Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 11, Position 2 = 12 Branch analysis from position: 11 1 jumps found. (Code = 79) Position 1 = -2 Branch analysis from position: 12 1 jumps found. (Code = 42) Position 1 = 22 Branch analysis from position: 22 2 jumps found. (Code = 44) Position 1 = 28, Position 2 = 21 Branch analysis from position: 28 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 21 2 jumps found. (Code = 44) Position 1 = 28, Position 2 = 21 Branch analysis from position: 28 Branch analysis from position: 21 filename: /in/oDAEE function name: (null) number of ops: 32 compiled vars: !0 = $socket, !1 = $httpReq, !2 = $line line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 2 0 E > BEGIN_SILENCE ~3 1 INIT_FCALL 'fsockopen' 2 INIT_FCALL 'gethostbyname' 3 SEND_VAL 'www.google.com' 4 DO_ICALL $4 5 SEND_VAR $4 6 DO_ICALL $5 7 END_SILENCE ~3 8 ASSIGN !0, $5 3 9 BOOL_NOT ~7 !0 10 > JMPZ ~7, ->12 4 11 > > EXIT 'spojenie+vypadlo' 6 12 > ASSIGN !1, 'GET+%2F+HTTP%2F1.1%0A' 7 13 ASSIGN_OP 8 !1, 'Host%3A+www.google.com%0A' 8 14 ASSIGN_OP 8 !1, 'Accept%3A+%2A%2F%2A%0A' 9 15 ASSIGN_OP 8 !1, 'Kubo2Sniffer+1.0+%28%2Bhttp%3A%2F%2Fkubo2.wz.sk%29%0A%0A' 10 16 INIT_FCALL 'fwrite' 17 SEND_VAR !0 18 SEND_VAR !1 19 DO_ICALL 11 20 > JMP ->22 12 21 > ECHO !2 11 22 > INIT_FCALL 'fgets' 23 SEND_VAR !0 24 DO_ICALL $13 25 IS_NOT_IDENTICAL ~14 $13, '%0A%0A' 26 ASSIGN ~15 !2, ~14 27 > JMPNZ ~15, ->21 14 28 > INIT_FCALL 'fclose' 29 SEND_VAR !0 30 DO_ICALL 31 > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0