phpstudyºóÃÅÖ²ÈëÊÂÎñÇ徲ͨ¸æ

Ðû²¼Ê±¼ä 2019-09-21

¡ñÊÂÎñÅä¾°


PhpstudyÈí¼þÊǺ£ÄÚµÄÒ»¿îÃâ·ÑµÄPHPµ÷ÊÔÇéÐεijÌÐò¼¯³É°ü £¬£¬£¬£¬£¬£¬Í¨¹ý¼¯³ÉApache¡¢PHP¡¢MySQL¡¢phpMyAdmin¡¢ZendOptimizer¶à¿îÈí¼þÒ»´ÎÐÔ×°Öà £¬£¬£¬£¬£¬£¬ÎÞÐèÉèÖü´¿ÉÖ±½Ó×°ÖÃʹÓà £¬£¬£¬£¬£¬£¬¾ßÓÐPHPÇéÐε÷ÊÔºÍPHP¿ª·¢¹¦Ð§ £¬£¬£¬£¬£¬£¬ÔÚº£ÄÚÓÐ׎ü°ÙÍòPHPÓïÑÔѧϰÕß¡¢¿ª·¢ÕßÓû§¡£¡£¡£¡£


¿ËÈÕ £¬£¬£¬£¬£¬£¬º¼Öݹ«°²±¨µÀÁËÒ»ÆðÖØ´óÇå¾²ÊÂÎñº¼Öݾ¯·½×ª´ï¹¥»÷ÉæÍøÎ¥·¨·¸·¨ôß¡°¾»Íø2019¡±×¨ÏîÐж¯Õ½¹û £¬£¬£¬£¬£¬£¬ÆäÖÐÏêϸ˵Ã÷ÎúÒ»Æð¹©Ó¦Á´¹¥»÷ÊÂÎñ¡£¡£¡£¡£


¡ñÊÂÎñÐÎò


2018Äê12ÔÂ4ÈÕ £¬£¬£¬£¬£¬£¬Î÷ºþÇø¹«Ñ­·Ö¾ÖÍø¾¯´ó¶Ó½Ó±¨°¸³Æ £¬£¬£¬£¬£¬£¬Ä³¹«Ë¾·¢Ã÷¹«Ë¾ÄÚÓÐ20Óą̀ÅÌËã»ú±»Ö´ÐÐΣÏÕÏÂÁî £¬£¬£¬£¬£¬£¬ÒÉËÆÔ¶³Ì¿ØÖÆ×¥È¡Õ˺ÅÃÜÂëµÈÅÌËã»úÊý¾Ý»Ø´«´ó×ÚÃô¸ÐÐÅÏ¢¡£¡£¡£¡£


Î÷ºþÍø¾¯Á¬Ã¦¶Ô¸Ã°¸Á¢°¸Õì²é £¬£¬£¬£¬£¬£¬²¢ÔÚÊÐÍø¾¯·Ö¾ÖǣͷÏ £¬£¬£¬£¬£¬£¬×éÖ¯¾«º·¾¯Á¦½¨Éèר°¸×éѸËÙ¿ªÕ¹Õì²éȡ֤ÊÂÇé¡£¡£¡£¡£


ÓÚ2019Äê1ÔÂ4ÈÕÖÁ5ÈÕ £¬£¬£¬£¬£¬£¬±ø·ÖËÄ· £¬£¬£¬£¬£¬£¬»®·ÖÔÚº£ÄÏÁêË®¡¢ËÄ´¨³É¶¼¡¢ÖØÇì¡¢¹ã¶«¹ãÖÝ×¥»ñÂíij¡¢Ñîij¡¢Ì·Ä³¡¢ÖÜijijµÈ7Ãû·¸·¨ÏÓÒÉÈË £¬£¬£¬£¬£¬£¬ÏÖ³¡½É»ñ´ó×ÚÉæ°¸ÎïÆ· £¬£¬£¬£¬£¬£¬²¢ÔÚÏÓÒÉÈ˵ĵç×Ó×°±¸ÖÐÕÒµ½ÁËÖ±½ÓµÄ·¸·¨Ö¤¾Ý¡£¡£¡£¡£¾Ýͳ¼Æ £¬£¬£¬£¬£¬£¬×èÖ¹×¥»ñʱ¼ä £¬£¬£¬£¬£¬£¬·¸·¨ÏÓÒÉÈ˹²²»·¨¿ØÖÆÅÌËã»ú67ÍòÓą̀ £¬£¬£¬£¬£¬£¬²»·¨»ñÈ¡Õ˺ÅÃÜÂëÀࡢ̸ÌìÊý¾ÝÀà¡¢×°±¸ÂëÀàµÈÊý¾Ý10ÍòÓà×é¡£¡£¡£¡£


¾ÝÖ÷Òª·¸·¨ÏÓÒÉÈËÂíij¹©Êö £¬£¬£¬£¬£¬£¬ÆäÓÚ2016Äê±àдÁË¡°ºóÃÅ¡± £¬£¬£¬£¬£¬£¬Ê¹ÓúڿÍÊֶβ»·¨ÇÖÈëÁËPhpStudyÈí¼þ¹ÙÍø £¬£¬£¬£¬£¬£¬¸Ä¶¯ÁËÈí¼þ×°ÖðüÄÚÈÝ¡£¡£¡£¡£¸Ã¡°ºóÃÅ¡±ÎÞ·¨±»É±¶¾Èí¼þɨÃèɾ³ý £¬£¬£¬£¬£¬£¬²¢ÇÒÒþ²ØÓÚÈí¼þij¹¦Ð§ÐÔ´úÂëÖÐ £¬£¬£¬£¬£¬£¬¼«Äѱ»·¢Ã÷¡£¡£¡£¡£


