├── LICENSE ├── README.md ├── Upload ├── filter.php ├── lib.php ├── protect.sh ├── waf.php └── waf_config.php ├── img └── result.png ├── waf_WatchDog.exe └── waf_WatchDog.py /LICENSE: -------------------------------------------------------------------------------- 1 | GNU LESSER GENERAL PUBLIC LICENSE 2 | Version 2.1, February 1999 3 | 4 | Copyright (C) 1991, 1999 Free Software Foundation, Inc. 5 | 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA 6 | Everyone is permitted to copy and distribute verbatim copies 7 | of this license document, but changing it is not allowed. 8 | 9 | [This is the first released version of the Lesser GPL. It also counts 10 | as the successor of the GNU Library Public License, version 2, hence 11 | the version number 2.1.] 12 | 13 | Preamble 14 | 15 | The licenses for most software are designed to take away your 16 | freedom to share and change it. By contrast, the GNU General Public 17 | Licenses are intended to guarantee your freedom to share and change 18 | free software--to make sure the software is free for all its users. 19 | 20 | This license, the Lesser General Public License, applies to some 21 | specially designated software packages--typically libraries--of the 22 | Free Software Foundation and other authors who decide to use it. You 23 | can use it too, but we suggest you first think carefully about whether 24 | this license or the ordinary General Public License is the better 25 | strategy to use in any particular case, based on the explanations below. 26 | 27 | When we speak of free software, we are referring to freedom of use, 28 | not price. Our General Public Licenses are designed to make sure that 29 | you have the freedom to distribute copies of free software (and charge 30 | for this service if you wish); that you receive source code or can get 31 | it if you want it; that you can change the software and use pieces of 32 | it in new free programs; and that you are informed that you can do 33 | these things. 34 | 35 | To protect your rights, we need to make restrictions that forbid 36 | distributors to deny you these rights or to ask you to surrender these 37 | rights. These restrictions translate to certain responsibilities for 38 | you if you distribute copies of the library or if you modify it. 39 | 40 | For example, if you distribute copies of the library, whether gratis 41 | or for a fee, you must give the recipients all the rights that we gave 42 | you. You must make sure that they, too, receive or can get the source 43 | code. If you link other code with the library, you must provide 44 | complete object files to the recipients, so that they can relink them 45 | with the library after making changes to the library and recompiling 46 | it. And you must show them these terms so they know their rights. 47 | 48 | We protect your rights with a two-step method: (1) we copyright the 49 | library, and (2) we offer you this license, which gives you legal 50 | permission to copy, distribute and/or modify the library. 51 | 52 | To protect each distributor, we want to make it very clear that 53 | there is no warranty for the free library. Also, if the library is 54 | modified by someone else and passed on, the recipients should know 55 | that what they have is not the original version, so that the original 56 | author's reputation will not be affected by problems that might be 57 | introduced by others. 58 | 59 | Finally, software patents pose a constant threat to the existence of 60 | any free program. We wish to make sure that a company cannot 61 | effectively restrict the users of a free program by obtaining a 62 | restrictive license from a patent holder. Therefore, we insist that 63 | any patent license obtained for a version of the library must be 64 | consistent with the full freedom of use specified in this license. 65 | 66 | Most GNU software, including some libraries, is covered by the 67 | ordinary GNU General Public License. This license, the GNU Lesser 68 | General Public License, applies to certain designated libraries, and 69 | is quite different from the ordinary General Public License. We use 70 | this license for certain libraries in order to permit linking those 71 | libraries into non-free programs. 72 | 73 | When a program is linked with a library, whether statically or using 74 | a shared library, the combination of the two is legally speaking a 75 | combined work, a derivative of the original library. The ordinary 76 | General Public License therefore permits such linking only if the 77 | entire combination fits its criteria of freedom. The Lesser General 78 | Public License permits more lax criteria for linking other code with 79 | the library. 80 | 81 | We call this license the "Lesser" General Public License because it 82 | does Less to protect the user's freedom than the ordinary General 83 | Public License. It also provides other free software developers Less 84 | of an advantage over competing non-free programs. These disadvantages 85 | are the reason we use the ordinary General Public License for many 86 | libraries. However, the Lesser license provides advantages in certain 87 | special circumstances. 88 | 89 | For example, on rare occasions, there may be a special need to 90 | encourage the widest possible use of a certain library, so that it becomes 91 | a de-facto standard. To achieve this, non-free programs must be 92 | allowed to use the library. A more frequent case is that a free 93 | library does the same job as widely used non-free libraries. In this 94 | case, there is little to gain by limiting the free library to free 95 | software only, so we use the Lesser General Public License. 