$ r; Z: y1 }3 z8 Y. g9 r% u应该是用的wordpress的漏洞,删了2个小时。5 j* |% Y# S8 b) `7 [$ v
, C4 k5 u" ~$ h4 L
生成的文件有index.php.radio.php,admin.php,还有其他几个,还有.htacess,在根目录,wp-content文件下还有个mu-plugins-old文件夹。然后基本每个文件夹下生成.htacess文件。没有wp-admin和wp-include的,就自动生成,伪装成wordpress正常文件。# i" U, E' U3 f8 `! S
, J% G( Z a _& U7 B- P
用着wordpress程序的,index.php文件里面写上程序了,能正常访问,一般发现不了。没用wordpress程序的,把原来的index.php覆盖了,访问不了,要不还发现不了。+ U6 Q( |; n, ~# ~: @; k! x' {6 q
: V& K1 M: e& Q3 }( G& b" H4 a' h4 m, W! T1 F* \
大家没事了查查源文件。 5 [: I s* c* o1 z---------------------------------------- V! O9 N3 n, t, \- v) E, i
生成的htacess文件* K( K- q! p2 v) |
( @ ~; E7 F! M* a# h<FilesMatch ".(py|exe|php)$">" z, U, {2 Z" n7 e
Order allow,deny: m2 w5 x& h9 Z+ _: u& Z Z
Deny from all- a3 e1 p/ f* ^$ b7 m, z7 n8 n
</FilesMatch> ; A! x( e) t0 A: C2 l<FilesMatch "^(about.php|radio.php|index.php|content.php|lock360.php|admin.php|wp-login.php|wp-l0gin.php|wp-theme.php|wp-scripts.php|wp-editor.php)$"> ! A2 @7 C& e7 x9 w6 @3 y1 s Order allow,deny, c; }% G# e% ^! v
Allow from all 1 P- B. @4 k/ d</FilesMatch> j; q4 k' w4 ]* m
<IfModule mod_rewrite.c> @5 d% _9 d# `9 p# \" N8 Q2 L
RewriteEngine On0 u( [( w; [' M
RewriteBase / 4 j( F5 h h6 n, g- Q; V9 H+ rRewriteRule ^index\.php$ - [L] $ c) t1 r. v% G% o% FRewriteCond %{REQUEST_FILENAME} !-f$ g$ w1 B( h0 }1 p+ x$ P. E8 w& _4 ]% J
RewriteCond %{REQUEST_FILENAME} !-d8 x. e; S! _$ d( |- ~" l% s" @
RewriteRule . /index.php [L] : `# K2 w) S6 R) m+ ^) ~6 c6 c</IfModule>-----------------------------------------9 d8 t8 ~( |! u' S/ Y
正常源码上面生成的字符 ( A$ `2 p) u% P# z5 @- G. L2 t# Z7 b/ N1 y6 t# h9 r% H# J- m
& j6 u8 X0 M$ p, d7 P2 J$ u6 M3 D2 {) V @0 |
( X$ T0 X) R9 p' n