Linux lionsclub 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64
Apache/2.4.29 (Ubuntu)
: 161.35.52.75 | : 3.139.240.219
Cant Read [ /etc/named.conf ]
7.4.28
www-data
shells.trxsecurity.org
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
Backdoor Scanner
Backdoor Create
Alfa Webshell
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
src /
linux-headers-4.15.0-210 /
tools /
nfsd /
[ HOME SHELL ]
Name
Size
Permission
Action
inject_fault.sh
1.01
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : inject_fault.sh
#!/bin/bash # SPDX-License-Identifier: GPL-2.0 # # Copyright (c) 2011 Bryan Schumaker <bjschuma@netapp.com> # # Script for easier NFSD fault injection # Check that debugfs has been mounted DEBUGFS=`cat /proc/mounts | grep debugfs` if [ "$DEBUGFS" == "" ]; then echo "debugfs does not appear to be mounted!" echo "Please mount debugfs and try again" exit 1 fi # Check that the fault injection directory exists DEBUGDIR=`echo $DEBUGFS | awk '{print $2}'`/nfsd if [ ! -d "$DEBUGDIR" ]; then echo "$DEBUGDIR does not exist" echo "Check that your .config selects CONFIG_NFSD_FAULT_INJECTION" exit 1 fi function help() { echo "Usage $0 injection_type [count]" echo "" echo "Injection types are:" ls $DEBUGDIR exit 1 } if [ $# == 0 ]; then help elif [ ! -f $DEBUGDIR/$1 ]; then help elif [ $# != 2 ]; then COUNT=0 else COUNT=$2 fi BEFORE=`mktemp` AFTER=`mktemp` dmesg > $BEFORE echo $COUNT > $DEBUGDIR/$1 dmesg > $AFTER # Capture lines that only exist in the $AFTER file diff $BEFORE $AFTER | grep ">" rm -f $BEFORE $AFTER
Close