Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
certmonger-0.77.5 /
[ HOME SHELL ]
Name
Size
Permission
Action
LICENSE
71
B
-rw-r--r--
README
1.62
KB
-rw-r--r--
STATUS
7.35
KB
-rw-r--r--
api.txt
11.35
KB
-rw-r--r--
certmaster-submit.txt
817
B
-rw-r--r--
design.txt
23.52
KB
-rw-r--r--
dogtag-notes-2.txt
1.46
KB
-rw-r--r--
dogtag-notes.txt
15.28
KB
-rw-r--r--
fips.txt
549
B
-rw-r--r--
ftw.txt
5.82
KB
-rw-r--r--
getting-started.txt
9.41
KB
-rw-r--r--
gpl-3.0.txt
34.32
KB
-rw-r--r--
ipa-submit.txt
1.64
KB
-rw-r--r--
local-signer.txt
1.49
KB
-rw-r--r--
sbexample.txt
4.55
KB
-rw-r--r--
scep.txt
1.8
KB
-rw-r--r--
selinux.txt
4.44
KB
-rw-r--r--
submit.txt
7.68
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : certmaster-submit.txt
The submission protocol is a single XMLRPC. Request to http://server:port/, method = "wait_for_cert". The port, default "51235", is given in the server's certmaster.conf, and both the server and the port number are given in the client's minion.conf. The client does not authenticate. Request parameters are a single argument, PEM-formatted CSR, with the limitation that the header must be for "CERTIFICATE REQUEST" and not "NEW CERTIFICATE REQUEST". (The request as-sent is compared to a rebuilt copy which uses this header to determine if the request matches one which has already been received.) Response is a sequence of (boolean, string, string), either (true, issued-cert, issuer-cert), or (false, '', ''). The issued certificate is returned in PEM format. - Based on certmaster.py from certmaster 0.25.
Close