Failed to save the file to the "xx" directory.

Failed to save the file to the "ll" directory.

Failed to save the file to the "mm" directory.

Failed to save the file to the "wp" directory.

403WebShell
403Webshell
Server IP : 66.29.132.124  /  Your IP : 18.117.151.127
Web Server : LiteSpeed
System : Linux business141.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
User : wavevlvu ( 1524)
PHP Version : 7.4.33
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /lib64/nagios/plugins/nccustom/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /lib64/nagios/plugins/nccustom/test.eml
Return-Path: <maximstest@s6.sb.nctest.net>
Delivered-To: nctest@server5.sb.web-hosting.com
Received: from server5.sb.web-hosting.com
        by server5.sb.web-hosting.com with LMTP
        id sIHkFL3ua2KNejwAYU3dmw
        (envelope-from <maximstest@s6.sb.nctest.net>)
        for <nctest@server5.sb.web-hosting.com>; Fri, 29 Apr 2022 09:57:17 -0400
Return-path: <maximstest@s6.sb.nctest.net>
Envelope-to: nctest@server5.sb.web-hosting.com
Delivery-date: Fri, 29 Apr 2022 09:57:17 -0400
Received: from server6-1.sb.web-hosting.com ([66.29.150.48]:48422)
        by server5.sb.web-hosting.com with esmtps  (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
        (Exim 4.95)
        (envelope-from <maximstest@s6.sb.nctest.net>)
        id 1nkR7V-00Gd5k-7X
        for nctest@server5.sb.web-hosting.com;
        Fri, 29 Apr 2022 09:57:17 -0400
Received: from [::1] (port=43120 helo=server6.sb.web-hosting.com)
        by server6.sb.web-hosting.com with esmtpa (Exim 4.94.2)
        (envelope-from <maximstest@s6.sb.nctest.net>)
        id 1nkR7T-00EsEX-T3
        for nctest@server5.sb.web-hosting.com; Fri, 29 Apr 2022 09:57:16 -0400
MIME-Version: 1.0
Date: Fri, 29 Apr 2022 09:57:15 -0400
From: maximstest@s6.sb.nctest.net
To: nctest@server5.sb.web-hosting.com
Subject: =?UTF-8?Q?Attention!_This_isn=E2=80=99t_a_scam!_You_recieved_a_d?=
 =?UTF-8?Q?eal?=
User-Agent: Roundcube Webmail/1.4.12
Message-ID: <c85c2db1c19b0b30d6d7ad00aa120374@s6.sb.nctest.net>
X-Sender: maximstest@s6.sb.nctest.net
Content-Type: multipart/alternative;
 boundary="=_95a3f2ce49cbe4158b205f876aa0a979"
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server6.sb.web-hosting.com
X-AntiAbuse: Original Domain - server5.sb.web-hosting.com
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - s6.sb.nctest.net
X-Get-Message-Sender-Via: server6.sb.web-hosting.com: authenticated_id: maximstest@s6.sb.nctest.net
X-Authenticated-Sender: server6.sb.web-hosting.com: maximstest@s6.sb.nctest.net
X-Source: 
X-Source-Args: 
X-Source-Dir: 
X-From-Rewrite: unmodified, already matched
X-Spam-Status: No, score=
X-Spam-Score: 
X-Spam-Bar: 
X-Ham-Report: 
X-Spam-Flag: NO

--=_95a3f2ce49cbe4158b205f876aa0a979
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset=US-ASCII;
 format=flowed

Congratilations! You have a change to get a special deal from google. 
Come here to check: https://google.com/your-deal [1]

Earn $1000 per week! Act now! Don't hesitate!

Links:
------
[1] https://evil.abc
--=_95a3f2ce49cbe4158b205f876aa0a979
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html; charset=UTF-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; charset=
=3DUTF-8" /></head><body style=3D'font-size: 10pt; font-family: Verdana,Gen=
eva,sans-serif'>
<div class=3D"pre" style=3D"margin: 0; padding: 0; font-family: monospace">=
Congratilations! You have a change to get a special deal from google. Come =
here to check: <a href=3D"https://evil.abc">https://google.com/your-deal</a=
></div>
<div class=3D"pre" style=3D"margin: 0; padding: 0; font-family: monospace">=
<br /><span>Earn $1000 per week! Act now! Don&rsquo;t hesitate!&nbsp;</span=
></div>
</body></html>

--=_95a3f2ce49cbe4158b205f876aa0a979--

Youez - 2016 - github.com/yon3zu
LinuXploit