![]() |
Exactly. :)
|
I use this piece of PHP code to find base64 and other uglies that might have been injected or placed on my server.
Note: This will not look through your hooks, this looks through all the PHP files on your server. It'll most likely bring up a large list, so I recommend skimming through the list and finding anything that mentions base64_decode() Then open up that file and find the base64 string in it and decode it yourself with an online decoder or using the php base64_decode($string) Place this in your forum root and then navigate to it ( http://www.yourforumhere.com/base64-check.php best of luck: base64-check.php PHP Code:
|
All times are GMT. The time now is 08:49 AM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|