ANTICHAT — форум по информационной безопасности, OSINT и технологиям
ANTICHAT — русскоязычное сообщество по безопасности, OSINT и программированию.
Форум ранее работал на доменах antichat.ru, antichat.com и antichat.club,
и теперь снова доступен на новом адресе —
forum.antichat.xyz.
Форум восстановлен и продолжает развитие: доступны архивные темы, добавляются новые обсуждения и материалы.
⚠️ Старые аккаунты восстановить невозможно — необходимо зарегистрироваться заново.
 |
|

09.07.2017, 21:18
|
|
Guest
Сообщений: n/a
Провел на форуме: 60408
Репутация:
0
|
|
Пацаны, помогите с Gentoo linux
uname -a
Linux ul9 2.6.35.7-c-s-m-1gb-ua #6 SMP Thu Jul 2 17:46:10 EEST 2015 x86_64 Intel(R) Xeon(R) CPU X5650 @ 2.67GHz GenuineIntel GNU/Linux
сработал dirty cow но почему-то не могу подключится со своим паролем через ssh
а так же там отсутствует su
что делать?
./dc qwertyuio123
sh: [22961: 3 (259)] tcsetattr: Invalid argument
при этом
firefart:fizS6CvT/B75g:0:0wned:/root:/bin/bash
однако через ssh не подключается
|
|
|
|

27.07.2017, 14:06
|
|
Новичок
Регистрация: 26.05.2007
Сообщений: 8
Провел на форуме: 23906
Репутация:
-5
|
|
Имеется web shell на Windows платформе
.SpoilerTarget" type="button">Spoiler: Win
Windows NT 6.3 build 9600 (Windows Server 2012 R2 Standard Edition) i586
Microsoft Windows [Version 6.3.9600]
PHP/5.6.31
Microsoft-IIS/8.5
cURLMySQL/mysqlnd 5.0.11-dev
----
Host Name: SERVER1
OS Name: Microsoft Windows Server 2012 R2 Standard
OS Version: 6.3.9600 N/A Build 9600
OS Manufacturer: Microsoft Corporation
OS Configuration: Standalone Server
OS Build Type: Multiprocessor Free
Registered Owner: Windows User
Registered Organization:
Original Install Date: 7/24/2015, 6:06:36 PM
System Boot Time: 7/24/2017, 8:50:48 PM
System Manufacturer: Supermicro
System Model: SYS-6018R-MT
System Type: x64-based PC
Processor(s): 2 Processor(s) Installed.
[01]: Intel64 Family 6 Model 63 Stepping 2 GenuineIntel ~1200 Mhz
[02]: Intel64 Family 6 Model 63 Stepping 2 GenuineIntel ~1200 Mhz
BIOS Version: American Megatrends Inc. 2.0, 12/18/2015
Windows Directory: C:\Windows
System Directory: C:\Windows\system32
Boot Device: \Device\HarddiskVolume2
System Locale: en-us;English (United States)
Input Locale: en-us;English (United States)
Time Zone: (UTC-05:00) Eastern Time (US & Canada)
Total Physical Memory: 65,426 MB
Available Physical Memory: 19,966 MB
Virtual Memory: Max Size: 130,962 MB
Virtual Memory: Available: 79,531 MB
Virtual Memory: In Use: 51,431 MB
Page File Location(s): C:\pagefile.sys
Domain: WORKGROUP
Logon Server: N/A
Hotfix(s): N/A
Network Card(s): 2 NIC(s) Installed.
[01]: Intel(R) I210 Gigabit Network Connection
Connection Name: Ethernet 8
DHCP Enabled: No
IP address(es)
[01]: ---IP---
[02]: ---MAC---
[02]: Intel(R) I210 Gigabit Network Connection
Connection Name: Internet
DHCP Enabled: No
IP address(es)
[01]: ---IP---
Как поднять права на данной машине?
