Linux server.edchosting.com 4.18.0-553.79.1.lve.el7h.x86_64 #1 SMP Wed Oct 15 16:34:46 UTC 2025 x86_64
LiteSpeed
Server IP : 75.98.162.185 & Your IP : 216.73.216.163
Domains :
Cant Read [ /etc/named.conf ]
User : goons4good
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
lib /
python2.7 /
site-packages /
supervisor /
medusa /
Delete
Unzip
Name
Size
Permission
Date
Action
__init__.py
121
B
-rw-r--r--
2020-03-10 20:45
__init__.pyc
270
B
-rw-r--r--
2020-03-10 20:45
__init__.pyo
270
B
-rw-r--r--
2020-03-10 20:45
asynchat_25.py
10.5
KB
-rw-r--r--
2020-03-10 20:45
asynchat_25.pyc
8.86
KB
-rw-r--r--
2020-03-10 20:45
asynchat_25.pyo
8.86
KB
-rw-r--r--
2020-03-10 20:45
asyncore_25.py
16.37
KB
-rw-r--r--
2020-03-10 20:45
asyncore_25.pyc
17.67
KB
-rw-r--r--
2020-03-10 20:45
asyncore_25.pyo
17.64
KB
-rw-r--r--
2020-03-10 20:45
auth_handler.py
4.71
KB
-rw-r--r--
2020-03-10 20:45
auth_handler.pyc
4.55
KB
-rw-r--r--
2020-03-10 20:45
auth_handler.pyo
4.55
KB
-rw-r--r--
2020-03-10 20:45
counter.py
1.41
KB
-rw-r--r--
2020-03-10 20:45
counter.pyc
1.99
KB
-rw-r--r--
2020-03-10 20:45
counter.pyo
1.99
KB
-rw-r--r--
2020-03-10 20:45
default_handler.py
6.15
KB
-rw-r--r--
2020-03-10 20:45
default_handler.pyc
4.84
KB
-rw-r--r--
2020-03-10 20:45
default_handler.pyo
4.84
KB
-rw-r--r--
2020-03-10 20:45
filesys.py
11
KB
-rw-r--r--
2020-03-10 20:45
filesys.pyc
13.44
KB
-rw-r--r--
2020-03-10 20:45
filesys.pyo
13.44
KB
-rw-r--r--
2020-03-10 20:45
http_date.py
3.17
KB
-rw-r--r--
2020-03-10 20:45
http_date.pyc
3.35
KB
-rw-r--r--
2020-03-10 20:45
http_date.pyo
3.35
KB
-rw-r--r--
2020-03-10 20:45
http_server.py
28.45
KB
-rw-r--r--
2020-03-10 20:45
http_server.pyc
23.68
KB
-rw-r--r--
2020-03-10 20:45
http_server.pyo
23.68
KB
-rw-r--r--
2020-03-10 20:45
logger.py
7.83
KB
-rw-r--r--
2020-03-10 20:45
logger.pyc
10.71
KB
-rw-r--r--
2020-03-10 20:45
logger.pyo
10.71
KB
-rw-r--r--
2020-03-10 20:45
m_syslog.py
7.18
KB
-rw-r--r--
2020-03-10 20:45
m_syslog.pyc
3.9
KB
-rw-r--r--
2020-03-10 20:45
m_syslog.pyo
3.9
KB
-rw-r--r--
2020-03-10 20:45
medusa_gif.py
2.71
KB
-rw-r--r--
2020-03-10 20:45
medusa_gif.pyc
1.13
KB
-rw-r--r--
2020-03-10 20:45
medusa_gif.pyo
1.13
KB
-rw-r--r--
2020-03-10 20:45
producers.py
8.69
KB
-rw-r--r--
2020-03-10 20:45
producers.pyc
11.18
KB
-rw-r--r--
2020-03-10 20:45
producers.pyo
11.18
KB
-rw-r--r--
2020-03-10 20:45
status_handler.py
9.48
KB
-rw-r--r--
2020-03-10 20:45
status_handler.pyc
9.69
KB
-rw-r--r--
2020-03-10 20:45
status_handler.pyo
9.69
KB
-rw-r--r--
2020-03-10 20:45
xmlrpc_handler.py
2.88
KB
-rw-r--r--
2020-03-10 20:45
xmlrpc_handler.pyc
3.72
KB
-rw-r--r--
2020-03-10 20:45
xmlrpc_handler.pyo
3.72
KB
-rw-r--r--
2020-03-10 20:45
Save
Rename
# -*- Mode: Python -*- # # Author: Sam Rushing <rushing@nightmare.com> # Copyright 1996-2000 by Sam Rushing # All Rights Reserved. # RCS_ID = '$Id: auth_handler.py,v 1.6 2002/11/25 19:40:23 akuchling Exp $' # support for 'basic' authenticaion. import base64 try: from hashlib import md5 except ImportError: from md5 import new as md5 import re import string import sys import time import counter import default_handler get_header = default_handler.get_header import producers # This is a 'handler' that wraps