Skip to content

Commit 6903f04

Browse files
committed
post phpstudy update
1 parent f590adc commit 6903f04

File tree

1 file changed

+9
-5
lines changed

1 file changed

+9
-5
lines changed

posts/phpstudy漏洞应急与检测.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -43,15 +43,15 @@ phpStudy后门被公开后, 第一时间通过IOC提取了最近一年存在此
4343

4444
php源代码中xmlrpc扩展定义: HTTP Header中存在"accept-Encoding: compress,gzip"
4545

46-
![1569332856979](_static/imgs/1569332856979.png)
46+
![zend_module_entry](_static/imgs/1569332856979.png)
4747

4848
xmlrpc.dll中xmlrpc_module_entry的定义:
4949

50-
![1569332960425](_static/imgs/1569332960425.png)
50+
![xmlrpc_zend_module_entry](_static/imgs/1569332960425.png)
5151

5252
劫持的函数为: "sub_100031F0" 和 "sub_10003710", 实际中 "sub_10003710"并未定义任何内容.
5353

54-
![1569333091959](_static/imgs/1569333091959.png)
54+
![sub_10003710](_static/imgs/1569333091959.png)
5555

5656
5757

@@ -60,10 +60,14 @@ phpStudy后门被公开后, 第一时间通过IOC提取了最近一年存在此
6060
构造HTTP包, 可以看到触发后门的IOC特征.
6161

6262
```bash
63-
curl "http://192.168.8.30" -H "user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36" -H "accept: text/html" -H "accept-Encoding: compress,gzip" -H "accept-language: en-US;q=0.9"
63+
curl "http://192.168.8.30" \
64+
-H "user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36" \
65+
-H "accept: text/html" \
66+
-H "accept-Encoding: compress,gzip" \
67+
-H "accept-language: en-US;q=0.9"
6468
```
6569

66-
<img src="_static/imgs/1569309358921.png" alt="1569309358921" style="zoom: 50%;" />
70+
![xmlrpc_ioc](_static/imgs/1569309358921.png)
6771

6872
**SYSMON触发的DNS Query:**
6973

0 commit comments

Comments
 (0)