#!/usr/bin/perl -w # findshell v1.0 == code taken/modified from traps.darkmindz.com #usage: ./findshell.pl <sensitivity 1-50> <directory to scan> use strict; use File::Find; my $sens = shift || 10; my $folder = shift || './'; find(\&backdoor, "$folder"); sub backdoor { if ((/\.(php|txt)/)){ open (my $IN,"<$_") || die "can not open datei $File::Find::name: $!"; my @file = <$IN>; #maybe evil stuffs my $score = grep (/function_exists\(|phpinfo\(|safe_?mode|shell_exec\(|popen\(|passthru\(|system\(|myshellexec\(|exec\(|getpwuid\(|getgrgid \(|fileperms\(/i,@file); #probably evil stuffs my $tempscore = grep(/\`\$\_(post|request|get).{0,20}\`|(include|require|eval|system|passthru|shell_exec).{0,10}\$\_(post|request|get)|eval.{0,10}base64_decode|back_connect|backdoor|r57|PHPJackal|PhpSpy|GiX|Fx29SheLL|w4ck1ng|milw0rm|PhpShell|k1r4|FeeLCoMz|FaTaLisTiCz|Ve_cENxShell|UnixOn|C99madShell|Spamfordz|Locus7s|c100|c99|x2300|cgitelnet|webadmin|cybershell|STUNSHELL|Pr!v8|PHPShell|KaMeLeOn|S4T|oRb|tryag|sniper|noexecshell|\/etc\/passwd|revengans/i, @file); $score += 50 * $tempscore; print "$score - Possible backdoor : $File::Find::name\n" if ($score > $sens-1 ); close $IN; }elsif((/\.(jpg|jpeg|gif|png|tar|zip|gz|rar|pdf)/)){ open (my $IN,"<$_") || (print "can not open datei $File::Find::name: $!" && next); print "5000 - Possible backdoor (php in non-php file): $File::Find::name\n" if grep /(\<\?php|include(\ |\())/i, <$IN>; close $IN; } }
perl findshell.pl 10 /srv/www/htdocs > scanout.txt sort scanout.txt
GOT MEMORY LIMIT USE FOLLOWING
for i in /srv/www/htdocs/ ; do perl findshell.pl 10 $i >> scanout.txt ; done