|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
Raizlabs Decode Request |
|
Posted: Thu Jun 20, 2013 9:42 pm |
|
|
hbrown |
Beginner |
|
|
Joined: Jun 21, 2013 |
Posts: 2 |
|
|
|
|
|
|
|
Hi
I have tried the tool kit but it didn't work for me, also tried some other sites ;-(.
If anyone can decode this it will be appreciated.
Thanks.
Code: |
<?php /* This file encoded by Raizlabs PHP Obfuscator http://www.raizlabs.com/software */ ?>
<?php global $R15588C7EBA5F096B1F26E8C48661D97C; $R15588C7EBA5F096B1F26E8C48661D97C = $this->licenseKey; function F8A76ED4F28C33A75F41E730A1F64DCF4() { global $R15588C7EBA5F096B1F26E8C48661D97C; return $R15588C7EBA5F096B1F26E8C48661D97C; } function FC718EAC1D5F164063CBA5FB022329FC7($RD7A9632D7A0B3B4AC99AAFB2107A2613) { $RD48CAD37DBDD2B2F8253B59555EFBE03 = strtoupper(trim($RD7A9632D7A0B3B4AC99AAFB2107A2613)); $R47E2D9D6C31AD7310705A05265D3E341 = str_replace('www.',"",$RD48CAD37DBDD2B2F8253B59555EFBE03); $R2A2A42AA26E792048E2B27B7D3B76864 = explode('.', $R47E2D9D6C31AD7310705A05265D3E341); $RD48CAD37DBDD2B2F8253B59555EFBE03 = substr($R2A2A42AA26E792048E2B27B7D3B76864[count($R2A2A42AA26E792048E2B27B7D3B76864)-2],0,38); return $RD48CAD37DBDD2B2F8253B59555EFBE03; } function FCE74825B5A01C99B06AF231DE0BD667D($RD7A9632D7A0B3B4AC99AAFB2107A2613) { $RD7A9632D7A0B3B4AC99AAFB2107A2613 = FC718EAC1D5F164063CBA5FB022329FC7($RD7A9632D7A0B3B4AC99AAFB2107A2613); $RB5719367F67DC84F064575F4E19A2606 = F8A76ED4F28C33A75F41E730A1F64DCF4(); $RFDFD105B00999E2642068D5711B49D5D = substr($RD7A9632D7A0B3B4AC99AAFB2107A2613, 0, 3); $RA6CC906CDD1BAB99B7EB044E98D68FAE = substr($RD7A9632D7A0B3B4AC99AAFB2107A2613, -3,3); $R8439A88C56A38281A17AE2CE034DB5B7 = substr($RB5719367F67DC84F064575F4E19A2606, 0, 3); $R254A597F43FF6E1BE7E3C0395E9409D4 = substr($RB5719367F67DC84F064575F4E19A2606, 3, 3); $RDE2A352768EABA0E164B92F7ACA37DEE = substr($RB5719367F67DC84F064575F4E19A2606, -3,3); $R254A597F43FF6E1BE7E3C0395E9409D4 = FCE67EB692054EBB3F415F8AF07562D82($R254A597F43FF6E1BE7E3C0395E9409D4, 3); $RDE2A352768EABA0E164B92F7ACA37DEE = FCE67EB692054EBB3F415F8AF07562D82($RDE2A352768EABA0E164B92F7ACA37DEE, 3); $R705EE0B4D45EEB1BC55516EB53DF7BCE = array('A' => 1, 'B' => 2, 'C' => 3, 'D' => 4, 'E' => 5, 'F' => 6, 'G' => 7, 'H' => 8, 'I' => 9, 'J' => 10,'K' => 11,'L' => 12, 'M' => 13,'N' => 14,'O' => 15,'P' => 16,'Q' => 17,'R' => 18, 'S' => 19,'T' => 20,'U' => 21,'V' => 22,'W' => 23,'X' => 24, 'Y' => 25,'Z' => 26,'1' => 1, '2' => 2, '3' => 3, '4' => 4, '5' => 5, '6' => 6, '7' => 7, '8' => 8, '9' => 9); $RA7B9A383688A89B5498FC84118153069 = mb_strlen($RD7A9632D7A0B3B4AC99AAFB2107A2613); $RA5694D3559F011A29A639C0B10305B51 = 0; for ($RA09FE38AF36F6839F4A75051DC7CEA25 = 0; $RA09FE38AF36F6839F4A75051DC7CEA25 < $RA7B9A383688A89B5498FC84118153069; $RA09FE38AF36F6839F4A75051DC7CEA25++) { $RF5687F6BBE9EC10202A32FA6C037D42B = mb_substr($RD7A9632D7A0B3B4AC99AAFB2107A2613, $RA09FE38AF36F6839F4A75051DC7CEA25, 1); $RA5694D3559F011A29A639C0B10305B51 = $RA5694D3559F011A29A639C0B10305B51 + $R705EE0B4D45EEB1BC55516EB53DF7BCE[$RF5687F6BBE9EC10202A32FA6C037D42B]; } if($RA5694D3559F011A29A639C0B10305B51 != ($R8439A88C56A38281A17AE2CE034DB5B7 - 5)) return false; else if(strcmp($RFDFD105B00999E2642068D5711B49D5D,$R254A597F43FF6E1BE7E3C0395E9409D4) != 0) return false; else if(strcmp($RA6CC906CDD1BAB99B7EB044E98D68FAE,$RDE2A352768EABA0E164B92F7ACA37DEE) != 0) return false; else return true; } function FCE67EB692054EBB3F415F8AF07562D82($R8409EAA6EC0CE2EA307354B2E150F8C2, $R68EAF33C4E51B47C7219F805B449C109) { $RF413F06AEBBCEF5E1C8B1019DEE6FE6B = strrev($R8409EAA6EC0CE2EA307354B2E150F8C2); return $RF413F06AEBBCEF5E1C8B1019DEE6FE6B; } $RD7A9632D7A0B3B4AC99AAFB2107A2613 = strtoupper(trim($_SERVER['HTTP_HOST'])); if($RD7A9632D7A0B3B4AC99AAFB2107A2613 == '192.168.0.11' || $RD7A9632D7A0B3B4AC99AAFB2107A2613 == 'LOCALHOST' || $RD7A9632D7A0B3B4AC99AAFB2107A2613 == '127.0.0.1') { ; }else if(!FCE74825B5A01C99B06AF231DE0BD667D($RD7A9632D7A0B3B4AC99AAFB2107A2613)) { $RCD176D3F23CDF64CF3AF123DB7453523 = ConfigUrl::base().'index/invalidlicence'; header("Location: $RCD176D3F23CDF64CF3AF123DB7453523"); exit; } ?>
|
|
|
|
|
|
|
|
|
|
Posted: Fri Jun 21, 2013 12:18 am |
|
|
myg3nx |
Advanced user |
|
|
Joined: Jun 01, 2013 |
Posts: 72 |
Location: indonesia |
|
|
|
|
|
|
that technique just obfuscate the variable into unknown word... you can try by refactoring/construc all variable and function repeatly by your self.
use notepad++ (or other refactoring tool) to make your homework easly... |
|
|
|
|
Posted: Fri Jun 21, 2013 9:15 am |
|
|
hbrown |
Beginner |
|
|
Joined: Jun 21, 2013 |
Posts: 2 |
|
|
|
|
|
|
|
|
|
|
|
www.waraxe.us Forum Index -> PHP script decode requests
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|