Beispiel #1
0
* @copyright (c) 2008 Icy Phoenix
* @license http://opensource.org/licenses/gpl-license.php GNU Public License
*
*/

define('IN_LOGIN', true);
define('IN_ICYPHOENIX', true);
if (!defined('IP_ROOT_PATH')) define('IP_ROOT_PATH', './');
if (!defined('PHP_EXT')) define('PHP_EXT', substr(strrchr(__FILE__, '.'), 1));
include(IP_ROOT_PATH . 'common.' . PHP_EXT);
include(IP_ROOT_PATH . 'includes/auth_db.' . PHP_EXT);

if (!class_exists('ct_database'))
{
	include(IP_ROOT_PATH . 'includes/ctracker/classes/class_ct_database.' . PHP_EXT);
	$ctracker_config = new ct_database();
}

// Start session management
$user->session_begin();
$auth->acl($user->data);
$user->setup();
// End session management

// If a bot gets redirected here is almost due to an error or a wrong page management... let's output an Error 404 code
if (!empty($user->data['is_bot']))
{
	redirect(append_sid(CMS_PAGE_ERRORS . '?code=404', true));
}

// session id check
Beispiel #2
0
* @since 16.07.2006 - 02:07:51
* @copyright (c) 2006 www.cback.de
*
*/
if (!defined('IN_ICYPHOENIX')) {
    die('Hacking attempt!');
}
/*
* We check if the user has activated the IP and Hostname Blocker.
* If so we use our ct_database class to load the Blocklist from the
* Database in an array and check if someone who was blocked is in the list.
*/
if ($config['ctracker_ipblock_enabled']) {
    if (!class_exists('ct_database')) {
        include IP_ROOT_PATH . 'includes/ctracker/classes/class_ct_database.' . PHP_EXT;
        $ctracker_config = new ct_database();
    }
    // Fetch Blocklist from Database
    $ctracker_config->unset_blocklist_verbose();
    $ctracker_config->load_blocklist();
    // Fetch IP UserAgent and Remote Host
    $ct_client_ip = $user_ip;
    $ct_user_agent = $_SERVER['HTTP_USER_AGENT'];
    $ct_remote_host = $_SERVER['REMOTE_HOST'];
    /*
     * Now we check if IP Adress, UserAgent or RemoteHost of the User
     * is blocked by CrackerTracker. You can use the Joker "*" to match
     * all expressions between 2 Words (adjustable in ACP)
     */
    for ($i = 0; $i < $ctracker_config->blocklist_count; $i++) {
        /*
Beispiel #3
0
if (!empty($setmodules)) {
    $filename = basename(__FILE__);
    $module['1610_Users']['210_Ban_Management'] = $filename;
    return;
}
// Load default header
if (!defined('IP_ROOT_PATH')) {
    define('IP_ROOT_PATH', './../');
}
if (!defined('PHP_EXT')) {
    define('PHP_EXT', substr(strrchr(__FILE__, '.'), 1));
}
require 'pagestart.' . PHP_EXT;
if (!class_exists('ct_database')) {
    include IP_ROOT_PATH . 'includes/ctracker/classes/class_ct_database.' . PHP_EXT;
    $ctracker_config = new ct_database();
}
// Start program
if (isset($_POST['submit'])) {
    $user_bansql = '';
    $email_bansql = '';
    $ip_bansql = '';
    $user_list = array();
    $username = request_var('username', '', true);
    $username = htmlspecialchars_decode($username, ENT_COMPAT);
    if (!empty($username)) {
        $this_userdata = get_userdata($username, true);
        if (!$this_userdata) {
            if (!defined('STATUS_404')) {
                define('STATUS_404', true);
            }