PS Посоветуйте web shell для windows
|
|
|

27.07.2017, 17:09
|
|
Guest
Сообщений: n/a
Провел на форуме: 187765
Репутация:
154
|
|
[QUOTE="kacergei"]
kacergei said:
↑
Имеется web shell на Windows платформе
Spoiler: Win
Windows NT 6.3 build 9600 (Windows Server 2012 R2 Standard Edition) i586
Microsoft Windows [Version 6.3.9600]
PHP
/5.6.31
Microsoft-IIS
/8.5
cURLMySQL
/mysqlnd 5.0.11-dev
----
Host Name: SERVER1
OS Name: Microsoft Windows Server 2012 R2 Standard
OS Version: 6.3.9600 N/A Build 9600
OS Manufacturer: Microsoft Corporation
OS Configuration: Standalone Server
OS Build Type: Multiprocessor Free
Registered Owner: Windows User
Registered Organization:
Original Install Date: 7/24/2015, 6:06:36 PM
System Boot Time: 7/24/2017, 8:50:48 PM
System Manufacturer: Supermicro
System Model: SYS-6018R-MT
System Type: x64-based PC
Processor(s): 2 Processor(s) Installed.
[01]: Intel64 Family 6 Model 63 Stepping 2 GenuineIntel ~1200 Mhz
[02]: Intel64 Family 6 Model 63 Stepping 2 GenuineIntel ~1200 Mhz
BIOS Version: American Megatrends Inc. 2.0, 12/18/2015
Windows Directory: C:\Windows
System Directory: C:\Windows\system32
Boot Device: \Device\HarddiskVolume2
System Locale: en-us;English (United States)
Input Locale: en-us;English (United States)
Time Zone: (UTC-05:00) Eastern Time (US & Canada)
Total Physical Memory: 65,426 MB
Available Physical Memory: 19,966 MB
Virtual Memory: Max Size: 130,962 MB
Virtual Memory: Available: 79,531 MB
Virtual Memory: In Use: 51,431 MB
Page File Location(s): C:\pagefile.sys
Domain: WORKGROUP
Logon Server: N/A
Hotfix(s): N/A
Network Card(s): 2 NIC(s) Installed.
[01]: Intel(R) I210 Gigabit Network Connection
Connection Name: Ethernet 8
DHCP Enabled: No
IP address(es)
[01]: ---IP---
[02]: ---MAC---
[02]: Intel(R) I210 Gigabit Network Connection
Connection Name: Internet
DHCP Enabled: No
IP address(es)
[01]: ---IP--- C:\temp\1.txt" полученный файл мне в лс.
2) passthru вместо system, ибо system по дефолту cmd не понимает.
|
|
|
|

27.07.2017, 17:15
|
|
Guest
Сообщений: n/a
Провел на форуме: 187765
Репутация:
154
|
|
Сообщение от ACat
ACat said:
↑
Пацаны, помогите с Gentoo linux
uname -a
Linux ul9 2.6.35.7-c-s-m-1gb-ua #6 SMP Thu Jul 2 17:46:10 EEST 2015 x86_64 Intel(R) Xeon(R) CPU X5650 @ 2.67GHz GenuineIntel GNU/Linux
сработал dirty cow но почему-то не могу подключится со своим паролем через ssh
а так же там отсутствует su
что делать?
./dc qwertyuio123
sh: [22961: 3 (259)] tcsetattr: Invalid argument
при этом
firefart:fizS6CvT/B75g:0:0
wned:/root:/bin/bash
однако через ssh не подключается
1) Дай вывод sudo -l
2) Вывод /etc/cron или файлы в cron.d
3) что находится в tmp, opt
4) Попробуй sudo -i (а вдруг ты уже в sudoers )
5) Попробуй создать symlink
6) Попробуй скриптик http://www.securitysift.com/download...privchecker.py
|
|
|
|

27.07.2017, 18:27
|
|
Guest
Сообщений: n/a
Провел на форуме: 187765
Репутация:
154
|
|
UPDATE: Sysinfo кинул. Лови список
.SpoilerTarget" type="button">Spoiler: Список
Код:
Code:
[M] MS16-075: Security Update for Windows SMB Server (3164038) - Important[*] https://github.com/foxglovesec/RottenPotato[*] https://github.com/Kevin-Robertson/Tater[*] https://bugs.chromium.org/p/project-zero/issues/detail?id=222 -- Windows: Local WebDAV NTLM Reflection Elevation of Privilege[*] https://foxglovesecurity.com/2016/01/16/hot-potato/ -- Hot Potato - Windows Privilege Escalation[*]
