Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
selinux /
devel /
include /
system /
[ HOME SHELL ]
Name
Size
Permission
Action
application.if
4.2
KB
-rw-r--r--
authlogin.if
33.85
KB
-rw-r--r--
clock.if
1.9
KB
-rw-r--r--
daemontools.if
4.21
KB
-rw-r--r--
fstools.if
2.95
KB
-rw-r--r--
getty.if
1.72
KB
-rw-r--r--
hostname.if
1.24
KB
-rw-r--r--
hotplug.if
3.29
KB
-rw-r--r--
init.if
41.11
KB
-rw-r--r--
ipsec.if
8
KB
-rw-r--r--
iptables.if
3.27
KB
-rw-r--r--
iscsi.if
1.51
KB
-rw-r--r--
kdump.if
2.18
KB
-rw-r--r--
libraries.if
10.88
KB
-rw-r--r--
locallogin.if
2.85
KB
-rw-r--r--
logging.if
23.83
KB
-rw-r--r--
lvm.if
3.91
KB
-rw-r--r--
miscfiles.if
15.45
KB
-rw-r--r--
modutils.if
6.94
KB
-rw-r--r--
mount.if
7.07
KB
-rw-r--r--
netlabel.if
1013
B
-rw-r--r--
pcmcia.if
3.01
KB
-rw-r--r--
raid.if
1.38
KB
-rw-r--r--
selinuxutil.if
35.72
KB
-rw-r--r--
setrans.if
977
B
-rw-r--r--
sosreport.if
2.41
KB
-rw-r--r--
sysnetwork.if
16.6
KB
-rw-r--r--
udev.if
5.99
KB
-rw-r--r--
unconfined.if
4.33
KB
-rw-r--r--
userdomain.if
103.05
KB
-rw-r--r--
xen.if
4.76
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : daemontools.if
## <summary>Collection of tools for managing UNIX services</summary> ## <desc> ## <p> ## Policy for DJB's daemontools ## </p> ## </desc> ######################################## ## <summary> ## An ipc channel between the supervised domain and svc_start_t ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access to svc_start_t. ## </summary> ## </param> # interface(`daemontools_ipc_domain',` gen_require(` type svc_start_t; ') allow $1 svc_start_t:process sigchld; allow $1 svc_start_t:fd use; allow $1 svc_start_t:fifo_file { read write getattr }; allow svc_start_t $1:process signal; ') ######################################## ## <summary> ## Define a specified domain as a supervised service. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <param name="entrypoint"> ## <summary> ## The type associated with the process program. ## </summary> ## </param> # interface(`daemontools_service_domain',` gen_require(` type svc_run_t; ') domain_auto_trans(svc_run_t, $2, $1) daemontools_ipc_domain($1) allow svc_run_t $1:process signal; allow $1 svc_run_t:fd use; ') ######################################## ## <summary> ## Execute in the svc_start_t domain. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`daemontools_domtrans_start',` gen_require(` type svc_start_t, svc_start_exec_t; ') domtrans_pattern($1, svc_start_exec_t, svc_start_t) ') ###################################### ## <summary> ## Execute svc_start in the svc_start domain, and ## allow the specified role the svc_start domain. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <param name="role"> ## <summary> ## The role to be allowed the svc_start domain. ## </summary> ## </param> ## <rolecap/> # interface(`daemonstools_run_start',` gen_require(` type svc_start_t; ') daemontools_domtrans_start($1) role $2 types svc_start_t; ') ######################################## ## <summary> ## Execute in the svc_run_t domain. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`daemontools_domtrans_run',` gen_require(` type svc_run_t, svc_run_exec_t; ') domtrans_pattern($1, svc_run_exec_t, svc_run_t) ') ######################################## ## <summary> ## Execute in the svc_multilog_t domain. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`daemontools_domtrans_multilog',` gen_require(` type svc_multilog_t, svc_multilog_exec_t; ') domtrans_pattern($1, svc_multilog_exec_t, svc_multilog_t) ') ######################################## ## <summary> ## Allow a domain to read svc_svc_t files. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <rolecap/> # interface(`daemontools_read_svc',` gen_require(` type svc_svc_t; ') allow $1 svc_svc_t:dir list_dir_perms; allow $1 svc_svc_t:file read_file_perms; ') ###################################### ## <summary> ## Search svc_svc_t directory. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`daemontools_search_svc_dir',` gen_require(` type svc_svc_t; ') allow $1 svc_svc_t:dir search_dir_perms; ') ######################################## ## <summary> ## Allow a domain to create svc_svc_t files. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <rolecap/> # interface(`daemontools_manage_svc',` gen_require(` type svc_svc_t; ') allow $1 svc_svc_t:dir manage_dir_perms; allow $1 svc_svc_t:fifo_file manage_fifo_file_perms; allow $1 svc_svc_t:file manage_file_perms; allow $1 svc_svc_t:lnk_file { read create }; ') ###################################### ## <summary> ## Send a SIGCHLD signal to svc_run domain. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`daemontools_sigchld_run',` gen_require(` type svc_run_t; ') allow $1 svc_run_t:process sigchld; ')
Close