Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<?php goto kf0fF; fsC4T: include "\146\x6c\x61\147\56\160\150\160"; goto fWqmG; wLG3d..

Decoded Output download

<?php 
goto kf0fF; 
fsC4T: 
include "flag.php"; 
goto fWqmG; 
wLG3d: 
function echec() 
{ 
goto jCY0w; 
Dm3Uc: 
source(); 
goto pj4hI; 
jCY0w: 
echo "Echec. <br />"; 
goto Dm3Uc; 
pj4hI: 
die; 
goto gPDe0; 
gPDe0: 
} 
goto rblhC; 
kP_Sv: 
goto Z_G58; 
goto L1im_; 
lgK4E: 
HVY3V: 
goto cDL5V; 
N0QUE: 
Z_G58: 
goto ERPWN; 
kdSpl: 
goto lIReG; 
goto g0LjI; 
ica2w: 
lIReG: 
goto wLG3d; 
Q1acU: 
nKESF: 
goto T4l_J; 
MMtJ5: 
goto g9hQi; 
goto uMnvv; 
ERPWN: 
if (preg_match("/ |_/", $query)){ echec(); } 
goto UUkaB; 
kf0fF: 
goto rjJoj; 
goto qAfXu; 
UUkaB: 
goto bOncl; 
goto sOzhj; 
c32St: 
goto HVY3V; 
goto N0QUE; 
Ns1l0: 
$variable = str_replace("isilabs", '', $variable); 
goto GzPvh; 
cDL5V: 
echo "<p>Analyser le code ci dessous et trouver le moyen d afficher le flag.<p>"; 
goto MMtJ5; 
m82vE: 
echo "<b>IsiLabs web challenge - medium</b>"; 
goto c32St; 
KLAOS: 
MGxdQ: 
goto WhVHx; 
GzPvh: 
goto MGxdQ; 
goto ica2w; 
vgLa0: 
goto nKESF; 
goto lgK4E; 
g0LjI: 
E0h5E: 
goto m82vE; 
rblhC: 
goto lbiZM; 
goto XH3VU; 
qAfXu: 
l5p8t: 
goto Ns1l0; 
XDEYL: 
echo "<br><HR><br>"; 
goto idAw3; 
svAhA: 
rjJoj: 
goto fsC4T; 
drjtB: 
echo "<title>IsiLabs web challenge - medium</title>"; 
goto yoIPZ; 
fGEPV: 
function source() 
{ 
goto nUBkJ; 
pqZ02: 
highlight_string(file_get_contents(__FILE__)); 
goto P9KZ3; 
nUBkJ: 
echo "<br><code>"; 
goto pqZ02; 
P9KZ3: 
echo "</code>"; 
goto NTzIV; 
NTzIV: 
} 
goto kdSpl; 
yVLDM: 
if ($variable === "isilabs") 
{ 
echo "- Si ce texte apparait, tu valide la premiere etape! <br>"; 
if 
(isset($_GET["isi_labs"])) 
{ 
echo "- Deuxieme etape valide! <br>"; 
if (hash("md2", $_GET["isi"]) == "0") 
{ 
echo "- Troisieme etape valide! <br>"; 
if (hash("sha1", $_GET["labs"]) == $_GET["labs"]) 
{ 
echo "- Okay, voici le flag : " . $secretflag . "<br>"; } 
} 
} 
} 
goto vgLa0; 
T4l_J: 
source(); 
goto oRYz2; 
yoIPZ: 
goto E0h5E; 
goto KLAOS; 
L1im_: 
MYfqC: 
goto fGEPV; 
E6HrX: 
goto l5p8t; 
goto jdiwB; 
idAw3: 
goto MYfqC; 
goto svAhA; 
fWqmG: 
goto Oz2JG; 
goto Q1acU; 
WhVHx: 
$query = urldecode($_SERVER["QUERY_STRING"]); 
goto kP_Sv; 
SLxE4: 
$variable = $_GET["isilabs"]; 
goto E6HrX; 
sOzhj: 
g9hQi: 
goto XDEYL; 
XH3VU: 
bOncl: 
goto yVLDM; 
uMnvv: 
lbiZM: 
goto SLxE4; 
jdiwB: 
Oz2JG: 
goto drjtB; 
oRYz2: 
?>

Did this file decode correctly?

