最终解密出来的内容为:
<?php
if(!defined('API_MODE')) {
session_start();
}
date_default_timezone_set('Asia/Chongqing');
define('ROOT_PATH', str_replace('\', '/', substr(dirname(__FILE__), 0, -7)));
define('INC_PATH', ROOT_PATH.'include');
define('UPLOAD_DIR', ROOT_PATH.'upload');
require_once(ROOT_PATH.'config.php');
require_once(INC_PATH.'/common.func.php');
require_once(INC_PATH.'/db_mysql.class.php');
$db = new dbstuff();
$db->connect(DB_HOST, DB_USER, DB_PW, DB_NAME);
if(!$db) {
die('cannot connect to mysql');
}
if(!defined('API_MODE')) {
require_once(ROOT_PATH.'libraries/smarty/Smarty.class.php');
$smarty = new Smarty();
$smarty->template_dir = ROOT_PATH.'templates'
$smarty->compile_dir = ROOT_PATH.'templates_c'
$smarty->cache_dir = ROOT_PATH.'cache'
}
$timestamp = time();
$action = isset($_REQUEST['action']) ? trim($_REQUEST['action']) : ''
$imgexts = array('gif','jpg','png');
?>
‘贰’ 文件加密解密问题
是不是-高强度文件夹加密大师 8000 ,如果是在安装一个同样的,就能找到,在不行重做系统可以吧
‘叁’ PHP代码解密
<xmp>
第1次解密结果如下:(虚线为分隔符)
-------------------------
?>
<?php
eval(gzinflate(base64_decode('NdJJsppAAADQvafI7mu5QFpAqJ//tsN3hOqm3+++J7Nthb/bYChOXLqsZeNqvQfQ4+/Z21CxIt+qQADDMxX3FAE+++QSR96HVBbn+6/dbve9Of+P8OMf')));
?>
<?php
-----------------------------
解密方法为:
把开始部分的:“eval(”和 “);” 之间的内容COPY下来,
做成:
$a= gzinflate(base64_decode('NdJHjp ………… EX'));
printf("<xmp>\n第1次解密:\n%s\n</xmp>\n",$a);
这样就出结果了,下面的一样处理,到第5次就得到了HTML了
</xmp>
<xmp>
第2次解密结果如下:(虚线为分隔符)
-------------------------
?>
<?php
eval(gzinflate(base64_decode('/+/sydy+YH6OOeb+/+p1h9b5DT5xfrB/sQDjjD8/Pr6XCwWv2eb/ykf/wA=')));
?>
<?php
---------------------------
</xmp>
<xmp>
第3次解密结果如下:(虚线为分隔符)
-------------------------
?>
<?php
eval(gzinflate(base64_decode('/CMBTt9V3xHe/mv2ua/Teob7iMyTKStjElE8v0Ud3gq/CN8rhOevxFMGpVPZ0ZimY/+/WzWGqBVD/QxKkRWXpCIWfAB/z2/0kvfw==')));
?>
<?php
------------------------
</xmp>
<xmp>
第4次解密结果如下:(虚线为分隔符)
-------------------------
?>
<?php
eval(gzinflate(base64_decode('yAgSgvaKdSqrl2qCKXb/SEm7wo8nykuyAKcEBW1j7RHY4/++sCOeidfKgZ3')));
?>
<?php
----------------------
</xmp>
<xmp>
第5次解密结果如下:(虚线为分隔符)终于看到HTML了
-------------------------
?>
</div>
<div class="clear"></div>
</div>
<div id="footer">
<p>
<a href="http://www.webintellects.com">Virtual Private Servers</a> | <a href="http://www.webintellects.com">Business Web Hosting</a> | <a href="http://www.webintellects.com">Managed Dedicated Servers</a>
</p>
</div>
<?php wp_footer(); ?>
</body>
</html>
<?php
---------------------------
</xmp>
‘肆’ eval(function(p,a,c,k,e,r) 解密
直接使用在线解密工具,已测试可以解密此文件
http://tool.chinaz.com/js.aspx
其中变量j是一个base64编码后的png图片,想看j代表的图片(人民网的logo),用下面的方法
<imgsrc="data:images/png;base64,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"/>