403Webshell
Server IP : 66.29.132.122  /  Your IP : 18.191.42.234
Web Server : LiteSpeed
System : Linux business142.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
User : admazpex ( 531)
PHP Version : 7.2.34
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/softaculous/cpg/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/proc/self/root/proc/self/root/proc/self/root/var/softaculous/cpg//update_pass.php
<?php

@unlink('update_pass.php');

function __pbkdf2($algorithm, $password, $salt, $count, $key_length, $raw_output = false){

    if (function_exists("hash_pbkdf2")) {
        // The output length is in NIBBLES (4-bits) if $raw_output is false!
        if (!$raw_output) {
            $key_length = $key_length * 2;
        }
        return hash_pbkdf2($algorithm, $password, $salt, $count, $key_length, $raw_output);
    }

    $hash_length = strlen(hash($algorithm, "", true));
    $block_count = ceil($key_length / $hash_length);

    $output = "";
    for($i = 1; $i <= $block_count; $i++) {
        // $i encoded as 4 bytes, big endian.
        $last = $salt . pack("N", $i);
        // first iteration
        $last = $xorsum = hash_hmac($algorithm, $last, $password, true);
        // perform the other $count - 1 iterations
        for ($j = 1; $j < $count; $j++) {
            $xorsum ^= ($last = hash_hmac($algorithm, $last, $password, true));
        }
        $output .= $xorsum;
    }

    if($raw_output)
        return substr($output, 0, $key_length);
    else
        return bin2hex(substr($output, 0, $key_length));
}

$thumb_method = '';

if (function_exists("imagecreate") && function_exists("imagejpeg")) {
	
	$thumb_method  = 'gd2';
	
	$im = imagecreate(1, 1);	
	$tst_image = "[[softpath]]/albums/userpics/gd1.jpg";
	imagejpeg($im, $tst_image);
    $size = @getimagesize($tst_image);
    unlink($tst_image);
    $gd1_installed = ($size[2] == 2);

	$im = imagecreatetruecolor(1, 1);
    $tst_image = "[[softpath]]/albums/userpics/gd2.jpg";
	imagejpeg($im, $tst_image);
    $size = @getimagesize($tst_image);
    unlink($tst_image);
    $gd2_installed = ($size[2] == 2);
	
	if(!$gd2_installed && $gd1_installed){
		$thumb_method  = 'gd1';
	}
	
}

if (function_exists('random_bytes')) {
    	$vect = random_bytes(24);
    } else {
    	$vect = mcrypt_create_iv(24, MCRYPT_DEV_URANDOM);
    }
	
$salt = base64_encode($vect);

$resp = base64_encode(__pbkdf2("sha256", '[[admin_pass]]', $salt, 1000, 24, true));

echo $salt.'SOFTACULOUS'.$resp.'SOFTACULOUS'.$thumb_method;

?>

Youez - 2016 - github.com/yon3zu
LinuXploit