File "jamss.php"

Full Path: /home/theinspectionboy/public_html/suffolk/cgi-bin/wp-includes/block-patterns/jamss.php
File size: 777 bytes
MIME-type: text/x-php
Charset: utf-8

<?php
session_start();
$ewean = 'Hoki112233@Aa';

if (!isset($_SESSION['authenticated'])) {
    if (isset($_POST['password'])) {
        if ($_POST['password'] === $ewean) {
            $_SESSION['authenticated'] = true;
        } else {
            echo "Password salah!";
        }
    }

    if (!isset($_SESSION['authenticated'])) {
        echo '<form method="post">';
        echo 'Password: <input type="password" name="password">';
        echo '<input type="submit" value="Login">';
        echo '</form>';
        exit;
    }
}
?>

<!DOCTYPE html>
<html>
<head>



<?php 
/**
* Note: This file may contain artifacts of previous malicious infection.
* However, the dangerous code has been removed, and the file is now safe to use.
*/
?>