Linux server.kiran-academy.com 3.10.0-1160.108.1.el7.x86_64 #1 SMP Thu Jan 25 16:17:31 UTC 2024 x86_64
Apache/2.4.57 (Unix) OpenSSL/1.0.2k-fips
: 194.233.91.196 | : 216.73.216.216
Cant Read [ /etc/named.conf ]
7.4.32
finalho
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
local /
cwpsrv /
var /
services /
roundcube /
bin /
[ HOME SHELL ]
Name
Size
Permission
Action
cleandb.sh
1.29
KB
-rwxr-xr-x
cssshrink.sh
1.65
KB
-rwxr-xr-x
decrypt.sh
2.67
KB
-rwxr-xr-x
deluser.sh
4.89
KB
-rwxr-xr-x
dumpschema.sh
2.96
KB
-rwxr-xr-x
gc.sh
1.62
KB
-rwxr-xr-x
indexcontacts.sh
1.3
KB
-rwxr-xr-x
initdb.sh
1.63
KB
-rwxr-xr-x
installto.sh
6.33
KB
-rwxr-xr-x
jsshrink.sh
2.06
KB
-rwxr-xr-x
makedoc.sh
537
B
-rwxr-xr-x
moduserprefs.sh
2.25
KB
-rwxr-xr-x
msgexport.sh
4.26
KB
-rwxr-xr-x
msgimport.sh
3.55
KB
-rwxr-xr-x
update.sh
11.94
KB
-rwxr-xr-x
updatecss.sh
3.66
KB
-rwxr-xr-x
updatedb.sh
1.7
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : decrypt.sh
#!/usr/bin/env php <?php /* +-----------------------------------------------------------------------+ | This file is part of the Roundcube Webmail client | | | | Copyright (C) The Roundcube Dev Team | | | | Licensed under the GNU General Public License version 3 or | | any later version with exceptions for skins & plugins. | | See the README file for a full license statement. | | | | PURPOSE: | | Decrypt the encrypted parts of the HTTP Received: headers | +-----------------------------------------------------------------------+ | Author: Tomas Tevesz <ice@extreme.hu> | +-----------------------------------------------------------------------+ */ /** * If http_received_header_encrypt is configured, the IP address and the * host name of the added Received: header is encrypted with 3DES, to * protect information that some could consider sensitve, yet their * availability is a must in some circumstances. * * Such an encrypted Received: header might look like: * * Received: from DzgkvJBO5+bw+oje5JACeNIa/uSI4mRw2cy5YoPBba73eyBmjtyHnQ== * [my0nUbjZXKtl7KVBZcsvWOxxtyVFxza4] * with HTTP/1.1 (POST); Thu, 14 May 2009 19:17:28 +0200 * * In this example, the two encrypted components are the sender host name * (DzgkvJBO5+bw+oje5JACeNIa/uSI4mRw2cy5YoPBba73eyBmjtyHnQ==) and the IP * address (my0nUbjZXKtl7KVBZcsvWOxxtyVFxza4). * * Using this tool, they can be decrypted into plain text: * * $ bin/decrypt.sh 'my0nUbjZXKtl7KVBZcsvWOxxtyVFxza4' \ * > 'DzgkvJBO5+bw+oje5JACeNIa/uSI4mRw2cy5YoPBba73eyBmjtyHnQ==' * 84.3.187.208 * 5403BBD0.catv.pool.telekom.hu * $ * * Thus it is known that this particular message was sent by 84.3.187.208, * having, at the time of sending, the name of 5403BBD0.catv.pool.telekom.hu. * * If (most likely binary) junk is shown, then * - either the encryption password has, between the time the mail was sent * and 'now', changed, or * - you are dealing with counterfeit header data. */ define('INSTALL_PATH', realpath(__DIR__ .'/..') . '/'); require INSTALL_PATH . 'program/include/clisetup.php'; if ($argc < 2) { die("Usage: " . basename($argv[0]) . " encrypted-hdr-part [encrypted-hdr-part ...]\n"); } $RCMAIL = rcube::get_instance(); for ($i = 1; $i < $argc; $i++) { printf("%s\n", $RCMAIL->decrypt($argv[$i])); };
Close