shell bypass 403

Cubjrnet7 Shell

: /home/eklavya/mail/.Trash/cur/ [ drwxr-x--x ]

name : 1597220741.M439140P29535.server.eklavya.in,S=2906,W=2965:2,S
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from server.eklavya.in
	by server.eklavya.in with LMTP
	id +K2YGYWnM19fcwAAviDrCw
	(envelope-from <[email protected]>)
	for <[email protected]>; Wed, 12 Aug 2020 13:55:41 +0530
Return-path: <[email protected]>
Envelope-to: [email protected]
Delivery-date: Wed, 12 Aug 2020 13:55:41 +0530
Received: from [111.79.45.164] (port=52256 helo=126.com)
	by server.eklavya.in with esmtp (Exim 4.93)
	(envelope-from <[email protected]>)
	id 1k5m4Q-0007dO-3N
	for [email protected]; Wed, 12 Aug 2020 13:55:41 +0530
From: [email protected]
To: [email protected]
Content-Type: text/plain;charset="GB2312"
Content-Transfer-Encoding: 8bit
Date: Wed, 12 Aug 2020 16:25:30 +0800
X-Priority: 3
X-Mailer: Foxmail 4.2 [cn]
X-Spam-Status: Yes, score=19.8
X-Spam-Score: 198
X-Spam-Bar: +++++++++++++++++++
X-Spam-Report: Spam detection software, running on the system "server.eklavya.in",
 has identified this incoming email as possible spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 Content preview:  �У���ʡ��ֿۣ���Ʊ��l3815411035.��΢��ͬ�� 
 Content analysis details:   (19.8 points, 5.0 required)
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  0.6 HK_RANDOM_ENVFROM      Envelope sender username looks random
  1.0 HK_RANDOM_FROM         From username looks random
  2.7 RCVD_IN_PSBL           RBL: Received via a relay in PSBL
                             [111.79.45.164 listed in psbl.surriel.com]
  1.2 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in
                             bl.spamcop.net
               [Blocked - see <https://www.spamcop.net/bl.shtml?111.79.45.164>]
  4.0 SPF_FAIL               SPF: sender does not match SPF record (fail)
 [SPF failed: Please see http://www.openspf.org/Why?s=mfrom;id=rxjtbags%40126.com;ip=111.79.45.164;r=server.eklavya.in]
  4.0 SPF_HELO_FAIL          SPF: HELO does not match SPF record (fail)
 [SPF failed: Please see http://www.openspf.org/Why?s=helo;id=126.com;ip=111.79.45.164;r=server.eklavya.in]
  0.0 FREEMAIL_FROM          Sender email is commonly abused enduser mail
                             provider
                             [rxjtbags[at]126.com]
  0.5 KAM_NUMSUBJECT         Subject ends in numbers excluding current years
  2.0 RDNS_NONE              Delivered to internal network by a host with no rDNS
  1.0 TVD_SPACE_ENCODED      Space ratio & encoded subject
  0.0 SPOOFED_FREEMAIL_NO_RDNS From SPOOFED_FREEMAIL and no rDNS
  1.3 SPOOFED_FREEMAIL       No description available.
  1.5 TVD_SPACE_RATIO_MINFP  Space ratio
X-Spam-Flag: YES
Subject:  ***SPAM***  =?GB2312?B?09C3osaxtPq/qmwzODE1NDExMDM1?=


�У���ʡ��ֿۣ���Ʊ��l3815411035.��΢��ͬ��

© 2025 Cubjrnet7