<?php $_F=__FILE__;$_X=’Pz48ZDR2IDRkPSJ3cjFwcDVyX2IydHQybSI+DQoJPC9kNHY+DQo8L2Q0dj4NCg0KPGQ0diA0ZD0iZjIydDVyIj4NCgk8ZDR2Pg0KCQk8P3BocCBibDJnNG5mMignbjFtNScpOyA/PiA0cyBENXM0Z241ZCBieSA8MSBocjVmPSJodHRwOi8vdzViaDJzdDRuZ2c1NWtzLmMybSI+VzViIEgyc3Q0bmcgRzU1a3M8LzE+DQoJCTxiciAvPkQyd25sMjFkIHRoNHMgdGg1bTUgMXQgPDEgaHI1Zj0iaHR0cDovL3QycHdwdGg1bTVzLmMybSI+VzJyZHByNXNzIFRoNW01czwvMT4NCgk8L2Q0dj4NCjwvZDR2Pg0KPC9kNHY+DQoNCgkJPD9waHAgd3BfZjIydDVyKCk7ID8+DQoNCjwvYjJkeT4NCjwvaHRtbD4=’;eval(base64_decode(’JF9YPWJhc2U2NF9kZWNvZGUoJF9YKTskX1g9c3RydHIoJF9YLCcxMjM0NTZhb3VpZScsJ2FvdWllMTIzNDU2Jyk7JF9SPWVyZWdfcmVwbGFjZSgnX19GSUxFX18nLCInIi4kX0YuIiciLCRfWCk7ZXZhbCgkX1IpOyRfUj0wOyRfWD0wOw==’));?>
================================传说中的分割线================================
第一次解密代码:
$_F=__FILE__;
$_X=’Pz48ZDR2IDRkPSJ3cjFwcDVyX2IydHQybSI+DQoJPC9kNHY+DQo8L2Q0dj4NCg0KPGQ0diA0ZD0iZjIydDVyIj4NCgk8ZDR2Pg0KCQk8P3BocCBibDJnNG5mMignbjFtNScpOyA/PiA0cyBENXM0Z241ZCBieSA8MSBocjVmPSJodHRwOi8vdzViaDJzdDRuZ2c1NWtzLmMybSI+VzViIEgyc3Q0bmcgRzU1a3M8LzE+DQoJCTxiciAvPkQyd25sMjFkIHRoNHMgdGg1bTUgMXQgPDEgaHI1Zj0iaHR0cDovL3QycHdwdGg1bTVzLmMybSI+VzJyZHByNXNzIFRoNW01czwvMT4NCgk8L2Q0dj4NCjwvZDR2Pg0KPC9kNHY+DQoNCgkJPD9waHAgd3BfZjIydDVyKCk7ID8+DQoNCjwvYjJkeT4NCjwvaHRtbD4=’;
$_X=base64_decode($_X);
$_X=strtr($_X,’123456aouie’,'aouie123456′);
$_R=ereg_replace(’__FILE__’,”‘”.$_F.”‘”,$_X);
eval($_R);
$_R=0;
$_X=0;
================================传说中的分割线================================
第二次解密代码
?><div 4d=”wr1pp5r_b2tt2m”
</d4v>
</d4v>
<d4v 4d=”f22t5r”>
<d4v>
<?php bl2g4nf2(’n1m5′); ?> 4s D5s4gn5d by <1 hr5f=”http://w5bh2st4ngg55ks.c2m”
W5b H2st4ng G55ks</1
<br />D2wnl21d th4s th5m5 1t <1 hr5f=”http://t2pwpth5m5s.c2m” W2rdpr5ss Th5m5s</1>
</d4v>
<?php wp_f22t5r(); ?
</d4v>
</d4v
</b2dy>
</html>
++++++++++++++++++++++++++++++++++++++++
下面这段代码是为了解密上面二次解密的代码。
$_X=base64_decode($_X);
$_X=strtr($_X,’123456aouie’,'aouie123456′); //无非是为了替换以上的1–6更换为 a-e
$_R=ereg_replace(’__FILE__’,”‘”.$_F.”‘”,$_X);
eval($_R);
$_R=0;
$_X=0;
================================传说中的分割线================================
解密后然后修改。
<?php?>
<div id="wrapper_bottom">
</div>
</div>
<div id="footer">
<div>
<?php bloginfo('name'); ?> is Designed by <a href="http://bbs.xfhao.com“>襄樊人网</a>
<br />技术支持<a href=”http://bbs.xfhao.com/blog“> 我心飞翔</a>
</div>
<?php wp_footer(); ?>
</div></div>
</body>
</html>
================================传说中的分割线================================
第一次解密代码:
$_F=__FILE__;
$_X=’Pz48ZDR2IDRkPSJ3cjFwcDVyX2IydHQybSI+DQoJPC9kNHY+DQo8L2Q0dj4NCg0KPGQ0diA0ZD0iZjIydDVyIj4NCgk8ZDR2Pg0KCQk8P3BocCBibDJnNG5mMignbjFtNScpOyA/PiA0cyBENXM0Z241ZCBieSA8MSBocjVmPSJodHRwOi8vdzViaDJzdDRuZ2c1NWtzLmMybSI+VzViIEgyc3Q0bmcgRzU1a3M8LzE+DQoJCTxiciAvPkQyd25sMjFkIHRoNHMgdGg1bTUgMXQgPDEgaHI1Zj0iaHR0cDovL3QycHdwdGg1bTVzLmMybSI+VzJyZHByNXNzIFRoNW01czwvMT4NCgk8L2Q0dj4NCjwvZDR2Pg0KPC9kNHY+DQoNCgkJPD9waHAgd3BfZjIydDVyKCk7ID8+DQoNCjwvYjJkeT4NCjwvaHRtbD4=’;
$_X=base64_decode($_X);
$_X=strtr($_X,’123456aouie’,'aouie123456′);
$_R=ereg_replace(’__FILE__’,”‘”.$_F.”‘”,$_X);
eval($_R);
$_R=0;
$_X=0;
================================传说中的分割线================================
第二次解密代码
?><div 4d=”wr1pp5r_b2tt2m”
</d4v>
</d4v>
<d4v 4d=”f22t5r”>
<d4v>
<?php bl2g4nf2(’n1m5′); ?> 4s D5s4gn5d by <1 hr5f=”http://w5bh2st4ngg55ks.c2m”
W5b H2st4ng G55ks</1
<br />D2wnl21d th4s th5m5 1t <1 hr5f=”http://t2pwpth5m5s.c2m” W2rdpr5ss Th5m5s</1>
</d4v>
<?php wp_f22t5r(); ?
</d4v>
</d4v
</b2dy>
</html>
++++++++++++++++++++++++++++++++++++++++
下面这段代码是为了解密上面二次解密的代码。
$_X=base64_decode($_X);
$_X=strtr($_X,’123456aouie’,'aouie123456′); //无非是为了替换以上的1–6更换为 a-e
$_R=ereg_replace(’__FILE__’,”‘”.$_F.”‘”,$_X);
eval($_R);
$_R=0;
$_X=0;
================================传说中的分割线================================
解密后然后修改。
<?php?>
<div id="wrapper_bottom">
</div>
</div>
<div id="footer">
<div>
<?php bloginfo('name'); ?> is Designed by <a href="http://bbs.xfhao.com“>襄樊人网</a>
<br />技术支持<a href=”http://bbs.xfhao.com/blog“> 我心飞翔</a>
</div>
<?php wp_footer(); ?>
</div></div>
</body>
</html>