Linux web-conference.aiou.edu.pk 5.4.0-204-generic #224-Ubuntu SMP Thu Dec 5 13:38:28 UTC 2024 x86_64
Apache/2.4.41 (Ubuntu)
: 172.16.50.247 | : 3.137.170.38
Cant Read [ /etc/named.conf ]
7.4.3-4ubuntu2.28
appadmin
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
dbus-1 /
[ HOME SHELL ]
Name
Size
Permission
Action
interfaces
[ DIR ]
drwxr-xr-x
services
[ DIR ]
drwxr-xr-x
session.d
[ DIR ]
drwxr-xr-x
system-services
[ DIR ]
drwxr-xr-x
system.d
[ DIR ]
drwxr-xr-x
session.conf
3.53
KB
-rw-r--r--
system.conf
5.62
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : system.conf
<!-- This configuration file controls the systemwide message bus. Add a system-local.conf and edit that rather than changing this file directly. --> <!-- Note that there are any number of ways you can hose yourself security-wise by screwing up this file; in particular, you probably don't want to listen on any more addresses, add any more auth mechanisms, run as a different user, etc. --> <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <busconfig> <!-- Our well-known bus type, do not change this --> <type>system</type> <!-- Run as special user --> <user>messagebus</user> <!-- Fork into daemon mode --> <fork/> <!-- We use system service launching using a helper --> <standard_system_servicedirs/> <!-- This is a setuid helper that is used to launch system services --> <servicehelper>/usr/lib/dbus-1.0/dbus-daemon-launch-helper</servicehelper> <!-- Write a pid file --> <pidfile>/run/dbus/pid</pidfile> <!-- Enable logging to syslog --> <syslog/> <!-- Only allow socket-credentials-based authentication --> <auth>EXTERNAL</auth> <!-- Only listen on a local socket. (abstract=/path/to/socket means use abstract namespace, don't really create filesystem file; only Linux supports this. Use path=/whatever on other systems.) --> <listen>unix:path=/var/run/dbus/system_bus_socket</listen> <policy context="default"> <!-- All users can connect to system bus --> <allow user="*"/> <!-- Holes must be punched in service configuration files for name ownership and sending method calls --> <deny own="*"/> <deny send_type="method_call"/> <!-- Signals and reply messages (method returns, errors) are allowed by default --> <allow send_type="signal"/> <allow send_requested_reply="true" send_type="method_return"/> <allow send_requested_reply="true" send_type="error"/> <!-- All messages may be received by default --> <allow receive_type="method_call"/> <allow receive_type="method_return"/> <allow receive_type="error"/> <allow receive_type="signal"/> <!-- Allow anyone to talk to the message bus --> <allow send_destination="org.freedesktop.DBus" send_interface="org.freedesktop.DBus" /> <allow send_destination="org.freedesktop.DBus" send_interface="org.freedesktop.DBus.Introspectable"/> <allow send_destination="org.freedesktop.DBus" send_interface="org.freedesktop.DBus.Properties"/> <!-- But disallow some specific bus services --> <deny send_destination="org.freedesktop.DBus" send_interface="org.freedesktop.DBus" send_member="UpdateActivationEnvironment"/> <deny send_destination="org.freedesktop.DBus" send_interface="org.freedesktop.DBus.Debug.Stats"/> <deny send_destination="org.freedesktop.DBus" send_interface="org.freedesktop.systemd1.Activator"/> </policy> <!-- Only systemd, which runs as root, may report activation failures. --> <policy user="root"> <allow send_destination="org.freedesktop.DBus" send_interface="org.freedesktop.systemd1.Activator"/> </policy> <!-- root may monitor the system bus. --> <policy user="root"> <allow send_destination="org.freedesktop.DBus" send_interface="org.freedesktop.DBus.Monitoring"/> </policy> <!-- If the Stats interface was enabled at compile-time, root may use it. Copy this into system.local.conf or system.d/*.conf if you want to enable other privileged users to view statistics and debug info --> <policy user="root"> <allow send_destination="org.freedesktop.DBus" send_interface="org.freedesktop.DBus.Debug.Stats"/> </policy> <!-- Include legacy configuration that was preserved in a Debian upgrade, if any --> <include ignore_missing="yes">/etc/dbus-1/system.conf.dpkg-bak</include> <!-- The defaults for these limits are hard-coded in dbus-daemon. Some clarifications: Times are in milliseconds (ms); 1000ms = 1 second 133169152 bytes = 127 MiB 33554432 bytes = 32 MiB 150000ms = 2.5 minutes --> <!-- <limit name="max_incoming_bytes">133169152</limit> --> <!-- <limit name="max_incoming_unix_fds">64</limit> --> <!-- <limit name="max_outgoing_bytes">133169152</limit> --> <!-- <limit name="max_outgoing_unix_fds">64</limit> --> <!-- <limit name="max_message_size">33554432</limit> --> <!-- <limit name="max_message_unix_fds">16</limit> --> <!-- <limit name="service_start_timeout">25000</limit> --> <!-- <limit name="auth_timeout">5000</limit> --> <!-- <limit name="pending_fd_timeout">150000</limit> --> <!-- <limit name="max_completed_connections">2048</limit> --> <!-- <limit name="max_incomplete_connections">64</limit> --> <!-- <limit name="max_connections_per_user">256</limit> --> <!-- <limit name="max_pending_service_starts">512</limit> --> <!-- <limit name="max_names_per_connection">512</limit> --> <!-- <limit name="max_match_rules_per_connection">512</limit> --> <!-- <limit name="max_replies_per_connection">128</limit> --> <!-- Config files are placed here that among other things, punch holes in the above policy for specific services. --> <includedir>system.d</includedir> <includedir>/etc/dbus-1/system.d</includedir> <!-- This is included last so local configuration can override what's in this standard file --> <include ignore_missing="yes">/etc/dbus-1/system-local.conf</include> <include if_selinux_enabled="yes" selinux_root_relative="yes">contexts/dbus_contexts</include> </busconfig>
Close