Linux quad-clini-stageVM 5.4.0-1109-azure #115~18.04.1-Ubuntu SMP Mon May 22 20:06:37 UTC 2023 x86_64
Apache/2.4.29 (Ubuntu)
: 10.2.0.4 | : 3.135.207.204
Cant Read [ /etc/named.conf ]
7.4.25
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
sbin /
[ HOME SHELL ]
Name
Size
Permission
Action
a2disconf
15.89
KB
-rwxr-xr-x
a2dismod
15.89
KB
-rwxr-xr-x
a2dissite
15.89
KB
-rwxr-xr-x
a2enconf
15.89
KB
-rwxr-xr-x
a2enmod
15.89
KB
-rwxr-xr-x
a2ensite
15.89
KB
-rwxr-xr-x
a2query
9.64
KB
-rwxr-xr-x
aa-remove-unknown
2.85
KB
-rwxr-xr-x
aa-status
8.41
KB
-rwxr-xr-x
accessdb
10.23
KB
-rwxr-xr-x
acpid
50.84
KB
-rwxr-xr-x
add-shell
860
B
-rwxr-xr-x
addgnupghome
3.01
KB
-rwxr-xr-x
addgroup
36.45
KB
-rwxr-xr-x
adduser
36.45
KB
-rwxr-xr-x
apache2
659.69
KB
-rwxr-xr-x
apache2ctl
7.06
KB
-rwxr-xr-x
apachectl
7.06
KB
-rwxr-xr-x
apparmor_status
8.41
KB
-rwxr-xr-x
applygnupgdefaults
2.17
KB
-rwxr-xr-x
arp
61.3
KB
-rwxr-xr-x
arpd
54.03
KB
-rwxr-xr-x
atd
26.01
KB
-rwxr-xr-x
bcache-super-show
13.99
KB
-rwxr-xr-x
biosdecode
18.87
KB
-rwxr-xr-x
bpftool
1.58
KB
-rwxr-xr-x
check_forensic
952
B
-rwxr-xr-x
chgpasswd
57.83
KB
-rwxr-xr-x
chmem
42.08
KB
-rwxr-xr-x
chpasswd
53.86
KB
-rwxr-xr-x
chroot
38.18
KB
-rwxr-xr-x
cifs.idmap
14.07
KB
-rwxr-xr-x
cifs.upcall
34.28
KB
-rwxr-xr-x
cpgr
55.96
KB
-rwxr-xr-x
cppw
55.96
KB
-rwxr-xr-x
cron
46.3
KB
-rwxr-xr-x
cryptdisks_start
1.11
KB
-rwxr-xr-x
cryptdisks_stop
1.16
KB
-rwxr-xr-x
delgroup
16.11
KB
-rwxr-xr-x
deluser
16.11
KB
-rwxr-xr-x
dmidecode
106.54
KB
-rwxr-xr-x
dnsmasq
379.6
KB
-rwxr-xr-x
dpkg-preconfigure
3.58
KB
-rwxr-xr-x
dpkg-reconfigure
4.34
KB
-rwxr-xr-x
e2freefrag
14.07
KB
-rwxr-xr-x
e4crypt
22.07
KB
-rwxr-xr-x
e4defrag
25.99
KB
-rwxr-xr-x
ephemeral-disk-warning
982
B
-rwxr-xr-x
faillock
13.99
KB
-rwxr-xr-x
fdformat
30.08
KB
-rwxr-xr-x
filefrag
14.02
KB
-rwxr-xr-x
genl
58.05
KB
-rwxr-xr-x
groupadd
61.92
KB
-rwxr-xr-x
groupdel
70.37
KB
-rwxr-xr-x
groupmems
57.87
KB
-rwxr-xr-x
groupmod
68.18
KB
-rwxr-xr-x
grpck
53.8
KB
-rwxr-xr-x
grpconv
49.68
KB
-rwxr-xr-x
grpunconv
49.68
KB
-rwxr-xr-x
grub-bios-setup
793.15
KB
-rwxr-xr-x
grub-install
1003.51
KB
-rwxr-xr-x
grub-macbless
780.84
KB
-rwxr-xr-x
grub-mkconfig
8.03
KB
-rwxr-xr-x
grub-mkdevicemap
207.62
KB
-rwxr-xr-x
grub-probe
793.09
KB
-rwxr-xr-x
grub-reboot
4.73
KB
-rwxr-xr-x
grub-set-default
3.47
KB
-rwxr-xr-x
httxt2dbm
9.99
KB
-rwxr-xr-x
hv_fcopy_daemon
1.58
KB
-rwxr-xr-x
hv_get_dhcp_info
1.39
KB
-rwxr-xr-x
hv_get_dns_info
622
B
-rwxr-xr-x
hv_kvp_daemon
1.58
KB
-rwxr-xr-x
hv_set_ifconfig
7.72
KB
-rwxr-xr-x
hv_vss_daemon
1.58
KB
-rwxr-xr-x
iconvconfig
30.25
KB
-rwxr-xr-x
init.lxc
38.5
KB
-rwxr-xr-x
init.lxc.static
1001.56
KB
-rwxr-xr-x
invoke-rc.d
15.66
KB
-rwxr-xr-x
ip6tables-apply
6.85
KB
-rwxr-xr-x
iptables-apply
6.85
KB
-rwxr-xr-x
irqbalance
62.68
KB
-rwxr-xr-x
irqbalance-ui
34.06
KB
-rwxr-xr-x
iscsi-iname
9.99
KB
-rwxr-xr-x
iscsi_discovery
5.16
KB
-rwxr-xr-x
