Software: Apache/2.2.3 (CentOS). PHP/5.1.6 uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44 uid=48(apache) gid=48(apache) groups=48(apache) Safe-mode: OFF (not secure) /var/www/html/alumni/ drwxrwxrwx |
Viewing file: imgCode.php (3.77 KB) -rw-r--r-- Select action/file-type: (+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) | (GPLv2) or write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA02110-1301, USA. ********************************************************************************/ if (isset($_GET['name']) AND !eregi("[^0-9a-zA-Z_-]",$_GET['name'])) { $session_name = @$_GET['name']; header("Content-type: image/png"); $width = 180; $height = 50; $im = @imagecreate($width,$height); $bg = imagecolorallocate($im,255,255,255); //Background $colorG = imagecolorallocate($im,rand(200,255),rand(200,255),rand(200,255)); $grey = imagecolorallocate($im,180,180,180); $rx = 0; //Common bg for ($a=0;$a<=5;$a++) { $rx += 35; $x = $rx+rand(-10,5); if ($x>145) { $x = 145; } $y = rand(30,60); $color = imagecolorallocate($im,rand(100,200),rand(100,200),rand(100,200)); imageline($im,rand(0,179),rand(0,49),rand(0,179),rand(0,49),$color); imageline($im,rand(0,179),rand(0,49),rand(0,179),rand(0,49),$color); imageline($im,rand(0,179),rand(0,49),rand(0,179),rand(0,49),$color); } $gdinfo = @gd_info(); if ($gdinfo['FreeType Support']) { $chars = array(); for ($i=1;$i<=5;$i++) { $chars[] = randStr(1); } //Bg $rx = -20; foreach ($chars as $ch) { $rx += 35; $x = $rx+rand(-10,5); if ($x>145) { $x = 145; } $y = rand(30,60); $size = rand(20,70); $angle = rand(-20,20); $font = "inc/fonts/1.ttf"; imagettftext($im,$size+rand(-20,20),$angle+rand(-20,20),$x+rand(-20,20),$y+rand(-20,20),$colorG,$font,$ch); } //Text $chars = array(); for ($i=1;$i<=5;$i++) { $chars[] = randStr(1); } $text = ""; $rx = -20; foreach ($chars as $ch) { $rx += 35; $x = $rx+rand(-10,5); if ($x>145) { $x = 145; } $y = 45; $size = rand(30,50); $angle = rand(-20,20); $text .= $ch; $font = "inc/fonts/1.ttf"; $color = imagecolorallocate($im,rand(0,200),rand(0,200),rand(0,200)); imagettftext($im,$size,$angle,$x,$y,$color,$font,$ch); } } else { //Text $chars = array(); for ($i=1;$i<=5;$i++) { $chars[] = randStr(1); } $text = ""; $rx = -20; foreach ($chars as $ch) { $rx += 35; $x = $rx+rand(-10,5); if ($x>170) { $x = 170; } $y = rand(1,25); $text .= $ch; $color = imagecolorallocate($im,rand(0,200),rand(0,200),rand(0,200)); imagestring($im,5,$x-1,$y-1,$ch,$white); imagestring($im,5,$x+1,$y+1,$ch,$white); imagestring($im,5,$x,$y,$ch,$color); } imagestring($im, 3, 66, 36,"FailSafe CAPTCHA", $bg); imagestring($im, 3, 67, 37,"FailSafe CAPTCHA", $grey); } imagerectangle($im,0,0,179,49,$grey); //--------------------------------------------- @session_start(); $_SESSION[$session_name] = $text; //--------------------------------------------- imagepng($im); imagedestroy($im); } function randStr($length) { $key = ""; $pattern = "23456789AbCdEFgHikLmNPqRsTuVwXyZ"; for($i=0;$i<$length;$i++) { $key .= $pattern{rand(0,31)}; } return $key; } ?> |
:: Command execute :: | |
:: Shadow's tricks :D :: | |
Useful Commands
|
:: Preddy's tricks :D :: | |
Php Safe-Mode Bypass (Read Files)
|
--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0054 ]-- |