hackluck.com fucked ! 2015 2016 --- code as we all can tell its fake as hell !! hacked by dr.web hacker ! ksa -yemen hacker groupm! Session_Exception [ 1 ]: Error reading session data. SYSPATH/classes/kohana/session.php [ 326 ] 321 } 322 catch (Exception $e) 323 { 324 // Error reading the session, usually 325 // a corrupt session. 326 throw new Session_Exception('Error reading session data.', NULL, Session_Exception::SESSION_CORRUPT); 327 } 328 329 if (is_array($data)) 330 { 331 // Load the data locally SYSPATH/classes/kohana/session.php [ 125 ] » Kohana_Session->read(arguments) 120 // Enable or disable encryption of data 121 $this->_encrypted = $config['encrypted']; 122 } 123 124 // Load the session 125 $this->read($id); 126 } 127 128 /** 129 * Session object is rendered to a serialized string. If encryption is 130 * enabled, the session will be encrypted. If not, the output string will MODPATH/database/classes/kohana/session/database.php [ 74 ] » Kohana_Session->__construct(arguments) 69 { 70 // Overload column names 71 $this->_columns = $config['columns']; 72 } 73 74 parent::__construct($config, $id); 75 76 if (mt_rand(0, $this->_gc) === $this->_gc) 77 { 78 // Run garbage collection 79 // This will average out to run once every X requests SYSPATH/classes/kohana/session.php [ 54 ] » Kohana_Session_Database->__construct(arguments) 49 50 // Set the session class name 51 $class = 'Session_'.ucfirst($type); 52 53 // Create a new session instance 54 Session::$instances[$type] = $session = new $class($config, $id); 55 56 // Write the session at shutdown 57 register_shutdown_function(array($session, 'write')); 58 } 59 APPPATH/classes/model/victim.php [ 76 ] » Kohana_Session::instance(arguments) 71 } 72 } 73 //храним в сессии 74 else { 75 $driver = 'session'; 76 $session = Session::instance('database'); 77 $hack_id = $session->get('id', 0); 78 $user_id = 0; 79 } 80 81 return $hack_id; APPPATH/classes/model/victim.php [ 10 ] » Model_Victim::current() 5 /** 6 * Сам процесс 7 */ 8 public static function process() { 9 //храним в бд 10 $hack_id = Model_Victim::current(); 11 12 if ($hack_id != 0) { 13 //получаем данные о текущем взломе 14 $hack = ORM::factory('victim', $hack_id); 15 APPPATH/bootstrap.php [ 138 ] » Model_Victim::process() DOCROOT/index.php [ 102 ] » require(arguments) 97 { 98 define('KOHANA_START_MEMORY', memory_get_usage()); 99 } 100 101 // Bootstrap the application 102 require APPPATH.'bootstrap'.EXT; 103 104 /** 105 * Execute the main request. A source of the URI can be passed, eg: $_SERVER['PATH_INFO']. 106 * If no source is specified, the URI will be automatically detected. 107 */ Environment