php - How can I gzinflate and save the inflated data without running it? (Found what I think is a trojan on my server) -
well, not server. friend found , sent me, trying make sense of it. appears php irc bot, have no idea how decode , make sense of it.
here code:
<?eval(gzinflate(base64_decode('some base 64 code here')))?>
so decoded base64, , output ton of strange characters, i'm guessing either encrypted or different file type, when change .jpg .txt , open it.
but have no idea how decode , determine source. help?
this should safe, still show code:
<pre> <?echo(gzinflate(base64_decode('some base 64 code here')))?> </pre>
that is, echo
instead of eval
.
if you'd rather in shell, try gunzip
after base64 decoding.
Comments
Post a Comment