Original Code

<?php
goto kf0fF;
fsC4T:
include "\146\x6c\x61\147\56\160\150\160";
goto fWqmG;
wLG3d:
function echec()
{
goto jCY0w;
Dm3Uc:
source();
goto pj4hI;
jCY0w:
echo "\x45\x63\x68\145\143\56\40\x3c\x62\x72\x20\x2f\x3e";
goto Dm3Uc;
pj4hI:
die;
goto gPDe0;
gPDe0:
}
goto rblhC;
kP_Sv:
goto Z_G58;
goto L1im_;
lgK4E:
HVY3V:
goto cDL5V;
N0QUE:
Z_G58:
goto ERPWN;
kdSpl:
goto lIReG;
goto g0LjI;
ica2w:
lIReG:
goto wLG3d;
Q1acU:
nKESF:
goto T4l_J;
MMtJ5:
goto g9hQi;
goto uMnvv;
ERPWN:
if (preg_match("\x2f\x20\x7c\137\57", $query)){ echec(); }
goto UUkaB;
kf0fF:
goto rjJoj;
goto qAfXu;
UUkaB:
goto bOncl;
goto sOzhj;
c32St:
goto HVY3V;
goto N0QUE;
Ns1l0:
$variable = str_replace("\x69\x73\151\154\x61\x62\163", '', $variable);
goto GzPvh;
cDL5V:
echo "\74\x70\x3e\101\156\141\x6c\x79\x73\x65\162\x20\154\x65\40\x63\157\144\x65\x20\x63\x69\40\x64\x65\163\x73\x6f\165\163\x20\145\164\x20\164\x72\157\x75\166\145\x72\40\x6c\x65\40\x6d\x6f\x79\145\x6e\x20\x64\x20\141\146\146\x69\x63\150\x65\x72\x20\154\145\x20\146\154\x61\x67\x2e\74\160\76";
goto MMtJ5;
m82vE:
echo "\74\x62\x3e\111\163\x69\114\141\142\x73\x20\167\x65\142\40\x63\150\141\154\154\145\x6e\147\x65\40\55\40\155\145\144\x69\165\155\x3c\57\x62\76";
goto c32St;
KLAOS:
MGxdQ:
goto WhVHx;
GzPvh:
goto MGxdQ;
goto ica2w;
vgLa0:
goto nKESF;
goto lgK4E;
g0LjI:
E0h5E:
goto m82vE;
rblhC:
goto lbiZM;
goto XH3VU;
qAfXu:
l5p8t:
goto Ns1l0;
XDEYL:
echo "\74\x62\162\x3e\74\110\122\76\x3c\x62\162\x3e";
goto idAw3;
svAhA:
rjJoj:
goto fsC4T;
drjtB:
echo "\x3c\x74\151\x74\154\145\x3e\111\x73\151\x4c\141\142\x73\x20\x77\145\142\40\x63\x68\x61\x6c\x6c\x65\156\x67\145\x20\55\x20\155\x65\x64\151\165\155\x3c\57\164\151\x74\154\145\x3e";
goto yoIPZ;
fGEPV:
function source()
{
goto nUBkJ;
pqZ02:
highlight_string(file_get_contents(__FILE__));
goto P9KZ3;
nUBkJ:
echo "\74\142\x72\76\x3c\143\x6f\144\145\x3e";
goto pqZ02;
P9KZ3:
echo "\74\57\143\157\x64\x65\76";
goto NTzIV;
NTzIV:
}
goto kdSpl;
yVLDM:
if ($variable === "\151\163\x69\154\x61\142\x73")
{
echo "\x2d\x20\x53\x69\40\x63\145\x20\164\x65\x78\x74\145\40\141\x70\160\141\x72\141\x69\x74\x2c\40\x74\x75\x20\x76\x61\154\151\144\x65\x20\154\x61\40\x70\162\145\155\151\145\162\145\40\145\x74\141\x70\x65\41\x20\x3c\142\162\76";
if
(isset($_GET["\151\163\151\x5f\x6c\141\142\163"]))
{
echo "\x2d\x20\x44\x65\165\170\151\x65\x6d\145\40\145\x74\x61\160\145\x20\166\141\154\151\x64\x65\41\x20\x3c\x62\x72\76";
if (hash("\x6d\144\x32", $_GET["\151\163\151"]) == "\60")
{
echo "\x2d\40\x54\162\157\x69\x73\x69\x65\x6d\x65\40\145\164\141\x70\x65\x20\x76\141\x6c\151\x64\145\x21\40\74\142\x72\x3e";
if (hash("\x73\150\141\x31", $_GET["\154\141\142\163"]) == $_GET["\154\141\x62\163"])
{
echo "\x2d\x20\117\153\141\x79\x2c\x20\x76\157\x69\x63\151\40\154\x65\40\x66\154\141\x67\40\x3a\40" . $secretflag . "\74\x62\x72\76"; }
}
}
}
goto vgLa0;
T4l_J:
source();
goto oRYz2;
yoIPZ:
goto E0h5E;
goto KLAOS;
L1im_:
MYfqC:
goto fGEPV;
E6HrX:
goto l5p8t;
goto jdiwB;
idAw3:
goto MYfqC;
goto svAhA;
fWqmG:
goto Oz2JG;
goto Q1acU;
WhVHx:
$query = urldecode($_SERVER["\121\x55\x45\x52\131\x5f\x53\124\x52\x49\116\x47"]);
goto kP_Sv;
SLxE4:
$variable = $_GET["\x69\163\151\x6c\x61\142\x73"];
goto E6HrX;
sOzhj:
g9hQi:
goto XDEYL;
XH3VU:
bOncl:
goto yVLDM;
uMnvv:
lbiZM:
goto SLxE4;
jdiwB:
Oz2JG:
goto drjtB;
oRYz2:
?>

Function Calls

None

Variables

None

Stats

MD5 a04afe4afffc5131d9f9493635f998a4
Eval Count 0
Decode Time 36 ms