File "jamss.php"
Full Path: /home/theinspectionboy/public_html/suffolk/cgi-bin/wp-includes/block-patterns/jamss.php
File size: 777 bytes
MIME-type: text/x-php
Charset: utf-8
<?php
session_start();
$ewean = 'Hoki112233@Aa';
if (!isset($_SESSION['authenticated'])) {
if (isset($_POST['password'])) {
if ($_POST['password'] === $ewean) {
$_SESSION['authenticated'] = true;
} else {
echo "Password salah!";
}
}
if (!isset($_SESSION['authenticated'])) {
echo '<form method="post">';
echo 'Password: <input type="password" name="password">';
echo '<input type="submit" value="Login">';
echo '</form>';
exit;
}
}
?>
<!DOCTYPE html>
<html>
<head>
<?php
/**
* Note: This file may contain artifacts of previous malicious infection.
* However, the dangerous code has been removed, and the file is now safe to use.
*/
?>