The tool that we will present here is a regex-based PHP malware scanner (written in Perl). It will scan your server for PHP malicious files. In addition to cxs and maldet (links at the end of this post), this tool is very useful for ensuring your server security.
1. So, first of all, download the latest script version from https://repo.coydogsoftware.net/coydog/rxtools/blob/master/findcrack0r.pl and save it to your server.
2. Now, that you saved the script to your server, just run it with:
perl findcrack0r.pl -po /home -t $(date +%Y-%m-%d)
The command we use will scan the /home directory (including all subdirectories) only for *.php file. The script will create a directory with the current date in /home/root/support/ (like /home/root/support/2018-07-18). In this directory, the script will create two files – one for suspicious malware PHP files, the other one for the symlinks founded:
root@www [~/support/2018-07-18]# ls ./ ../ scan-20180718234534.txt symlinks-20180718234534.txt root@www [~/support/2018-07-18]#
root@www [/]# perl findcrack0r.pl -h Usage: -t ticket number for output dir -a account list, comma-delimited. Will search only public_html -b Number of bytes per file to scan. Default is 500000 -p restrict searches to *.php (faster but may miss stuff) -S Skip checking symlinks -d grep for defacements -o other directories to search, independently of -a docroots. May be needed for addon/subdomains -u user homedir prefix (default /home) -D Debug mode. Output a more detailed log which identifies signature matches. -N Show files which do NOT match on stderr (debug feature only) -e exclude files wth names ending in . Workaround if scan hangs on js -r regex debugging -c use cache -q quiet -h print this help message and quit root@www [/]#
Other security tools for your server: