Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 3.142.124.139
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
snap /
core /
17200 /
usr /
lib /
cloud-init /
[ HOME SHELL ]
Name
Size
Permission
Action
ds-identify
49.95
KB
-rwxr-xr-x
uncloud-init
4.02
KB
-rwxr-xr-x
write-ssh-key-fingerprints
1.11
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : write-ssh-key-fingerprints
#!/bin/sh # This file is part of cloud-init. See LICENSE file for license information. logger_opts="-p user.info -t ec2" # rhels' version of logger_opts does not support long # for of -s (--stderr), so use short form. logger_opts="$logger_opts -s" # Redirect stderr to stdout exec 2>&1 fp_blist=",${1}," key_blist=",${2}," { echo echo "#############################################################" echo "-----BEGIN SSH HOST KEY FINGERPRINTS-----" for f in /etc/ssh/ssh_host_*key.pub; do [ -f "$f" ] || continue read ktype line < "$f" # skip the key if its type is in the blacklist [ "${fp_blist#*,$ktype,}" = "${fp_blist}" ] || continue ssh-keygen -l -f "$f" done echo "-----END SSH HOST KEY FINGERPRINTS-----" echo "#############################################################" } | logger $logger_opts echo "-----BEGIN SSH HOST KEY KEYS-----" for f in /etc/ssh/ssh_host_*key.pub; do [ -f "$f" ] || continue read ktype line < "$f" # skip the key if its type is in the blacklist [ "${key_blist#*,$ktype,}" = "${key_blist}" ] || continue cat $f done echo "-----END SSH HOST KEY KEYS-----"
Close