Update 'findbot.pl'
This commit is contained in:
64
findbot.pl
64
findbot.pl
@@ -1,69 +1,7 @@
|
|||||||
#!/usr/bin/perl
|
#!/usr/bin/perl
|
||||||
|
|
||||||
# Version 0.08 Wed Apr 15 01:55:56 UTC 2015
|
# cool scanner, strings produce too manu false positives so it needs a little tweaking
|
||||||
|
|
||||||
# The above line may need to be changed to point at your version of Perl
|
|
||||||
#
|
|
||||||
# This script attempts to find malicious files/scripts on your machine.
|
|
||||||
# It specifically looks for spambots that we're aware of, as well
|
|
||||||
# as "suspicious" constructs in various scripting languages.
|
|
||||||
#
|
|
||||||
# To use it, you should put this in a file on your computer called
|
|
||||||
# "findbot.pl" and make it executable by "chmod 755 findbot.pl".
|
|
||||||
#
|
|
||||||
# By default, findbot.pl scans the directories /tmp, /usr/tmp, /home and
|
|
||||||
# /var/www. This script isn't fast. So if you know where to look you can
|
|
||||||
# speed things up by giving just the directories that you suspect has the
|
|
||||||
# malware.
|
|
||||||
#
|
|
||||||
# You can often find out what user is infected by using:
|
|
||||||
# lsof -i | grep smtp
|
|
||||||
# and looking for processes that are NOT your mail server.
|
|
||||||
#
|
|
||||||
# If you're successful finding the user, you need to look everywhere the user
|
|
||||||
# has write permissions - and you can run findbot.pl faster, by something like:
|
|
||||||
#
|
|
||||||
# findbot.pl /tmp /usr/tmp /home/<user> <user's web directory>
|
|
||||||
#
|
|
||||||
# There are two types of "detections" - "suspicious files" are files that contain
|
|
||||||
# things that -may- be malicious.
|
|
||||||
# "malware" is definitely malicious software.
|
|
||||||
#
|
|
||||||
# This script needs the following command line utilities. It will not run
|
|
||||||
# if it can't find them, you will have to install them yourself:
|
|
||||||
# - "md5sum" (Linux) or "md5" (FreeBSD etc) this appears to be standard
|
|
||||||
# core utilities.
|
|
||||||
# - "strings" - on Linux this is in the "binutils" package
|
|
||||||
# - "file" - on Linux this is in the "file" package.
|
|
||||||
#
|
|
||||||
# Usage:
|
|
||||||
# findbot.pl [-c] [directories...]
|
|
||||||
#
|
|
||||||
# If a list of directories is supplied, it's used, otherwise,
|
|
||||||
# /tmp, /usr/tmp, /home and /var/www are use by default.
|
|
||||||
#
|
|
||||||
# The -c option is a shortcut to make finding cryptophp faster and
|
|
||||||
# easier, but this may not work in all situations
|
|
||||||
#
|
|
||||||
# Very simple web malware detection module.
|
|
||||||
# .01 -> .02:
|
|
||||||
# - more strings of bad software
|
|
||||||
# - search for encoded perl scripts
|
|
||||||
# .02 -> .03: 2013/01/10 Ray
|
|
||||||
# - speed up
|
|
||||||
# - MD5 stuff
|
|
||||||
# .03 -> .04: 2013/01/13 Ray
|
|
||||||
# - improved docs
|
|
||||||
# .04 -> .05: 2013/01/20 Ray
|
|
||||||
# - more patterns
|
|
||||||
# - MAXLINES way too small
|
|
||||||
# .05 -> .06: 2014/10/31 Havriliuc Andrei, Hostvision srl, Romania
|
|
||||||
# - many more patterns/heuristics from hoster's experience
|
|
||||||
# - Thanks for the contribution!
|
|
||||||
# .06 -> 07: 2014/11/22 Ray
|
|
||||||
# - Speed up specifically for current version of cryptophp
|
|
||||||
# .07 -> 08: 2015/04/14 Ray
|
|
||||||
# - Stealrat patterns
|
|
||||||
|
|
||||||
my $access = '(\.htaccess)';
|
my $access = '(\.htaccess)';
|
||||||
my $accesspat = '(RewriteRule)';
|
my $accesspat = '(RewriteRule)';
|
||||||
|
|||||||
Reference in New Issue
Block a user