Linux ip-172-26-5-244 6.1.0-28-cloud-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.119-1 (2024-11-22) x86_64
Apache
: 172.26.5.244 | : 216.73.216.21
Cant Read [ /etc/named.conf ]
8.3.14
daemon
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
etc /
[ HOME SHELL ]
Name
Size
Permission
Action
ImageMagick-6
[ DIR ]
drwxr-xr-x
NetworkManager
[ DIR ]
drwxr-xr-x
X11
[ DIR ]
drwxr-xr-x
alternatives
[ DIR ]
drwxr-xr-x
apparmor
[ DIR ]
drwxr-xr-x
apparmor.d
[ DIR ]
drwxr-xr-x
apt
[ DIR ]
drwxr-xr-x
bash_completion.d
[ DIR ]
drwxr-xr-x
binfmt.d
[ DIR ]
drwxr-xr-x
ca-certificates
[ DIR ]
drwxr-xr-x
cloud
[ DIR ]
drwxr-xr-x
cron.d
[ DIR ]
drwxr-xr-x
cron.daily
[ DIR ]
drwxr-xr-x
cron.hourly
[ DIR ]
drwxr-xr-x
cron.monthly
[ DIR ]
drwxr-xr-x
cron.weekly
[ DIR ]
drwxr-xr-x
cron.yearly
[ DIR ]
drwxr-xr-x
dbus-1
[ DIR ]
drwxr-xr-x
default
[ DIR ]
drwxr-xr-x
dhcp
[ DIR ]
drwxr-xr-x
dpkg
[ DIR ]
drwxr-xr-x
emacs
[ DIR ]
drwxr-xr-x
fonts
[ DIR ]
drwxr-xr-x
freetds
[ DIR ]
drwxr-xr-x
gonit
[ DIR ]
drwxr-xr-x
groff
[ DIR ]
drwxr-xr-x
grub.d
[ DIR ]
drwxr-xr-x
gss
[ DIR ]
drwxr-xr-x
init.d
[ DIR ]
drwxr-xr-x
initramfs-tools
[ DIR ]
drwxr-xr-x
iproute2
[ DIR ]
drwxr-xr-x
kernel
[ DIR ]
drwxr-xr-x
ld.so.conf.d
[ DIR ]
drwxr-xr-x
logrotate.d
[ DIR ]
drwxr-xr-x
modprobe.d
[ DIR ]
drwxr-xr-x
modules-load.d
[ DIR ]
drwxr-xr-x
monit
[ DIR ]
drwxr-xr-x
netplan
[ DIR ]
drwxr-xr-x
network
[ DIR ]
drwxr-xr-x
opt
[ DIR ]
drwxr-xr-x
pam.d
[ DIR ]
drwxr-xr-x
perl
[ DIR ]
drwxr-xr-x
pm
[ DIR ]
drwxr-xr-x
polkit-1
[ DIR ]
drwxr-xr-x
profile.d
[ DIR ]
drwxr-xr-x
python3
[ DIR ]
drwxr-xr-x
python3.11
[ DIR ]
drwxr-xr-x
rc0.d
[ DIR ]
drwxr-xr-x
rc1.d
[ DIR ]
drwxr-xr-x
rc2.d
[ DIR ]
drwxr-xr-x
rc3.d
[ DIR ]
drwxr-xr-x
rc4.d
[ DIR ]
drwxr-xr-x
rc5.d
[ DIR ]
drwxr-xr-x
rc6.d
[ DIR ]
drwxr-xr-x
rcS.d
[ DIR ]
drwxr-xr-x
runit
[ DIR ]
drwxr-xr-x
salt
[ DIR ]
drwxr-xr-x
security
[ DIR ]
drwxr-xr-x
selinux
[ DIR ]
drwxr-xr-x
sgml
[ DIR ]
drwxr-xr-x
skel
[ DIR ]
drwxr-xr-x
ssh
[ DIR ]
drwxr-xr-x
ssl
[ DIR ]
drwxr-xr-x
sudoers.d
[ DIR ]
drwxr-x---
sv
[ DIR ]
drwxr-xr-x
sysctl.d
[ DIR ]
drwxr-xr-x
systemd
[ DIR ]
drwxr-xr-x
terminfo
[ DIR ]
drwxr-xr-x
tmpfiles.d
[ DIR ]
drwxr-xr-x
udev
[ DIR ]
drwxr-xr-x
ufw
[ DIR ]
drwxr-xr-x
update-motd.d
[ DIR ]
drwxr-xr-x
vim
[ DIR ]
drwxr-xr-x
xdg
[ DIR ]
drwxr-xr-x
xml
[ DIR ]
drwxr-xr-x
.pwd.lock
0
B
-rw-------
.resolv.conf.systemd-resolved....
