Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
libexec /
webmin /
ipfilter /
[ HOME SHELL ]
Name
Size
Permission
Action
images
[ DIR ]
drwxr-xr-x
lang
[ DIR ]
drwxr-xr-x
CHANGELOG
896
B
-rw-r--r--
apply.cgi
271
B
-rwxr-xr-x
backup_config.pl
604
B
-rwxr-xr-x
bootup.cgi
252
B
-rwxr-xr-x
cluster.cgi
2.01
KB
-rwxr-xr-x
cluster_add.cgi
1.78
KB
-rwxr-xr-x
cluster_delete.cgi
522
B
-rwxr-xr-x
config
155
B
-rw-r--r--
config-freebsd
149
B
-rw-r--r--
config-solaris-10-ALL
177
B
-rw-r--r--
config.info
669
B
-rw-r--r--
config.info.ca
703
B
-rw-r--r--
config.info.ca.UTF-8
717
B
-rw-r--r--
config.info.de
747
B
-rw-r--r--
config.info.de.UTF-8
747
B
-rw-r--r--
config.info.nl
741
B
-rw-r--r--
config.info.nl.UTF-8
741
B
-rw-r--r--
convert.cgi
341
B
-rwxr-xr-x
edit_nat.cgi
7.83
KB
-rwxr-xr-x
edit_rule.cgi
9.81
KB
-rwxr-xr-x
index.cgi
8.42
KB
-rwxr-xr-x
install_check.pl
337
B
-rwxr-xr-x
ipfilter-lib.pl
39.31
KB
-rwxr-xr-x
log_parser.pl
928
B
-rwxr-xr-x
module.info
198
B
-rw-r--r--
module.info.ca
121
B
-rw-r--r--
module.info.ca.UTF-8
133
B
-rw-r--r--
module.info.de
97
B
-rw-r--r--
module.info.de.UTF-8
109
B
-rw-r--r--
module.info.nl
26
B
-rw-r--r--
module.info.nl.UTF-8
32
B
-rw-r--r--
move.cgi
427
B
-rwxr-xr-x
natmove.cgi
432
B
-rwxr-xr-x
save_nat.cgi
5.06
KB
-rwxr-xr-x
save_rule.cgi
4.88
KB
-rwxr-xr-x
setup.cgi
6.12
KB
-rwxr-xr-x
unapply.cgi
235
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : setup.cgi
#!/usr/bin/perl # setup.cgi # Setup an initial save file require './ipfilter-lib.pl'; &ReadParse(); @rules = ( ); if ($in{'auto'}) { $iface = $in{'iface'.$in{'auto'}}; if ($iface eq 'other') { $iface = $in{'iface'.$in{'auto'}.'_other'}; } $iface || &error($text{'setup_eiface'}); if ($in{'auto'} >= 2) { # Block all incoming traffic, except for established # connections, DNS replies and safe ICMP types # In mode 3 allow ssh and ident too # In mode 4 allow ftp, echo-request and high ports too push(@rules, { 'action' => 'skip', 'skip' => 1, 'active' => 1, 'quick' => 1, 'dir' => 'in', 'all' => 1, 'on' => $iface, 'cmt' => 'Skip next rule for external interface' }, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'all' => 1, 'keep' => 'state', 'cmt' => 'Allow all traffic on internal interface' }, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'udp', 'from-any' => 1, 'to-any' => 1, 'to-port-start' => 1024, 'to-port-range' => '<>', 'to-port-end' => 1024, 'keep' => 'state', 'cmt' => 'Accept responses to DNS queries' }, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'icmp', 'all' => 1, 'icmp-type' => 'echorep', 'keep' => 'state', 'cmt' => 'Accept responses to our pings' }, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'icmp', 'all' => 1, 'icmp-type' => 'unreach', 'keep' => 'state', 'cmt' => 'Accept notifications of unreachable hosts' }, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'icmp', 'all' => 1, 'icmp-type' => 'squench', 'keep' => 'state', 'cmt' => 'Accept notifications to reduce sending speed' }, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'icmp', 'all' => 1, 'icmp-type' => 'timex', 'keep' => 'state', 'cmt' => 'Accept notifications of lost packets' }, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'icmp', 'all' => 1, 'icmp-type' => 'paramprob', 'keep' => 'state', 'cmt' => 'Accept notifications of protocol problems' } ); if ($in{'auto'} >= 3) { # Allow ssh and ident push(@rules, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'tcp', 'from-any' => 1, 'to-any' => 1, 'to-port-comp' => '=', 'to-port-num' => 22, 'keep' => 'state', 'cmt' => 'Allow connections to our SSH server' }, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'tcp', 'from-any' => 1, 'to-any' => 1, 'to-port-comp' => '=', 'to-port-num' => 113, 'keep' => 'state', 'cmt' => 'Allow connections to our IDENT server' }, ); } if ($in{'auto'} == 4) { # Allow pings and most high ports push(@rules, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'icmp', 'all' => 1, 'icmp-type' => 'echo', 'keep' => 'state', 'cmt' => 'Respond to pings' }, { 'action' => 'block', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'tcp', 'from-any' => 1, 'to-any' => 1, 'to-port-start' => 2049, 'to-port-range' => '<>', 'to-port-end' => 2050, 'keep' => 'state', 'cmt' => 'Protect our NFS server' }, { 'action' => 'block', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'tcp', 'from-any' => 1, 'to-any' => 1, 'to-port-start' => 6000, 'to-port-range' => '<>', 'to-port-end' => 6063, 'keep' => 'state', 'cmt' => 'Protect our X11 display server' }, { 'action' => 'block', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'tcp', 'from-any' => 1, 'to-any' => 1, 'to-port-start' => 7000, 'to-port-range' => '<>', 'to-port-end' => 7010, 'keep' => 'state', 'cmt' => 'Protect our X font server' }, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'tcp', 'from-any' => 1, 'to-any' => 1, 'to-port-start' => 1024, 'to-port-range' => '<>', 'to-port-end' => 65535, 'keep' => 'state', 'cmt' => 'Allow connections to unprivileged ports' }, ); } # Add final block rule push(@rules, { 'action' => 'block', 'active' => 1, 'all' => 1, 'dir' => 'in' }); push(@rules, { 'action' => 'pass', 'active' => 1, 'all' => 1, 'dir' => 'out' }); } else { # Just add one rule for NAT push(@natrules, { 'action' => 'map', 'active' => 1, 'fromip' => '0.0.0.0', 'frommask' => 0, 'toip' => '0.0.0.0', 'tomask' => 32, 'iface' => $iface, 'type' => 'ipnat' }); # Allow all other traffic push(@rules, { 'action' => 'pass', 'active' => 1, 'all' => 1, 'dir' => 'in' }); push(@rules, { 'action' => 'pass', 'active' => 1, 'all' => 1, 'dir' => 'out' }); } } else { # Just add rules to allow all push(@rules, { 'action' => 'pass', 'active' => 1, 'all' => 1, 'dir' => 'in' }); push(@rules, { 'action' => 'pass', 'active' => 1, 'all' => 1, 'dir' => 'out' }); } &lock_file($config{'ipf_conf'}); &save_config(\@rules); &unlock_file($config{'ipf_conf'}); &lock_file($config{'ipnatf_conf'}); &save_config(\@natrules, undef, 'ipnat'); &unlock_file($config{'ipnatf_conf'}); ©_to_cluster(); if ($in{'atboot'}) { &create_firewall_init(); } &webmin_log("setup"); &redirect("");
Close