Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
<?php goto kf0fF; fsC4T: include "\146\x6c\x61\147\56\160\150\160"; goto fWqmG; wLG3d..
Decoded Output download
<?php
goto kf0fF;
fsC4T:
include "flag.php";
goto fWqmG;
wLG3d:
function echec()
{
goto jCY0w;
Dm3Uc:
source();
goto pj4hI;
jCY0w:
echo "Echec. <br />";
goto Dm3Uc;
pj4hI:
die;
goto gPDe0;
gPDe0:
}
goto rblhC;
kP_Sv:
goto Z_G58;
goto L1im_;
lgK4E:
HVY3V:
goto cDL5V;
N0QUE:
Z_G58:
goto ERPWN;
kdSpl:
goto lIReG;
goto g0LjI;
ica2w:
lIReG:
goto wLG3d;
Q1acU:
nKESF:
goto T4l_J;
MMtJ5:
goto g9hQi;
goto uMnvv;
ERPWN:
if (preg_match("/ |_/", $query)){ echec(); }
goto UUkaB;
kf0fF:
goto rjJoj;
goto qAfXu;
UUkaB:
goto bOncl;
goto sOzhj;
c32St:
goto HVY3V;
goto N0QUE;
Ns1l0:
$variable = str_replace("isilabs", '', $variable);
goto GzPvh;
cDL5V:
echo "<p>Analyser le code ci dessous et trouver le moyen d afficher le flag.<p>";
goto MMtJ5;
m82vE:
echo "<b>IsiLabs web challenge - medium</b>";
goto c32St;
KLAOS:
MGxdQ:
goto WhVHx;
GzPvh:
goto MGxdQ;
goto ica2w;
vgLa0:
goto nKESF;
goto lgK4E;
g0LjI:
E0h5E:
goto m82vE;
rblhC:
goto lbiZM;
goto XH3VU;
qAfXu:
l5p8t:
goto Ns1l0;
XDEYL:
echo "<br><HR><br>";
goto idAw3;
svAhA:
rjJoj:
goto fsC4T;
drjtB:
echo "<title>IsiLabs web challenge - medium</title>";
goto yoIPZ;
fGEPV:
function source()
{
goto nUBkJ;
pqZ02:
highlight_string(file_get_contents(__FILE__));
goto P9KZ3;
nUBkJ:
echo "<br><code>";
goto pqZ02;
P9KZ3:
echo "</code>";
goto NTzIV;
NTzIV:
}
goto kdSpl;
yVLDM:
if ($variable === "isilabs")
{
echo "- Si ce texte apparait, tu valide la premiere etape! <br>";
if
(isset($_GET["isi_labs"]))
{
echo "- Deuxieme etape valide! <br>";
if (hash("md2", $_GET["isi"]) == "0")
{
echo "- Troisieme etape valide! <br>";
if (hash("sha1", $_GET["labs"]) == $_GET["labs"])
{
echo "- Okay, voici le flag : " . $secretflag . "<br>"; }
}
}
}
goto vgLa0;
T4l_J:
source();
goto oRYz2;
yoIPZ:
goto E0h5E;
goto KLAOS;
L1im_:
MYfqC:
goto fGEPV;
E6HrX:
goto l5p8t;
goto jdiwB;
idAw3:
goto MYfqC;
goto svAhA;
fWqmG:
goto Oz2JG;
goto Q1acU;
WhVHx:
$query = urldecode($_SERVER["QUERY_STRING"]);
goto kP_Sv;
SLxE4:
$variable = $_GET["isilabs"];
goto E6HrX;
sOzhj:
g9hQi:
goto XDEYL;
XH3VU:
bOncl:
goto yVLDM;
uMnvv:
lbiZM:
goto SLxE4;
jdiwB:
Oz2JG:
goto drjtB;
oRYz2:
?>
Did this file decode correctly?