iscsid
398.15
KB
-rwxr-xr-x
iscsistart
358.13
KB
-rwxr-xr-x
ldattach
30.08
KB
-rwxr-xr-x
locale-gen
4.3
KB
-rwxr-xr-x
logrotate
74.09
KB
-rwxr-xr-x
lsvmbus
1.58
KB
-rwxr-xr-x
luksformat
3.32
KB
-rwxr-xr-x
make-bcache
18.07
KB
-rwxr-xr-x
make-ssl-cert
3.78
KB
-rwxr-xr-x
mkinitramfs
10.89
KB
-rwxr-xr-x
mklost+found
9.99
KB
-rwxr-xr-x
mysqld
23.16
MB
-rwxr-xr-x
netdata
806.77
KB
-rwxr-xr-x
netplan
798
B
-rwxr-xr-x
newusers
82.39
KB
-rwxr-xr-x
nfnl_osf
13.99
KB
-rwxr-xr-x
nologin
5.99
KB
-rwxr-xr-x
overlayroot-chroot
2.45
KB
-rwxr-xr-x
ownership
10.13
KB
-rwxr-xr-x
pam-auth-update
19.38
KB
-rwxr-xr-x
pam_getenv
2.82
KB
-rwxr-xr-x
pam_timestamp_check
9.99
KB
-rwxr-xr-x
phpdismod
7.11
KB
-rwxr-xr-x
phpenmod
7.11
KB
-rwxr-xr-x
phpquery
6.24
KB
-rwxr-xr-x
popcon-largest-unused
543
B
-rwxr-xr-x
popularity-contest
4.92
KB
-rwxr-xr-x
pwck
49.8
KB
-rwxr-xr-x
pwconv
45.7
KB
-rwxr-xr-x
pwunconv
45.68
KB
-rwxr-xr-x
readprofile
18.11
KB
-rwxr-xr-x
remove-shell
904
B
-rwxr-xr-x
rmt
58.39
KB
-rwxr-xr-x
rmt-tar
58.39
KB
-rwxr-xr-x
rsyslogd
668.54
KB
-rwxr-xr-x
rtcwake
42.08
KB
-rwxr-xr-x
samba_kcc
11.76
KB
-rwxr-xr-x
service
9.04
KB
-rwxr-xr-x
setvesablank
14.07
KB
-rwxr-xr-x
split-logfile
2.36
KB
-rwxr-xr-x
sshd
772.41
KB
-rwxr-xr-x
tarcat
936
B
-rwxr-xr-x
tcpdump
999.6
KB
-rwxr-xr-x
tzconfig
106
B
-rwxr-xr-x
ufw
4.82
KB
-rwxr-xr-x
update-ca-certificates
5.27
KB
-rwxr-xr-x
update-grub
64
B
-rwxr-xr-x
update-grub-gfxpayload
301
B
-rwxr-xr-x
update-grub2
64
B
-rwxr-xr-x
update-info-dir
1.66
KB
-rwxr-xr-x
update-initramfs
8.04
KB
-rwxr-xr-x
update-locale
2.99
KB
-rwxr-xr-x
update-mime
8.84
KB
-rwxr-xr-x
update-passwd
30.41
KB
-rwxr-xr-x
update-pciids
2.84
KB
-rwxr-xr-x
update-rc.d
16.12
KB
-rwxr-xr-x
update-secureboot-policy
7.43
KB
-rwxr-xr-x
update-usbids
1.05
KB
-rwxr-xr-x
upgrade-from-grub-legacy
1.49
KB
-rwxr-xr-x
useradd
123.28
KB
-rwxr-xr-x
userdel
82.48
KB
-rwxr-xr-x
usermod
123.06
KB
-rwxr-xr-x
uuidd
34.16
KB
-rwxr-xr-x
validlocale
1.73
KB
-rwxr-xr-x
vcstime
9.99
KB
-rwxr-xr-x
vigr
60.18
KB
-rwxr-xr-x
vipw
60.18
KB
-rwxr-xr-x
visudo
208.8
KB
-rwxr-xr-x
vpddecode
14.27
KB
-rwxr-xr-x
waagent
1.48
KB
-rwxr-xr-x
waagent2.0
246.41
KB
-rwxr-xr-x
xfs_admin
1.35
KB
-rwxr-xr-x
xfs_bmap
638
B
-rwxr-xr-x
xfs_copy
394.31
KB
-rwxr-xr-x
xfs_db
667.63
KB
-rwxr-xr-x
xfs_estimate
10.01
KB
-rwxr-xr-x
xfs_freeze
767
B
-rwxr-xr-x
xfs_fsr
30.02
KB
-rwxr-xr-x
xfs_growfs
382.27
KB
-rwxr-xr-x
xfs_info
472
B
-rwxr-xr-x
xfs_io
130.93
KB
-rwxr-xr-x
xfs_logprint
414.27
KB
-rwxr-xr-x
xfs_mdrestore
370.28
KB
-rwxr-xr-x
xfs_metadump
747
B
-rwxr-xr-x
xfs_mkfile
1007
B
-rwxr-xr-x
xfs_ncheck
650
B
-rwxr-xr-x
xfs_quota
86.01
KB
-rwxr-xr-x
xfs_rtcp
13.99
KB
-rwxr-xr-x
zerofree
9.99
KB
-rwxr-xr-x
zic
54.14
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : update-secureboot-policy
