Software: Apache/2.2.3 (CentOS). PHP/5.1.6 uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44 uid=48(apache) gid=48(apache) groups=48(apache) Safe-mode: OFF (not secure) /usr/libexec/webmin/wuftpd/help/ drwxr-xr-x |
Viewing file: anon.html (1.71 KB) -rw-r--r-- Select action/file-type: (+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) | Because the server calls external programs like ls and tar, the anonymous root directory must contain a bin directory with those programs, a lib directory containing any shared libraries needed, an an etc directory containing passwd and group files. When the server uses chroot to limit access to the anonymous root directory, it cannot access any programs outside that directory. The second table controls which directory the server will chroot to for guest users. For each directory, you can specify which users this directory will apply to by entering usernames, UIDs (like %3000) or UID ranges (like %3000-3006). If no users are entered, the directory is used for all guest users. The third table allows you to control which Unix group anonymous FTP users will be switched to, instead of the primary group for the ftp user. For each group entered you can choose one or more user classes, for example to grant access to certain files to anonymous users from certain IP addresses. Finally, the bottom section of the page has inputs to control what passwords are acceptable for anonymous FTP logins. Traditionally, FTP users should send a valid email address as their anonymous login password.
|
:: Command execute :: | |
:: Shadow's tricks :D :: | |
Useful Commands
|
:: Preddy's tricks :D :: | |
Php Safe-Mode Bypass (Read Files)
|
--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0108 ]-- |