96 | 97 | In other cases, permission to use a particular library in non-free 98 | programs enables a greater number of people to use a large body of 99 | free software. For example, permission to use the GNU C Library in 100 | non-free programs enables many more people to use the whole GNU 101 | operating system, as well as its variant, the GNU/Linux operating 102 | system. 103 | 104 | Although the Lesser General Public License is Less protective of the 105 | users' freedom, it does ensure that the user of a program that is 106 | linked with the Library has the freedom and the wherewithal to run 107 | that program using a modified version of the Library. 108 | 109 | The precise terms and conditions for copying, distribution and 110 | modification follow. Pay close attention to the difference between a 111 | "work based on the library" and a "work that uses the library". The 112 | former contains code derived from the library, whereas the latter must 113 | be combined with the library in order to run. 114 | 115 | GNU LESSER GENERAL PUBLIC LICENSE 116 | TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 117 | 118 | 0. This License Agreement applies to any software library or other 119 | program which contains a notice placed by the copyright holder or 120 | other authorized party saying it may be distributed under the terms of 121 | this Lesser General Public License (also called "this License"). 122 | Each licensee is addressed as "you". 123 | 124 | A "library" means a collection of software functions and/or data 125 | prepared so as to be conveniently linked with application programs 126 | (which use some of those functions and data) to form executables. 127 | 128 | The "Library", below, refers to any such software library or work 129 | which has been distributed under these terms. A "work based on the 130 | Library" means either the Library or any derivative work under 131 | copyright law: that is to say, a work containing the Library or a 132 | portion of it, either verbatim or with modifications and/or translated 133 | straightforwardly into another language. (Hereinafter, translation is 134 | included without limitation in the term "modification".) 135 | 136 | "Source code" for a work means the preferred form of the work for 137 | making modifications to it. For a library, complete source code means 138 | all the source code for all modules it contains, plus any associated 139 | interface definition files, plus the scripts used to control compilation 140 | and installation of the library. 141 | 142 | Activities other than copying, distribution and modification are not 143 | covered by this License; they are outside its scope. The act of 144 | running a program using the Library is not restricted, and output from 145 | such a program is covered only if its contents constitute a work based 146 | on the Library (independent of the use of the Library in a tool for 147 | writing it). Whether that is true depends on what the Library does 148 | and what the program that uses the Library does. 149 | 150 | 1. You may copy and distribute verbatim copies of the Library's 151 | complete source code as you receive it, in any medium, provided that 152 | you conspicuously and appropriately publish on each copy an 153 | appropriate copyright notice and disclaimer of warranty; keep intact 154 | all the notices that refer to this License and to the absence of any 155 | warranty; and distribute a copy of this License along with the 156 | Library. 157 | 158 | You may charge a fee for the physical act of transferring a copy, 159 | and you may at your option offer warranty protection in exchange for a 160 | fee. 161 | 162 | 2. You may modify your copy or copies of the Library or any portion 163 | of it, thus forming a work based on the Library, and copy and 164 | distribute such modifications or work under the terms of Section 1 165 | above, provided that you also meet all of these conditions: 166 | 167 | a) The modified work must itself be a software library. 168 | 169 | b) You must cause the files modified to carry prominent notices 170 | stating that you changed the files and the date of any change. 171 | 172 | c) You must cause the whole of the work to be licensed at no 173 | charge to all third parties under the terms of this License. 174 | 175 | d) If a facility in the modified Library refers to a function or a 176 | table of data to be supplied by an application program that uses 177 | the facility, other than as an argument passed when the facility 178 | is invoked, then you must make a good faith effort to ensure that, 179 | in the event an application does not supply such function or 180 | table, the facility still operates, and performs whatever part of 181 | its purpose remains meaningful. 182 | 183 | (For example, a function in a library to compute square roots has 184 | a purpose that is entirely well-defined independent of the 185 | application. Therefore, Subsection 2d requires that any 186 | application-supplied function or table used by this function must 187 | be optional: if the application does not supply it, the square 188 | root function must still compute square roots.) 189 | 190 | These requirements apply to the modified work as a whole. If 191 | identifiable sections of that work are not derived from the Library, 192 | and can be reasonably considered independent and separate works in 193 | themselves, then this License, and its terms, do not apply to those 194 | sections when you distribute them as separate works. But when you 195 | distribute the same sections as part of a whole which is a work based 196 | on the Library, the distribution of the whole must be on the terms of 197 | this License, whose permissions for other licensees extend to the 198 | entire whole, and thus to each and every part regardless of who wrote 199 | it. 200 | 201 | Thus, it is not the intent of this section to claim rights or contest 202 | your rights to work written entirely by you; rather, the intent is to 203 | exercise the right to control the distribution of derivative or 204 | collective works based on the Library. 