[E] MS16-032: Security Update for Secondary Logon to Address Elevation of Privile (3143141) - Important[*] https://www.exploit-db.com/exploits/40107/ -- MS16-032 Secondary Logon Handle Privilege Escalation, MSF[*] https://www.exploit-db.com/exploits/39574/ -- Microsoft Windows 8.1/10 - Secondary Logon Standard Handles Missing Sanitization Privilege Escalation (MS16-032), PoC[*] https://www.exploit-db.com/exploits/39719/ -- Microsoft Windows 7-10 & Server 2008-2012 (x32/x64) - Local Privilege Escalation (MS16-032) (PowerShell), PoC[*] https://www.exploit-db.com/exploits/39809/ -- Microsoft Windows 7-10 & Server 2008-2012 (x32/x64) - Local Privilege Escalation (MS16-032) (C#)[*]
[M] MS16-016: Security Update for WebDAV to Address Elevation of Privilege (3136041) - Important[*] https://www.exploit-db.com/exploits/40085/ -- MS16-016 mrxdav.sys WebDav Local Privilege Escalation, MSF[*] https://www.exploit-db.com/exploits/39788/ -- Microsoft Windows 7 - WebDAV Privilege Escalation Exploit (MS16-016) (2), PoC[*] https://www.exploit-db.com/exploits/39432/ -- Microsoft Windows 7 SP1 x86 - WebDAV Privilege Escalation (MS16-016) (1), PoC[*]
[E] MS15-102: Vulnerabilities in Windows Task Management Could Allow Elevation of Privilege (3089657) - Important[*] https://www.exploit-db.com/exploits/38202/ -- Windows CreateObjectTask SettingsSyncDiagnostics Privilege Escalation, PoC[*] https://www.exploit-db.com/exploits/38200/ -- Windows Task Scheduler DeleteExpiredTaskAfter File Deletion Privilege Escalation, PoC[*] https://www.exploit-db.com/exploits/38201/ -- Windows CreateObjectTask TileUserBroker Privilege Escalation, PoC[*]
[M] MS15-051: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (3057191) - Important[*] https://github.com/hfiref0x/CVE-2015-1701, Win32k Elevation of Privilege Vulnerability, PoC[*] https://www.exploit-db.com/exploits/37367/ -- Windows ClientCopyImage Win32k Exploit, MSF[*]
[E] MS14-040: Vulnerability in Ancillary Function Driver (AFD) Could Allow Elevation of Privilege (2975684) - Important[*] https://www.exploit-db.com/exploits/39525/ -- Microsoft Windows 7 x64 - afd.sys Privilege Escalation (MS14-040), PoC[*] https://www.exploit-db.com/exploits/39446/ -- Microsoft Windows - afd.sys Dangling Pointer Privilege Escalation (MS14-040), PoC[*]
[E] MS14-026: Vulnerability in .NET Framework Could Allow Elevation of Privilege (2958732) - Important[*] http://www.exploit-db.com/exploits/35280/, -- .NET Remoting Services Remote Command Execution, PoC
|
|
|
|

01.08.2017, 01:41
|
|
Guest
Сообщений: n/a
Провел на форуме: 11491
Репутация:
4
|
|
Подскажите как повысить привилегии. Каким эксплойтом?
есть два сервера
1:
$ uname -a
Linux ks209234.kimsufi.com 2.6.38.2-xxxx-std-ipv6-64 #2 SMP Thu Aug 25 16:43:23 UTC 2011 x86_64 x86_64 x86_64 GNU/Linux
$ cat /etc/*-release
CentOS release 6.2 (Final)
CentOS release 6.2 (Final)
CentOS release 6.2 (Final)
2:
$ uname -a
Linux php54-web-21 4.4.0-53-generic #74-Ubuntu SMP Fri Dec 2 15:59:10 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux
$ cat /etc/*-release
DISTRIB_ID=Ubuntu
DISTRIB_RELEASE=16.04
DISTRIB_CODENAME=xenial
DISTRIB_DESCRIPTION="Ubuntu 16.04.2 LTS"
NAME="Ubuntu"
VERSION="16.04.2 LTS (Xenial Xerus)"
ID=ubuntu
ID_LIKE=debian
PRETTY_NAME="Ubuntu 16.04.2 LTS"
VERSION_ID="16.04"
HOME_URL=" http://www.ubuntu.com/"
SUPPORT_URL=" http://help.ubuntu.com/"
BUG_REPORT_URL=" http://bugs.launchpad.net/ubuntu/"
VERSION_CODENAME=xenial
UBUNTU_CODENAME=xenial
Спасибо
|
|
|
|

02.08.2017, 18:18
|
|
Guest
Сообщений: n/a
Провел на форуме: 187765
Репутация:
154
|
|
Сообщение от spize0r
spize0r said:
↑
Подскажите как повысить привилегии. Каким эксплойтом?
