Linux web-conference.aiou.edu.pk 5.4.0-204-generic #224-Ubuntu SMP Thu Dec 5 13:38:28 UTC 2024 x86_64
Apache/2.4.41 (Ubuntu)
: 172.16.50.247 | : 3.129.73.6
Cant Read [ /etc/named.conf ]
7.4.3-4ubuntu2.28
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
etc /
apparmor.d /
local /
[ HOME SHELL ]
Name
Size
Permission
Action
README
1.08
KB
-rw-r--r--
lsb_release
0
B
-rw-r--r--
nvidia_modprobe
0
B
-rw-r--r--
sbin.dhclient
0
B
-rw-r--r--
usr.bin.man
0
B
-rw-r--r--
usr.lib.snapd.snap-confine.rea...
0
B
-rw-r--r--
usr.sbin.mysqld
0
B
-rw-r--r--
usr.sbin.rsyslogd
0
B
-rw-r--r--
usr.sbin.tcpdump
0
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : README
# This directory is intended to contain profile additions and overrides for # inclusion by distributed profiles to aid in packaging AppArmor for # distributions. # # The shipped profiles in /etc/apparmor.d can still be modified by an # administrator and people should modify the shipped profile when making # large policy changes, rather than trying to make those adjustments here. # # For simple access additions or the occasional deny override, adjusting them # here can prevent the package manager of the distribution from interfering # with local modifications. As always, new policy should be reviewed to ensure # it is appropriate for your site. # # For example, if the shipped /etc/apparmor.d/usr.sbin.smbd profile has: # #include <local/usr.sbin.smbd> # # then an administrator can adjust /etc/apparmor.d/local/usr.sbin.smbd to # contain any additional paths to be allowed, such as: # # /var/exports/** lrwk, # # Keep in mind that 'deny' rules are evaluated after allow rules, so you won't # be able to allow access to files that are explicitly denied by the shipped # profile using this mechanism.
Close