Linux ip-172-26-5-244 6.1.0-28-cloud-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.119-1 (2024-11-22) x86_64
Apache
: 172.26.5.244 | : 216.73.216.21
Cant Read [ /etc/named.conf ]
8.3.14
daemon
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
share /
apport /
package-hooks /
[ HOME SHELL ]
Name
Size
Permission
Action
openssh-client.py
1.18
KB
-rw-r--r--
openssh-server.py
1004
B
-rw-r--r--
source_apparmor.py
2.72
KB
-rw-r--r--
source_grub2.py
3.79
KB
-rw-r--r--
source_sudo.py
1.13
KB
-rwxr-xr-x
source_unattended-upgrades.py
705
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : source_sudo.py
#!/usr/bin/python3 '''Apport package hook for sudo (c) 2010 Canonical Ltd. Contributors: Marc Deslauriers <marc.deslauriers@canonical.com> This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. See http://www.gnu.org/copyleft/gpl.html for the full text of the license. ''' from apport.hookutils import * def add_info(report, ui): response = ui.yesno("The contents of your /etc/sudoers file may help developers diagnose your bug more quickly, however, it may contain sensitive information. Do you want to include it in your bug report?") if response == None: #user cancelled raise StopIteration elif response == True: # This needs to be run as root report['Sudoers'] = root_command_output(['/bin/cat', '/etc/sudoers']) report['VisudoCheck'] = root_command_output(['/usr/sbin/visudo', '-c']) elif response == False: ui.information("The contents of your /etc/sudoers will NOT be included in the bug report.")
Close