403Webshell
Server IP : 101.53.144.229  /  Your IP : 216.73.216.181
Web Server : Apache
System : Linux host.gdigitalindia.in 3.10.0-1160.119.1.el7.x86_64 #1 SMP Tue Jun 4 14:43:51 UTC 2024 x86_64
User : digitalshiksha ( 1179)
PHP Version : 5.6.40
Disable Function : eval,show_source,system,shell_exec,escapeshellarg,escapeshellcmd,proc_close,proc_open,ini_alter,dl,show_source,curl_multi_exechellcmd, ini_restore,apache_get_modules,get_cfg_var,passthru, exec ,proc_get_status,fpassthru,c999_buff_prepare,c999_sess_put,c99_buff_prepare,c99_sess_put,proc_close,ini_alter,dl,symlink,link,proc_close,ini_alter,dl,symlink,link,mail
MySQL : ON  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /var/softaculous/procwire/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /var/softaculous/procwire/update_pass.php
<?php

$salt_config = md5(mt_rand() . microtime(true));
echo $salt_db = '$2y$11$'.__randomBase64String(22);
echo '<SOFTACULOUS>';
echo $pass = substr(crypt('[[admin_pass]]' . '[[salt_config]]', $salt_db), 29);
		
function __randomBase64String($requiredLength = 22) {

	$buffer = '';
	$rawLength = (int) ($requiredLength * 3 / 4 + 1);
	$valid = false;

	if(function_exists('mcrypt_create_iv')) {
		$buffer = mcrypt_create_iv($rawLength, MCRYPT_DEV_URANDOM);
		if($buffer) $valid = true;
	}

	if(!$valid && function_exists('openssl_random_pseudo_bytes')) {
		$buffer = openssl_random_pseudo_bytes($rawLength);
		if($buffer) $valid = true;
	}

	if(!$valid || strlen($buffer) < $rawLength) {
		$bl = strlen($buffer);
		for($i = 0; $i < $rawLength; $i++) {
			if($i < $bl) {
				$buffer[$i] = $buffer[$i] ^ chr(mt_rand(0, 255));
			} else {
				$buffer .= chr(mt_rand(0, 255));
			}
		}
	}

	$salt = str_replace('+', '.', base64_encode($buffer));
	$salt = substr($salt, 0, $requiredLength);

	$salt .= $valid; 

	return $salt;
}

@unlink('update_pass.php');

?>

Youez - 2016 - github.com/yon3zu
LinuXploit