есть два сервера
1:
$ uname -a
Linux ks209234.kimsufi.com 2.6.38.2-xxxx-std-ipv6-64 #2 SMP Thu Aug 25 16:43:23 UTC 2011 x86_64 x86_64 x86_64 GNU/Linux
$ cat /etc/*-release
CentOS release 6.2 (Final)
CentOS release 6.2 (Final)
CentOS release 6.2 (Final)
2:
$ uname -a
Linux php54-web-21 4.4.0-53-generic #74-Ubuntu SMP Fri Dec 2 15:59:10 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux
$ cat /etc/*-release
DISTRIB_ID=Ubuntu
DISTRIB_RELEASE=16.04
DISTRIB_CODENAME=xenial
DISTRIB_DESCRIPTION="Ubuntu 16.04.2 LTS"
NAME="Ubuntu"
VERSION="16.04.2 LTS (Xenial Xerus)"
ID=ubuntu
ID_LIKE=debian
PRETTY_NAME="Ubuntu 16.04.2 LTS"
VERSION_ID="16.04"
HOME_URL="
http://www.ubuntu.com/
"
SUPPORT_URL="
http://help.ubuntu.com/
"
BUG_REPORT_URL="
http://bugs.launchpad.net/ubuntu/
"
VERSION_CODENAME=xenial
UBUNTU_CODENAME=xenial
Спасибо
http://www.securitysift.com/download...privchecker.py - вывод скрипта мне в лс
|
|
|
|

04.08.2017, 11:05
|
|
Участник форума
Регистрация: 10.01.2008
Сообщений: 199
Провел на форуме: 961428
Репутация:
662
|
|
Хелп
* uname -a
Код:
Code:
Linux ip-10-149-5-107 2.6.32-431.1.2.0.1.el6.x86_64 #1 SMP Fri Dec 13 13:06:13 UTC 2013 x86_64 x86_64 x86_64 GNU/Linux
* ls -la /boot
Код:
Code:
total 39464
dr-xr-xr-x. 4 root root 4096 Dec 23 2013 .
drwxr-xr-x. 24 root root 4096 Jun 20 06:40 ..
-rw-r--r--. 1 root root 171 Oct 16 2012 .vmlinuz-2.6.32-279.11.1.el6.x86_64.hmac
-rw-r--r--. 1 root root 170 Mar 12 2013 .vmlinuz-2.6.32-358.2.1.el6.x86_64.hmac
-rw-r--r--. 1 root root 174 Dec 13 2013 .vmlinuz-2.6.32-431.1.2.0.1.el6.x86_64.hmac
-rw-r--r--. 1 root root 2342243 Oct 16 2012 System.map-2.6.32-279.11.1.el6.x86_64
-rw-r--r--. 1 root root 2407544 Mar 12 2013 System.map-2.6.32-358.2.1.el6.x86_64
-rw-r--r--. 1 root root 2518212 Dec 13 2013 System.map-2.6.32-431.1.2.0.1.el6.x86_64
-rw-r--r--. 1 root root 101977 Oct 16 2012 config-2.6.32-279.11.1.el6.x86_64
-rw-r--r--. 1 root root 104085 Mar 12 2013 config-2.6.32-358.2.1.el6.x86_64
-rw-r--r--. 1 root root 105203 Dec 13 2013 config-2.6.32-431.1.2.0.1.el6.x86_64
drwxr-xr-x. 3 root root 4096 Oct 30 2012 efi
drwxr-xr-x. 2 root root 4096 Dec 23 2013 grub
-rw-r--r--. 1 root root 6512664 Oct 30 2012 initramfs-2.6.32-279.11.1.el6.x86_64.img
-rw-r--r--. 1 root root 6619790 Apr 22 2013 initramfs-2.6.32-358.2.1.el6.x86_64.img
-rw-------. 1 root root 6921745 Dec 23 2013 initramfs-2.6.32-431.1.2.0.1.el6.x86_64.img
-rw-r--r--. 1 root root 179202 Oct 16 2012 symvers-2.6.32-279.11.1.el6.x86_64.gz
-rw-r--r--. 1 root root 185828 Mar 12 2013 symvers-2.6.32-358.2.1.el6.x86_64.gz
-rw-r--r--. 1 root root 193760 Dec 13 2013 symvers-2.6.32-431.1.2.0.1.el6.x86_64.gz
-rwxr-xr-x. 1 root root 3987760 Oct 16 2012 vmlinuz-2.6.32-279.11.1.el6.x86_64
-rwxr-xr-x. 1 root root 4043920 Mar 12 2013 vmlinuz-2.6.32-358.2.1.el6.x86_64
-rwxr-xr-x. 1 root root 4128784 Dec 13 2013 vmlinuz-2.6.32-431.1.2.0.1.el6.x86_64
* ls -la --full-time /lib
Код:
Code:
dr-xr-xr-x. 9 root root 4096 2013-12-15 12:30:03.701829792 -0800 .
