晋太元中,武陵人捕鱼为业。缘溪行,忘路之远近。忽逢桃花林,夹岸数百步,中无杂树,芳草鲜美,落英缤纷。渔人甚异之,复前行,欲穷其林。 林尽水源,便得一山,山有小口,仿佛若有光。便舍船,从口入。初极狭,才通人。复行数十步,豁然开朗。土地平旷,屋舍俨然,有良田、美池、桑竹之属。阡陌交通,鸡犬相闻。其中往来种作,男女衣着,悉如外人。黄发垂髫,并怡然自乐。 见渔人,乃大惊,问所从来。具答之。便要还家,设酒杀鸡作食。村中闻有此人,咸来问讯。自云先世避秦时乱,率妻子邑人来此绝境,不复出焉,遂与外人间隔。问今是何世,乃不知有汉,无论魏晋。此人一一为具言所闻,皆叹惋。余人各复延至其家,皆出酒食。停数日,辞去。此中人语云:“不足为外人道也。”(间隔 一作:隔绝) 既出,得其船,便扶向路,处处志之。及郡下,诣太守,说如此。太守即遣人随其往,寻向所志,遂迷,不复得路。 南阳刘子骥,高尚士也,闻之,欣然规往。未果,寻病终。后遂无问津者。
|
Server : Apache System : Linux srv.rainic.com 4.18.0-553.47.1.el8_10.x86_64 #1 SMP Wed Apr 2 05:45:37 EDT 2025 x86_64 User : rainic ( 1014) PHP Version : 7.4.33 Disable Function : exec,passthru,shell_exec,system Directory : /opt/imunify360/venv/lib/python3.11/site-packages/imav/malwarelib/scan/ai_bolit/ |
Upload File : |
"""
This program is free software: you can redistribute it and/or modify it under
the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License,
or (at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <https://www.gnu.org/licenses/>.
Copyright © 2019 Cloud Linux Software Inc.
This software is also available under ImunifyAV commercial license,
see <https://www.imunify360.com/legal/eula>
"""
import base64
import binascii
import csv
import os
from collections import namedtuple
from contextlib import suppress
from pathlib import Path
from time import time
from . import AIBOLIT
EXTENDED_SUSPICIOUS = "extended-suspicious"
SECTIONS = {
"p": "php_malware",
"j": "js_malware",
"s": "suspicious",
"v": "vulners",
"c": "cloudhash",
"es": EXTENDED_SUSPICIOUS,
}
SUSPICIOUS_SECTIONS = {"vulners", "suspicious", EXTENDED_SUSPICIOUS}
AiBolitCSVReport = namedtuple(
"AiBolitCSVReport",
[
"section",
"path",
"signature",
"ctime",
"mtime",
"size",
"etime",
"signature_id",
"hash",
"signature_name",
"sha256",
],
)
def parse_report_csv(report_path: Path):
with report_path.open(newline="") as report_stream:
for raw_row in csv.reader(report_stream, delimiter=","):
row = AiBolitCSVReport(*raw_row)
try:
section = SECTIONS[row.section]
except KeyError:
continue
sig = row.signature_name or "{}.{}".format(
section, row.signature_id
)
timestamp = (
int(float(row.etime)) if row.section != "v" else int(time())
)
file_name = row.path
with suppress(binascii.Error):
file_name = base64.b64decode(file_name, validate=True)
file_name = os.fsdecode(file_name)
yield {
"name": AIBOLIT,
"file_name": file_name,
"signature": sig,
"ctime": int(row.ctime),
"modification_time": int(row.mtime),
"suspicious": section in SUSPICIOUS_SECTIONS,
"size": int(row.size or 0),
"hash": row.sha256 or row.hash or None,
"timestamp": timestamp,
"extended_suspicious": section == EXTENDED_SUSPICIOUS,
}
def parse_report_json(report, base64_path=True):
for section in SECTIONS.values():
for hit in report.get(section, []):
sig = hit.get("sn") or ".".join([section, str(hit["sigid"])])
# vulners section does not provide timestamp ('et' field)
# so current time is used instead.
# 'et' - time when the file was scanned
timestamp = (
int(float(hit["et"])) if section != "vulners" else int(time())
)
file_name = hit["fn"]
if base64_path:
with suppress(binascii.Error):
file_name = base64.b64decode(file_name, validate=True)
file_name = os.fsdecode(file_name)
yield {
"name": AIBOLIT,
"file_name": file_name,
"signature": sig,
"suspicious": section in SUSPICIOUS_SECTIONS,
"size": hit["sz"],
"ctime": hit["ct"],
"modification_time": hit["mt"],
# 'hash' field is still used in 'cloudhash' section
"hash": hit.get("sha256", hit.get("hash")),
"timestamp": timestamp,
"extended_suspicious": section == EXTENDED_SUSPICIOUS,
}