205 | 206 | In addition, mere aggregation of another work not based on the Library 207 | with the Library (or with a work based on the Library) on a volume of 208 | a storage or distribution medium does not bring the other work under 209 | the scope of this License. 210 | 211 | 3. You may opt to apply the terms of the ordinary GNU General Public 212 | License instead of this License to a given copy of the Library. To do 213 | this, you must alter all the notices that refer to this License, so 214 | that they refer to the ordinary GNU General Public License, version 2, 215 | instead of to this License. (If a newer version than version 2 of the 216 | ordinary GNU General Public License has appeared, then you can specify 217 | that version instead if you wish.) Do not make any other change in 218 | these notices. 219 | 220 | Once this change is made in a given copy, it is irreversible for 221 | that copy, so the ordinary GNU General Public License applies to all 222 | subsequent copies and derivative works made from that copy. 223 | 224 | This option is useful when you wish to copy part of the code of 225 | the Library into a program that is not a library. 226 | 227 | 4. You may copy and distribute the Library (or a portion or 228 | derivative of it, under Section 2) in object code or executable form 229 | under the terms of Sections 1 and 2 above provided that you accompany 230 | it with the complete corresponding machine-readable source code, which 231 | must be distributed under the terms of Sections 1 and 2 above on a 232 | medium customarily used for software interchange. 233 | 234 | If distribution of object code is made by offering access to copy 235 | from a designated place, then offering equivalent access to copy the 236 | source code from the same place satisfies the requirement to 237 | distribute the source code, even though third parties are not 238 | compelled to copy the source along with the object code. 239 | 240 | 5. A program that contains no derivative of any portion of the 241 | Library, but is designed to work with the Library by being compiled or 242 | linked with it, is called a "work that uses the Library". Such a 243 | work, in isolation, is not a derivative work of the Library, and 244 | therefore falls outside the scope of this License. 245 | 246 | However, linking a "work that uses the Library" with the Library 247 | creates an executable that is a derivative of the Library (because it 248 | contains portions of the Library), rather than a "work that uses the 249 | library". The executable is therefore covered by this License. 250 | Section 6 states terms for distribution of such executables. 251 | 252 | When a "work that uses the Library" uses material from a header file 253 | that is part of the Library, the object code for the work may be a 254 | derivative work of the Library even though the source code is not. 255 | Whether this is true is especially significant if the work can be 256 | linked without the Library, or if the work is itself a library. The 257 | threshold for this to be true is not precisely defined by law. 258 | 259 | If such an object file uses only numerical parameters, data 260 | structure layouts and accessors, and small macros and small inline 261 | functions (ten lines or less in length), then the use of the object 262 | file is unrestricted, regardless of whether it is legally a derivative 263 | work. (Executables containing this object code plus portions of the 264 | Library will still fall under Section 6.) 265 | 266 | Otherwise, if the work is a derivative of the Library, you may 267 | distribute the object code for the work under the terms of Section 6. 268 | Any executables containing that work also fall under Section 6, 269 | whether or not they are linked directly with the Library itself. 270 | 271 | 6. As an exception to the Sections above, you may also combine or 272 | link a "work that uses the Library" with the Library to produce a 273 | work containing portions of the Library, and distribute that work 274 | under terms of your choice, provided that the terms permit 275 | modification of the work for the customer's own use and reverse 276 | engineering for debugging such modifications. 277 | 278 | You must give prominent notice with each copy of the work that the 279 | Library is used in it and that the Library and its use are covered by 280 | this License. You must supply a copy of this License. If the work 281 | during execution displays copyright notices, you must include the 282 | copyright notice for the Library among them, as well as a reference 283 | directing the user to the copy of this License. Also, you must do one 284 | of these things: 285 | 286 | a) Accompany the work with the complete corresponding 287 | machine-readable source code for the Library including whatever 288 | changes were used in the work (which must be distributed under 289 | Sections 1 and 2 above); and, if the work is an executable linked 290 | with the Library, with the complete machine-readable "work that 291 | uses the Library", as object code and/or source code, so that the 292 | user can modify the Library and then relink to produce a modified 293 | executable containing the modified Library. (It is understood 294 | that the user who changes the contents of definitions files in the 295 | Library will not necessarily be able to recompile the application 296 | to use the modified definitions.) 