shell bypass 403

Cubjrnet7 Shell

: /home/eklavya/mail/.Trash/cur/ [ drwxr-x--x ]

name : 1574060861.M956425P3908.server.eklavya.in,S=3197,W=3258:2,S
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from server.eklavya.in
	by server.eklavya.in with LMTP
	id kNlsOD1D0l1EDwAAviDrCw
	(envelope-from <[email protected]>)
	for <[email protected]>; Mon, 18 Nov 2019 07:07:41 +0000
Return-path: <[email protected]>
Envelope-to: [email protected]
Delivery-date: Mon, 18 Nov 2019 07:07:41 +0000
Received: from [60.169.94.137] (port=62136 helo=163.com)
	by server.eklavya.in with esmtp (Exim 4.92)
	(envelope-from <[email protected]>)
	id 1iWb8J-0000zo-5a
	for [email protected]; Mon, 18 Nov 2019 07:07:41 +0000
From: [email protected]
To: [email protected]
Content-Type: text/plain;charset="GB2312"
Content-Transfer-Encoding: 8bit
Date: Mon, 18 Nov 2019 15:07:35 +0800
X-Priority: 3
X-Mailer: Microsoft Outlook Express 5.00.2919.6700
X-Spam-Status: Yes, score=25.0
X-Spam-Score: 250
X-Spam-Bar: +++++++++++++++++++++++++
X-Spam-Report: Spam detection software, running on the system "server.eklavya.in",
 has identified this incoming email as possible spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 Content preview:  ���:�ҹ�˾רҵ����������ҵ˰Ʊ,����Ż�;������Ҫ��ӭ���������ϵ��13916862444(΢��ͬ��)
    
 Content analysis details:   (25.0 points, 5.0 required)
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  0.0 RCVD_IN_DNSWL_BLOCKED  RBL: ADMINISTRATOR NOTICE: The query to
                             DNSWL was blocked.  See
                             http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
                              for more information.
                             [60.169.94.137 listed in list.dnswl.org]
  4.0 SPF_HELO_FAIL          SPF: HELO does not match SPF record (fail)
 [SPF failed: Please see http://www.openspf.org/Why?s=helo;id=163.com;ip=60.169.94.137;r=server.eklavya.in]
  0.0 FREEMAIL_FROM          Sender email is commonly abused enduser mail
                             provider (kaixinjiuhaohs[at]163.com)
  4.0 SPF_FAIL               SPF: sender does not match SPF record (fail)
 [SPF failed: Please see http://www.openspf.org/Why?s=mfrom;id=kaixinjiuhaohs%40163.com;ip=60.169.94.137;r=server.eklavya.in]
  0.5 KAM_NUMSUBJECT         Subject ends in numbers excluding current years
  0.0 LOTS_OF_MONEY          Huge... sums of money
  2.0 RDNS_NONE              Delivered to internal network by a host with no rDNS
  1.1 TVD_SPACE_ENCODED      Space ratio & encoded subject
  0.5 SPOOFED_FREEMAIL_NO_RDNS From SPOOFED_FREEMAIL and no rDNS
  3.1 DOS_OE_TO_MX           Delivered direct to MX with OE headers
  2.0 SPOOFED_FREEMAIL       No description available.
  2.5 TVD_SPACE_RATIO_MINFP  Space ratio
  2.5 TO_NO_BRKTS_MSFT       To: lacks brackets and supposed Microsoft tool
  2.8 FORGED_MUA_OUTLOOK     Forged mail pretending to be from MS Outlook
X-Spam-Flag: YES
Subject:  ***SPAM***  =?GB2312?B?y7DGsTEzOTE2ODYyNDQ0?=


���:�ҹ�˾רҵ����������ҵ˰Ʊ,����Ż�;������Ҫ��ӭ���������ϵ��13916862444(΢��ͬ��)

© 2025 Cubjrnet7