shell bypass 403

UnknownSec Shell

: /home/az2015/Maildir/new/ [ drwxrwx--- ]
Uname: Linux gains.arrowcloudlinux.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64
Software: Apache
PHP version: 7.4.33 [ PHP INFO ] PHP os: Linux
Server Ip: 131.153.51.35
Your Ip: 3.143.237.54
User: az2015 (2658) | Group: az2015 (2661)
Safe Mode: OFF
Disable Function:
allow_url_include,show_source,symlink,system, passthru, exec, popen, pclose, proc_open, proc_terminate, proc_get_status, proc_close, proc_nice, allow_url_fopen, shell-exec, shell_exec, fpassthru, base64_encodem, escapeshellcmd, escapeshellarg, crack_check, crack_closedict, crack_getlastmessage, crack_opendict, posix_kill, posix_mkfifo, posix_setpgid, posix_setsid, posix_setuid, dl, escap,phpinfo

name : 1678597730.M653113P18220.gains.arrowcloudlinux.com
Return-path: <>
Envelope-to: az2015@automationzone.co.in
Delivery-date: Sun, 12 Mar 2023 10:38:50 +0530
Received: from mail by gains.arrowcloudlinux.com with local (Exim 4.96-58-g4e9ed49f8)
	id 1pbDww-0004ji-1u
	for az2015@automationzone.co.in;
	Sun, 12 Mar 2023 10:38:50 +0530
X-Failed-Recipients: info@automationzone.co.in
Auto-Submitted: auto-replied
From: Mail Delivery System <Mailer-Daemon@gains.arrowcloudlinux.com>
To: az2015@automationzone.co.in
References: <E1pbDww-0004jS-1j@gains.arrowcloudlinux.com>
Content-Type: multipart/report; report-type=delivery-status; boundary=1678597730-eximdsn-1368235669
MIME-Version: 1.0
Subject: Mail delivery failed: returning message to sender
Message-Id: <E1pbDww-0004ji-1u@gains.arrowcloudlinux.com>
Date: Sun, 12 Mar 2023 10:38:50 +0530

--1678597730-eximdsn-1368235669
Content-type: text/plain; charset=us-ascii

This message was created automatically by mail delivery software.

A message that you sent could not be delivered to one or more of its
recipients. This is a permanent error. The following address(es) failed:

  info@automationzone.co.in
    

--1678597730-eximdsn-1368235669
Content-type: message/delivery-status

Reporting-MTA: dns; gains.arrowcloudlinux.com

Action: failed
Final-Recipient: rfc822;info@automationzone.co.in
Status: 5.0.0

--1678597730-eximdsn-1368235669
Content-type: message/rfc822

Return-path: <az2015@automationzone.co.in>
Received: from az2015 by gains.arrowcloudlinux.com with local (Exim 4.96-58-g4e9ed49f8)
	(envelope-from <az2015@automationzone.co.in>)
	id 1pbDww-0004jS-1j
	for info@automationzone.co.in;
	Sun, 12 Mar 2023 10:38:50 +0530
To: info@automationzone.co.in
Subject: Enquiry from Automation Zone
X-PHP-Originating-Script: 3901:contact.php
From: Automation Zone <info@automationzone.co.in>
Message-Id: <E1pbDww-0004jS-1j@gains.arrowcloudlinux.com>
Date: Sun, 12 Mar 2023 10:38:50 +0530

Enquiry Form

Name: Paulette Polson
Email: hacker@kaguhaku.or.jp
Subject: Your Website Is Vulnerable
Message: We are a group of highly qualified ethical hackers who scan tens of thousands of sites every day for critical vulnerabilities and patch them for a small fee.\r\n\r\nOn your site automationzone.co.in - we have discovered 5 critical vulnerabilities, each of which can give attackers full access to your site, databases and the server as a whole.\r\n\r\nPay $3000 (0.15 BTC) by visiting this site where you will be able to copy our bitcoin (btc) address or scan the QR code with your device https://www.blockchain.com/explorer/addresses/btc/3DmN4bUdArGvRtsNA54kdCP2bcudzBWoUY\r\n And after payment within 12 hours we will fix all the vulnerabilities on your site and you can sleep peacefully without worrying about the safety of your site and server.\r\n \r\nIf we are hired by well-known corporations, then we charge from $50000 for our services, so you are lucky that we offer you the same service for $3000 (0.15 BTC)


--1678597730-eximdsn-1368235669--
© 2024 UnknownSec