Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
openssh-5.3p1 /
[ HOME SHELL ]
Name
Size
Permission
Action
CREDITS
5.42
KB
-rw-r--r--
ChangeLog
91.07
KB
-rw-r--r--
INSTALL
9.2
KB
-rw-r--r--
LICENCE
15.63
KB
-rw-r--r--
OVERVIEW
6.56
KB
-rw-r--r--
PROTOCOL
10.13
KB
-rw-r--r--
PROTOCOL.agent
17.55
KB
-rw-r--r--
PROTOCOL.certkeys
9.89
KB
-rw-r--r--
README
2.66
KB
-rw-r--r--
README.dns
1.57
KB
-rw-r--r--
README.nss
1.01
KB
-rw-r--r--
README.platform
3.92
KB
-rw-r--r--
README.privsep
2.6
KB
-rw-r--r--
README.smartcard
2
KB
-rw-r--r--
README.tun
4.78
KB
-rw-r--r--
TODO
2.71
KB
-rw-r--r--
WARNING.RNG
4.14
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : README.smartcard
How to use smartcards with OpenSSH? OpenSSH contains experimental support for authentication using Cyberflex smartcards and TODOS card readers, in addition to the cards with PKCS#15 structure supported by OpenSC. To enable this you need to: Using libsectok: (1) enable sectok support in OpenSSH: $ ./configure --with-sectok (2) If you have used a previous version of ssh with your card, you must remove the old applet and keys. $ sectok sectok> login -d sectok> junload Ssh.bin sectok> delete 0012 sectok> delete sh sectok> quit (3) load the Java Cardlet to the Cyberflex card and set card passphrase: $ sectok sectok> login -d sectok> jload /usr/libdata/ssh/Ssh.bin sectok> setpass Enter new AUT0 passphrase: Re-enter passphrase: sectok> quit Do not forget the passphrase. There is no way to recover if you do. IMPORTANT WARNING: If you attempt to login with the wrong passphrase three times in a row, you will destroy your card. (4) load a RSA key to the card: $ ssh-keygen -f /path/to/rsakey -U 1 (where 1 is the reader number, you can also try 0) In spite of the name, this does not generate a key. It just loads an already existing key on to the card. (5) Optional: If you don't want to use a card passphrase, change the acl on the private key file: $ sectok sectok> login -d sectok> acl 0012 world: w world: w AUT0: w inval sectok> quit If you do this, anyone who has access to your card can assume your identity. This is not recommended. Using OpenSC: (1) install OpenSC: Sources and instructions are available from http://www.opensc.org/ (2) enable OpenSC support in OpenSSH: $ ./configure --with-opensc[=/path/to/opensc] [options] (3) load a RSA key to the card: Not supported yet. Common operations: (1) tell the ssh client to use the card reader: $ ssh -I 1 otherhost (2) or tell the agent (don't forget to restart) to use the smartcard: $ ssh-add -s 1 -markus, Tue Jul 17 23:54:51 CEST 2001 $OpenBSD: README.smartcard,v 1.9 2003/11/21 11:57:02 djm Exp $
Close