297 | 298 | b) Use a suitable shared library mechanism for linking with the 299 | Library. A suitable mechanism is one that (1) uses at run time a 300 | copy of the library already present on the user's computer system, 301 | rather than copying library functions into the executable, and (2) 302 | will operate properly with a modified version of the library, if 303 | the user installs one, as long as the modified version is 304 | interface-compatible with the version that the work was made with. 305 | 306 | c) Accompany the work with a written offer, valid for at 307 | least three years, to give the same user the materials 308 | specified in Subsection 6a, above, for a charge no more 309 | than the cost of performing this distribution. 310 | 311 | d) If distribution of the work is made by offering access to copy 312 | from a designated place, offer equivalent access to copy the above 313 | specified materials from the same place. 314 | 315 | e) Verify that the user has already received a copy of these 316 | materials or that you have already sent this user a copy. 317 | 318 | For an executable, the required form of the "work that uses the 319 | Library" must include any data and utility programs needed for 320 | reproducing the executable from it. However, as a special exception, 321 | the materials to be distributed need not include anything that is 322 | normally distributed (in either source or binary form) with the major 323 | components (compiler, kernel, and so on) of the operating system on 324 | which the executable runs, unless that component itself accompanies 325 | the executable. 326 | 327 | It may happen that this requirement contradicts the license 328 | restrictions of other proprietary libraries that do not normally 329 | accompany the operating system. Such a contradiction means you cannot 330 | use both them and the Library together in an executable that you 331 | distribute. 332 | 333 | 7. You may place library facilities that are a work based on the 334 | Library side-by-side in a single library together with other library 335 | facilities not covered by this License, and distribute such a combined 336 | library, provided that the separate distribution of the work based on 337 | the Library and of the other library facilities is otherwise 338 | permitted, and provided that you do these two things: 339 | 340 | a) Accompany the combined library with a copy of the same work 341 | based on the Library, uncombined with any other library 342 | facilities. This must be distributed under the terms of the 343 | Sections above. 344 | 345 | b) Give prominent notice with the combined library of the fact 346 | that part of it is a work based on the Library, and explaining 347 | where to find the accompanying uncombined form of the same work. 348 | 349 | 8. You may not copy, modify, sublicense, link with, or distribute 350 | the Library except as expressly provided under this License. Any 351 | attempt otherwise to copy, modify, sublicense, link with, or 352 | distribute the Library is void, and will automatically terminate your 353 | rights under this License. However, parties who have received copies, 354 | or rights, from you under this License will not have their licenses 355 | terminated so long as such parties remain in full compliance. 356 | 357 | 9. You are not required to accept this License, since you have not 358 | signed it. However, nothing else grants you permission to modify or 359 | distribute the Library or its derivative works. These actions are 360 | prohibited by law if you do not accept this License. Therefore, by 361 | modifying or distributing the Library (or any work based on the 362 | Library), you indicate your acceptance of this License to do so, and 363 | all its terms and conditions for copying, distributing or modifying 364 | the Library or works based on it. 365 | 366 | 10. Each time you redistribute the Library (or any work based on the 367 | Library), the recipient automatically receives a license from the 368 | original licensor to copy, distribute, link with or modify the Library 369 | subject to these terms and conditions. You may not impose any further 370 | restrictions on the recipients' exercise of the rights granted herein. 371 | You are not responsible for enforcing compliance by third parties with 372 | this License. 373 | 374 | 11. If, as a consequence of a court judgment or allegation of patent 375 | infringement or for any other reason (not limited to patent issues), 376 | conditions are imposed on you (whether by court order, agreement or 377 | otherwise) that contradict the conditions of this License, they do not 378 | excuse you from the conditions of this License. If you cannot 379 | distribute so as to satisfy simultaneously your obligations under this 380 | License and any other pertinent obligations, then as a consequence you 381 | may not distribute the Library at all. For example, if a patent 382 | license would not permit royalty-free redistribution of the Library by 383 | all those who receive copies directly or indirectly through you, then 384 | the only way you could satisfy both it and this License would be to 385 | refrain entirely from distribution of the Library. 386 | 387 | If any portion of this section is held invalid or unenforceable under any 388 | particular circumstance, the balance of the section is intended to apply, 389 | and the section as a whole is intended to apply in other circumstances. 