an authorization method # around access to the resources normally served up by # another handler. # does anyone support digest authentication? (rfc2069) class auth_handler: def __init__ (self, dict, handler, realm='default'): self.authorizer = dictionary_authorizer (dict) self.handler = handler self.realm = realm self.pass_count = counter.counter() self.fail_count = counter.counter() def match (self, request): # by default, use the given handler's matcher return self.handler.match (request) def handle_request (self, request): # authorize a request before handling it... scheme = get_header (AUTHORIZATION, request.header) if scheme: scheme = scheme.lower() if scheme == 'basic': cookie = get_header (AUTHORIZATION, request.header, 2) try: decoded = base64.decodestring (cookie) except: sys.stderr.write('malformed authorization info <%s>\n' % cookie) request.error (400) return auth_info = decoded.split(':', 1) if self.authorizer.authorize (auth_info): self.pass_count.increment() request.auth_info = auth_info self.handler.handle_request (request) else: self.handle_unauthorized (request) #elif scheme == 'digest': # print 'digest: ',AUTHORIZATION.group(2) else: sys.stderr.write('unknown/unsupported auth method: %s\n' % scheme) self.handle_unauthorized(request) else: # list both? prefer one or the other? # you could also use a 'nonce' here. [see below] #auth = 'Basic realm="%s" Digest realm="%s"' % (self.realm, self.realm) #nonce = self.make_nonce (request) #auth = 'Digest realm="%s" nonce="%s"' % (self.realm, nonce) #request['WWW-Authenticate'] = auth #print 'sending header: %s' % request['WWW-Authenticate'] self.handle_unauthorized (request) def handle_unauthorized (self, request): # We are now going to receive data that we want to ignore. # to ignore the file data we're not interested in. self.fail_count.increment() request.channel.set_terminator (None) request['Connection'] = 'close' request['WWW-Authenticate'] = 'Basic realm="%s"' % self.realm request.error (401) def make_nonce (self, request): "A digest-authentication <nonce>, constructed as suggested in RFC 2069" ip = request.channel.server.ip now = str(long(time.time())) if now[-1:] == 'L': now = now[:-1] private_key = str (id (self)) nonce = ':'.join([ip, now, private_key]) return self.apply_hash (nonce) def apply_hash (self, s): "Apply MD5 to a string <s>, then wrap it in base64 encoding." m = md5() m.update (s) d = m.digest() # base64.encodestring tacks on an extra linefeed. return base64.encodestring (d)[:-1] def status (self): # Thanks to mwm@contessa.phone.net (Mike Meyer) r = [ producers.simple_producer ( '<li>Authorization Extension : ' '<b>Unauthorized requests:</b> %s<ul>' % self.fail_count ) ] if hasattr (self.handler, 'status'): r.append (self.handler.status()) r.append ( producers.simple_producer ('</ul>') ) return producers.composite_producer(r) class dictionary_authorizer: def __init__ (self, dict): self.dict = dict def authorize (self, auth_info): [username, password] = auth_info if (self.dict.has_key (username)) and (self.dict[username] == password): return 1 else: return 0 AUTHORIZATION = re.compile ( # scheme challenge 'Authorization: ([^ ]+) (.*)', re.IGNORECASE )