!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/sbin/   drwxr-xr-x
Free 52.59 GB of 127.8 GB (41.15%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     mount.ecryptfs (21.85 KB)      -rwxr-xr-x
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
ELF4R4 (444444==@@HHH  Ptd7Qtd/lib/ld-linux.so.2GNU	/ `/16|CEK8qXfUa{<=$ ! gK1<qC9E5(2'W-d4t9I+_V{XC}{a=j%]Ulm
h
MeMMpt
M#lbM{<$MK:5M45EM.WMhP1bM:M^M_p^+Mp7MSGMq5.bii
ii
ti	ii

$24748<@DHLP	T
X\`
dhlptx| !"#$%&'()*+,-.U5,%0%4h%8h%<h%@h%Dh %Hh(%Lh0%Ph8p%Th@`%XhHP%\hP@%`hX0%dh` %hhh%lhp%phx%th%xh%|h%h%h%h%h%hp%h`%hP%h@%h0%h %h%h%h%h%h%h%h%h %h(%h0%h8p%h@`%hHP%hP@%hX0%h` 1^PTRhhЩQVh0US[h3tX[ÐUS=u?-X9v&9w[]Ít&'Utt	$ÐUWVS,ɉUMtEt	EEt	UEtIEp4$4X$U\$t$$U؀8/utIEp4$X$yU\$t$$U؀8/]~~Q5EEE9uA9Eu
A9E9uϡD$KD$$تD$1,[^_]TD$!D$$D$XMtUt$UtUt$xEut,[^_]áD$!D$$D$뜋U\"$Vp4$Ut0t$\$$"Ut$D$-D$$$D$mt&UWVSÃtbt^$ED$$ۉt9D$,4$ËE|$4$D$u˃[^_]Ã1[^_]ÍvUWVS|]MM\$]$EEEEEE$E$E~UMD$T$$DEuEED$,4$Et	E d1U D$4$9uދ]t%E1fD$4$9tduMu_E=*$ecry@ptfs@_unl@ink_@sigs@D$E$E$yE$nE$cE$X|[^_]ËE!4$kt$ÉD$E$FM]EMUEL$T$$U$MɉMD$$EEEE7MtzEU\$)؉D$$+])]MUUD$,$uÃtuHeuM19M)EE6M,MD$'D$$TD$c$|uEuMEL$$EUD$D$ij$UEuoEEEt^UMT$$%uU,:t>D$EMD$#D$EL$$MU$K1뾋MʳMu
{EEEpED$س$t$.ED$$M\$D$E؉$sQE؉$E܉t$D$$N}EԉD$EE
D$<$EE1D$$D$KE$UD$D$$>M9u(:Au:Au:A9u:Au:Atk$}EЉ$QE܉$FE܉<$D$r$LLEЉ$E܉$UU}uM#EGlu1lulD$$D$D$D$$uu-e$D$$D$ZuM=uEMt$D$EL$$KD$$+D$ED$$D$EЉ$E܉$}\$D$ĭ$uuXeD$D$$D$Mл$E܉$yuM1iM9u(:Au:Au:AT)u:AuQ:AtntQ$]E܉|$D$$D$~MD$D$$OK}u-:AfuQ:u$uu	eut]M &L$qU}M]u1IM$&$VE$At'$?jM؋]u}]aÐ$E@ED$DD$$]E1ED$$UHuE?t
E躼eEGTEEoEpEpkEu1}ED$ED$ED$ED$E$$\$D$$D$$l$$Я$$4$d$x$lE
D$&D$$@D$D$tD$$D$E^wM|$E$Um}1)‰$ۉ\$D$$D$G$|z6D$hD$$BED$mD$E$^EED$!D$$D$nD$D$$D$I$$mUD$D$$UVSÃPueE1t$$uuEt$ECECEăeCEȉCẺCEЉCEԉCE؉C E܉C$EC(EC,EC0EC4EC8D$$Ue3uP[^]&U$Q
tÍɰ
ÍUWVS,EU}EeE1U܋U܋Z,iC(C$,GvCt$D$$D$2[(uD$D$X$D$<$D$F$
"! t€uҸ)D
}
teD$D$
D$<$AD$
<$$R
uv9}U܃Z,~[(uE1Ue3u",[^_]ø$&UXMeE1}}]ɉutc1;|;
t;]|ދU1tDt\;]~%UDUe3u_]u}]Ít&D܍Et$
t&Euu
z'U($@]}}uv	D$@$D$Ķ$D$D$@<$uf?D$޶$}D$D$@$t[D$RD$D$$&$D$@D$|$]u}]Ð\$<$8uO$$D$RD$|D$$
q$[t&'US$$]eE1S$GD$D$$$;D$D$H$D$D$h$D$D$0$vD$;$E
t*t%t&
tvu$밉ً! t€u҃)D
D$D$
D$$@wЋUe3u$[]v'UWVS\}eE1ED$M$D$$fMti1EE;u0E|0
uD0U1t+t?Ue3\[^_]ÍEt$
Euu$륋0
노둋UU$tt$$D$t$D$$&$|`U]ÍUWVS,}uD$g4$|$D$E$t5t)fD$uD$$,[^_]ËE$|$D$4$xJD$E$t?t3D$D$$,[^_][`E$YE@|$D$4$D$xD$E$$uE1ۉ$,[^_]Ðt&ҍ&'UWVS,]yfxX@ED$UBD$ED$D$E$xaE$D$E$|tc0u:E$aD$/$q1,[^_]$0D$uD$$5,[^_]ÐU]Ít&'UWVS^ME)E}Ut+1ƍED$ED$E$9}u߃[^_]Ë$ÐUStЋu[]US[ô`Y[Unable to allocate source buffer
Unable to allocate target buffer
Unable to find a list of options to parse, defaulting to interactive mount
Unable to allocate memory for options buffer
Unable to understand the mount options
Attempting to mount with the following options:Can't change ownership of sig file; errno = [%d]; [%m]
WARNING: Based on the contents of [%s],
it looks like you have never mounted with this key 
before. This could mean that you have typed your 
passphrase wrong.