390 | 391 | It is not the purpose of this section to induce you to infringe any 392 | patents or other property right claims or to contest validity of any 393 | such claims; this section has the sole purpose of protecting the 394 | integrity of the free software distribution system which is 395 | implemented by public license practices. Many people have made 396 | generous contributions to the wide range of software distributed 397 | through that system in reliance on consistent application of that 398 | system; it is up to the author/donor to decide if he or she is willing 399 | to distribute software through any other system and a licensee cannot 400 | impose that choice. 401 | 402 | This section is intended to make thoroughly clear what is believed to 403 | be a consequence of the rest of this License. 404 | 405 | 12. If the distribution and/or use of the Library is restricted in 406 | certain countries either by patents or by copyrighted interfaces, the 407 | original copyright holder who places the Library under this License may add 408 | an explicit geographical distribution limitation excluding those countries, 409 | so that distribution is permitted only in or among countries not thus 410 | excluded. In such case, this License incorporates the limitation as if 411 | written in the body of this License. 412 | 413 | 13. The Free Software Foundation may publish revised and/or new 414 | versions of the Lesser General Public License from time to time. 415 | Such new versions will be similar in spirit to the present version, 416 | but may differ in detail to address new problems or concerns. 417 | 418 | Each version is given a distinguishing version number. If the Library 419 | specifies a version number of this License which applies to it and 420 | "any later version", you have the option of following the terms and 421 | conditions either of that version or of any later version published by 422 | the Free Software Foundation. If the Library does not specify a 423 | license version number, you may choose any version ever published by 424 | the Free Software Foundation. 425 | 426 | 14. If you wish to incorporate parts of the Library into other free 427 | programs whose distribution conditions are incompatible with these, 428 | write to the author to ask for permission. For software which is 429 | copyrighted by the Free Software Foundation, write to the Free 430 | Software Foundation; we sometimes make exceptions for this. Our 431 | decision will be guided by the two goals of preserving the free status 432 | of all derivatives of our free software and of promoting the sharing 433 | and reuse of software generally. 434 | 435 | NO WARRANTY 436 | 437 | 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO 438 | WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. 439 | EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR 440 | OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY 441 | KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE 442 | IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 443 | PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE 444 | LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME 445 | THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 446 | 447 | 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN 448 | WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY 449 | AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU 450 | FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR 451 | CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE 452 | LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING 453 | RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A 454 | FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF 455 | SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH 456 | DAMAGES. 457 | 458 | END OF TERMS AND CONDITIONS 459 | 460 | How to Apply These Terms to Your New Libraries 461 | 462 | If you develop a new library, and you want it to be of the greatest 463 | possible use to the public, we recommend making it free software that 464 | everyone can redistribute and change. You can do so by permitting 465 | redistribution under these terms (or, alternatively, under the terms of the 466 | ordinary General Public License). 467 | 468 | To apply these terms, attach the following notices to the library. It is 469 | safest to attach them to the start of each source file to most effectively 470 | convey the exclusion of warranty; and each file should have at least the 471 | "copyright" line and a pointer to where the full notice is found. 472 | 473 | 474 | Copyright (C) 475 | 476 | This library is free software; you can redistribute it and/or 477 | modify it under the terms of the GNU Lesser General Public 478 | License as published by the Free Software Foundation; either 479 | version 2.1 of the License, or (at your option) any later version. 480 | 481 | This library is distributed in the hope that it will be useful, 482 | but WITHOUT ANY WARRANTY; without even the implied warranty of 483 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 484 | Lesser General Public License for more details. 485 | 486 | You should have received a copy of the GNU Lesser General Public 487 | License along with this library; if not, write to the Free Software 488 | Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 489 | USA 490 | 491 | Also add information on how to contact you by electronic and paper mail. 492 | 493 | You should also get your employer (if you work as a programmer) or your 494 | school, if any, to sign a "copyright disclaimer" for the library, if 495 | necessary. Here is a sample; alter the names: 496 | 497 | Yoyodyne, Inc., hereby disclaims all copyright interest in the 498 | library `Frob' (a library for tweaking knobs) written by James Random 499 | Hacker. 