403Webshell
Server IP : 66.29.132.122  /  Your IP : 18.189.192.220
Web Server : LiteSpeed
System : Linux business142.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
User : admazpex ( 531)
PHP Version : 7.2.34
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/softaculous/mahara/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/var/softaculous/mahara/update_pass.php
<?php

$resp = __encrypt_password('[[admin_pass]]', '[[salt]]', '$2a$' . '12' . '$', '[[passwordsaltmain]]');
echo '<update_pass>'.$resp.'</update_pass>';

function __encrypt_password($password, $salt='', $alg='$6$', $sitesalt='') {
	if ($salt == '') {
		$salt = substr(md5(rand(1000000, 9999999)), 2, 8);
	}
	if ($alg == '$6$') { // $6$ is the identifier for the SHA512 algorithm
		// Return a hash which is sha512(originalHash, salt), where original is sha1(salt + password)
		$password = sha1($salt . $password);
		// Generate a salt based on a supplied salt and the passwordsaltmain
		$fullsalt = substr(md5($sitesalt . $salt), 0, 16); // SHA512 expects 16 chars of salt
	}
	else { // This is most likely bcrypt $2a$, but any other algorithm can take up to 22 chars of salt
		// Generate a salt based on a supplied salt and the passwordsaltmain
		$fullsalt = substr(md5($sitesalt . $salt), 0, 22); // bcrypt expects 22 chars of salt
	}
	$hash = crypt($password, $alg . $fullsalt);
	// Strip out the computed salt
	// We strip out the salt hide the computed salt (in case the sitesalt was used which isn't in the database)
	$hash = substr($hash, 0, strlen($alg)) . substr($hash, strlen($alg)+strlen($fullsalt));
	return $hash;
}

@unlink('update_pass.php');
?>

Youez - 2016 - github.com/yon3zu
LinuXploit