drwxr-xr-x. 24 root root 4096 2017-06-20 06:40:08.269205113 -0700 ..
lrwxrwxrwx. 1 root root 14 2013-12-15 12:30:03.698829792 -0800 cpp -> ../usr/bin/cpp
drwxr-xr-x. 42 root root 4096 2013-11-22 11:09:17.000000000 -0800 firmware
drwxr-xr-x. 6 root root 4096 2012-10-30 18:33:20.000000000 -0700 kbd
drwxr-xr-x. 2 root root 4096 2013-05-09 17:49:28.605425768 -0700 lsb
dr-xr-xr-x. 5 root root 4096 2013-12-23 02:31:35.810829793 -0800 modules
drwxr-xr-x. 2 root root 4096 2013-12-15 12:32:06.450829793 -0800 security
drwxr-xr-x. 6 root root 4096 2012-10-30 18:33:20.000000000 -0700 terminfo
drwxr-xr-x. 5 root root 4096 2013-12-23 02:31:18.871829793 -0800 udev
* cat /etc/*-release
Код:
Code:
CentOS release 6.5 (Final)
LSB_VERSION=base-4.0-amd64:base-4.0-noarch:core-4.0-amd64:core-4.0-noarch:graphics-4.0-amd64:graphics-4.0-noarch:printing-4.0-amd64:printing-4.0-noarch
CentOS release 6.5 (Final)
CentOS release 6.5 (Final)
|
|
|

09.08.2017, 11:04
|
|
Guest
Сообщений: n/a
Провел на форуме: 17650
Репутация:
0
|
|
Сообщение от DezMond™
DezMond™ said:
↑
Хелп
* uname -a
Код:
Code:
Linux ip-10-149-5-107 2.6.32-431.1.2.0.1.el6.x86_64 #1 SMP Fri Dec 13 13:06:13 UTC 2013 x86_64 x86_64 x86_64 GNU/Linux
* ls -la /boot
Код:
Code:
total 39464
dr-xr-xr-x. 4 root root 4096 Dec 23 2013 .
drwxr-xr-x. 24 root root 4096 Jun 20 06:40 ..
