⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.50
Server IP:
41.128.143.86
Server:
Linux host.raqmix.cloud 6.8.0-1025-azure #30~22.04.1-Ubuntu SMP Wed Mar 12 15:28:20 UTC 2025 x86_64
Server Software:
Apache
PHP Version:
8.3.23
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
proc
/
self
/
root
/
usr
/
share
/
psa-pear
/
pear
/
View File Name :
imp-bounce-spam
#!/usr/bin/env php * @category Horde * @license http://www.horde.org/licenses/gpl GPL * @package IMP */ $baseFile = __DIR__ . '/../lib/Application.php'; if (file_exists($baseFile)) { require_once $baseFile; } else { require_once 'PEAR/Config.php'; require_once PEAR_Config::singleton() ->get('horde_dir', null, 'pear.horde.org') . '/imp/lib/Application.php'; } Horde_Registry::appInit('imp', array( 'authentication' => false, 'cli' => true )); /** Configuration **/ /** * Location of the bounce template. * The following strings will be replaced in the template: * %TO% - The spammer's e-mail address. * %TARGET% - The target's e-mail address. */ $bounce_template = IMP_BASE . '/config/bounce.txt'; /** End Configuration **/ /* If there's no bounce template file then abort */ if (!is_readable($bounce_template)) { $cli->fatal('Bounce template does not exist.'); } /* Read the message content. */ $data = $cli->readStdin(); /* Who's the spammer? */ $headers = Horde_Mime_Headers::parseHeaders($data); $return_path = $headers->getOb('return-path'); /* Who's the target? */ $delivered_to = $headers->getOb('delivered-to'); /* Read the bounce template and construct the mail */ $bounce = str_replace( array('%TO%', '%TARGET%'), array($return_path[0]->bare_address, $delivered_to[0]->bare_address), file_get_contents($bounce_template) ); /* Send the mail */ $sendmail = "/usr/sbin/sendmail -t -f ''"; $fd = popen($sendmail, 'w'); fputs($fd, preg_replace("/\n$/", "\r\n", $bounce . $data)); pclose($fd);