500 | 501 | , 1 April 1990 502 | Ty Coon, President of Vice 503 | 504 | That's all there is to it! 505 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # EasyPHPWaf 2 | ## 描述 3 | 本项目是一款简单,() 能( 暴)为PHP架设保姆级WEB防火墙,适用于国内高校赛CTF比赛中AWD环节,提供日志审查、抓取payload、过滤未知威胁操作,误杀率较低,**本waf不会die掉任何请求只会自动替换掉敏感请求数据**.并配备监控脚本用于查看当前受攻击情况. 4 | ## 特性 5 | * mysql注入过滤✔ 6 | * 实时监控客户端✔ 7 | * 过滤未知攻击参数✔ 8 | * 拦截带有flag标识的访问✔ 9 | * 请求数据dump✔ 10 | * 调用文件栈输出✔ 11 | * 记录过滤事件溯源✔ 12 | * 支持namespace✔ 13 | * 遍历反解与过滤base64编码的payload✔ 14 | ## 目录结构 15 | ``` 16 | │ README.md //说明文件 17 | │ waf_WatchDog.exe //Window监控脚本客户端 18 | │ waf_WatchDog.py //python监控脚本源码 19 | └─Upload //上传目录 20 | filter.php //过滤文件 21 | lib.php //防火墙核心库 22 | waf.php //入口文件 23 | waf_config.php //配置文件 24 | protect.sh //一键部署脚本 25 | ``` 26 | ## 使用方法 27 | ### 服务端 28 | * 把upload文件夹内的文件 传至tmp目录 29 | * 备份: ```./protect.sh /var/www/html gameboxname backup ``` 30 | * 设置waf: ```./protect.sh /var/www/html gameboxname setwaf ``` 31 | * 还原: ```./protect.sh /var/www/html gameboxname reload ``` 32 | ### 监控端 33 | * 启动监听 ```./waf_WatchDog.py Gamebox1 http://172.17.0.2/ hRwNxiAPJaJIJUHUKbN3Q5awoMn90WQ6``` 34 | ## 效果 35 | ![img](./img/result.png) 36 | 37 | - gamebox3 gamebox4均为PHP环境 38 | 39 | ## 结语 40 | 如果你对本项目十分感兴趣请Star,Follow,如果有问题或能有bypass的地方请提出issue 41 | -------------------------------------------------------------------------------- /Upload/filter.php: -------------------------------------------------------------------------------- 1 | $kv) { 27 | $GLOBALS["WafFilterBuildInFunction_KeyWords"] = array_merge($GLOBALS["WafFilterBuildInFunction_KeyWords"], $kv); 28 | } 29 | $GLOBALS["WafFilterBuildInFunction_KeyWords"] = array_merge($GLOBALS["WafFilterBuildInFunction_KeyWords"], ["eval"]); 30 | usort($GLOBALS["WafFilterBuildInFunction_KeyWords"], function ($a, $b) { 31 | return strlen($b) >= strlen($a); 32 | }); 33 | } 34 | $keyWords = $GLOBALS["WafFilterBuildInFunction_KeyWords"]; 35 | $touchKey = []; 36 | $raw_value = $value; 37 | $isChange = false; 38 | foreach ($keyWords as $key => $kv) { 39 | if (strlen($kv) > 3 && strlen($value) >= strlen($kv) && strstr($value, $kv) && !in_array($kv, $whileKeyWord)) { 40 | $change = str_replace($kv, GenerateRandomString(strlen($kv)), $value); 41 | if ($value != $change) { 42 | array_push($touchKey, $kv); 43 | } 44 | $value = $change; 45 | } 46 | } 47 | if ($raw_value != $value) { 48 | WafFilterLog("WafFilterBuildInFunction", $raw_value, $value, $touchKey, $waf_gobal_name); 49 | } 50 | $GLOBALS["WafFilterBuildInFunction_ISLoad_" . md5($value)] = true; 51 | return $value; 52 | } 53 | //通用过滤 54 | function WafFilterSymbol($value, $key, $data, $waf_gobal_name) 55 | { 56 | //配置 57 | $keyWords = []; 58 | //For Symbol 59 | $keyWords = array_merge($keyWords, explode(" ", " php \$_ \$ () ( %")); 60 | $touchKey = []; 61 | //处理数据库 62 | $raw_value = $value; 63 | $isChange = false; 64 | foreach ($keyWords as $key => $kv) { 65 | 66 | $change = str_ireplace($kv, GenerateRandomString(strlen($kv)), $value); 67 | if ($value != $change) { 68 | array_push($touchKey, $kv); 69 | } 70 | $value = $change; 71 | } 72 | if ($raw_value != $value) { 73 | 74 | WafFilterLog("WafFilterSymbol", $raw_value, $value, $touchKey, $waf_gobal_name); 75 | } 76 | return $value; 77 | } 78 | 79 | //通用过滤 80 | function WafFilterCommon($value, $key, $data, $waf_gobal_name) 81 | { 82 | //配置 83 | $keyWords = []; 84 | //For PHP Code 85 | $keyWords = array_merge($keyWords, explode(" ", "base64_ file_ include require urlencode")); 86 | //For Sql 87 | $keyWords = array_merge($keyWords, explode(" ", "select insert update drop delete")); 88 | //For Symbol 89 | $keyWords = array_merge($keyWords, explode(" ", " php \$_ () ( %")); 90 | $touchKey = []; 91 | //处理数据库 92 | $raw_value = $value; 93 | $isChange = false; 94 | foreach ($keyWords as $key => $kv) { 95 | 96 | $change = str_ireplace($kv, GenerateRandomString(strlen($kv)), $value); 97 | if ($value != $change) { 98 | array_push($touchKey, $kv); 99 | } 100 | $value = $change; 101 | } 102 | if ($raw_value != $value) { 103 | 104 | WafFilterLog("WafFilterCommon", $raw_value, $value, $touchKey, $waf_gobal_name); 105 | } 106 | return $value; 107 | } 108 | //通用过滤 109 | function WafFilterFunctionString($value, $key, $data, $waf_gobal_name) 110 | { 111 | //配置 112 | $keyWords = []; 113 | //For PHP Code 114 | $keyWords = array_merge($keyWords, explode(" ", "eval system preg_replace create_function array_map call_user_func call_user_func_array assert dumpfile outfile load_file rename extractvalue updatexml name_const multipoint")); 115 | $keyWords = array_merge($keyWords, explode(" ", "base64_ file_ include require urlencode")); 116 | //For Sql 117 | $keyWords = array_merge($keyWords, explode(" ", "select insert update drop delete")); 118 | //For Symbol 119 | $keyWords = array_merge($keyWords, explode(" ", " :{ php \$_")); 120 | //处理数据库 121 | $raw_value = $value; 122 | $isChange = false; 123 | $touchKey = []; 124 | foreach ($keyWords as $key => $kv) { 125 | $change = str_ireplace($kv, GenerateRandomString(strlen($kv)), $value); 126 | $value = $change; 127 | if ($value != $change) { 128 | array_push($touchKey, $kv); 129 | } 130 | } 131 | if ($raw_value != $value) { 132 | 133 | WafFilterLog("WafFilterFunctionString", $raw_value, $value, $touchKey, $waf_gobal_name); 134 | } 135 | return $value; 136 | } 137 | //Base64过滤 138 | function WafFilterBase64($value, $key, $data, $waf_gobal_name) 139 | { 140 | $CellWafFilteFunctionList = ["WafFilterFlagKeywords", "WafFilterFunctionString"]; 141 | $output_array = []; 142 | $_change_value = $value; 143 | if (preg_match('/[a-zA-Z0-9\+\=]{1,}/i', $value, $output_array) > 0) { 144 | foreach ($output_array as $key => $ov) { 145 | $raw_value = base64_decode($ov); 146 | $change_value = $raw_value; 147 | foreach ($CellWafFilteFunctionList as $fnkey => $fn) { 148 | $change_value = $fn($change_value, $value, [$ov => $raw_value], $waf_gobal_name); 149 | } 150 | if ($change_value != $raw_value) { 151 | $_change_value = str_replace($ov, base64_encode($change_value), $_change_value); 152 | } 153 | } 154 | } 155 | if ($_change_value != $value) { 156 | WafFilterLog("WafFilterBase64", $value, $_change_value, [], $waf_gobal_name); 157 | $value = $_change_value; 158 | } 159 | 160 | return $value; 161 | } 162 | 163 | //AWD CTF 过滤Flag 164 | function WafFilterFlagKeywords($value, $key, $data, $waf_gobal_name) 165 | { 166 | $change_value = preg_replace('/(f(.