0% found this document useful (0 votes)
11 views

The given base64 string

Uploaded by

Boniface Ibrahim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

The given base64 string

Uploaded by

Boniface Ibrahim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 1

The given base64 string decodes into PHP code that uses a series of encoding

techniques: base64_decode, strrev, gzinflate, gzuncompress, and eval.

Here’s a clear decoding process with well-structured explanations:


Step 1: Decode the Base64 String

The base64-decoded string is:

eval%28%26quot%3B%3F%26gt%3B%26quot%3B.gzuncompress%28gzuncompress%28gzinflate
%28gzinflate%28gzinflate%28base64_decode%28strrev%28%24Crime
%29%29%29%29%29%29%29%29%3B

Step 2: URL Decode the String

The %28, %3B, etc., represent URL-encoded characters. Use a URL decoder to convert
them into readable characters. The result is:

eval("?
>".gzuncompress(gzuncompress(gzinflate(gzinflate(gzinflate(base64_decode(strrev($Cr
ime))))))));

Step 3: Analyze the Decoded Code

strrev($Crime): Reverses the string stored in $Crime.


base64_decode: Decodes the reversed string as base64.
gzinflate and gzuncompress: Perform successive decompression.
eval: Executes the final result as PHP code.

Step 4: Extract the $Crime Value

The actual content of $Crime needs to be provided or extracted from the original
script. Without $Crime, the exact behavior cannot be reproduced.
Final Note

This script is an example of obfuscated/malicious PHP code. Proceed with caution


when analyzing or running such scripts. It’s best to execute it in a sandboxed
environment to avoid unintended

You might also like