What is the encryption principle of phpjm.net?

Source: Internet
Author: User
For example, what is the encryption method www.phpjm.netencode.html? PHP files are garbled, and the file will not run as long as you modify the comments in the file. What is the principle? In addition, zhaoyuanma. comphpjm. php this thing can also crack the above encryption, the principle... such as the question of http://www.phpjm.net/encode.html this encryption method is what? PHP files are garbled, and the file will not run as long as you modify the comments in the file. What is the principle?

In addition, http://zhaoyuanma.com/phpjm.php this thing can also crack the above encryption, the principle is?

Out of question, is this... the legendary industry chain?

Reply content:

What is the encryption method like http://www.phpjm.net/encode.html? PHP files are garbled, and the file will not run as long as you modify the comments in the file. What is the principle?

In addition, http://zhaoyuanma.com/phpjm.php this thing can also crack the above encryption, the principle is?

Out of question, is this... the legendary industry chain?

Garbled section:

Https://segmentfault.com/q/1010000004145305/a-1020000004424387

The problem that the file cannot run normally after modification is:

After the code is executed, the header string is detected with get_file_contents (_ FILE.

In addition, such code encryption has two huge performance problems:

  1. Get_file_contents has at least one additional system I/O, resulting in high performance loss.

  2. Eval

It seems that the code is changed. (The variable name is garbled ......
What is base64 encryption?
I guess PHPJM _ the magic horse should be a special key ......
It is not actually encrypted. Let's wait for a more detailed introduction to this topic to verify my guess.

The encrypted geographic chart on behalf of Alibaba Cloud is just a kind of geographic chart, because it does not require external information during operation. The "encryption" provided is only for the hacker who steals the source code.

Therefore, during the operation, all agents will reveal their original shape (may change a bit, but wait for a while .), This is a common method to crack "encryption" of all agents.

In fact, there are two types of products: one is to allow the generation of images to be written, and the other is to prevent the generation from being written.

The former is more obfuscated, that is, when the external information generated during production is deleted, only necessary information is left. This change is irreversible (the obfuscation of instructions is the opposite, add extra characters, the amount of information may not change ).

The latter stores the token in other places, and the main program takes the source token for the token.

Where can I save it? A. Native data types, such as strings and data groups. B. Upload the c. Simple Upload File.

For php and non-generational mixed statements, they are stored in filesThe content is also stored in c.

As a result, the first question ends.

The second problem is that common words can be decrypted during operation based on the previous ideas. You can also crack the popular "encryption" solution.

As long as you study the "encrypted" files, most people will be able to write a pair of decryption keys, which is not a concern.

The third question is submitted to the internal author for further discussion.

I just guessed that the two websites may not be related to each other, and the technologies used by these websites are not quite new.

They are all about virus Trojans.

I don't know if the encryption is similar to the ZEND encryption.
It can be cracked. Because the operating mechanism of PHP itself determines that it cannot be encrypted and confused like. net or java.
When converting PHP to an intermediate code, it should be decrypted.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.