#!/bin/sh set -e if test $# = 0 \ && test x"$SHIM_NOTRIGGER" = x \ && test x"$DPKG_MAINTSCRIPT_PACKAGE" != x \ && dpkg-trigger --check-supported 2>/dev/null then if dpkg-trigger --no-await shim-secureboot-policy; then if test x"$SHIM_TRIGGER_DEBUG" != x; then echo "shim: wrapper deferring policy update (trigger activated)" fi exit 0 fi fi if [ "$(id -u)" -ne 0 ]; then echo "$0: Permission denied" exit 1 fi do_enroll=0 do_toggle=0 efivars=/sys/firmware/efi/efivars secureboot_var=SecureBoot-8be4df61-93ca-11d2-aa0d-00e098032b8c moksbstatert_var=MokSBStateRT-605dab50-e046-4300-abb6-3dd810dd8b23 SB_KEY="/var/lib/shim-signed/mok/MOK.der" SB_PRIV="/var/lib/shim-signed/mok/MOK.priv" OLD_DKMS_LIST="/var/lib/shim-signed/dkms-list" NEW_DKMS_LIST="${OLD_DKMS_LIST}.new" touch $OLD_DKMS_LIST dkms_list=$(find /var/lib/dkms -maxdepth 1 -type d -print 2>/dev/null \ | LC_ALL=C sort) dkms_modules=$(echo "$dkms_list" | wc -l) . /usr/share/debconf/confmodule update_dkms_list() { echo "$dkms_list" > $NEW_DKMS_LIST } save_dkms_list() { mv "$NEW_DKMS_LIST" "$OLD_DKMS_LIST" } clear_new_dkms_list() { rm "$NEW_DKMS_LIST" } new_dkms_module() { # handle nvidia module specially because it changed path if ! grep -q "/var/lib/dkms/nvidia" "$OLD_DKMS_LIST" && grep -q "/var/lib/dkms/nvidia" "$NEW_DKMS_LIST" ; then # nvidia module is newly added return 0 fi # return 0 if there is any other new module env LC_ALL=C comm -1 -3 $OLD_DKMS_LIST $NEW_DKMS_LIST | grep -q -v "/var/lib/dkms/nvidia" } show_dkms_list_changes() { diff -u $OLD_DKMS_LIST $NEW_DKMS_LIST >&2 } validate_password() { db_capb if [ "$key" != "$again" ]; then db_fset shim/error/secureboot_key_mismatch seen false db_input critical shim/error/secureboot_key_mismatch || true STATE=$(($STATE - 2)) else length=$((`echo "$key" | wc -c` - 1)) if [ $length -lt 8 ] || [ $length -gt 16 ]; then db_fset shim/error/bad_secureboot_key seen false db_input critical shim/error/bad_secureboot_key || true STATE=$(($STATE - 2)) elif [ $length -ne 0 ]; then return 0 fi fi return 1 } clear_passwords() { # Always clear secureboot key. db_set shim/secureboot_key '' db_fset shim/secureboot_key seen false db_set shim/secureboot_key_again '' db_fset shim/secureboot_key_again seen false } toggle_validation() { local key="$1" local again="$2" echo "Enabling shim validation." printf '%s\n%s\n' "$key" "$again" | mokutil --enable-validation >/dev/null || true mokutil --timeout -1 >/dev/null || true } enroll_mok() { local key="$1" local again="$2" echo "Adding '$SB_KEY' to shim:" printf '%s\n%s\n' "$key" "$again" | mokutil --import "$SB_KEY" >/dev/null || true mokutil --timeout -1 >/dev/null || true } do_it() { STATE=1 db_settitle shim/title/secureboot while true; do case "$STATE" in 1) db_capb db_fset shim/secureboot_explanation seen false db_input critical shim/secureboot_explanation || true ;; 2) if [ "$do_toggle" -eq 1 ]; then # Force no backtracking here; otherwise the GNOME backend # might allow it due to displaying the explanation just