Original Code
<?php
goto kf0fF;
fsC4T:
include "\146\x6c\x61\147\56\160\150\160";
goto fWqmG;
wLG3d:
function echec()
{
goto jCY0w;
Dm3Uc:
source();
goto pj4hI;
jCY0w:
echo "\x45\x63\x68\145\143\56\40\x3c\x62\x72\x20\x2f\x3e";
goto Dm3Uc;
pj4hI:
die;
goto gPDe0;
gPDe0:
}
goto rblhC;
kP_Sv:
goto Z_G58;
goto L1im_;
lgK4E:
HVY3V:
goto cDL5V;
N0QUE:
Z_G58:
goto ERPWN;
kdSpl:
goto lIReG;
goto g0LjI;
ica2w:
lIReG:
goto wLG3d;
Q1acU:
nKESF:
goto T4l_J;
MMtJ5:
goto g9hQi;
goto uMnvv;
ERPWN:
if (preg_match("\x2f\x20\x7c\137\57", $query)){ echec(); }
goto UUkaB;
kf0fF:
goto rjJoj;
goto qAfXu;
UUkaB:
goto bOncl;
goto sOzhj;
c32St:
goto HVY3V;
goto N0QUE;
Ns1l0:
$variable = str_replace("\x69\x73\151\154\x61\x62\163", '', $variable);
goto GzPvh;
cDL5V:
echo "\74\x70\x3e\101\156\141\x6c\x79\x73\x65\162\x20\154\x65\40\x63\157\144\x65\x20\x63\x69\40\x64\x65\163\x73\x6f\165\163\x20\145\164\x20\164\x72\157\x75\166\145\x72\40\x6c\x65\40\x6d\x6f\x79\145\x6e\x20\x64\x20\141\146\146\x69\x63\150\x65\x72\x20\154\145\x20\146\154\x61\x67\x2e\74\160\76";
goto MMtJ5;
m82vE:
echo "\74\x62\x3e\111\163\x69\114\141\142\x73\x20\167\x65\142\40\x63\150\141\154\154\145\x6e\147\x65\40\55\40\155\145\144\x69\165\155\x3c\57\x62\76";
goto c32St;
KLAOS:
MGxdQ:
goto WhVHx;
GzPvh:
goto MGxdQ;
goto ica2w;
vgLa0:
goto nKESF;
goto lgK4E;
g0LjI:
E0h5E:
goto m82vE;
rblhC:
goto lbiZM;
goto XH3VU;
qAfXu:
l5p8t:
goto Ns1l0;
XDEYL:
echo "\74\x62\162\x3e\74\110\122\76\x3c\x62\162\x3e";
goto idAw3;
svAhA:
rjJoj:
goto fsC4T;
drjtB:
echo "\x3c\x74\151\x74\154\145\x3e\111\x73\151\x4c\141\142\x73\x20\x77\145\142\40\x63\x68\x61\x6c\x6c\x65\156\x67\145\x20\55\x20\155\x65\x64\151\165\155\x3c\57\164\151\x74\154\145\x3e";
goto yoIPZ;
fGEPV:
function source()
{
goto nUBkJ;
pqZ02:
highlight_string(file_get_contents(__FILE__));
goto P9KZ3;
nUBkJ:
echo "\74\142\x72\76\x3c\143\x6f\144\145\x3e";
goto pqZ02;
P9KZ3:
echo "\74\57\143\157\x64\x65\76";
goto NTzIV;
NTzIV:
}
goto kdSpl;
yVLDM:
if ($variable === "\151\163\x69\154\x61\142\x73")
{
echo "\x2d\x20\x53\x69\40\x63\145\x20\164\x65\x78\x74\145\40\141\x70\160\141\x72\141\x69\x74\x2c\40\x74\x75\x20\x76\x61\154\151\144\x65\x20\154\x61\40\x70\162\145\155\151\145\162\145\40\145\x74\141\x70\x65\41\x20\x3c\142\162\76";
if
(isset($_GET["\151\163\151\x5f\x6c\141\142\163"]))
{
echo "\x2d\x20\x44\x65\165\170\151\x65\x6d\145\40\145\x74\x61\160\145\x20\166\141\154\151\x64\x65\41\x20\x3c\x62\x72\76";
if (hash("\x6d\144\x32", $_GET["\151\163\151"]) == "\60")
{
echo "\x2d\40\x54\162\157\x69\x73\x69\x65\x6d\x65\40\145\164\141\x70\x65\x20\x76\141\x6c\151\x64\145\x21\40\74\142\x72\x3e";
if (hash("\x73\150\141\x31", $_GET["\154\141\142\163"]) == $_GET["\154\141\x62\163"])
{
echo "\x2d\x20\117\153\141\x79\x2c\x20\x76\157\x69\x63\151\40\154\x65\40\x66\154\141\x67\40\x3a\40" . $secretflag . "\74\x62\x72\76"; }
}
}
}
goto vgLa0;
T4l_J:
source();
goto oRYz2;
yoIPZ:
goto E0h5E;
goto KLAOS;
L1im_:
MYfqC:
goto fGEPV;
E6HrX:
goto l5p8t;
goto jdiwB;
idAw3:
goto MYfqC;
goto svAhA;
fWqmG:
goto Oz2JG;
goto Q1acU;
WhVHx:
$query = urldecode($_SERVER["\121\x55\x45\x52\131\x5f\x53\124\x52\x49\116\x47"]);
goto kP_Sv;
SLxE4:
$variable = $_GET["\x69\163\151\x6c\x61\142\x73"];
goto E6HrX;
sOzhj:
g9hQi:
goto XDEYL;
XH3VU:
bOncl:
goto yVLDM;
uMnvv:
lbiZM:
goto SLxE4;
jdiwB:
Oz2JG:
goto drjtB;
oRYz2:
?>
Function Calls
None |
Stats
MD5 | a04afe4afffc5131d9f9493635f998a4 |
Eval Count | 0 |
Decode Time | 36 ms |