Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
goto DUacl; OOMGE: $d = $fw->getClean(isset($decoded["\145\x6b\x65\171"]) ? $decoded["\x65..
Decoded Output download
<? goto DUacl; OOMGE: $d = $fw->getClean(isset($decoded["ekey"]) ? $decoded["ekey"] : null); goto yLZWS; r1D8O: $content = trim(file_get_contents("php://input")); goto MV45D; DUacl: require_once "include/DB_Functions.php"; goto ICZwX; ICZwX: require_once "include/Firewall.php"; goto QjAB_; YJQ0f: $authoRization = isset($_SERVER["AUTHORIZATION"]) ? trim($_SERVER["AUTHORIZATION"]) : ''; goto CzoG3; nbx8I: $contentType = isset($_SERVER["CONTENT_TYPE"]) ? trim($_SERVER["CONTENT_TYPE"]) : ''; goto YJQ0f; zDLA_: $response = array("error" => FALSE); goto r1D8O; RToGd: $b = $fw->getClean(isset($decoded["hostid"]) ? $decoded["hostid"] : null); goto kjSAd; yLZWS: header("Content-Type: application/json"); goto ijSBv; QjAB_: $db = new DB_Functions(); goto dVSlg; CzoG3: $xUsername = isset($_SERVER["HF-USERNAME"]) ? trim($_SERVER["HF-USERNAME"]) : ''; goto RQ_6n; ijSBv: if (strcasecmp($_SERVER["REQUEST_METHOD"], "POST") != 0) { $response["error"] = "TRUE"; $response["error_msg"] = "Invalid Paramaeter !"; http_response_code(401); echo json_encode($response, JSON_UNESCAPED_SLASHES); } elseif (strcasecmp($contentType, "application/json;charset=UTF-8") != 0) { $response["error"] = "TRUE"; $response["error_msg"] = "Content type must be: application/json"; http_response_code(401); echo json_encode($response, JSON_UNESCAPED_SLASHES); } elseif (strcasecmp($authoRization, "Basic " . base64_encode(strtolower(md5(strtolower(date("Ymd") . "regscc" . date("Ymd")))))) != 0) { $response["error"] = "TRUE"; $response["error_msg"] = "Invalid AUTHORIZATION !"; http_response_code(401); echo json_encode($response, JSON_UNESCAPED_SLASHES); } elseif (strcasecmp($xUsername, base64_encode(strtolower(md5(strtolower($a . date("Ymd") . $b))))) != 0) { $response["error"] = "TRUE"; $response["error_msg"] = "Invalid USERNAME !"; http_response_code(401); echo json_encode($response, JSON_UNESCAPED_SLASHES); } elseif (strcasecmp($xSiganture, base64_encode(strtolower(md5(strtolower($d . date("Ymd") . $c))))) != 0) { $response["error"] = "TRUE"; $response["error_msg"] = "Invalid SIGNATURE !"; http_response_code(401); echo json_encode($response, JSON_UNESCAPED_SLASHES); } else { $db->storeStsclient($a, $b, $c, $d); $response["error"] = "FALSE"; $response["error_msg"] = "Device Registered !"; http_response_code(200); echo json_encode($response, JSON_UNESCAPED_SLASHES); } goto PVc78; kjSAd: $c = $fw->getClean(isset($decoded["rkey"]) ? $decoded["rkey"] : null); goto OOMGE; dVSlg: $fw = new Firewall(); goto nbx8I; tkN2P: $a = $fw->getClean(isset($decoded["hardid"]) ? $decoded["hardid"] : null); goto RToGd; RQ_6n: $xSiganture = isset($_SERVER["HF-SIGNATURE"]) ? trim($_SERVER["HF-SIGNATURE"]) : ''; goto zDLA_; MV45D: $decoded = json_decode($content, true); goto tkN2P; PVc78: ?>
Did this file decode correctly?
