- 01
- 02
- 03
- 04
- 05
- 06
- 07
- 08
- 09
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
<?
if(!defined('Hacking')) { die('Hacking attempt!'); exit;}
$database_user_name="demo";
$database_password="demo";
$database_name="demo";
$display_errors = false;
$AdminEmail="[email protected]";
$bpref="demo";
$domenname="demo";
function connect_db()
{
global $database_user_name, $database_password;
$db=mysql_connect("localhost",$database_user_name,$database_password) or die ("Could not connect");
mysql_query("SET NAMES cp1251") or die("Invalid query: " .mysql_error());
return $db;
}
function db_name()
{
global $database_name;
$db_name=$database_name;
return $db_name;
}
function get_now()
{
$db=connect_db();
$db_name=db_name();
mysql_select_db($db_name,$db);
$sql="select now() as now";
$result=mysql_query($sql,$db);
$myrow=mysql_fetch_array($result);
$now=$myrow["now"];
return $now;
}
function puterror($message)
{
echo("<p>$message</p>");
exit();
}
foreach($_GET as $chexss) {
if((eregi("<[^>]*script[^>]*>", $chexss)) || (eregi("<[^>]*object[^>]*>", $chexss)) ||
(eregi("<[^>]*iframe[^>]*>", $chexss)) || (eregi("<[^>]*applet[^>]*>", $chexss)) ||
(eregi("<[^>]*meta[^>]*>", $chexss)) || (eregi("<[^>]*style[^>]*>", $chexss)) ||
(eregi("<[^>]*form[^>]*>", $chexss)) || (eregi("\([^>][^)]*\)", $chexss)) ||
(eregi("<[^>]*frameset[^>]*>", $chexss)) || (eregi("<[^>]*onmouseover[^>]*>", $chexss)) ||
(eregi("<[^>]*img[^>]*>", $chexss)) || (eregi("\"", $chexss)) || (eregi("'", $chexss))){
die("Попытка ХАКА !");
}
}
$zzzz = html_entity_decode(urldecode($_SERVER['QUERY_STRING']));
if ($zzzz) {
if ((strpos($zzzz, '<') !== false) ||
(strpos($zzzz, '>') !== false) ||
(strpos($zzzz, '"') !== false) ||
(strpos($zzzz, './') !== false) ||
(strpos($zzzz, '../') !== false) ||
(strpos($zzzz, '\'') !== false) ||
(strpos($zzzz, '.pl') !== false) ||
(strpos($zzzz, '.php') !== false))
{
die("Попытка ХАКА !");
}
}
$zamena_b = array( "\x27", "\x22", "\x60", "\t",'\n','\r', '\\', "'","¬","#",";","~","[","]","{","}","=","-","+",")","(","*","&","^","%","$","<",">","?","!",".pl", ".php",'"' );
$_GET = str_replace($zamena_b, '', $_GET);
$_POST = str_replace($zamena_b, '', $_POST);
$_SESSION = str_replace($zamena_b, '', $_SESSION);
$_COOKIE = str_replace($zamena_b, '', $_COOKIE);
$_ENV = str_replace($zamena_b, '', $_ENV);
$_FILES = str_replace($zamena_b, '', $_FILES);
$_REQUEST = str_replace($zamena_b, '', $_REQUEST);
$_SERVER = str_replace($zamena_b, '', $_SERVER);
?>
Просторы интернета богаты... Так вот люди работают с СУБД
Vasiliy 30.06.2011 15:34 # +2
wvxvw 30.06.2011 16:33 # +7
rO_ot 30.06.2011 17:30 # +3
guest 01.07.2011 09:43 # +1
substr 01.07.2011 10:40 # 0
sonic 30.06.2011 22:56 # +5
die('Hacking attempt!'); exit; return; throw 1; system('shutdown -h NOW');
что-то точно должно сработать
sectus 04.07.2011 03:37 # 0
guest 30.06.2011 23:57 # 0
JeremyW 01.07.2011 15:56 # 0
LegionDead 01.07.2011 16:38 # −2
Lure Of Chaos 03.07.2011 15:00 # 0
смело
bugmenot 03.07.2011 15:44 # 0