Linux premium71.web-hosting.com 4.18.0-513.11.1.lve.el8.x86_64 #1 SMP Thu Jan 18 16:21:02 UTC 2024 x86_64
LiteSpeed
Server IP : 198.187.29.8 & Your IP : 216.73.216.206
Domains :
Cant Read [ /etc/named.conf ]
User : cleahvkv
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
var /
softaculous /
zurmo /
Delete
Unzip
Name
Size
Permission
Date
Action
images
[ DIR ]
drwxr-xr-x
2024-03-06 00:23
php53
[ DIR ]
drwxr-xr-x
2024-03-06 00:23
php56
[ DIR ]
drwxr-xr-x
2024-03-06 00:23
php71
[ DIR ]
drwxr-xr-x
2024-03-06 00:23
php81
[ DIR ]
drwxr-xr-x
2024-03-06 00:23
upgrade
[ DIR ]
drwxr-xr-x
2024-03-06 00:23
clone.php
6.22
KB
-rw-r--r--
2022-09-21 09:18
debug.php
7.63
KB
-rw-r--r--
2021-12-23 11:54
edit.php
5.71
KB
-rw-r--r--
2022-09-21 09:18
edit.xml
433
B
-rw-r--r--
2021-12-23 11:54
extend.php
1.85
KB
-rw-r--r--
2022-09-21 09:18
fileindex.php
49
B
-rw-r--r--
2021-12-23 11:54
import.php
3.5
KB
-rw-r--r--
2022-09-21 09:18
info.xml
3.42
KB
-rw-r--r--
2022-09-21 08:18
install.js
924
B
-rw-r--r--
2021-12-23 11:54
install.php
9.62
KB
-rw-r--r--
2022-09-21 09:18
install.xml
507
B
-rw-r--r--
2021-12-23 11:54
md5
2.14
KB
-rw-r--r--
2022-09-21 09:18
notes.txt
1.06
KB
-rw-r--r--
2021-12-23 11:54
perInstance.php
3.86
KB
-rw-r--r--
2021-12-23 11:54
update_pass.php
2.13
KB
-rw-r--r--
2021-12-23 11:54
upgrade.php
9.45
KB
-rw-r--r--
2022-09-21 09:18
upgrade.xml
388
B
-rw-r--r--
2021-12-23 11:54
Save
Rename
<?php $resp = crypt(md5('[[admin_pass]]'), __genSalt()); echo '<update_pass>'.$resp.'</update_pass>'; function __genSalt($input = null) { if (!$input) { $input = __getRandomBytes(16); } $_identifier = '2y'; if (version_compare(PHP_VERSION, '5.3.7', '<')) { $_identifier = '2a'; } $_iterationCountLog2 = 12; // Hash identifier $identifier = $_identifier; // Cost factor - "4" to "04" $costFactor = chr(ord('0') + $_iterationCountLog2 / 10); $costFactor .= chr(ord('0') + $_iterationCountLog2 % 10); // Salt string $salt = __encode64($input, 16); // $II$CC$SSSSSSSSSSSSSSSSSSSSSS return '$' . $identifier . '$' . $costFactor . '$' . $salt; } function __encode64($input, $count){ $output = ''; $i = 0; $_itoa64 = './ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789'; do { $c1 = ord($input[$i++]); $output .= $_itoa64[$c1 >> 2]; $c1 = ($c1 & 0x03) << 4; if ($i >= $count) { $output .= $_itoa64[$c1]; break; } $c2 = ord($input[$i++]); $c1 |= $c2 >> 4; $output .= $_itoa64[$c1]; $c1 = ($c2 & 0x0f) << 2; $c2 = ord($input[$i++]); $c1 |= $c2 >> 6; $output .= $_itoa64[$c1]; $output .= $_itoa64[$c2 & 0x3f]; } while (1); return $output; } function __getRandomBytes($count){ if (!is_int($count) || $count < 1) { //throw new InvalidArgumentException('Argument must be a positive integer'); } // Try OpenSSL's random generator if (function_exists('openssl_random_pseudo_bytes')) { $strongCrypto = false; $output = openssl_random_pseudo_bytes($count, $strongCrypto); if ($strongCrypto && strlen($output) == $count) { return $output; } } // Try reading from /dev/urandom, if present $output = ''; if (is_readable('/dev/urandom') && ($fh = fopen('/dev/urandom', 'rb'))) { $output = fread($fh, $count); fclose($fh); } // Fall back to a locally generated "random" string if (strlen($output) < $count) { $_randomState = microtime(); $output = ''; for ($i = 0; $i < $count; $i += 16) { $_randomState = md5(microtime() . $_randomState); $output .= md5($_randomState, true); } $output = substr($output, 0, $count); } return $output; } @unlink('update_pass.php'); ?>