您现在的位置是:网站首页> 编程资料编程资料

雷客图 站长安全助手 vbs版代码(asp 木马查找)_vbs_

2023-05-25 297人已围观

简介 雷客图 站长安全助手 vbs版代码(asp 木马查找)_vbs_

均在命令行下使用
AntiIframe.vbs

#该脚本是批量挂马程序的逆向,用于批量清除被添加到文件中的恶意代码。记事本打开文件可以修改Pattern参数指定要处理的文件名,文件名之间用|隔开(也支持vbs正则表达式)。由于要修改文件,请谨慎的使用(最好先备份文件)
#用法: CScript AntiIframe.vbs [处理的路径] [包含清除内容的文件]
#例子: CScript AntiIframe.vbs d:\Web d:\lake2.txt
----------------------------
Scan.vbs

#该脚本用于本地扫描ASP木马,速度比ASP版快很多。可能存在误报、漏报的情况,视具体情况处理
#用法: CScript Scan.vbs [扫描路径] [结果HTM文件路径]
#例子: CScript Scan.vbs d:\Web f:\my\report.html

Scan.vbs
复制代码 代码如下:

'-----------------------
'Scan ASP WebShell in vbs
'Author: lake2 (http://lake2.0x54.org)
'Date: 2007-7-29
'Version: 1.1
'-----------------------

DimFileExt = "asp,cer,asa,cdx"
Dim Report, Report2, Sun, SumFiles, SumFolders

Call ShowInfo()
If WScript.Arguments.Count = 2 Then
    Sun = 0
    SumFiles = 0
    SumFolders = 1
    If Right(WScript.Arguments.Item(0),1) = "\" Then
        thePath = Mid(WScript.Arguments.Item(0),1,Len(WScript.Arguments.Item(0))-1)
    Else
        thePath = WScript.Arguments.Item(0)
    End If
    Call CheckArg(thePath)
    WScript.Echo "开始扫描,请稍候……"
    WScript.Sleep(1000)
    StartTime = now()
    Call ShowAllFile(thePath)
    EndTime = now()
    WScript.Echo vbcrlf & "扫描完成!" & vbcrlf
    report2 = report2 & "雷客图 ASP 站长安全助手vbs版扫描报告"
    report2 = report2 & ""
    report2 = report2 & "雷客图 ASP 站长安全助手vbs版扫描报告

"
    report2 = report2 & "开始时间:"&StartTime&"
"
    report2 = report2 & "结束时间:"&EndTime&"
"
    report2 = report2 & "扫描完毕!一共检查文件夹"&SumFolders&"个,文件"&SumFiles&"个,发现可疑点"&Sun&"个(红字显示的为严重可疑)
"
    report2 = report2 & ""
    report2 = report2 & ""
    report2 = report2 & ""
    report2 = report2 & ""
    report2 = report2 & ""
    report2 = report2 & ""
    report2 = report2 & ""
    report2 = report2 & "

"
    report2 = report2 & report
    report2 = report2 & "

"
    report2 = report2 & "
文件路径特征码描述创建/修改时间

"
    report2 = report2 & "
powered by 0x54.org
"
    report2 = report2 & ""
    Call WriteToFile()
Else
    Call ShowHelp()
End If

Sub ShowInfo()
    HelpStr = HelpStr & "==============================" & vbcrlf
    HelpStr = HelpStr & "===== 欢迎使用雷客图 ASP 站长安全助手vbs版 =====" & vbcrlf
    HelpStr = HelpStr & "===== 之 检查ASP木马 =====" & vbcrlf
    HelpStr = HelpStr & "===== Author: lake2 =====" & vbcrlf
    HelpStr = HelpStr & "===== Email:lake2@mail.csdn.net =====" & vbcrlf
    HelpStr = HelpStr & "===== 欢迎访问 www.0x54.org 得到更多信息 =====" & vbcrlf
    HelpStr = HelpStr & "==============================" & vbcrlf
    HelpStr = HelpStr & vbcrlf
    WScript.Echo HelpStr
End Sub

Sub ShowHelp()
    HelpStr = HelpStr & "#用法: CScript Scan.vbs [扫描路径] [结果HTM文件路径]" & vbcrlf
    HelpStr = HelpStr & "#例子: CScript Scan.vbs d:\Web f:\my\report.html" & vbcrlf
    HelpStr = HelpStr & vbcrlf
    WScript.Echo HelpStr
End Sub

Sub CheckArg(arg)
    tmpPath = arg
    tmpPath2 = Left(WScript.Arguments.Item(1), InStrRev(WScript.Arguments.Item(1),"\")-1)
    Set objFSO = WScript.CreateObject ("Scripting.FileSystemObject")
    If Not objFSO.FolderExists(tmpPath2) Then
        WScript.Echo "Error:错误的路径“" & tmpPath2 & "”!"
        WScript.Quit
    ElseIf Not objFSO.FolderExists(tmpPath) Then
        WScript.Echo "Error:错误的路径“" & tmpPath & "”!"
        WScript.Quit    
    End If
    Set objFSO = Nothing
End Sub

'遍历处理path及其子目录所有文件
Sub ShowAllFile(Path)
    WScript.Echo "正在检查目录" & path
    Set FSO = CreateObject("Scripting.FileSystemObject")
    Set f = FSO.GetFolder(Path)
    Set fc2 = f.files
    For Each myfile in fc2
        If CheckExt(FSO.GetExtensionName(path&"\"&myfile.name)) Then
            'WScript.Echo "正在检查文件" & path&"\"&myfile.name
            Call ScanFile(Path&Temp&"\"&myfile.name, "")
            SumFiles = SumFiles + 1
        End If
    Next
    Set fc = f.SubFolders
    For Each f1 in fc
        ShowAllFile path&"\"&f1.name
        SumFolders = SumFolders + 1
    Next
    Set FSO = Nothing
End Sub