20
B
-rw-r--r--
adduser.conf
2.97
KB
-rw-r--r--
at.deny
144
B
-rw-r-----
bash.bashrc
1.95
KB
-rw-r--r--
bash_completion
45
B
-rw-r--r--
bindresvport.blacklist
367
B
-rw-r--r--
ca-certificates.conf
5.96
KB
-rw-r--r--
ca-certificates.conf.dpkg-old
5.85
KB
-rw-r--r--
cloud-release
33
B
-rw-r--r--
cron.deny
7
B
-rw-r--r--
crontab
1.08
KB
-rw-r--r--
debconf.conf
2.9
KB
-rw-r--r--
debian_version
6
B
-rw-r--r--
deluser.conf
1.67
KB
-rw-r--r--
e2scrub.conf
685
B
-rw-r--r--
environment
0
B
-rw-r--r--
ethertypes
1.81
KB
-rw-r--r--
fstab
187
B
-rw-r--r--
fstab.old
37
B
-rw-r--r--
gai.conf
2.52
KB
-rw-r--r--
gprofng.rc
3.79
KB
-rw-r--r--
group
815
B
-rw-r--r--
group-
801
B
-rw-r--r--
gshadow
689
B
-rw-r-----
gshadow-
679
B
-rw-r-----
host.conf
9
B
-rw-r--r--
hostname
16
B
-rw-r--r--
hosts
270
B
-rw-r--r--
hosts.allow
411
B
-rw-r--r--
hosts.deny
711
B
-rw-r--r--
inputrc
1.83
KB
-rw-r--r--
issue
27
B
-rw-r--r--
issue.net
20
B
-rw-r--r--
kernel-img.conf
17
B
-rw-r--r--
ld.so.cache
16.04
KB
-rw-r--r--
ld.so.conf
34
B
-rw-r--r--
libaudit.conf
191
B
-rw-r--r--
locale.alias
2.93
KB
-rw-r--r--
locale.gen
9.21
KB
-rw-r--r--
localtime
114
B
-rw-r--r--
login.defs
12.27
KB
-rw-r--r--
logrotate.conf
494
B
-rw-r--r--
machine-id
33
B
-rw-r--r--
magic
111
B
-rw-r--r--
magic.mime
111
B
-rw-r--r--
manpath.config
5.11
KB
-rw-r--r--
mime.types
72.09
KB
-rw-r--r--
mke2fs.conf
782
B
-rw-r--r--
modules
248
B
-rw-r--r--
motd
736
B
-rw-r--r--
mtab
0
B
-r--r--r--
nanorc
11.16
KB
-rw-r--r--
netconfig
767
B
-rw-r--r--
networks
60
B
-rw-r--r--
nsswitch.conf
520
B
-rw-r--r--
os-release
267
B
-rw-r--r--
pam.conf
552
B
-rw-r--r--
passwd
1.46
KB
-rw-r--r--
passwd-
1.46
KB
-rw-r--r--
profile
769
B
-rw-r--r--
protocols
3.07
KB
-rw-r--r--
reportbug.conf
3.15
KB
-rw-r--r--
resolv.conf
785
B
-rw-r--r--
rmt
59.02
KB
-rwxr-xr-x
rpc
911
B
-rw-r--r--
screenrc
3.58
KB
-rw-r--r--
services
12.51
KB
-rw-r--r--
shadow
781
B
-rw-r-----
shadow-
781
B
-rw-r-----
shells
144
B
-rw-r--r--
subgid
59
B
-rw-r--r--
subgid-
40
B
-rw-r--r--
subuid
59
B
-rw-r--r--
subuid-
40
B
-rw-r--r--
sudo.conf
4.24
KB
-rw-r--r--
sudo_logsrvd.conf
9.57
KB
-rw-r--r--
sudoers
1.67
KB
-r--r-----
sysctl.conf
2.3
KB
-rw-r--r--
timezone
8
B
-rw-r--r--
ucf.conf
1.23
KB
-rw-r--r--
wgetrc
4.83
KB
-rw-r--r--
xattr.conf
681
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : sudo.conf
# # Default /etc/sudo.conf file # # Sudo plugins: # Plugin plugin_name plugin_path plugin_options ... # # The plugin_path is relative to /usr/libexec/sudo unless # fully qualified. # The plugin_name corresponds to a global symbol in the plugin # that contains the plugin interface structure. # The plugin_options are optional. # # The sudoers plugin is used by default if no Plugin lines are present. #Plugin sudoers_policy sudoers.so #Plugin sudoers_io sudoers.so #Plugin sudoers_audit sudoers.so # # Sudo askpass: # Path askpass /path/to/askpass # # An askpass helper program may be specified to provide a graphical # password prompt for "sudo -A" support. Sudo does not ship with its # own askpass program but can use the OpenSSH askpass. # # Use the OpenSSH askpass #Path askpass /usr/X11R6/bin/ssh-askpass # # Use the Gnome OpenSSH askpass #Path askpass /usr/libexec/openssh/gnome-ssh-askpass # # Sudo device search path: # Path devsearch /dev/path1:/dev/path2:/dev # # A