Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 18.216.99.18
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
lib64 /
python2.7 /
site-packages /
sepolicy /
[ HOME SHELL ]
Name
Size
Permission
Action
templates
[ DIR ]
drwxr-xr-x
__init__.py
31.65
KB
-rw-r--r--
__init__.pyc
33.24
KB
-rw-r--r--
__init__.pyo
33.24
KB
-rw-r--r--
booleans.py
1.59
KB
-rw-r--r--
booleans.pyc
1.1
KB
-rw-r--r--
booleans.pyo
1.1
KB
-rw-r--r--
communicate.py
1.72
KB
-rw-r--r--
communicate.pyc
1.41
KB
-rw-r--r--
communicate.pyo
1.41
KB
-rw-r--r--
interface.py
8.61
KB
-rw-r--r--
interface.pyc
7.66
KB
-rw-r--r--
interface.pyo
7.66
KB
-rw-r--r--
manpage.py
39.37
KB
-rw-r--r--
manpage.pyc
39.15
KB
-rw-r--r--
manpage.pyo
39.15
KB
-rw-r--r--
network.py
2.83
KB
-rw-r--r--
network.pyc
1.91
KB
-rw-r--r--
network.pyo
1.91
KB
-rw-r--r--
policy.so
47.11
KB
-rwxr-xr-x
sedbus.py
1.71
KB
-rw-r--r--
sedbus.pyc
2.87
KB
-rw-r--r--
sedbus.pyo
2.87
KB
-rw-r--r--
transition.py
3.03
KB
-rw-r--r--
transition.pyc
3.58
KB
-rw-r--r--
transition.pyo
3.58
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : network.py
#! /usr/bin/python -Es # Copyright (C) 2012 Red Hat # see file 'COPYING' for use and warranty information # # setrans is a tool for analyzing process transistions in SELinux policy # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License as # published by the Free Software Foundation; either version 2 of # the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA # 02111-1307 USA # # import sepolicy search = sepolicy.search info = sepolicy.info def get_types(src, tclass, perm, check_bools=False): allows = search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm}) nlist = [] if allows: for i in [y[sepolicy.TARGET] for y in [x for x in allows if set(perm).issubset(x[sepolicy.PERMS]) and (not check_bools or x["enabled"])]]: if i not in nlist: nlist.append(i) return nlist def get_network_connect(src, protocol, perm, check_bools=False): portrecs, portrecsbynum = sepolicy.gen_port_dict() d = {} tlist = get_types(src, "%s_socket" % protocol, [perm], check_bools) if len(tlist) > 0: d[(src, protocol, perm)] = [] for i in tlist: if i == "ephemeral_port_type": if "unreserved_port_type" in tlist: continue i = "ephemeral_port_t" if i == "unreserved_port_t": if "unreserved_port_type" in tlist: continue if "port_t" in tlist: continue if i == "port_t": d[(src, protocol, perm)].append((i, ["all ports with out defined types"])) if i == "port_type": d[(src, protocol, perm)].append((i, ["all ports"])) elif i == "unreserved_port_type": d[(src, protocol, perm)].append((i, ["all ports > 1024"])) elif i == "reserved_port_type": d[(src, protocol, perm)].append((i, ["all ports < 1024"])) elif i == "rpc_port_type": d[(src, protocol, perm)].append((i, ["all ports > 500 and < 1024"])) else: try: d[(src, protocol, perm)].append((i, portrecs[(i, protocol)])) except KeyError: pass return d
Close