'检查文件后缀,如果与预定的匹配即返回TRUE
Function CheckExt(FileExt)
    If DimFileExt = "*" Then CheckExt = True
    Ext = Split(DimFileExt,",")
    For i = 0 To Ubound(Ext)
        If Lcase(FileExt) = Ext(i) Then
            CheckExt = True
            Exit Function
        End If
    Next
End Function

'检测文件
Sub ScanFile(FilePath, InFile)
    If InFile <> "" Then
        Infiles = "该文件被"& InFile & "文件包含执行"
    End If
    temp = FilePath
    On Error Resume Next
    Set tStream = WScript.CreateObject("ADODB.Stream")
    tStream.type = 1
    tStream.mode = 3
    tStream.open
    tStream.Position=0
    tStream.LoadFromFile FilePath
    If err Then Exit Sub end if
    tStream.type = 2
    tStream.charset = "GB2312"
    Do Until tStream.EOS
        filetxt = filetxt & LCase(replace(tStream.ReadText(102400), Chr(0), ""))
    Loop
    tStream.close()
    Set tStream = Nothing

    Set FSOs = WScript.CreateObject("Scripting.FileSystemObject")    
    if len(filetxt) >0 then
        '特征码检查
        filetxt = vbcrlf & filetxt
            'Check "WScr"&DoMyBest&"ipt.Shell"
            If Instr( filetxt, Lcase("WScr"&DoMyBest&"ipt.Shell") ) or Instr( filetxt, Lcase("clsid:72C24DD5-D70A"&DoMyBest&"-438B-8A42-98424B88AFB8") ) then
                Report = Report&""&temp&"WScr"&DoMyBest&"ipt.Shell 或者 clsid:72C24DD5-D70A"&DoMyBest&"-438B-8A42-98424B88AFB8危险组件,一般被ASP木马利用"&infiles&""&GetDateCreate(filepath)&"
"&GetDateModify(filepath)&""
                Sun = Sun + 1
            End if
            'Check "She"&DoMyBest&"ll.Application"
            If Instr( filetxt, Lcase("She"&DoMyBest&"ll.Application") ) or Instr( filetxt, Lcase("clsid:13709620-C27"&DoMyBest&"9-11CE-A49E-444553540000") ) then
                Report = Report&""&temp&"She"&DoMyBest&"ll.Application 或者 clsid:13709620-C27"&DoMyBest&"9-11CE-A49E-444553540000危险组件,一般被ASP木马利用"&infiles&""&GetDateCreate(filepath)&"
"&GetDateModify(filepath)&""
                Sun = Sun + 1
            End If
            'Check .Encode
            Set regEx = New RegExp
            regEx.IgnoreCase = True
            regEx.Global = True
            regEx.Pattern = "\bLANGUAGE\s*=\s*[""]?\s*(vbscript|jscript|javascript).encode\b"
            If regEx.Test(filetxt) Then
                Report = Report&""&temp&"(vbscript|jscript|javascript).Encode似乎脚本被加密了,一般ASP文件是不会加密的"&infiles&""&GetDateCreate(filepath)&"
"&GetDateModify(filepath)&""
                Sun = Sun + 1
            End If
            'Check my ASP backdoor :(
            regEx.Pattern = "\bEv"&"al\b"
            If regEx.Test(filetxt) Then
                Report = Report&""&temp&"Ev"&"ale"&"val()函数可以执行任意ASP代码,被一些后门利用。其形式一般是:ev"&"al(X)
但是javascript代码中也可以使用,有可能是误报。"&infiles&""&GetDateCreate(filepath)&"
"&GetDateModify(filepath)&""
                Sun = Sun + 1
            End If
            'Check exe&cute backdoor
            regEx.Pattern = "[^.]\bExe"&"cute(Global)?\b"
            If regEx.Test(filetxt) Then
                Report = Report&""&temp&"Exec"&"ute()或者Exe"&"cuteGlobal()该函数可以执行任意ASP代码,被一些后门利用。其形式一般是:ex"&"ecute(X)
"&infiles&""&GetDateCreate(filepath)&"
"&GetDateModify(filepath)&""
                Sun = Sun + 1
            End If
            'Check Script.Control
            regEx.Pattern = "\.Execu"&"teStatement\b"
            If regEx.Test(filetxt) Then
                Report = Report&""&temp&".Exec"&"uteStatement发现MSScriptControl.ScriptControl的.Execut"&"eStatement函数
"&infiles&""&GetDateCreate(filepath)&"
"&GetDateModify(filepath)&""
                Sun = Sun + 1
            End If
            'Check .(Open|Create)TextFile
            regEx.Pattern = "\.(Open|Create)TextFile\b"
            If regEx.Test(filetxt) Then
                Report = Report&""&temp&".Crea"&"teTextFile|.O"&"penTextFile使用了FSO的CreateTextFile|OpenTextFile函数读写文件"&infiles&""&GetDateCreate(filepath)&"
"&GetDateModify(filepath)&""
                Sun = Sun + 1
            End If
            'Check .SaveT&oFile
            regEx.Pattern = "\.SaveT"&"oFile\b"
            If regEx.Test(filetxt) Then
     

-六神源码网