*?)l(.*?)a(.*?)g$)/i', GenerateRandomString(rand(10, 100)), $value); 167 | if ($value != $change_value) { 168 | $touchKey = []; 169 | preg_match('/(f(.*?)l(.*?)a(.*?)g$)/i', $value, $touchKey); 170 | WafFilterLog("WafFilterFlagKeywords", $value, $change_value, $touchKey, $waf_gobal_name); 171 | $GLOBALS[$waf_gobal_name]["_BaseInfo"]["IsDanger"] = true; 172 | } 173 | $value = $change_value; 174 | return $value; 175 | } 176 | 177 | function WafFilterDataLoop($data, $filterFn, $waf_gobal_name) 178 | { 179 | foreach ($data as $key => $value) { 180 | $type = gettype($value); 181 | if ($type == "array") { 182 | $data[$key] = WafFilterDataLoop($value, $filterFn, $waf_gobal_name); 183 | } else if ($type == "object") { 184 | unset($data[$key]); 185 | } else { 186 | $data[$key] = $filterFn($value, $key, $data, $waf_gobal_name); 187 | } 188 | } 189 | return $data; 190 | } 191 | 192 | //生成随机字符串 193 | function GenerateRandomString($length) 194 | { 195 | $characters = '0123456789abcdeghijklmnopqrstuvwxyzABCDEGHIJKLMNOPQRSTUVWXYZ'; 196 | $randomString = ''; 197 | for ($i = 0; $i < $length; $i++) { 198 | $randomString .= $characters[rand(0, strlen($characters) - 1)]; 199 | } 200 | return $randomString; 201 | } 202 | 203 | 204 | 205 | function WafFilterLog($actionName, $beforeData, $afterData, $touchKeys, $waf_gobal_name) 206 | { 207 | array_push($GLOBALS[$waf_gobal_name]["_FilterAction"], [ 208 | "actionName" => $actionName, 209 | "touchKeys" => $touchKeys, 210 | "beforeData" => $beforeData, 211 | "afterData" => $afterData 212 | ]); 213 | } 214 | 215 | 216 | function WafArrayFilter($CellWafFilterTarget, $CellWafFilteFunctionList, $waf_gobal_name) 217 | { 218 | //执行过程 219 | foreach ($CellWafFilterTarget as $key => $value) { 220 | foreach ($CellWafFilteFunctionList as $fnkey => $fn) { 221 | $CellWafFilterTarget[$key] = WafFilterDataLoop($CellWafFilterTarget[$key], $fn, $waf_gobal_name); 222 | } 223 | } 224 | } 225 | 226 | //Waf过滤流程 227 | function WafFilterStart($waf_gobal_name) 228 | { 229 | //清除文件 230 | WafUnsetFiles(); 231 | //代码关键词过滤 232 | WafArrayFilter( 233 | [ 234 | &$_POST, 235 | &$_GET, 236 | &$_REQUEST, 237 | &$GLOBALS["_POST"], 238 | &$GLOBALS["_GET"], 239 | &$GLOBALS["_REQUEST"] 240 | ], 241 | [ 242 | "WafFilterBuildInFunction", 243 | "WafFilterSymbol" 244 | ], 245 | $waf_gobal_name 246 | ); 247 | //详细参数过滤 248 | WafArrayFilter( 249 | [ 250 | &$_POST, 251 | &$_GET, 252 | &$_REQUEST, 253 | &$_COOKIE, 254 | &$GLOBALS["_POST"], 255 | &$GLOBALS["_GET"], 256 | &$GLOBALS["_REQUEST"] 257 | ], 258 | [ 259 | "WafFilterCommon", 260 | "WafFilterFlagKeywords", 261 | "WafFilterBase64" 262 | ], 263 | $waf_gobal_name 264 | ); 265 | } 266 | 267 | function WafFilter($waf_toekn) 268 | { 269 | $waf_gobal_name = "CellWaf_" . md5($waf_toekn); 270 | WafFilterStart($waf_gobal_name); 271 | } 272 | -------------------------------------------------------------------------------- /Upload/lib.php: -------------------------------------------------------------------------------- 1 | array([ 53 | "URL" => GetProtocol() . $_SERVER['HTTP_HOST'] . ':' . $_SERVER["SERVER_PORT"] . $_SERVER["REQUEST_URI"], 54 | "IP" => GetIP(), 55 | "DateTime" => date('Y-m-d H:i:s', time()), 56 | "Time" => GetNowTime(), 57 | "IsDanger" => false, 58 | ])[0], 59 | '_WafInfo' => array($GLOBALS['Waf_PHPIFNO'])[0], 60 | '_GET' => array($GLOBALS['_GET'])[0], 61 | '_POST' => array($GLOBALS['_POST'])[0], 62 | '_COOKIE' => array($GLOBALS['_COOKIE'])[0], 63 | '_ENV' => array($GLOBALS['_ENV'])[0], 64 | '_REQUEST' => array($GLOBALS['_REQUEST'])[0], 65 | '_SERVER' => array($GLOBALS['_SERVER'])[0], 66 | '_FILES' => array($GLOBALS['_FILES'])[0], 67 | '_FilterAction' => [], 68 | '_CallStack' => [] 69 | ]; 70 | } 71 | //保存日志 72 | function WafSaveLog($waf_gobal_name) 73 | { 74 | $wafInfo = $GLOBALS['Waf_PHPIFNO']; 75 | $logFilePath = ""; 76 | if ($wafInfo) { 77 | $logFilePath = $wafInfo["protectDataPath"] . 'logs/' . $GLOBALS[$waf_gobal_name]["_BaseInfo"]["Time"] . ".log"; 78 | } 79 | //保存日志 80 | if ($logFilePath != "") { 81 | if (!is_dir(dirname($logFilePath))) { 82 | mkdir(dirname($logFilePath), 0777); 83 | } 84 | file_put_contents($logFilePath, json_encode($GLOBALS[$waf_gobal_name], JSON_PRETTY_PRINT | JSON_UNESCAPED_UNICODE | JSON_PARTIAL_OUTPUT_ON_ERROR)); 85 | } 86 | } 87 | 88 | //防火墙处理 89 | function WafInit($waf_toekn) 90 | { 91 | $waf_gobal_name = "CellWaf_" . md5($waf_toekn); 92 | //数据处理保持部分 93 | if (!array_key_exists($waf_gobal_name, $GLOBALS)) { 94 | //初始化数据 95 | $GLOBALS[$waf_gobal_name] = MakeRuntimeInfo(); 96 | header("X-Protect-By: CellWaf By MoeGuo H."); 97 | } 98 | //日志文件夹路径 99 | $logFilePath = ""; 100 | $wafInfo = $GLOBALS['Waf_PHPIFNO']; 101 | if ($wafInfo) { 102 | //添加程序堆栈信息 103 | array_push($GLOBALS[$waf_gobal_name]["_CallStack"], $wafInfo["filePath"]); 104 | $logFilePath = $wafInfo["protectDataPath"] . 'logs/'; 105 | } 106 | //管理监控部分 107 | if (array_key_exists("WafAction", $_REQUEST) && $_REQUEST["waf_toekn"] === $waf_toekn) { 108 | header('Content-Type:application/json; charset=utf-8'); 109 | if ($_REQUEST["WafAction"] === "LastLogTime") { 110 | $files = scandir($logFilePath); 111 | if (!