diff options
| author | jvoisin | 2016-12-08 11:56:15 +0100 |
|---|---|---|
| committer | jvoisin | 2016-12-08 11:56:15 +0100 |
| commit | dbbb60842f045f4c706b7c734f1c5e03a2f69a62 (patch) | |
| tree | f55c82074d6eb92dc206dc5a0ed0d27e86c9bc8c | |
| parent | 98b1d99081414b3ad882aea30f1869608eb20757 (diff) | |
Remove a broken test
| -rwxr-xr-x | php-malware-finder/tests.sh | 2 |
1 files changed, 0 insertions, 2 deletions
diff --git a/php-malware-finder/tests.sh b/php-malware-finder/tests.sh index c973196..4f1c765 100755 --- a/php-malware-finder/tests.sh +++ b/php-malware-finder/tests.sh | |||
| @@ -35,7 +35,6 @@ run_test freepbx.php '0x31d:$execution: system(base64_decode' | |||
| 35 | 35 | ||
| 36 | # Classic shells | 36 | # Classic shells |
| 37 | run_test classic/ajaxshell.php 'DodgyStrings' | 37 | run_test classic/ajaxshell.php 'DodgyStrings' |
| 38 | run_test classic/ajaxshell.php 'Websites' | ||
| 39 | run_test classic/ajaxshell.php '0x23e2:$: shell_exec' | 38 | run_test classic/ajaxshell.php '0x23e2:$: shell_exec' |
| 40 | run_test classic/ajaxshell.php "0x16e0:\$ini_get: ini_get('safe_mode" | 39 | run_test classic/ajaxshell.php "0x16e0:\$ini_get: ini_get('safe_mode" |
| 41 | run_test classic/ajaxshell.php "0x17f1:\$ini_get: ini_get('open_basedir" | 40 | run_test classic/ajaxshell.php "0x17f1:\$ini_get: ini_get('open_basedir" |
| @@ -92,7 +91,6 @@ run_test artificial/bypasses.php "0x132:\$var_as_func: \$_POST\['funct'\](" | |||
| 92 | run_test real/sucuri_2014_04.php '0x67:$execution3:' | 91 | run_test real/sucuri_2014_04.php '0x67:$execution3:' |
| 93 | run_test real/novahot.php 'DodgyStrings' | 92 | run_test real/novahot.php 'DodgyStrings' |
| 94 | run_test real/guidtz.php '0x12d8:$non_printables:' | 93 | run_test real/guidtz.php '0x12d8:$non_printables:' |
| 95 | run_test real/guidtz.php 'NonPrintableChars' | ||
| 96 | 94 | ||
| 97 | # Asp files | 95 | # Asp files |
| 98 | run_test_asp classic/cmdasp.asp 'DodgyStrings' | 96 | run_test_asp classic/cmdasp.asp 'DodgyStrings' |
