Linux premium180.web-hosting.com 4.18.0-553.54.1.lve.el8.x86_64 #1 SMP Wed Jun 4 13:01:13 UTC 2025 x86_64
LiteSpeed
: 162.0.209.168 | : 216.73.216.55
Cant Read [ /etc/named.conf ]
8.3.30
nortrmdp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
etc /
security /
[ HOME SHELL ]
Name
Size
Permission
Action
console.apps
[ DIR ]
drwxr-xr-x
console.perms.d
[ DIR ]
drwxr-xr-x
limits.d
[ DIR ]
drwxr-xr-x
namespace.d
[ DIR ]
drwxr-xr-x
access.conf
4.46
KB
-rw-r--r--
chroot.conf
82
B
-rw-r--r--
console.handlers
624
B
-rw-r--r--
console.perms
939
B
-rw-r--r--
faillock.conf
2.18
KB
-rw-r--r--
group.conf
3.55
KB
-rw-r--r--
limits.conf
2.37
KB
-rw-r--r--
namespace.conf
1.41
KB
-rw-r--r--
namespace.init
1.92
KB
-rwxr-xr-x
opasswd
0
B
-rw-------
pam_env.conf
2.9
KB
-rw-r--r--
pwhistory.conf
517
B
-rw-r--r--
sepermit.conf
419
B
-rw-r--r--
time.conf
2.13
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : namespace.init
#!/bin/sh # It receives as arguments: # - $1 polydir path (see WARNING below) # - $2 instance path (see WARNING below) # - $3 flag whether the instance dir was newly created (0 - no, 1 - yes) # - $4 user name # - $5 flag whether the polydir path ($1) is safe (0 - unsafe, 1 -safe) # - $6 flag whether the instance path ($2) is safe (0 - unsafe, 1 - safe) # # WARNING: This script is invoked with full root privileges. Accessing # the polydir ($1) and the instance ($2) directories in this context may be # extremely dangerous as those can be under user control. The flags $5 and $6 # are provided to let you know if all the segments part of the path (except the # last one) are owned by root and are writable by root only. If the path does # not meet these criteria, you expose yourself to possible symlink attacks when # accessing these path. # However, even if the path components are safe, the content of the # directories may still be owned/writable by a user, so care must be taken! # # The following section will copy the contents of /etc/skel if this is a # newly created home directory. # Executes only if the polydir path is safe if [ "$5" = 1 ]; then if [ "$3" = 1 ]; then # This line will fix the labeling on all newly created directories [ -x /sbin/restorecon ] && /sbin/restorecon "$1" user="$4" passwd=$(getent passwd "$user") homedir=$(echo "$passwd" | cut -f6 -d":") if [ "$1" = "$homedir" ]; then gid=$(echo "$passwd" | cut -f4 -d":") cp -rT /etc/skel "$homedir" chown -R "$user":"$gid" "$homedir" mask=$(sed -E -n 's/^UMASK[[:space:]]+([^#[:space:]]+).*/\1/p' /etc/login.defs) mode=$(printf "%o" $((0777 & ~mask))) chmod ${mode:-700} "$homedir" [ -x /sbin/restorecon ] && /sbin/restorecon -R "$homedir" fi fi fi exit 0
Close