before. # Fixes LP: #1767091 db_capb # Allow the user to skip toggling Secure Boot. db_fset shim/enable_secureboot seen false db_input critical shim/enable_secureboot || true db_go db_get shim/enable_secureboot if [ "$RET" = "false" ]; then break fi fi ;; 3) db_input critical shim/secureboot_key || true seen_key=$RET db_input critical shim/secureboot_key_again || true ;; 4) db_get shim/secureboot_key key="$RET" db_get shim/secureboot_key_again again="$RET" if [ -z "$key$again" ] && echo "$seen_key" | grep -q ^30; then echo "Running in non-interactive mode, doing nothing." >&2 if new_dkms_module; then show_dkms_list_changes clear_new_dkms_list exit 1 else exit 0 fi fi if validate_password; then if [ $do_toggle -eq 1 ]; then toggle_validation "$key" "$again" fi if [ $do_enroll -eq 1 ]; then enroll_mok "$key" "$again" fi save_dkms_list fi clear_passwords ;; *) break ;; esac if db_go; then STATE=$(($STATE + 1)) else STATE=$(($STATE - 1)) fi db_capb backup done db_capb } validate_actions() { # Validate any queued actions before we go try to do them. local moksbstatert=0 if ! [ -d $efivars ]; then echo "$efivars not found, aborting." >&2 exit 0 fi if ! [ -f $efivars/$secureboot_var ] \ || [ "$(od -An -t u1 $efivars/$secureboot_var | awk '{ print $NF }')" -ne 1 ] then echo "Secure Boot not enabled on this system." >&2 exit 0 fi if [ $dkms_modules -lt 2 ]; then echo "No DKMS modules installed." >&2 exit 0 fi if [ -f /proc/sys/kernel/moksbstate_disabled ]; then moksbstatert=$(cat /proc/sys/kernel/moksbstate_disabled 2>/dev/null || echo 0) elif [ -f $efivars/$moksbstatert_var ]; then # MokSBStateRT set to 1 means validation is disabled moksbstatert=$(od -An -t u1 $efivars/$moksbstatert_var | \ awk '{ print $NF; }') fi # We were asked to enroll a key. This only makes sense if validation # is enabled. if [ $do_enroll -eq 1 ] && [ $moksbstatert -eq 1 ]; then do_toggle=1 fi } create_mok() { if [ -e "$SB_KEY" ]; then return fi echo "Generating a new Secure Boot signing key:" openssl req -config /usr/lib/shim/mok/openssl.cnf \ -subj "/CN=`hostname -s | cut -b1-31` Secure Boot Module Signature key" \ -new -x509 -newkey rsa:2048 \ -nodes -days 36500 -outform DER \ -keyout "$SB_PRIV" \ -out "$SB_KEY" } update_dkms_list case "$1" in '--enable'|'--disable') echo "Please run mokutil directly to change shim validation behavior." exit 0 ;; '--new-key') create_mok exit 0 ;; '--enroll-key') if [ -e "$SB_KEY" ]; then if mokutil --test-key "$SB_KEY" | \ grep -qc 'is not'; then do_enroll=1 fi else echo "No MOK found." exit 1 fi ;; *) echo "update-secureboot-policy: toggle UEFI Secure Boot in shim" echo echo "\t--new-key\tCreate a new MOK." echo "\t--enroll-key\tEnroll the new MOK for this system in shim." echo "\t--help\t\tThis help text." exit 0 esac validate_actions if [ $(($do_toggle + $do_enroll)) -lt 1 ]; then echo "Nothing to do." exit 0 fi do_it exit 0
Close