php - How can I gzinflate and save the inflated data without running it? (Found what I think is a trojan on my server) -


well, not server. friend found , sent me, trying make sense of it. appears php irc bot, have no idea how decode , make sense of it.

here code:

<?eval(gzinflate(base64_decode('some base 64 code here')))?>

so decoded base64, , output ton of strange characters, i'm guessing either encrypted or different file type, when change .jpg .txt , open it.

but have no idea how decode , determine source. help?

this should safe, still show code:

<pre> <?echo(gzinflate(base64_decode('some base 64 code here')))?> </pre> 

that is, echo instead of eval.

if you'd rather in shell, try gunzip after base64 decoding.


Comments

Popular posts from this blog

javascript - Enclosure Memory Copies -

php - Replacing tags in braces, even nested tags, with regex -