Linux business72.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
LiteSpeed
: 162.0.229.97 | : 18.116.14.71
Cant Read [ /etc/named.conf ]
8.1.30
temmmp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
lib64 /
nagios /
plugins /
nccustom /
[ HOME SHELL ]
Name
Size
Permission
Action
authorized_users.list
143
B
-rw-r-----
check-autobackup.sh
6.68
KB
-rwxr-xr-x
check-cagefs-status.sh
2.04
KB
-rwxr-xr-x
check-cpanel-update.sh
1.85
KB
-rwxr-xr-x
check-litespeed-version.sh
2.87
KB
-rwxr-xr-x
check-lscache-version.sh
3.84
KB
-rwxr-xr-x
check-mail-filter-avlb.sh
2.18
KB
-rwxr-xr-x
check-outmailip-rbl.py
3.99
KB
-rwxr-xr-x
check-rpmdb-integrity.sh
1.63
KB
-rwxr-xr-x
check-unexpected-systemd-servi...
8.07
KB
-rwxr-xr-x
check_backup.sh
6.35
KB
-rwxr-xr-x
check_cl_license
950
B
-rwxr-xr-x
check_cplicense.sh
268
B
-rwxr-xr-x
check_cpshell
949
B
-rwxr-xr-x
check_csf
3.72
KB
-rwxr-xr-x
check_cwaf.sh
2.44
KB
-rwxr-xr-x
check_execve_filter.list
370
B
-rw-r-----
check_execve_privileges.sh
2.51
KB
-rwxr-x---
check_eximq.sh
3.16
KB
-rwxr-xr-x
check_extra_accts.py
4.18
KB
-rwxr-xr-x
check_http_full_stack.conf
144
B
-rw-r--r--
check_http_full_stack.py
4.3
KB
-rwxr-xr-x
check_if_ips.py
4.15
KB
-rwxr-xr-x
check_if_ips_tcp.py
4.71
KB
-rwxr-xr-x
check_ip_update_log.sh
540
B
-rwxr-xr-x
check_ip_usage.py
6.67
KB
-rwxr-xr-x
check_kernelcare.sh
2.13
KB
-rwxr-xr-x
check_lfd_logs.conf
471
B
-rw-r--r--
check_logfiles.conf
595
B
-rw-r--r--
check_logfiles.pl
206.82
KB
-rwxr-xr-x
check_logfiles_innodbcounter.c...
1002
B
-rw-r--r--
check_mailip.py
3.83
KB
-rwxr-xr-x
check_mem.pl
12.85
KB
-rwxr-xr-x
check_mysqld_msize.sh
666
B
-rwxr-xr-x
check_nc_cp_backup_process.sh
8.75
KB
-rwxr-xr-x
check_ncsslplugin.py
1.89
KB
-rwxr-xr-x
check_ntp_client
11.78
KB
-rwxr-xr-x
check_openport.sh
7.59
KB
-rwxr-xr-x
check_pem_worker.pl
929
B
-rwxr-xr-x
check_pgactivity
294.21
KB
-rwxr-xr-x
check_plans.py
7.59
KB
-rwxr-xr-x
check_puppet
16.14
KB
-rwxr-xr-x
check_quota_on.sh
902
B
-rwxr-xr-x
check_ro_fs.py
3.43
KB
-rwxr-xr-x
check_service.sh
9.34
KB
-rwxr-xr-x
check_software_updates
31.68
KB
-rwxr-xr-x
check_spamd
6.7
KB
-rwxr-xr-x
check_stalled_procs.py
4.42
KB
-rwxr-xr-x
check_suid_status.sh
295
B
-rwxr-xr-x
check_suspicious_files_status....
