note
myocom
<p>This one's fairly simple, actually. There are really only two parts: An assignment to <code>$_</code> and a back-tick running of <code>$_</code>.</p>
<p>If you break down the first statement, you'll see it's two strings XOR'd together:</p>
<code>
$_ = '%#(/@*(((@!./((%)@+%),@(!#+%)@#/.' # The encrypted string
^ # XOR
'@@@@``][\`@@@\@@[`{@[@`@@@@@[~@@@' # The secret decoder ring
</code>
<p>So this ends up assigning <code>'echo Just another Perl hacker>con'</code> to <code>$_</code>. The second line, <code>`$_`</code> simply passes that to the shell and runs it, which will work fine on any Win32 system.</p>
54214
54274