About the "PHP eggs" may be a lot of old phper already know or heard, as if it was early in the PHP4 version of the time there are eggs, very good fun, may have been gradually forgotten in recent years, in fact, the Easter egg function in PHP script engine is open by default.
Write a phpinfo (), then access, plus the following get value to check
Here is a Discuz official forum to do the test:
http://www.discuz.net/? =phpe9568f34-d428-11d2-a769-00aa001acf42
http://www.discuz.net/? =phpe9568f35-d428-11d2-a769-00aa001acf42
http://www.discuz.net/? =phpe9568f36-d428-11d2-a769-00aa001acf42
http://www.discuz.net/? =phpb8b5f2a0-3c92-11d3-a3a9-4c7b08c10000
The red part of the 4 links is the GUID value defined in the PHP source/ext/standard/info.h, as shown in the following figure
About the PHP egg This play has been used by some foreign web vulnerability scanners (for example, HP WebInspect) to detect what web development language the scanned web site uses. In fact, in the process of penetration testing often met some Web site is difficult to identify the use of what kind of web development language, because some sites using dynamic script to generate pure static HTML page or URL rewrite to achieve pseudo static page, if the site is using PHP development, you can try to use the detection of eggs, In many cases can be identified on the nail, because by default, the function of the eggs in the php.ini is open, of course, if you do not want to let others through the way of the eggs to get the sensitive information of the site, then in php.ini will expose_php = off!
Read above These may be some people will say since php.ini in expose_php = On, then grab the packet to look at the HTTP header information is not OK, but some large site Web servers are in front of the reverse proxy server, Therefore, it is not entirely dependent on capturing the information in the HTTP header.