Would you like to proceed with the mount (yes/no)? Would you like to append sig [%s] to
[%s] 
in order to avoid this warning in the futureError appending to [%s]; rc = [%d]. Aborting mount.
Successfully appended new sig to user sig cache fileNot adding sig to user sig cache file; continuing with mount.Error processing sig; rc = [%d]
Required mount option not provided: [%s]
Invalid mount options; aborting. rc = [%d]
Exiting. Unable to obtain passwd info
Exiting. Unable to mlockall address space: %m
Insufficient number of arguments
	eCryptfs mount helper
	usage: mount -t ecryptfs [lower directory] [ecryptfs mount point]

See the README file in the ecryptfs-utils package for complete usage guidelines.

Unable to get the version number of the kernelmodule. Please make sure that you have the eCryptfskernel module loaded, you have sysfs mounted, andthe sysfs mount point is in /etc/mtab. This isnecessary so that the mount helper knows which kernel options are supported.
Make sure that your system is set up to auto-load
your filesystem kernel module on mount.
Enabling passphrase-mode only for now.
Unable to link the KEY_SPEC_USER_KEYRING into the KEY_SPEC_SESSION_KEYRING; there is something wrong with your kernel keyring. Did you build key retention support into your kernel?Error attempting to evaluate mount options: [%d] %s
Check your system logs for details on why this happened.
Try updating your ecryptfs-utils package, and/or
submit a bug report on https://launchpad.net/ecryptfs
Error mounting eCryptfs: [%d] %s
Check your system logs; visit <http://launchpad.net/ecryptfs>
When are remounting eCryptfs, you need to pass the mount utility the -i parameter to avoid calling the mount helper
ecryptfs_enable_filename_crypto-oOut of memory
nosuidnodevnoexecrorwremount  %s
ecryptfs_sig=%s/.ecryptfs%s/.ecryptfs/sig-cache.txtyesno (yes/no)? Aborting mount.%s%c%secryptfs_unlink_sigsverboseno_sig_cacheno_promptwild_ass_guess%s,verbosity=0Try ``modprobe ecryptfs''Mounted eCryptfskey=cipher=ecryptfs_passthroughecryptfs_hmacecryptfs_xattrecryptfs_encrypted_viewsigverbosityxattr_userecryptfs_key_bytes=
The following PKI modules are available:
Select desired key module [%d]: %s: Failed to allocate memory
Invalid passphrase. Aborting mount.%s: Failed to read passphrase
Passphrase mismatch. Aborting mount-------------------------------	%d. Add passphrase key to keyring
	%d. Add public key to keyring
	%d. Generate new public/private keypair
	%i. %s