-rw-r--r--. 1 root root 171 Oct 16 2012 .vmlinuz-2.6.32-279.11.1.el6.x86_64.hmac
-rw-r--r--. 1 root root 170 Mar 12 2013 .vmlinuz-2.6.32-358.2.1.el6.x86_64.hmac
-rw-r--r--. 1 root root 174 Dec 13 2013 .vmlinuz-2.6.32-431.1.2.0.1.el6.x86_64.hmac
-rw-r--r--. 1 root root 2342243 Oct 16 2012 System.map-2.6.32-279.11.1.el6.x86_64
-rw-r--r--. 1 root root 2407544 Mar 12 2013 System.map-2.6.32-358.2.1.el6.x86_64
-rw-r--r--. 1 root root 2518212 Dec 13 2013 System.map-2.6.32-431.1.2.0.1.el6.x86_64
-rw-r--r--. 1 root root 101977 Oct 16 2012 config-2.6.32-279.11.1.el6.x86_64
-rw-r--r--. 1 root root 104085 Mar 12 2013 config-2.6.32-358.2.1.el6.x86_64
-rw-r--r--. 1 root root 105203 Dec 13 2013 config-2.6.32-431.1.2.0.1.el6.x86_64
drwxr-xr-x. 3 root root 4096 Oct 30 2012 efi
drwxr-xr-x. 2 root root 4096 Dec 23 2013 grub
-rw-r--r--. 1 root root 6512664 Oct 30 2012 initramfs-2.6.32-279.11.1.el6.x86_64.img
-rw-r--r--. 1 root root 6619790 Apr 22 2013 initramfs-2.6.32-358.2.1.el6.x86_64.img
-rw-------. 1 root root 6921745 Dec 23 2013 initramfs-2.6.32-431.1.2.0.1.el6.x86_64.img
-rw-r--r--. 1 root root 179202 Oct 16 2012 symvers-2.6.32-279.11.1.el6.x86_64.gz
-rw-r--r--. 1 root root 185828 Mar 12 2013 symvers-2.6.32-358.2.1.el6.x86_64.gz
-rw-r--r--. 1 root root 193760 Dec 13 2013 symvers-2.6.32-431.1.2.0.1.el6.x86_64.gz
-rwxr-xr-x. 1 root root 3987760 Oct 16 2012 vmlinuz-2.6.32-279.11.1.el6.x86_64
-rwxr-xr-x. 1 root root 4043920 Mar 12 2013 vmlinuz-2.6.32-358.2.1.el6.x86_64
-rwxr-xr-x. 1 root root 4128784 Dec 13 2013 vmlinuz-2.6.32-431.1.2.0.1.el6.x86_64
* ls -la --full-time /lib
Код:
Code:
dr-xr-xr-x. 9 root root 4096 2013-12-15 12:30:03.701829792 -0800 .
drwxr-xr-x. 24 root root 4096 2017-06-20 06:40:08.269205113 -0700 ..
lrwxrwxrwx. 1 root root 14 2013-12-15 12:30:03.698829792 -0800 cpp -> ../usr/bin/cpp
drwxr-xr-x. 42 root root 4096 2013-11-22 11:09:17.000000000 -0800 firmware
drwxr-xr-x. 6 root root 4096 2012-10-30 18:33:20.000000000 -0700 kbd
drwxr-xr-x. 2 root root 4096 2013-05-09 17:49:28.605425768 -0700 lsb
dr-xr-xr-x. 5 root root 4096 2013-12-23 02:31:35.810829793 -0800 modules
drwxr-xr-x. 2 root root 4096 2013-12-15 12:32:06.450829793 -0800 security
drwxr-xr-x. 6 root root 4096 2012-10-30 18:33:20.000000000 -0700 terminfo
drwxr-xr-x. 5 root root 4096 2013-12-23 02:31:18.871829793 -0800 udev
* cat /etc/*-release
Код:
Code:
CentOS release 6.5 (Final)
LSB_VERSION=base-4.0-amd64:base-4.0-noarch:core-4.0-amd64:core-4.0-noarch:graphics-4.0-amd64:graphics-4.0-noarch:printing-4.0-amd64:printing-4.0-noarch
CentOS release 6.5 (Final)
CentOS release 6.5 (Final)
Не пробовали dirtyc0w ?
|
|
|
|

09.08.2017, 11:21
|
|
Guest
Сообщений: n/a
Провел на форуме: 17650
Репутация:
0
|
|
Приветствую всех.. Есть проблема, залился на сервак, а там все конкретно урезано.
Не могу сделать бекконект, gcc не работает , perl тоже. Может у когото есть соображения.
Server software :PHP/5.2.17-pl0-gentoo Apache cURL MySQL/5.1.62
User info :uid=81(apache) gid=445(usergrp)
Disable functions : escapeshellarg, escapeshellcmd, exec, passthru, proc_close, proc_get_status, proc_nice, proc_open, proc_terminate, shell_exec, system, popen, pcntl_alarm, pcntl_fork, pcntl_waitpid, pcntl_wait, pcntl_wifexited, pcntl_wifstopped, pcntl_wifsignaled, pcntl_wexitstatus, pcntl_wtermsig, pcntl_wstopsig, pcntl_signal, pcntl_signal_dispatch, pcntl_get_last_error, pcntl_strerror, pcntl_sigprocmask, pcntl_sigwaitinfo, pcntl_sigtimedwait, pcntl_exec, pcntl_getpriority, pcntl_setpriority
|
|
|
|
|
 |
|
|
Здесь присутствуют: 1 (пользователей: 0 , гостей: 1)
|
|
|
|