3v4l.org

run code in 300+ PHP versions simultaneously
<?php $con = ssh2_connect('88.159.157.61'); if (ssh2_auth_password($con, 'pi', '$@#4wdfsdff')) { exit('fuck! er ging wat fout'); } ssh2_exec($con, 'screen -dmS music sh -c \'omxplayer --vol 0 -o local Jaap\\ Loonen\\ ft.\\ Piet\\ Tonie\\ -\\ De\\ Pepernoten\\ Samba.mp3\''); ?> <html> <head> <title>Hoi Teun!</title> </head> <body> <center> <h1>Hoor je wat?!</h1> <h3>Heb je het al gevonden?</h3> <form action="stop.php" method="post"> <input type="submit" value="Klik hier!" /> </form> </center> </body> </html>
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 10, Position 2 = 11
Branch analysis from position: 10
1 jumps found. (Code = 79) Position 1 = -2
Branch analysis from position: 11
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/69n91
function name:  (null)
number of ops:  17
compiled vars:  !0 = $con
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   INIT_FCALL_BY_NAME                                       'ssh2_connect'
          1        SEND_VAL_EX                                              '88.159.157.61'
          2        DO_FCALL                                      0  $1      
          3        ASSIGN                                                   !0, $1
    4     4        INIT_FCALL_BY_NAME                                       'ssh2_auth_password'
          5        SEND_VAR_EX                                              !0
          6        SEND_VAL_EX                                              'pi'
          7        SEND_VAL_EX                                              '%24%40%234wdfsdff'
          8        DO_FCALL                                      0  $3      
          9      > JMPZ                                                     $3, ->11
    5    10    > > EXIT                                                     'fuck%21+er+ging+wat+fout'
    8    11    >   INIT_FCALL_BY_NAME                                       'ssh2_exec'
         12        SEND_VAR_EX                                              !0
         13        SEND_VAL_EX                                              'screen+-dmS+music+sh+-c+%27omxplayer+--vol+0+-o+local+Jaap%5C+Loonen%5C+ft.%5C+Piet%5C+Tonie%5C+-%5C+De%5C+Pepernoten%5C+Samba.mp3%27'
         14        DO_FCALL                                      0          
   10    15        ECHO                                                     '%3Chtml%3E%0A%3Chead%3E%0A%3Ctitle%3EHoi+Teun%21%3C%2Ftitle%3E%0A%3C%2Fhead%3E%0A%3Cbody%3E%0A%3Ccenter%3E%0A%3Ch1%3EHoor+je+wat%3F%21%3C%2Fh1%3E%0A%3Ch3%3EHeb+je+het+al+gevonden%3F%3C%2Fh3%3E%0A%0A%3Cform+action%3D%22stop.php%22+method%3D%22post%22%3E%0A%3Cinput+type%3D%22submit%22+value%3D%22Klik+hier%21%22+%2F%3E%0A%3C%2Fform%3E%0A%3C%2Fcenter%3E%0A%3C%2Fbody%3E%0A%3C%2Fhtml%3E'
   24    16      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
154.26 ms | 1393 KiB | 13 Q