Error reading inputInvalid selection
	Mount-wide passphrase: 	Confirm passphrase: 	Using the default salt value
eCryptfs key management menu	%d. Exit

Make selection: %s: read_passphrase_salt%s/.ecryptfs/Error: %m
%s/.ecryptfs/pki/Error: %m%s/.ecryptfs/pki/%s/%s/.ecryptfs/pki/%s/%sEnable Plaintext Passthrough1YesNo; @`$<@\pt0p(H|pAB
AG8}AB
ADX	AB
F(x0D	FAB
RP AB
pAB
B0$AB
`AB
F AB
TK4uAB
PFTfAB
DpdAB
F`
AG
pbAB
FAB
Flibecryptfs.so.0__gmon_start___Jv_RegisterClassesecryptfs_process_decision_graphecryptfs_get_versionecryptfs_check_sigecryptfs_mount_fini_initstack_pop_valstack_pushecryptfs_append_sigecryptfs_validate_keyringecryptfs_verbositylibssl3.solibsmime3.solibnss3.solibnssutil3.solibkeyutils.so.1libgcrypt.so.11libgpg-error.so.0libdl.so.2libc.so.6_IO_stdin_used__rawmemchr__printf_chkexitstrncmpgetpwuidputs__stack_chk_failputcharmkdirstdinfgetscallocstrlenmemsetstrstr__errno_locationtcsetattrmlock__syslog_chk__fprintf_chkmemcpy__strtol_internalmunlockallmallocgetgidasprintfstderrgetuidchownfwritemlockallstrchrtcgetattr_IO_getcstrcmpstrerror__libc_start_mainfree_edata__bss_start_endGLIBC_2.1GLIBC_2.4GLIBC_2.3.4GLIBC_2.0libplc4.solibplds4.solibnspr4.solibpthread.so.0/lib/ld-linux.so.2
$5EWb
hoh\
(h$ oooDo0o,ooDpa?P :+òS0@9P^PչٳXAzFh`+Pv$вK0va]޲ӹC*_@<@hXҴɴ״G?pȷzz`e dP$T$\$x$p$b$$ j$ o<%i&0i&j& mp j,i00iPoĘ80_XY0Z0_4X8Y<0Z^^^^^_8_<_L______ܴdpb$ kص@!"4$xl j oԶ$iPԯLϯT@$l`j@#P& P䷅!%p%U@"$L%0i &0%$4 nDZ\Podp #jع mܹ#&b̿п0Կؿܿٳmount.ecryptfs.debugkHELF4H4 (444444\:\:@@HHH  Ptd7Qtd44HH !ohhH+300;oDDpHoPW		 `	$$	hi
d
o
uhh*{*j
7tt8@@@@$$A((AB GGG.shstrtab.interp.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rel.dyn.rel.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.ctors.dtors.jcr.dynamic.got.got.plt.data.bss.gnu_debuglink.dynbss.gnu.liblist.gnu.conflict.gnu.prelink_undo44HH !ohhH+o00,;oDDpHoPW		 `	$$	hi
d
o
uhh*{*j
7tt83\\:Z@@@@$$A((AB GGGDL8LD|Q

:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0058 ]--