DonatShell
Server IP : 180.180.241.3  /  Your IP : 216.73.216.252
Web Server : Microsoft-IIS/7.5
System : Windows NT NETWORK-NHRC 6.1 build 7601 (Windows Server 2008 R2 Standard Edition Service Pack 1) i586
User : IUSR ( 0)
PHP Version : 5.3.28
Disable Function : NONE
MySQL : ON  |  cURL : ON  |  WGET : OFF  |  Perl : OFF  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /Windows/SysWOW64/en-US/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /Windows/SysWOW64/en-US/ICacls.exe.mui
MZ@	!L!This program cannot be run in DOS mode.

$uEEELlDLl
DRichEPEL[J!	Zpp@PY.rsrc`Z@@(@Xp			LTedMUI]ʿ0i/_`)GNA(MUIen-US'-'P)

ICACLS name /save aclfile [/T] [/C] [/L] [/Q]

    stores the DACLs for the files and folders that match the name

    into aclfile for later use with /restore. Note that SACLs,

    owner, or integrity labels are not saved.



ICACLS directory [/substitute SidOld SidNew [...]] /restore aclfile

                 [/C] [/L] [/Q]

    applies the stored DACLs to files in directory.



ICACLS name /setowner user [/T] [/C] [/L] [/Q]

    changes the owner of all matching names. This option does not

    force a change of ownership; use the takeown.exe utility for

    that purpose.



ICACLS name /findsid Sid [/T] [/C] [/L] [/Q]

    finds all matching names that contain an ACL

    explicitly mentioning Sid.



ICACLS name /verify [/T] [/C] [/L] [/Q]

    finds all files whose ACL is not in canonical form or whose

    lengths are inconsistent with ACE counts.



ICACLS name /reset [/T] [/C] [/L] [/Q]

    replaces ACLs with default inherited ACLs for all matching files.



ICACLS name [/grant[:r] Sid:perm[...]]

       [/deny Sid:perm [...]]

       [/remove[:g|:d]] Sid[...]] [/T] [/C] [/L] [/Q]

       [/setintegritylevel Level:policy[...]]



    /grant[:r] Sid:perm grants the specified user access rights. With :r,

        the permissions replace any previouly granted explicit permissions.

        Without :r, the permissions are added to any previously granted

        explicit permissions.



    /deny Sid:perm explicitly denies the specified user access rights.

        An explicit deny ACE is added for the stated permissions and

        the same permissions in any explicit grant are removed.



    /remove[:[g|d]] Sid removes all occurrences of Sid in the ACL. With

        :g, it removes all occurrences of granted rights to that Sid. With

        :d, it removes all occurrences of denied rights to that Sid.



    /setintegritylevel [(CI)(OI)]Level explicitly adds an integrity

        ACE to all matching files.  The level is to be specified as one

        of:

            L[ow]

            M[edium]

            H[igh]

        Inheritance options for the integrity ACE may precede the level

        and are applied only to directories.



    /inheritance:e|d|r

        e - enables inheritance

        d - disables inheritance and copy the ACEs

        r - remove all inherited ACEs





Note:

    Sids may be in either numerical or friendly name form. If a numerical

    form is given, affix a * to the start of the SID.



    /T indicates that this operation is performed on all matching

        files/directories below the directories specified in the name.



    /C indicates that this operation will continue on all file errors.

        Error messages will still be displayed.



    /L indicates that this operation is performed on a symbolic link

       itself versus its target.



    /Q indicates that icacls should supress success messages.



    ICACLS preserves the canonical ordering of ACE entries:

            Explicit denials

            Explicit grants

            Inherited denials

            Inherited grants



    perm is a permission mask and can be specified in one of two forms:

        a sequence of simple rights:

                N - no access

                F - full access

                M - modify access

                RX - read and execute access

                R - read-only access

                W - write-only access

                D - delete access

        a comma-separated list in parentheses of specific rights:

                DE - delete

                RC - read control

                WDAC - write DAC

                WO - write owner

                S - synchronize

                AS - access system security

                MA - maximum allowed

                GR - generic read

                GW - generic write

                GE - generic execute

                GA - generic all

                RD - read data/list directory

                WD - write data/add file

                AD - append data/add subdirectory

                REA - read extended attributes

                WEA - write extended attributes

                X - execute/traverse

                DC - delete child

                RA - read attributes

                WA - write attributes

        inheritance rights may precede either form and are applied

        only to directories:

                (OI) - object inherit

                (CI) - container inherit

                (IO) - inherit only

                (NP) - don't propagate inherit

                (I) - permission inherited from parent container



Examples:



        icacls c:\windows\* /save AclFile /T

        - Will save the ACLs for all files under c:\windows

          and its subdirectories to AclFile.



        icacls c:\windows\ /restore AclFile

        - Will restore the Acls for every file within

          AclFile that exists in c:\windows and its subdirectories.



        icacls file /grant Administrator:(D,WDAC)

        - Will grant the user Administrator Delete and Write DAC

          permissions to file.



        icacls file /grant *S-1-1-0:(D,WDAC)

        - Will grant the user defined by sid S-1-1-0 Delete and

          Write DAC permissions to file.