ÔÚר°¸×éµÄÕì²éÀú³ÌÖÐ £¬£¬£¬£¬£¬£¬Í¬Ê±·¢Ã÷ÂíijµÈÈË̫ͨ¹ýÎö¡°ÍµÈ¡¡±µÄÊý¾Ý £¬£¬£¬£¬£¬£¬»ñµÃÁ˶à¸ö¾³ÍâÍøÕ¾µÄÖÎÀíºǫ́Õ˺ÅÃÜÂë £¬£¬£¬£¬£¬£¬²¢Í¨¹ýÐÞ¸ÄЧÀÍÆ÷Êý¾ÝµÄ·½·¨ÊµÑéÕ©Æ­ £¬£¬£¬£¬£¬£¬²»·¨Ä²Àû¹²¼Æ600ÓàÍòÔª¡£¡£¡£¡£


ÏÖÔÚ £¬£¬£¬£¬£¬£¬¹Ù·½·¢Í¨¸æ³Æ £¬£¬£¬£¬£¬£¬±»¸Ä¶¯µÄÈí¼þ°æ±¾ÎªPhpStudy2016°æ±¾ÖеÄphp5.4°æ±¾ £¬£¬£¬£¬£¬£¬ÈôÊÇÄãÊÇ´ÓÆäËüÏÂÔØÕ¾»ñÈ¡µÄ¸Ã°æ±¾ £¬£¬£¬£¬£¬£¬Çë×ÔÐмì²é²¢É¾³ýÆäÖеÄphp5.4°æ±¾¡£¡£¡£¡£


¡ñÊÂÎñÆÊÎö


±»Ñ¬È¾ºóÃŵÄÊÇ /php/php-5.4.45/ext/php_xmlrpc.dll

md5£ºC339482FD2B233FB0A555B629C0EA5D5


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


²¿·ÖÆÊÎö»ØÁ¬´úÂë £¬£¬£¬£¬£¬£¬ÆäÖÐÌá¼°ÁË»ØÁ¬C2


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


¡ñ¼ì²âÒªÁì


pcheck.shÎļþ £¬£¬£¬£¬£¬£¬ÔËÐкó¿ÉÒԵݹé¼ì²âÄ¿½ñĿ¼ÏÂËùÓÐdllÎļþÖÐÊÇ·ñ°üÀ¨Ä¾ÂíÎļþµÄÌØÕ÷Öµ¡£¡£¡£¡£


#! /bin/bash

# author: pcat@chamd5.org

# http://pcat.cc

# trojan feature

trojan=@eval

function check_dir(){

   for file in `ls $1`

   do

       f2=$1"/"$file

       if [ -d $f2 ]

       then

           check_dir $f2

       # just check dll file

       elif [ "${file##*.}"x = "dll"x ]

       then

           strings $f2 |grep -q $trojan

           if [ $? == 0 ]

           then

               echo "===" $f2 "===="

               strings $f2 |grep $trojan

           fi

       fi

   done

}

# . stand for current directory

check_dir .


windowsϵͳ £¬£¬£¬£¬£¬£¬Ö´ÐÐpcheck.py


# -*- coding:utf8 -*-

__author__='pcat@chamd5.org'

__blog__='http://pcat.cc'


import os

import string

import re


def strings(file) :

   chars = string.printable[:94]

   shortestReturnChar = 4

   regExp = '[%s]{%d,}' % (chars, shortestReturnChar)

   pattern = re.compile(regExp)

   with open(file, 'rb') as f:

       return pattern.findall(f.read())


def grep(lines,pattern):

   for line in lines:

       if pattern in line:

           yield line


def pcheck(filename):

   # trojan feature

   trojan='@eval'

   # just check dll file

   if filename.endswith('.dll'):        

       lines=strings(filename)

       try:

           grep(lines,trojan).next()

       except:

           return

       print '=== {0} ==='.format(filename)

       for line in grep(lines,trojan):

           print line

   pass


def foo():

   # . stand for current directory

   for path, dirs, files in os.walk(".", topdown=False):

       for name in files:

           pcheck(os.path.join(path, name))

       for name in dirs:

           pcheck(os.path.join(path, name))

   pass


if __name__ == '__main__':

   foo()


¡ñÐÞ¸´½¨Òé


ÏÖÔÚPhpStudy¹Ù·½µÄ×îа汾Öв»±£´æÒÔºóÃÅ £¬£¬£¬£¬£¬£¬Çë»á¼û¹Ù·½Á´½Ó¸üе½×îÐÂÈí¼þ£º

https://www.xp.cn/


¡ñIOC


IP

133.130.101.150


ÓòÃû

360se.net

bbs.360se.net

www.360se.net

up.360se.net

down.360se.net

cms.360se.net

file.360se.net

ftp.360se.net


MD5

C339482FD2B233FB0A555B629C0EA5D5

0f7ad38e7a9857523dfbce4bce43a9e9


¡ñ²Î¿¼Á´½Ó


http://baijiahao.m.hfgufa.com/s?id=1645182793211249695&wfr=spider&for=pc

https://mp.weixin.qq.com/s/xikzveCJqkKAu1MnMRCYPw