Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Looking for Reseller Hosting with Shell - Page 3
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Looking for Reseller Hosting with Shell

13»

Comments

  • @yokowasis said:

    @FoxelVox said:

    @IAlwaysBeCoding said:

    @FoxelVox said:
    Seems more like a JS botnet webpage/malware then anything else to me...

    The OP is selling web hosting services, real JS botnet webpage/malware operators have more than $9.5 a month to spend.

    Ha you think So? Some kids from hackforums.net dont have a penny to spend so come to forums like these to get a deal

    Dude, can you even read ?

    I definetly can but everyone that runs something illegal has a cover up. But Hey, Who am i to judge.

  • @FoxelVox said:

    @yokowasis said:

    @FoxelVox said:

    @IAlwaysBeCoding said:

    @FoxelVox said:
    Seems more like a JS botnet webpage/malware then anything else to me...

    The OP is selling web hosting services, real JS botnet webpage/malware operators have more than $9.5 a month to spend.

    Ha you think So? Some kids from hackforums.net dont have a penny to spend so come to forums like these to get a deal

    Dude, can you even read ?

    I definetly can but everyone that runs something illegal has a cover up. But Hey, Who am i to judge.

    If you can then you will know that the script I posted is clean. I posted the source code.
    And there are already 2 members here that say my code is clean. 1 of them actually the guy that posted the wrong decoded script (which consists a lot of exploit and such).

    @doghouch said:
    What developer uses base64 to obfuscate? It's super easy to decode FYI

    http://www.heypasteit.com/clip/0IIPE7

    This code is full of bullshit

    and then he decode it the right way

    @Falzo said:
    out of interest also had a look into this... using php to fiddle through the layers I got this as a result:

    https://pastebin.com/14fQyEG7

    you can use http://ddecode.com/hexdecoder/ to decode the hexcode to human readable function names which are given before the eval and then use those on the strings inside the eval...

    its not that complicated and there is really no key or magic involved, just work through 5 or 6 layers of base_decode/gzinflate/str_rot13 blah...

    so after all can confirm **that the initial code does not contain that kind of malware **which btw wouldn't fit in that few obfuscated lines from the beginning ;-)

    @doghouch said:
    and after replacing eval a few times, I was able to decode it fully. I got the same result as you, and I shoved it through a formatter to get the original script.

    And here is the full source code

    @yokowasis said:
    You mean the original version ?

    https://pastebin.com/ahuExFgD

    I guess, reading is overrated huh. Good for you.

Sign In or Register to comment.