Linux srv25.usacloudserver.us 5.14.0-570.39.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Sep 4 05:08:52 EDT 2025 x86_64
LiteSpeed
Server IP : 23.137.84.82 & Your IP : 216.73.216.127
Domains :
Cant Read [ /etc/named.conf ]
User : epicgamerzoneco
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
etc /
security /
Delete
Unzip
Name
Size
Permission
Date
Action
console.apps
[ DIR ]
drwxr-xr-x
2025-09-03 03:46
console.perms.d
[ DIR ]
drwxr-xr-x
2025-09-03 03:46
limits.d
[ DIR ]
drwxr-xr-x
2025-09-03 03:46
namespace.d
[ DIR ]
drwxr-xr-x
2025-09-03 03:46
access.conf
4.46
KB
-rw-r--r--
2025-09-03 03:46
chroot.conf
82
B
-rw-r--r--
2025-09-03 03:46
console.handlers
624
B
-rw-r--r--
2025-09-03 03:46
console.perms
939
B
-rw-r--r--
2025-09-03 03:46
faillock.conf
2.18
KB
-rw-r--r--
2025-09-03 03:46
group.conf
3.55
KB
-rw-r--r--
2025-09-03 03:46
limits.conf
2.37
KB
-rw-r--r--
2025-09-03 03:46
namespace.conf
1.6
KB
-rw-r--r--
2025-09-03 03:46
namespace.init
1.93
KB
-rwxr-xr-x
2025-09-03 03:46
opasswd
0
B
-rw-------
2025-09-03 03:47
pam_env.conf
2.9
KB
-rw-r--r--
2025-09-03 03:46
pwhistory.conf
517
B
-rw-r--r--
2025-09-03 03:46
sepermit.conf
418
B
-rw-r--r--
2025-09-03 03:46
time.conf
2.13
KB
-rw-r--r--
2025-09-03 03:47
Save
Rename
#!/usr/bin/sh # It receives as arguments: # - $1 polydir path (see WARNING below) # - $2 instance path (see WARNING below) # - $3 flag whether the instance dir was newly created (0 - no, 1 - yes) # - $4 user name # - $5 flag whether the polydir path ($1) is safe (0 - unsafe, 1 -safe) # - $6 flag whether the instance path ($2) is safe (0 - unsafe, 1 - safe) # # WARNING: This script is invoked with full root privileges. Accessing # the polydir ($1) and the instance ($2) directories in this context may be # extremely dangerous as those can be under user control. The flags $5 and $6 # are provided to let you know if all the segments part of the path (except the # last one) are owned by root and are writable by root only. If the path does # not meet these criteria, you expose yourself to possible symlink attacks when # accessing these path. # However, even if the path components are safe, the content of the # directories may still be owned/writable by a user, so care must be taken! # # The following section will copy the contents of /etc/skel if this is a # newly created home directory. # Executes only if the polydir path is safe if [ "$5" = 1 ]; then if [ "$3" = 1 ]; then # This line will fix the labeling on all newly created directories [ -x /sbin/restorecon ] && /sbin/restorecon "$1" user="$4" passwd=$(getent passwd "$user") homedir=$(echo "$passwd" | cut -f6 -d":") if [ "$1" = "$homedir" ]; then gid=$(echo "$passwd" | cut -f4 -d":") cp -rT /etc/skel "$homedir" chown -R "$user":"$gid" "$homedir" mask=$(sed -E -n 's/^UMASK[[:space:]]+([^#[:space:]]+).*/\1/p' /etc/login.defs) mode=$(printf "%o" $((0777 & ~mask))) chmod ${mode:-700} "$homedir" [ -x /sbin/restorecon ] && /sbin/restorecon -R "$homedir" fi fi fi exit 0