Linux server.uxijen.com 4.18.0-553.83.1.lve.el8.x86_64 #1 SMP Wed Nov 12 10:04:12 UTC 2025 x86_64
LiteSpeed
Server IP : 94.177.147.70 & Your IP : 216.73.216.26
Domains :
Cant Read [ /etc/named.conf ]
User : uxijen
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
etc /
security /
Delete
Unzip
Name
Size
Permission
Date
Action
console.apps
[ DIR ]
drwxr-xr-x
2026-01-11 17:54
console.perms.d
[ DIR ]
drwxr-xr-x
2025-12-17 18:53
limits.d
[ DIR ]
drwxr-xr-x
2025-12-17 18:54
namespace.d
[ DIR ]
drwxr-xr-x
2025-12-17 18:54
access.conf
4.46
KB
-rw-r--r--
2025-12-17 18:53
chroot.conf
82
B
-rw-r--r--
2025-12-17 18:53
console.handlers
624
B
-rw-r--r--
2025-12-17 18:53
console.perms
939
B
-rw-r--r--
2025-12-17 18:53
faillock.conf
2.18
KB
-rw-r--r--
2025-12-17 18:53
group.conf
3.55
KB
-rw-r--r--
2025-12-17 18:53
limits.conf
2.37
KB
-rw-r--r--
2025-12-17 18:54
namespace.conf
1.41
KB
-rw-r--r--
2025-12-17 18:54
namespace.init
1.92
KB
-rwxr-xr-x
2025-12-17 18:54
opasswd
0
B
-rw-------
2025-12-17 18:54
pam_env.conf
2.9
KB
-rw-r--r--
2025-12-17 18:53
pwhistory.conf
517
B
-rw-r--r--
2025-12-17 18:54
sepermit.conf
419
B
-rw-r--r--
2025-12-17 18:54
time.conf
2.13
KB
-rw-r--r--
2025-12-17 18:54
Save
Rename
#!/bin/sh # It receives as arguments: # - $1 polydir path (see WARNING below) # - $2 instance path (see WARNING below) # - $3 flag whether the instance dir was newly created (0 - no, 1 - yes) # - $4 user name # - $5 flag whether the polydir path ($1) is safe (0 - unsafe, 1 -safe) # - $6 flag whether the instance path ($2) is safe (0 - unsafe, 1 - safe) # # WARNING: This script is invoked with full root privileges. Accessing # the polydir ($1) and the instance ($2) directories in this context may be # extremely dangerous as those can be under user control. The flags $5 and $6 # are provided to let you know if all the segments part of the path (except the # last one) are owned by root and are writable by root only. If the path does # not meet these criteria, you expose yourself to possible symlink attacks when # accessing these path. # However, even if the path components are safe, the content of the # directories may still be owned/writable by a user, so care must be taken! # # The following section will copy the contents of /etc/skel if this is a # newly created home directory. # Executes only if the polydir path is safe if [ "$5" = 1 ]; then if [ "$3" = 1 ]; then # This line will fix the labeling on all newly created directories [ -x /sbin/restorecon ] && /sbin/restorecon "$1" user="$4" passwd=$(getent passwd "$user") homedir=$(echo "$passwd" | cut -f6 -d":") if [ "$1" = "$homedir" ]; then gid=$(echo "$passwd" | cut -f4 -d":") cp -rT /etc/skel "$homedir" chown -R "$user":"$gid" "$homedir" mask=$(sed -E -n 's/^UMASK[[:space:]]+([^#[:space:]]+).*/\1/p' /etc/login.defs) mode=$(printf "%o" $((0777 & ~mask))) chmod ${mode:-700} "$homedir" [ -x /sbin/restorecon ] && /sbin/restorecon -R "$homedir" fi fi fi exit 0