$files) { 112 | exit(json_encode(["LastLogTime" => "0"])); 113 | } 114 | $filenames = []; 115 | foreach ($files as $key => $value) { 116 | $name = trim(pathinfo($value, PATHINFO_FILENAME)); 117 | if (strlen($name) > 2) { 118 | array_push($filenames, $name); 119 | } 120 | } 121 | rsort($filenames); 122 | if (!$filenames[0]) { 123 | $filenames[0] = "0"; 124 | } 125 | exit(json_encode(["LastLogTime" => "$filenames[0]"])); 126 | } else if ($_REQUEST["WafAction"] === "GetLogFiles" && array_key_exists("AfterTime", $_REQUEST)) { 127 | 128 | if (!array_key_exists("BeforeTime", $_REQUEST) && $_REQUEST["BeforeTime"]) { 129 | $_REQUEST["BeforeTime"] = GetNowTime(); 130 | } 131 | $files = scandir($logFilePath); 132 | if (!$files) { 133 | exit(json_encode(["Files" => []])); 134 | } 135 | $filenames = []; 136 | foreach ($files as $key => $value) { 137 | $name = trim(pathinfo($value, PATHINFO_FILENAME)); 138 | if (strlen($name) > 2 && $_REQUEST["AfterTime"] < $name && $_REQUEST["BeforeTime"] >= $name) { 139 | array_push($filenames, ["fileName" => "$value", "fileData" => base64_encode(file_get_contents($logFilePath . "/" . $value))]); 140 | } 141 | } 142 | exit(json_encode(["Files" => $filenames])); 143 | } else { 144 | exit(json_encode(["State" => "NotFound"])); 145 | } 146 | } 147 | 148 | } 149 | -------------------------------------------------------------------------------- /Upload/protect.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | #./protect.sh / thinkShop reload 3 | #./protect.sh /app thinkShop setwaf 4 | #Config 5 | TargePath=$1 6 | TargeName=$2 7 | ProtectDataPath="/tmp/protect/${TargeName}/" 8 | ProtectWaf="$(pwd)/waf.php" 9 | 10 | function genWafCode(){ 11 | filePath=$1 12 | raw_code=$(cat ${filePath}) 13 | namespace=$(cat ${filePath} | grep "^namespace.*;") 14 | PHPWafCode="\"${ProtectDataPath}\",\"TargeName\"=>\"${TargeName}\",\"filePath\"=>\"${filePath}\"]; 18 | require(\"${ProtectWaf}\"); 19 | } catch (Exception \$e) { 20 | echo \$e->getMessage(); 21 | } 22 | ?>" 23 | echo "${PHPWafCode}" > ${filePath} 24 | echo "${raw_code}" >> ${filePath} 25 | } 26 | 27 | function backup(){ 28 | #Init 29 | mkdir -p ${ProtectDataPath} 30 | #SaveMysql 31 | mysqldump -u root -p --all-databases > ${ProtectDataPath}/db.sql 32 | #BackUpWeb 33 | tar -zcf ${ProtectDataPath}/wwwroot.tar.gz ${TargePath}/* 34 | } 35 | 36 | function reload(){ 37 | #ReloadFile 38 | tar -zxf ${ProtectDataPath}/wwwroot.tar.gz -C ${TargePath}/ 39 | #ReloadMysql 40 | mysql -u root -p < ${ProtectDataPath}/db.sql 41 | } 42 | 43 | function setwaf(){ 44 | chmod 777 -R ${ProtectDataPath} 45 | echo -e "Protect File" > ${ProtectDataPath}/Protect.log 46 | for line in $(find ${TargePath}/* -type f -name '*.php'); do 47 | echo -e "$line" >> ${ProtectDataPath}/Protect.log 48 | genWafCode $line 49 | done 50 | } 51 | 52 | case "$3" in 53 | 54 | backup ) 55 | echo "开始备份" 56 | backup 57 | echo "备份结束" 58 | ;; 59 | 60 | reload ) 61 | echo "开始恢复" 62 | reload 63 | echo "恢复结束" 64 | ;; 65 | 66 | setwaf ) 67 | echo "开始配置Waf" 68 | setwaf 69 | echo "配置Waf结束" 70 | ;; 71 | 72 | * ) 73 | echo "$0.sh filepath hostname [backup|reload|setwaf] " 74 | ;; 75 | 76 | esac -------------------------------------------------------------------------------- /Upload/waf.php: -------------------------------------------------------------------------------- 1 | 0: 43 | colorStr = "\033[35m[Warming] " 44 | if wafLogInfo["_BaseInfo"]["IsDanger"]: 45 | colorStr = "\033[31m[Danger] " 46 | print("\033[0;37m"+"-"*50) 47 | print(colorStr+"Host: %s Time:%s %s IP: %s\nMethod:%s FilePath: %s\nURL: %s\n%sGET: %s\nPost: %s\nCookie: %s" % ( 48 | wafLogInfo["_WafInfo"]["TargeName"], 49 | wafLogInfo["_BaseInfo"]["DateTime"], 50 | wafLogInfo["_BaseInfo"]["Time"], 51 | wafLogInfo["_BaseInfo"]["IP"], 52 | wafLogInfo["_SERVER"]["REQUEST_METHOD"], 53 | wafLogInfo["_SERVER"]["SCRIPT_FILENAME"], 54 | wafLogInfo["_BaseInfo"]["URL"], 55 | White, 56 | self._JsonShowFormart(wafLogInfo["_GET"]), 57 | self._JsonShowFormart(wafLogInfo["_POST"]), 58 | self._JsonShowFormart(wafLogInfo["_COOKIE"]), 59 | )) 60 | if len(wafLogInfo["_FilterAction"]) > 0: 61 | print("FilterAction:%s" % 62 | self._JsonShowFormart( 63 | wafLogInfo["_FilterAction"] 64 | )) 65 | pass 66 | 67 | def _UpdateLocalLogTime(self): 68 | filenames = os.listdir(self.logsPath) 69 | filenames.sort() 70 | print("\033[1;33m"+"-"*100) 71 | for file in filenames: 72 | if not os.path.isdir(file): 73 | time = float(Path(file).stem) 74 | if(time > self.SelfLastLogTime): 75 | self.SelfLastLogTime = time 76 | if os.path.getsize(self.logsPath+"/"+file) > 0: 77 | with open(self.logsPath+"/"+file, "r", encoding="UTF-8") as f: 78 | self._PrintLogToScreen(json_load(f)) 79 | else: 80 | print("\033[0;37m"+"-"*50) 81 | print("[]") 82 | print("\033[1;33m"+"-"*100) 83 | 84 | pass 85 | 86 | def UpdateLogFiles(self): 87 | self._UpdateLastLogTime() 88 | if(self.SelfLastLogTime < self.ServerLastLogTime): 89 | result = request("POST", self._targetUrl + 90 | "&WafAction=GetLogFiles", data={ 91 | "AfterTime": self.SelfLastLogTime, 92 | "BeforeTime": self.ServerLastLogTime, 93 | }).json() 94 | for fileData in result["Files"]: 95 | with open(self.logsPath+"/"+fileData["fileName"], "wb+") as f: 96 | f.write(b64decode(fileData["fileData"])) 97 | pass 98 | pass 99 | pass 100 | self._UpdateLocalLogTime() 101 | pass 102 | 103 | 104 | if __name__ == "__main__": 105 | 106 | if len(argv) < 4: 107 | print( 108 | "Usage:%s Gamebox1 http://172.17.0.2/ hRwNxiAPJaJIJUHUKbN3Q5awoMn90WQ6" % (argv[0])) 109 | sys.exit() 110 | cw = cellwaf(argv[1], argv[2], argv[3]) 111 | while True: 112 | cw.UpdateLogFiles() 113 | time.sleep(2) 114 | pass 115 | --------------------------------------------------------------------------------