PHP 功能木马 webshell

MSG

1、PIC:
在这里插入图片描述
在这里插入图片描述

特征:
Cookie: envlpass=97faf8f61ca07a06f7bb999737158d4c; serveru=192.168.36.133%2Fwebshell%2F1%2F74c92f29cf15de34b8866db4b40748243fb938b4.php; serverp=nihaoa
后门:qyvc.com

检测:

alert http any any -> any any (msg:"Webshell.PHP.Success.Exec.Threat.A"; flow:established,to_server; content:"envlpass="; http_cookie; nocase; fast_pattern;  content:"serveru="; http_cookie; nocase; content:"serverp="; http_cookie; nocase; reference:url,https://mp.csdn.net/mdeditor/88943927; classtype:web-application-attack; sid:80000012; rev:1; metadata:created_at 2019_04_01, updated_at 2019_04_01;)

pcre:"/Cookie\x3a\x20envlpass=[a-z0-9]{32}(.*?)serveru=/i"

PCAP:https://github.com/Fate9091/fate/blob/master/webshell-pass.rar

2.PIC
在这里插入图片描述
在这里插入图片描述
在这里插入图片描述
特征:

Cookie: cwd=%2Fvar%2Fwww%2Fhtml%2Fwebshell%2F2%2F; pass=10470c3b4b1fed12c3baac014be15fac67c6e815
Cookie: pass=10470c3b4b1fed12c3baac014be15fac67c6e815

检测

Http_header
pcre:"/Cookie\x3a\x20(cwd=[\S]*\x3b\x20)?pass=[a-z0-9]{40}/i"
http_response_body
pcre:"/\x22menuterminal\x22[\s\S]*\x22menueval\x22[\s\S]*\x22menuprocesses\x22[\S\s]*\d+\x20Folder\x28s\x29/i"

alert http any any -> any any (msg:"Webshell.PHP.jak3fr0z.Success.Folder.Threat.A"; flow:established,to_server; content:"POST"; http_method; content:"cwd="; http_cookie; nocase;  pcre:"/pass=[a-z0-9]{40}$/RCi"; reference:url,https://mp.csdn.net/mdeditor/88943927; classtype:web-application-attack; sid:80000013; rev:1; metadata:created_at 2019_04_01, updated_at 2019_04_01;)

PCAP:https://github.com/Fate9091/fate/blob/master/jak3fr0z-pass.rar

3.PIC
在这里插入图片描述
在这里插入图片描述

在这里插入图片描述
特征:

login=b374k&submitlogin=Go+%21

Cookie: s_self=%3F; b374k=fb621f5060b9f65acf8eb4232e3024140dea2b34; s_python=Python+2.7.12%0A; s_perl=5.022001; s_gcc=gcc+%28Ubuntu+5.4.0-6ubuntu1%7E16.04.10%29+5.4.0+20160609; s_tar=tar+%28GNU+tar%29+1.28; s_wget=GNU+Wget+1.17.1+built+on+linux-gnu.; s_lwpdownload=%2Fusr%2Fbin%2Flwp-download+version+%5Bunknown%5D+calling+Getopt%3A%3AStd%3A%3Agetopts+%28version+1.11+%5Bparanoid%5D%29%2C; s_curl=curl+7.47.0+%28x86_64-pc-linux-gnu%29+libcurl%2F7.47.0+GnuTLS%2F3.4.10+zlib%2F1.2.8+libidn%2F1.32+librtmp%2F2.3

检测

pcre:"/Cookie\x3a.*?b374k=[a-z0-9]{40}\x3b/"
alert http any any -> any any (msg:"Webshell.b374k.Cookies.A"; flow:established,to_server;  pcre:"/b374k=[a-z0-9]{40}\x3b/Ci";reference:url,https://mp.csdn.net/mdeditor/88943927; classtype:web-application-attack; sid:80000016; rev:1; metadata:created_at 2019_04_09, updated_at 2019_04_08;)

PCAP:https://github.com/Fate9091/fate/blob/master/b374k.pcap

4、PIC
在这里插入图片描述

检测

pcre:"/form\x20method=\x27GET\x27[\s\S]*value=\x27Files\x27\x20size=\x27[\S\s]*value=\x27Bruteforce\x27\x20size=\x27/i"
alert http any any -> any any (msg:"Webshell.PHP.Gaza.Http_Response_Body.Threat.A"; flow:established,from_server;  file_data; content:"value=|27|Change-Admin|27 20|size="; nocase; content:"value=|27|Server-Info|27 20|size="; distance:0; nocase;    reference:url,https://mp.csdn.net/mdeditor/88943927; classtype:web-application-attack; sid:80000017; rev:1; metadata:created_at 2019_04_01, updated_at 2019_04_01;)

5、PIC
在这里插入图片描述
检测


开源:
alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET WEB_SERVER WebShell - Generic - c99shell based header"; flow:established,to_client; file_data; content:"<span>Uname<br>User<br>Php<br>Hdd<br>Cwd</span>"; classtype:attempted-user; sid:2015918; rev:2; metadata:created_at 2012_11_21, updated_at 2012_11_21;)
alert tcp $HTTP_SERVERS any -> $EXTERNAL_NET any (msg:"ET ATTACK_RESPONSE Output of id command from HTTP server"; flow:established; content:"uid="; pcre:"/^\d+[^\r\n\s]+/R"; content:" gid="; within:5; pcre:"/^\d+[^\r\n\s]+/R"; content:" groups="; within:8; classtype:bad-unknown; sid:2019284; rev:3; metadata:created_at 2014_09_26, updated_at 2014_09_26;)