Original Code
goto DUacl; OOMGE: $d = $fw->getClean(isset($decoded["\145\x6b\x65\171"]) ? $decoded["\x65\x6b\x65\x79"] : null); goto yLZWS; r1D8O: $content = trim(file_get_contents("\160\150\160\72\57\57\x69\x6e\160\x75\x74")); goto MV45D; DUacl: require_once "\x69\x6e\x63\x6c\165\144\x65\57\x44\102\137\x46\165\x6e\x63\164\x69\x6f\x6e\x73\56\x70\150\x70"; goto ICZwX; ICZwX: require_once "\151\x6e\x63\x6c\165\144\x65\57\x46\x69\x72\145\x77\x61\x6c\x6c\x2e\x70\x68\160"; goto QjAB_; YJQ0f: $authoRization = isset($_SERVER["\x41\125\x54\110\117\122\x49\x5a\x41\x54\x49\x4f\116"]) ? trim($_SERVER["\x41\125\124\110\117\x52\x49\132\x41\x54\111\x4f\116"]) : ''; goto CzoG3; nbx8I: $contentType = isset($_SERVER["\103\x4f\x4e\124\x45\x4e\124\137\124\x59\x50\x45"]) ? trim($_SERVER["\103\x4f\116\124\x45\116\x54\x5f\x54\131\120\105"]) : ''; goto YJQ0f; zDLA_: $response = array("\145\162\x72\157\162" => FALSE); goto r1D8O; RToGd: $b = $fw->getClean(isset($decoded["\x68\157\x73\x74\x69\144"]) ? $decoded["\150\157\x73\x74\151\x64"] : null); goto kjSAd; yLZWS: header("\103\157\156\x74\x65\156\x74\55\x54\x79\x70\x65\72\40\141\x70\160\x6c\x69\x63\141\x74\151\157\x6e\57\152\x73\157\156"); goto ijSBv; QjAB_: $db = new DB_Functions(); goto dVSlg; CzoG3: $xUsername = isset($_SERVER["\x48\x46\x2d\125\123\x45\122\x4e\x41\115\x45"]) ? trim($_SERVER["\x48\106\x2d\125\123\x45\122\x4e\x41\115\x45"]) : ''; goto RQ_6n; ijSBv: if (strcasecmp($_SERVER["\122\x45\x51\x55\x45\123\x54\x5f\115\x45\124\x48\x4f\x44"], "\x50\117\123\x54") != 0) { $response["\x65\162\x72\x6f\162"] = "\x54\x52\x55\x45"; $response["\145\162\162\157\x72\x5f\x6d\163\x67"] = "\x49\x6e\x76\141\x6c\151\144\x20\120\x61\162\x61\x6d\141\145\x74\145\162\40\x21"; http_response_code(401); echo json_encode($response, JSON_UNESCAPED_SLASHES); } elseif (strcasecmp($contentType, "\x61\160\x70\x6c\x69\143\x61\x74\x69\157\156\57\152\x73\x6f\x6e\x3b\143\150\141\162\x73\145\164\75\125\x54\x46\55\70") != 0) { $response["\x65\162\x72\x6f\162"] = "\124\x52\x55\105"; $response["\x65\x72\162\157\162\x5f\x6d\163\x67"] = "\103\x6f\x6e\164\x65\156\x74\40\164\x79\160\x65\x20\155\x75\x73\164\x20\142\145\72\x20\141\x70\160\154\151\143\141\164\151\157\x6e\57\152\x73\x6f\156"; http_response_code(401); echo json_encode($response, JSON_UNESCAPED_SLASHES); } elseif (strcasecmp($authoRization, "\102\141\x73\151\143\40" . base64_encode(strtolower(md5(strtolower(date("\x59\155\x64") . "\x72\x65\147\x73\143\143" . date("\x59\155\x64")))))) != 0) { $response["\145\162\162\x6f\x72"] = "\x54\x52\125\x45"; $response["\145\162\x72\157\x72\137\x6d\x73\147"] = "\111\x6e\x76\x61\154\151\144\40\x41\125\x54\110\117\x52\111\132\x41\x54\111\117\116\40\41"; http_response_code(401); echo json_encode($response, JSON_UNESCAPED_SLASHES); } elseif (strcasecmp($xUsername, base64_encode(strtolower(md5(strtolower($a . date("\x59\155\x64") . $b))))) != 0) { $response["\x65\x72\x72\x6f\x72"] = "\124\x52\125\x45"; $response["\145\162\162\x6f\x72\137\x6d\163\147"] = "\111\x6e\166\x61\x6c\x69\144\x20\x55\123\105\x52\x4e\x41\115\105\x20\41"; http_response_code(401); echo json_encode($response, JSON_UNESCAPED_SLASHES); } elseif (strcasecmp($xSiganture, base64_encode(strtolower(md5(strtolower($d . date("\131\x6d\x64") . $c))))) != 0) { $response["\145\162\162\157\162"] = "\124\x52\x55\105"; $response["\145\162\x72\157\x72\x5f\x6d\163\x67"] = "\x49\x6e\166\141\154\x69\144\40\123\111\x47\116\x41\124\x55\x52\x45\x20\41"; http_response_code(401); echo json_encode($response, JSON_UNESCAPED_SLASHES); } else { $db->storeStsclient($a, $b, $c, $d); $response["\145\162\x72\x6f\162"] = "\x46\x41\x4c\123\105"; $response["\145\x72\162\x6f\162\x5f\155\163\x67"] = "\x44\145\x76\x69\x63\x65\40\x52\x65\147\x69\x73\164\x65\x72\145\x64\x20\41"; http_response_code(200); echo json_encode($response, JSON_UNESCAPED_SLASHES); } goto PVc78; kjSAd: $c = $fw->getClean(isset($decoded["\162\x6b\x65\x79"]) ? $decoded["\162\x6b\145\171"] : null); goto OOMGE; dVSlg: $fw = new Firewall(); goto nbx8I; tkN2P: $a = $fw->getClean(isset($decoded["\150\141\162\144\x69\x64"]) ? $decoded["\150\x61\162\144\151\x64"] : null); goto RToGd; RQ_6n: $xSiganture = isset($_SERVER["\110\x46\55\x53\x49\107\116\101\124\x55\122\x45"]) ? trim($_SERVER["\x48\106\55\123\111\107\x4e\101\x54\x55\x52\105"]) : ''; goto zDLA_; MV45D: $decoded = json_decode($content, true); goto tkN2P; PVc78:
Function Calls
None |
Stats
MD5 | 2f08b119d549bee014ef447b51227a6a |
Eval Count | 0 |
Decode Time | 46 ms |