1.42
KB
-rwxr-xr-x
check_unauthorized_user.sh
17.16
KB
-rwxr-xr-x
replcheck_param.pl
5.48
KB
-rwxr-xr-x
systemd_scopes_whitelist
10
B
-rw-r--r--
systemd_services_folders
70
B
-rw-r--r--
systemd_services_whitelist
6.67
KB
-rw-r-----
systemd_targets_whitelist
12
B
-rw-r--r--
test.eml
3.26
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : check_if_ips.py
#!/usr/libexec/platform-python # version 2016/12/13 # writen by v.burov # Requirements: # you need to allow fillowing commands: # "/bin/ping","ip","sed" # Please pay attention that it's necessary to add access to sudoers file for /bin/ping if it is not SUID import os, stat, re, sys, time, argparse from subprocess import Popen, PIPE ellist='' redlist='' PING = '/bin/ping' SUDO = '/usr/bin/sudo' def check_sudo_usable(): """Checks that the SUDO program and path are correct and usable - that the program exists and is executable, otherwise exits with error.""" if not os.path.exists(SUDO): end(UNKNOWN, "%s cannot be found" % SUDO) elif not os.path.isfile(SUDO): end(UNKNOWN, "%s is not a file" % SUDO) elif not os.access(SUDO, os.X_OK): end(UNKNOWN, "%s is not executable" % SUDO) def get_server_ips(): # Python 2 version; #ips = Popen("ip -4 -o a|sed -e '/inet 127\|inet 10\\.\|inet 172\|inet 192\\.168/d' -e 's/.*inet \(.*\)\/.*/\\1/'", stdout=PIPE, shell=True).stdout.read().split('\n') ips = Popen("ip -4 -o a|sed -e '/inet 127\|inet 10\\.\|inet 100\\.100\\.0\\.\|inet 172\|inet 192\\.168/d' -e 's/.*inet \(.*\)\/.*/\\1/'", stdout=PIPE, shell=True).stdout.read().decode('UTF-8').split('\n') return ips def ping_to_float(s): try: return float(s) except ValueError: return 5000.1 def add_redlist(s): global redlist if redlist=='': redlist='CRITICAL - '+s else: redlist+=', '+s def add_ellist(s): global ellist if ellist=='': ellist='Warning - '+s else: ellist+=', '+s if __name__ == "__main__": parser = argparse.ArgumentParser() parser.add_argument("-v","--verbose", default=False, action="store_true", help="Extra output") parser.add_argument("destination", nargs='?', default="nagios.web-hosting.com", help="Destination") args = parser.parse_args() ips=[] ips=get_server_ips() #print(ips) pingoutputmatch=re.compile("icmp\S+=(\d+)\s+\S+\s+time=(\S+)\s+") destination = args.destination if args.verbose : print("Destination = {}".format(destination)) use_sudo = False if not os.stat(PING).st_mode & stat.S_ISUID: if args.verbose : print("/bin/ping is not SUID: have to use sudo") check_sudo_usable() use_sudo = True running_procs={} result={} for s in ips: if len(s) == 0: continue if use_sudo : running_procs[s]=Popen([SUDO, PING,'-I', s, '-A','-n','-c','3','-W','1',destination], stdout=PIPE, stderr=PIPE) else: running_procs[s]=Popen([PING,'-I', s, '-A', '-n', '-c', '3', '-W', '1', destination], stdout=PIPE, stderr=PIPE) result[s] = ['-','-','-'] i1=0 while running_procs : i1+=1 if i1>1000 : print("Script error: loop") sys.exit(3) for ip in running_procs.keys(): proc = running_procs[ip] retcode = proc.poll() if retcode is not None: # Process finished. del running_procs[ip] break else: # No process is done, wait a bit and check again. time.sleep(.1) continue retcode = proc.poll() if retcode is None: time.sleep(.1) continue i2=0 for output in iter(proc.stdout.readline,b'') : p=pingoutputmatch.search(output.decode('UTF-8')) if p: result[ip][int(p.group(1))-1] = p.group(2) if args.verbose : print("%{} seq={}s time={}s ms".format(ip, p.group(1), p.group(2))) for ip in result.keys(): if args.verbose : print("ip+{}{}{} ".format(result[ip][0],result[ip][1],result[ip][2])) if result[ip][0]=='-' and result[ip][1]=='-' and result[ip][2]=='-': add_redlist(ip) else: p1=ping_to_float(result[ip][0]) p2=ping_to_float(result[ip][1]) p3=ping_to_float(result[ip][2]) if p1>400 and p2>400 and p3>400 : add_redlist('%s(%s;%s;%s)' % (ip,result[ip][0],result[ip][1],result[ip][2])) elif p1>200 and p2>200 and p3>200 : add_ellist('%s(%s;%s;%s)' % (ip,result[ip][0],result[ip][1],result[ip][2])) if len(redlist)>0 : print("{}{}".format(redlist,ellist)) sys.exit(2) if len(ellist)>0 : print(ellist) sys.exit(1) print("OK")
Close