6、PIC
在这里插入图片描述
在这里插入图片描述
在这里插入图片描述
检测

alert http any any -> any any (msg:"WebShell.PHP.AnonGhost.Response-Body.C"; flow:established,to_client; file_data; content:"<a|20|href=|222f|php|2f|2|2e|PHP|22|"; fast_pattern; pcre:"/\x3e\x26nbsp\x3bHome\x26nbsp\x3b[\S\s]*?File\x20Manager\x26[\S\s]*?Bypass[\S\s]*?Bruteforce[\S\s]*?Scan[\S\s]*?Kill\x26nbsp/Ri"; reference:md5,37fd75fe3726fbcb2b1e784f9e3dfc44; classtype:web-application-attack; sid:7070091; rev:3; metadata:create_at 2018_7_10, updated_at 2018_7_10;)

PCAP:https://github.com/Fate9091/fate/blob/master/8-AnonGhost.rar

7.PIC

在这里插入图片描述
在这里插入图片描述
检测:

FSID_00020134,HTTP,HTTP_Response_Body,FLOW,IMPORT,IMPORT,3,WebShell,WebShell.PHP.PHP_Mailer.Response-Body.A,NOCASE,0,181,pcre:"/PHP\x20Mailer\x3c[\S\s]*?\x20SMTP\x20\x26\x20OTHER\x20SETUP\x3c[\S\s]*?\x22\x20If\x20you\x20dont\x20have\x20SMTP\x20login\x2c\x20leave\x20blank\x20queries\x20above\x20\x22/i",NA,NA,NA,NA,NA,NA,NA,iDomeK-00000936,iDomeT-00008504:PHP_Mailer WebShell;iDomeT-00008371:WebShell控制行为,2019/4/12

alert http any any -> any any (msg:"WebShell.PHP.PHP_Mailer.Response-Body.A"; flow:established,to_client; file_data; content:"<div|20|class=|22|panel-title|2220|align=|22|center|22|><a|20|href=|2222|>"; fast_pattern; pcre:"/PHP\x20Mailer\x3c[\S\s]*?\x20SMTP\x20\x26\x20OTHER\x20SETUP\x3c[\S\s]*?\x22\x20If\x20you\x20dont\x20have\x20SMTP\x20login\x2c\x20leave\x20blank\x20queries\x20above\x20\x22/Ri"; reference:md5,26fda294b2c808784b8f0ee4767288e4; classtype:web-application-attack; sid:7070151; rev:3; metadata:create_at 2018_7_13, updated_at 2018_7_13;)

PCAP:https://github.com/Fate9091/fate/blob/master/9-pass—.rar

8:PIC
在这里插入图片描述
在这里插入图片描述
检测:

alert http any any -> any any (msg:"WebShell.PHP.Response-Body.G"; flow:established,to_client; file_data; content:"id=mainmenu><a|20|href=|22|?x="; fast_pattern; pcre:"/phptools\x22\x3e\[PHP\x2dTools\][\S\s]*?phpback\x22\x3e\[PHP\x7cBackconnect\][\S\s]*?fi\x22\x3e\[Cpanel\x20Brute\]/Ri"; reference:md5,68f28aabd5049afad66de5deb7ff5804; classtype:web-application-attack; sid:7070152; rev:3; metadata:create_at 2018_7_13, updated_at 2018_7_13;)

FSID_00017447,HTTP,HTTP_Response_Body,FLOW,IMPORT,IMPORT,3,WebShell,WebShell.PHP.To_Client.Response_Body.F,NOCASE,0,124,pcre:"/phptools\x22\x3e\[PHP\x2dTools\][\S\s]*?phpback\x22\x3e\[PHP\x7cBackconnect\][\S\s]*?fi\x22\x3e\[Cpanel\x20Brute\]/i",NA,NA,NA,NA,NA,NA,0,2019/4/12

PCAP:https://github.com/Fate9091/fate/blob/master/10-pass.rar

9.PIC

在这里插入图片描述
检测:

alert http any any -> any any (msg:"WebShell.PHP.Xnonymoux.Response-Body.A"; flow:established,to_client; content:"title=|27|File|20|Explorer|27|><div|20|class=|27|menumi|27|"; fast_pattern; pcre:"/\x3eXplorer\x3c[\S\s]*?\x3eProcess\x3c[\S\s]*?\x3eStats\x3c[\S\s]*?\x3eDatabase\x3c[\S\s]*?\x3eBConnect\x3c[\S\s]*?\x3eCoders\x3c/Ri"; reference:md5,4618a0469bf2cb2ca8a49fcd337ef463; classtype:web-application-attack; sid:7070092; rev:3; metadata:create_at 2018_7_10, updated_at 2018_7_10;)

FSID_00017454,HTTP,HTTP_Response_Body,FLOW,IMPORT,IMPORT,3,WebShell,WebShell.PHP.Xnonymoux.To_Client.Response_Body.A,NOCASE,0,139,pcre:"/\x3eXplorer\x3c[\S\s]*?\x3eProcess\x3c[\S\s]*?\x3eStats\x3c[\S\s]*?\x3eDatabase\x3c[\S\s]*?\x3eBConnect\x3c[\S\s]*?\x3eCoders\x3c/i",NA,NA,NA,NA,NA,NA,0,2019/4/17

PCAP:https://github.com/Fate9091/fate/blob/master/12-pass.rar

  • 0
    点赞
  • 2
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值