!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/usr/bin/   drwxr-xr-x
Free 52.29 GB of 127.8 GB (40.92%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     ecryptfs-mount-private (2.03 KB)      -rwxr-xr-x
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
#!/bin/sh -e # This script mounts a user's confidential private folder # # Original by Michael Halcrow, IBM # Extracted to a stand-alone script by Dustin Kirkland # # This script: # * interactively prompts for a user's wrapping passphrase (defaults to their # login passphrase) # * checks it for validity # * unwraps a users mount passphrase with their supplied wrapping passphrase # * inserts the mount passphrase into the keyring # * and mounts a user's encrypted private folder PRIVATE_DIR="Private" WRAPPING_PASS="LOGIN" PW_ATTEMPTS=3 MESSAGE="Enter your login passphrase: " if [ -f $HOME/.ecryptfs/wrapping-independent ]; then # use a wrapping passphrase different from the login passphrase WRAPPING_PASS="INDEPENDENT" MESSAGE="Enter your wrapping passphrase: " fi WRAPPED_PASSPHRASE_FILE="$HOME/.ecryptfs/wrapped-passphrase" MOUNT_PASSPHRASE_SIG_FILE="$HOME/.ecryptfs/$PRIVATE_DIR.sig" # First, silently try to perform the mount, which would succeed if the appropriate # key is available in the keyring if /sbin/mount.ecryptfs_private >/dev/null 2>&1; then exit 0 fi # Otherwise, interactively prompt for the user's password if [ -f "$WRAPPED_PASSPHRASE_FILE" -a -f "$MOUNT_PASSPHRASE_SIG_FILE" ]; then tries=0 stty_orig=`stty -g` while [ $tries -lt $PW_ATTEMPTS ]; do echo -n "$MESSAGE" stty -echo LOGINPASS=`head -n1` stty $stty_orig echo if printf "%s\0" "$LOGINPASS" | ecryptfs-insert-wrapped-passphrase-into-keyring "$WRAPPED_PASSPHRASE_FILE" - ; then break else echo "ERROR: Your passphrase is incorrect" tries=$(($tries + 1)) continue fi done if [ $tries -ge $PW_ATTEMPTS ]; then echo "ERROR: Too many incorrect password attempts, exiting" exit 1 fi /sbin/mount.ecryptfs_private else echo "ERROR: Encrypted $PRIVATE_DIR is not setup properly" exit 1 fi if grep -qs "$HOME/.Private $PWD ecryptfs " /proc/mounts 2>/dev/null; then echo echo "INFO: Your private directory has been mounted." echo "INFO: To see this change in your current shell:" echo " cd $PWD" echo fi exit 0

:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0051 ]--