Last active
October 21, 2021 22:30
-
-
Save goeroeku/db1031cbf12aeffb372f15b46ec3a350 to your computer and use it in GitHub Desktop.
Script to search for php shell. `for i in /srv/www/htdocs/ ; do perl findshell.pl 10 $i >> scanout.txt ; done`
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl -w | |
# findshell v1.0 == code taken/modified from traps.darkmindz.com | |
#usage: ./findshell.pl | |
use strict; | |
use File::Find; | |
my $sens = shift || 10; | |
my $folder = shift || './'; | |
find(\&backdoor, "$folder"); | |
sub backdoor { | |
if ((/\.(php|txt)/)){ | |
open (my $IN,"<$_") || die "can not open datei $File::Find::name: $!"; | |
my @file = <$IN>; | |
#maybe evil stuffs | |
my $score = grep (/function_exists\(|phpinfo\(|safe_?mode|shell_exec\(|popen\(|passthru\(|system\(|myshellexec\(|exec\(|getpwuid\(|getgrgid \(|fileperms\(/i,@file); | |
#probably evil stuffs | |
my $tempscore = grep(/\`\$\_(post|request|get).{0,20}\`|(include|require|eval|system|passthru|shell_exec).{0,10}\$\_(post|request|get)|eval.{0,10}base64_decode|back_connect|backdoor|r57|PHPJackal|PhpSpy|GiX|Fx29SheLL|w4ck1ng|milw0rm|PhpShell|k1r4|FeeLCoMz|FaTaLisTiCz|Ve_cENxShell|UnixOn|C99madShell|Spamfordz|Locus7s|c100|c99|x2300|cgitelnet|webadmin|cybershell|STUNSHELL|Pr!v8|PHPShell|KaMeLeOn|S4T|oRb|tryag|sniper|noexecshell|\/etc\/passwd|revengans/i, @file); | |
$score += 50 * $tempscore; | |
print "$score - Possible backdoor : $File::Find::name\n" if ($score > $sens-1 ); | |
close $IN; | |
}elsif((/\.(jpg|jpeg|gif|png|tar|zip|gz|rar|pdf)/)){ | |
open (my $IN,"<$_") || (print "can not open datei $File::Find::name: $!" && next); | |
print "5000 - Possible backdoor (php in non-php file): $File::Find::name\n" if grep /(\<\?php|include(\ |\())/i, <$IN>; | |
close $IN; | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment