Linux server60.web-hosting.com 4.18.0-513.24.1.lve.1.el8.x86_64 #1 SMP Thu May 9 15:10:09 UTC 2024 x86_64
LiteSpeed
: 198.54.116.118 | : 3.144.222.209
Cant Read [ /etc/named.conf ]
8.1.29
eterygua
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
home /
eterygua /
[ HOME SHELL ]
Name
Size
Permission
Action
.cagefs
[ DIR ]
drwxrwx--x
.cl.selector
[ DIR ]
drwxr-xr-x
.clwpos
[ DIR ]
drwx------
.cpanel
[ DIR ]
drwx------
.cphorde
[ DIR ]
drwx------
.googleapps
[ DIR ]
drwxr-xr-x
.htpasswds
[ DIR ]
drwxr-x---
.nc_plugin
[ DIR ]
drwx--x--x
.pkexec
[ DIR ]
drwxr-xr-x
.pki
[ DIR ]
drwxr-----
.razor
[ DIR ]
drwxr-xr-x
.softaculous
[ DIR ]
drwx--x--x
.spamassassin
[ DIR ]
drwx------
.subaccounts
[ DIR ]
drwx------
.trash
[ DIR ]
drwx------
GCONV_PATH=.
[ DIR ]
drwxr-xr-x
etc
[ DIR ]
drwxr-x---
logs
[ DIR ]
drwx------
lscache
[ DIR ]
drwxrws---
mail
[ DIR ]
drwxr-x--x
perl5
[ DIR ]
drwxrwxr-x
public_ftp
[ DIR ]
drwxr-x---
public_html
[ DIR ]
drwxr-x---
ssl
[ DIR ]
drwxr-xr-x
tmp
[ DIR ]
drwxr-xr-x
www
[ DIR ]
drwxr-x---
.bash_history
120
B
-rw-------
.bash_logout
18
B
-rw-r--r--
.bash_profile
176
B
-rw-r--r--
.bashrc
124
B
-rw-r--r--
.contactemail
17
B
-rw-r-----
.dns
20
B
-rw-rw-r--
.gemrc
139
B
-rw-r--r--
.last.inodes
2.24
KB
-rw-r--r--
.lastlogin
580
B
-rw-------
.mad-root
0
B
-rw-r--r--
.myimunify_id
102
B
-rw-rw----
.spamassassinboxenable
0
B
-rw-r--r--
.spamassassinenable
0
B
-rw-r--r--
.spbldr_localStorage
83
B
-rw-------
.zshrc
658
B
-rw-r--r--
pwnkit
10.99
KB
-rwxr-xr-x
scan_report_2024-06-19.txt
907
B
-rw-r--r--
scanreport-eterygua-Aug_19_202...
3.52
KB
-rw-r--r--
scanreport-eterygua-May_25_202...
4.21
KB
-rw-r--r--
scanreport-eterygua-Nov_02_202...
4.28
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : scanreport-eterygua-Aug_19_2024_15h18m.txt
----------- SCAN REPORT ----------- TimeStamp: Mon, 19 Aug 2024 15:18:19 -0400 (/usr/sbin/cxs --background --clamdsock /var/clamd --dbreport --defapache nobody --doptions Mv --exploitscan --nofallback --filemax 50000 --noforce --html --ignore /etc/cxs/cxs.ignore.manual --options mMOLfSGchexdnwZDRru --noprobability --qoptions Mv --report /home/eterygua/scanreport-eterygua-Aug_19_2024_15h18m.txt --sizemax 1000000 --ssl --summary --sversionscan --timemax 30 --unofficial --user eterygua --virusscan --vmrssmax 2000000 --waitscan 0 --xtra /etc/cxs/cxs.xtra.manual) Scanning /home/eterygua: '/home/eterygua/.nc_plugin/hidden' # World writeable directory '/home/eterygua/public_html/ucenwsoshell.php' # Universal decode regex match = [universal decoder] # Decode regex match = [decode regex: 1] '/home/eterygua/public_html/.well-known/ucenwsoshell.php' # Universal decode regex match = [universal decoder] # Decode regex match = [decode regex: 1] '/home/eterygua/public_html/.well-known/pki-validation/mah.php' # Decode regex match = [decode regex: 1] # (decoded file [depth: 1]) Decode regex match = [decode regex: 1] # (decoded file [depth: 2]) ClamAV detected virus = [{HEX}php.cpanel.d0mains.388.UNOFFICIAL] '/home/eterygua/public_html/PHPMailer/ucenwsoshell.php' # Universal decode regex match = [universal decoder] # Decode regex match = [decode regex: 1] '/home/eterygua/public_html/admin/ucenwsoshell.php' # Universal decode regex match = [universal decoder] # Decode regex match = [decode regex: 1] '/home/eterygua/public_html/admin/assets/fonts/lock360_php.php' # Universal decode regex match = [universal decoder] '/home/eterygua/public_html/cgi-bin/ucenwsoshell.php' # Universal decode regex match = [universal decoder] # Decode regex match = [decode regex: 1] '/home/eterygua/public_html/css/ucenwsoshell.php' # Universal decode regex match = [universal decoder] # Decode regex match = [decode regex: 1] '/home/eterygua/public_html/czz/ucenwsoshell.php' # Universal decode regex match = [universal decoder] # Decode regex match = [decode regex: 1] '/home/eterygua/public_html/fonts/ucenwsoshell.php' # Universal decode regex match = [universal decoder] # Decode regex match = [decode regex: 1] '/home/eterygua/public_html/img/ucenwsoshell.php' # Universal decode regex match = [universal decoder] # Decode regex match = [decode regex: 1] '/home/eterygua/public_html/includes/mah.php' # Decode regex match = [decode regex: 1] # (decoded file [depth: 1]) Decode regex match = [decode regex: 1] # (decoded file [depth: 2]) ClamAV detected virus = [{HEX}php.cpanel.d0mains.388.UNOFFICIAL] '/home/eterygua/public_html/includes/ucenwsoshell.php' # Universal decode regex match = [universal decoder] # Decode regex match = [decode regex: 1] '/home/eterygua/public_html/js/ucenwsoshell.php' # Universal decode regex match = [universal decoder] # Decode regex match = [decode regex: 1] '/home/eterygua/public_html/js/vendor/ucenwsoshell.php' # Universal decode regex match = [universal decoder] # Decode regex match = [decode regex: 1] '/home/eterygua/public_html/vendor/ucenwsoshell.php' # Universal decode regex match = [universal decoder] # Decode regex match = [decode regex: 1] '/home/eterygua/public_html/vendor/stripe/stripe-php/lib/lock360_php.php' # Universal decode regex match = [universal decoder] ----------- SCAN SUMMARY ----------- Scanned directories: 445 Scanned files: 3801 Ignored items: 42 Suspicious matches: 35 Viruses found: 2 Fingerprint matches: 0 Data scanned: 1311.21 MB Scan peak memory: 418652 kB Scan time/item: 0.086 sec Scan time: 367.224 sec
Close