Linux br942.hostgator.com.br 4.19.286-203.ELK.el7.x86_64 #1 SMP Wed Jun 14 04:33:55 CDT 2023 x86_64
Apache
: 162.241.2.188 | : 13.58.121.29
Cant Read [ /etc/named.conf ]
8.2.22
manoe678
May The Force Be With You
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
MASS DEFACE
+ Create Folder
+ Create File
/
var /
softaculous /
moodle38 /
[ HOME SHELL ]
Name
Size
Permission
Action
images
[ DIR ]
drwxr-xr-x
languages
[ DIR ]
drwxr-xr-x
php53
[ DIR ]
drwxr-xr-x
php56
[ DIR ]
drwxr-xr-x
php71
[ DIR ]
drwxr-xr-x
php81
[ DIR ]
drwxr-xr-x
php82
[ DIR ]
drwxr-xr-x
NOTES.txt
1.63
KB
-rw-r--r--
add_admin.php
733
B
-rw-r--r--
check_utf8.php
5.88
KB
-rw-r--r--
clone.php
5.47
KB
-rw-r--r--
config.php
745
B
-rw-r--r--
edit.php
5.68
KB
-rw-r--r--
edit.xml
433
B
-rw-r--r--
fileindex.php
945
B
-rw-r--r--
import.php
7.51
KB
-rw-r--r--
info.xml
3.37
KB
-rw-r--r--
install.js
924
B
-rw-r--r--
install.php
19.85
KB
-rw-r--r--
install.xml
2.57
KB
-rw-r--r--
md5
4.26
KB
-rw-r--r--
privatekey.php
786
B
-rw-r--r--
update_pass.php
3.17
KB
-rw-r--r--
upgrade.php
8.34
KB
-rw-r--r--
upgrade.xml
307
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : update_pass.php
<?php $resp = __password_hash('[[admin_pass]]', 1, array()); echo '<update_pass>'.$resp.'</update_pass>'; function __password_hash($password, $algo, array $options = array()) { global $error; if (!function_exists('crypt')) { $error[] = "Crypt must be loaded for password_hash to function"; return null; } if (!is_string($password)) { $error[] = "password_hash(): Password must be a string"; return null; } if (!is_int($algo)) { $error[] = "password_hash() expects parameter 2 to be long, " . gettype($algo) . " given"; return null; } switch ($algo) { case 1: // Note that this is a C constant, but not exposed to PHP, so we don't define it here. $cost = 10; if (isset($options['cost'])) { $cost = $options['cost']; if ($cost < 4 || $cost > 31) { $error[] = "password_hash(): Invalid bcrypt cost parameter specified: ".$cost; return null; } } $required_salt_len = 22; $hash_format = sprintf("$2y$%02d$", $cost); break; default: $error[] = "password_hash(): Unknown password hashing algorithm: ".$algo; return null; } if (isset($options['salt'])) { switch (gettype($options['salt'])) { case 'NULL': case 'boolean': case 'integer': case 'double': case 'string': $salt = (string) $options['salt']; break; case 'object': if (method_exists($options['salt'], '__tostring')) { $salt = (string) $options['salt']; break; } case 'array': case 'resource': default: $error[] = 'password_hash(): Non-string salt parameter supplied'; return null; } if (strlen($salt) < $required_salt_len) { $error[] = "password_hash(): Provided salt is too short: ".strlen($salt)." expecting ".$required_salt_len; return null; } elseif (0 == preg_match('#^[a-zA-Z0-9./]+$#D', $salt)) { $salt = str_replace('+', '.', base64_encode($salt)); } } else { $buffer = ''; $raw_length = (int) ($required_salt_len * 3 / 4 + 1); $buffer_valid = false; if (function_exists('mcrypt_create_iv')) { $buffer = mcrypt_create_iv($raw_length, MCRYPT_DEV_URANDOM); if ($buffer) { $buffer_valid = true; } } if (!$buffer_valid && function_exists('openssl_random_pseudo_bytes')) { $buffer = openssl_random_pseudo_bytes($raw_length); if ($buffer) { $buffer_valid = true; } } if (!$buffer_valid && file_exists('/dev/urandom')) { $f = @fopen('/dev/urandom', 'r'); if ($f) { $read = strlen($buffer); while ($read < $raw_length) { $buffer .= fread($f, $raw_length - $read); $read = strlen($buffer); } fclose($f); if ($read >= $raw_length) { $buffer_valid = true; } } } if (!$buffer_valid || strlen($buffer) < $raw_length) { $bl = strlen($buffer); for ($i = 0; $i < $raw_length; $i++) { if ($i < $bl) { $buffer[$i] = $buffer[$i] ^ chr(mt_rand(0, 255)); } else { $buffer .= chr(mt_rand(0, 255)); } } } $salt = str_replace('+', '.', base64_encode($buffer)); } $salt = substr($salt, 0, $required_salt_len); $hash = $hash_format . $salt; $ret = crypt($password, $hash); if (!is_string($ret) || strlen($ret) <= 13) { return false; } return $ret; } // We do not need this file any more unlink('update_pass.php'); ?>
Close