$

ICACLS name /save aclfile [/T] [/C]

    stores the DACLs for the files and folders that match the name

    into aclfile for later use with /restore. Note that SACLs,

    owner, or integrity labels are not saved.



ICACLS directory [/substitute SidOld SidNew [...]] /restore aclfile [/C]

    applies the stored DACLs to files in directory.



ICACLS name /setowner user [/T] [/C]

    changes the owner of all matching names. This option does not

    force a change of ownership; use the takeown.exe utility for

    that purpose.



ICACLS name /findsid Sid [/T] [/C]

    finds all matching names that contain an ACL

    explicitly mentioning Sid.



ICACLS name /verify [/T] [/C]

    finds all files whose ACL is not in canonical form or whose

    lengths are inconsistent with ACE counts.



ICACLS name /reset [/T] [/C]

    replaces ACLs with default inherited ACLs for all matching files.



ICACLS name [/grant[:r] Sid:perm[...]]

       [/deny Sid:perm [...]]

       [/remove[:g|:d]] Sid[...]] [/T] [/C]



    /grant[:r] Sid:perm grants the specified user access rights. With :r,

        the permissions replace any previouly granted explicit permissions.

        Without :r, the permissions are added to any previously granted

        explicit permissions.



    /deny Sid:perm explicitly denies the specified user access rights.

        An explicit deny ACE is added for the stated permissions and

        the same permissions in any explicit grant are removed.



    /remove[:[g|d]] Sid removes all occurrences of Sid in the ACL. With

        :g, it removes all occurrences of granted rights to that Sid. With

        :d, it removes all occurrences of denied rights to that Sid.



    /inheritance:e|d|r

        e - enables inheritance

        d - disables inheritance and copy the ACEs

        r - remove all inherited ACEs







Note:

    Sids may be in either numerical or friendly name form. If a numerical

    form is given, affix a * to the start of the SID.



    /T indicates that this operation is performed on all matching

        files/directories below the directories specified in the name.



    /C indicates that this operation will continue on all file errors.

        Error messages will still be displayed.



    ICACLS preserves the canonical ordering of ACE entries:

            Explicit denials

            Explicit grants

            Inherited denials

            Inherited grants



    perm is a permission mask and can be specified in one of two forms:

        a sequence of simple rights:

                N - no access

                F - full access

                M - modify access

                RX - read and execute access

                R - read-only access

                D - delete access

        a comma-separated list in parenthesis of specific rights:

                DE - delete

                RC - read control

                WDAC - write DAC

                WO - write owner

                S - synchronize

                AS - access system security

                MA - maximum allowed

                GR - generic read

                GW - generic write

                GE - generic execute

                GA - generic all

                RD - read data/list directory

                WD - write data/add file

                AD - append data/add subdirectory

                REA - read extended attributes

                WEA - write extended attributes

                X - execute/traverse

                DC - delete child

                RA - read attributes

                WA - write attributes

        inheritance rights may precede either form and are applied

        only to directories:

                (OI) - object inherit

                (CI) - container inherit

                (IO) - inherit only

                (NP) - don't propagate inherit

                (I) - permission inherited from parent container



Examples:



        icacls c:\windows\* /save AclFile /T

        - Will save the ACLs for all files under c:\windows

          and its subdirectories to AclFile.



        icacls c:\windows\ /restore AclFile

        - Will restore the Acls for every file within

          AclFile that exists in c:\windows and its subdirectories.



        icacls file /grant Administrator:(D,WDAC)

        - Will grant the user Administrator Delete and Write DAC

          permissions to file.



        icacls file /grant *S-1-1-0:(D,WDAC)

        - Will grant the user defined by sid S-1-1-0 Delete and

          Write DAC permissions to file.

8Invalid parameter "%1"

(ACCESS_DENIED%0

0processed file: %1

8<User name not found>%0

(OI)%0

(CI)%0

(NP)%0

(IO)%0

(DENY)%0

,(special access:)

4sharing violation:%0

<Set ownership failed

%0

,Access denied: %0

x No permissions are set. All users have full control.%0

X%1: Ace entries not in canonical order.

D%1: Acl length is incorrect.

DAcls were successfully saved.

@Acls successfully restored.

(SID Found: %1.

`No errors were found while verifying ACLs.

TThe Acls were successfully modified.

LThe ACLs were successfully reset.

HThe owner was successfully set.

XNo files with a matching SID was found

Successfully processed %1 files; Failed processing %2 files

This operation is not allowed as it would create an un-usable ACL.

pFirst parameter must be a file name pattern or "/?"

d4VS_VERSION_INFO@@?StringFileInfo040904B0LCompanyNameMicrosoft Corporation(FileDescriptionl&FileVersion6.1.7600.16385 (win7_rtm.090713-1255).InternalNameicacls.LegalCopyright Microsoft Corporation. All rights reserved.FOriginalFilenameiCACLS.EXE.MUIj%ProductNameMicrosoft Windows Operating SystemBProductVersion6.1.7600.16385DVarFileInfo$Translation	PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDING

Anon7 - 2022
AnonSec Team