shell bypass 403

Cubjrnet7 Shell

: /home/eklavya/mail/.Trash/cur/ [ drwxr-x--x ]

name : 1591155091.M806720P22067.server.eklavya.in,S=2489,W=2541:2,S
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from server.eklavya.in
	by server.eklavya.in with LMTP
	id 4ZeHL5MZ114zVgAAviDrCw
	(envelope-from <[email protected]>)
	for <[email protected]>; Wed, 03 Jun 2020 09:01:31 +0530
Return-path: <[email protected]>
Envelope-to: [email protected]
Delivery-date: Wed, 03 Jun 2020 09:01:31 +0530
Received: from [183.141.42.102] (port=59561 helo=hotmail.com)
	by server.eklavya.in with esmtp (Exim 4.93)
	(envelope-from <[email protected]>)
	id 1jgK7k-0005jc-Fx
	for [email protected]; Wed, 03 Jun 2020 09:01:31 +0530
From: [email protected]
To: [email protected]
Content-Type: text/plain;charset="GB2312"
Content-Transfer-Encoding: 8bit
Date: Wed, 3 Jun 2020 11:31:28 +0800
X-Priority: 3
X-Mailer: Microsoft Outlook Express 6.00.2800.1106
X-Spam-Status: Yes, score=15.6
X-Spam-Score: 156
X-Spam-Bar: +++++++++++++++
X-Spam-Report: Spam detection software, running on the system "server.eklavya.in",
 has identified this incoming email as possible spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 Content preview:  ���ඐƱ��� l369��l3l927 Vxͬ�� 
 Content analysis details:   (15.6 points, 5.0 required)
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  0.0 FREEMAIL_FROM          Sender email is commonly abused enduser mail
                             provider
                             [aifyti[at]hotmail.com]
  1.5 SPF_SOFTFAIL           SPF: sender does not match SPF record (softfail)
  2.7 RCVD_IN_PSBL           RBL: Received via a relay in PSBL
                             [183.141.42.102 listed in psbl.surriel.com]
  1.5 SPF_HELO_SOFTFAIL      SPF: HELO does not match SPF record (softfail)
  2.0 RDNS_NONE              Delivered to internal network by a host with no rDNS
  0.0 PDS_HP_HELO_NORDNS     High profile HELO with no sender rDNS
  0.0 SPOOFED_FREEMAIL_NO_RDNS From SPOOFED_FREEMAIL and no rDNS
  3.1 DOS_OE_TO_MX           Delivered direct to MX with OE headers
  2.0 SPOOFED_FREEMAIL       No description available.
  0.0 TO_NO_BRKTS_MSFT       To: lacks brackets and supposed Microsoft tool
  2.8 FORGED_MUA_OUTLOOK     Forged mail pretending to be from MS Outlook
X-Spam-Flag: YES
Subject:  ***SPAM***  =?GB2312?B?uPfA4LaQxrGw7MDt?=

���ඐƱ��� l369��l3l927 Vxͬ��

© 2025 Cubjrnet7