colon-separated list of paths to check when searching for a user's # terminal device. # #Path devsearch /dev/pts:/dev/vt:/dev/term:/dev/zcons:/dev/pty:/dev # # Sudo command interception: # Path intercept /path/to/sudo_intercept.so # # Path to a shared library containing replacements for the execv(), # execve() and fexecve() library functions that perform a policy check # to verify the command is allowed and simply return an error if not. # This is used to implement the "intercept" functionality on systems that # support LD_PRELOAD or its equivalent. # # The compiled-in value is usually sufficient and should only be changed # if you rename or move the sudo_intercept.so file. # #Path intercept /usr/libexec/sudo/sudo_intercept.so # # Sudo noexec: # Path noexec /path/to/sudo_noexec.so # # Path to a shared library containing replacements for the execv(), # execve() and fexecve() library functions that just return an error. # This is used to implement the "noexec" functionality on systems that # support LD_PRELOAD or its equivalent. # # The compiled-in value is usually sufficient and should only be changed # if you rename or move the sudo_noexec.so file. # #Path noexec /usr/libexec/sudo/sudo_noexec.so # # Sudo plugin directory: # Path plugin_dir /path/to/plugins # # The default directory to use when searching for plugins that are # specified without a fully qualified path name. # #Path plugin_dir /usr/libexec/sudo # # Core dumps: # Set disable_coredump true|false # # By default, sudo disables core dumps while it is executing (they # are re-enabled for the command that is run). # To aid in debugging sudo problems, you may wish to enable core # dumps by setting "disable_coredump" to false. # #Set disable_coredump false # # User groups: # Set group_source static|dynamic|adaptive # # Sudo passes the user's group list to the policy plugin. # If the user is a member of the maximum number of groups (usually 16), # sudo will query the group database directly to be sure to include # the full list of groups. # # On some systems, this can be expensive so the behavior is configurable. # The "group_source" setting has three possible values: # static - use the user's list of groups returned by the kernel. # dynamic - query the group database to find the list of groups. # adaptive - if user is in less than the maximum number of groups. # use the kernel list, else query the group database. # #Set group_source static # # Sudo interface probing: # Set probe_interfaces true|false # # By default, sudo will probe the system's network interfaces and # pass the IP address of each enabled interface to the policy plugin. # On systems with a large number of virtual interfaces this may take # a noticeable amount of time. # #Set probe_interfaces false # # Sudo debug files: # Debug program /path/to/debug_log subsystem@priority[,subsyste@priority] # # Sudo and related programs support logging debug information to a file. # The program is typically sudo, sudoers.so, sudoreplay, or visudo. # # Subsystems vary based on the program; "all" matches all subsystems. # Priority may be crit, err, warn, notice, diag, info, trace, or debug. # Multiple subsystem@priority may be specified, separated by a comma. # #Debug sudo /var/log/sudo_debug all@debug #Debug sudoers.so /var/log/sudoers_debug all@debug
Close