªÁì
pcheck.shÎļþ£¬£¬£¬ÔËÐкó¿ÉÒԵݹé¼ì²âÄ¿½ñĿ¼ÏÂËùÓÐdllÎļþÖÐÊÇ·ñ°üÀ¨Ä¾ÂíÎļþµÄÌØÕ÷Öµ¡£¡£¡£¡£¡£
#! /bin/bash
# author: pcat@chamd5.org
# http://pcat.cc
# trojan feature
trojan=@eval
function check_dir(){
for file in `ls $1`
do
f2=$1"/"$file
if [ -d $f2 ]
then
check_dir $f2
# just check dll file
elif [ "${file##*.}"x = "dll"x ]
then
strings $f2 |grep -q $trojan
if [ $? == 0 ]
then
echo "===" $f2 "===="
strings $f2 |grep $trojan
fi
fi
done
}
# . stand for current directory
check_dir .
windowsϵͳ£¬£¬£¬Ö´ÐÐpcheck.py
# -*- coding:utf8 -*-
__author__='pcat@chamd5.org'
__blog__='http://pcat.cc'
import os
import string
import re
def strings(file) :
chars = string.printable[:94]
shortestReturnChar = 4
regExp = '[%s]{%d,}' % (chars, shortestReturnChar)
pattern = re.compile(regExp)
with open(file, 'rb') as f:
return pattern.findall(f.read())
def grep(lines,pattern):
for line in lines:
if pattern in line:
yield line
def pcheck(filename):
# trojan feature
trojan='@eval'
# just check dll file
if filename.endswith('.dll'):
lines=strings(filename)
try:
grep(lines,trojan).next()
except:
return
print '=== {0} ==='.format(filename)
for line in grep(lines,trojan):
print line
pass
def foo():
# . stand for current directory
for path, dirs, files in os.walk(".", topdown=False):
for name in files:
pcheck(os.path.join(path, name))
for name in dirs:
pcheck(os.path.join(path, name))
pass
if __name__ == '__main__':
foo()
¡ñÐÞ¸´½¨Òé
ÏÖÔÚPhpStudy¹Ù·½µÄ×îа汾Öв»±£´æÒÔºóÃÅ£¬£¬£¬Çë»á¼û¹Ù·½Á´½Ó¸üе½×îÐÂÈí¼þ£º
https://www.xp.cn/
¡ñIOC
IP
133.130.101.150
ÓòÃû
360se.net
bbs.360se.net
www.360se.net
up.360se.net
down.360se.net
cms.360se.net
file.360se.net
ftp.360se.net
MD5
C339482FD2B233FB0A555B629C0EA5D5
0f7ad38e7a9857523dfbce4bce43a9e9
¡ñ²Î¿¼Á´½Ó
http://baijiahao.www.chinabigbag.com/s?id=1645182793211249695&wfr=spider&for=pc
https://mp.weixin.qq.com/s/xikzveCJqkKAu1MnMRCYPw


¾©¹«Íø°²±¸11010802024551ºÅ