Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 3.16.15.52
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
apport /
package-hooks /
[ HOME SHELL ]
Name
Size
Permission
Action
apache2.py
1.77
KB
-rw-r--r--
cloud-init.py
176
B
-rw-r--r--
cryptsetup.py
1.06
KB
-rw-r--r--
dovecot-core.py
1.36
KB
-rw-r--r--
isc-dhcp-client.py
1.75
KB
-rw-r--r--
openssh-client.py
1.18
KB
-rw-r--r--
openssh-server.py
1004
B
-rw-r--r--
postfix.py
2.68
KB
-rw-r--r--
source_apparmor.py
2.76
KB
-rw-r--r--
source_apport.py
569
B
-rw-r--r--
source_byobu.py
339
B
-rw-r--r--
source_clamav.py
523
B
-rw-r--r--
source_console-setup.py
374
B
-rw-r--r--
source_debian-installer.py
1.86
KB
-rw-r--r--
source_grub2.py
3.69
KB
-rw-r--r--
source_linux-5.4.py
6.15
KB
-rw-r--r--
source_linux-firmware.py
6.15
KB
-rw-r--r--
source_linux-meta-oem-osp1.py
6.15
KB
-rw-r--r--
source_linux-meta-oem.py
6.15
KB
-rw-r--r--
source_linux-meta-raspi.py
6.15
KB
-rw-r--r--
source_linux-meta.py
6.15
KB
-rw-r--r--
source_linux-oem-5.4.py
6.15
KB
-rw-r--r--
source_linux-oem-osp1.py
6.15
KB
-rw-r--r--
source_linux-oem.py
6.15
KB
-rw-r--r--
source_linux-signed-5.4.py
6.15
KB
-rw-r--r--
source_linux-signed-oem-5.4.py
6.15
KB
-rw-r--r--
source_linux-signed-oem-osp1.p...
6.15
KB
-rw-r--r--
source_linux-signed-oem.py
6.15
KB
-rw-r--r--
source_linux-signed.py
6.15
KB
-rw-r--r--
source_linux.py
6.15
KB
-rw-r--r--
source_mdadm.py
2.2
KB
-rw-r--r--
source_plymouth.py
1.44
KB
-rw-r--r--
source_shadow.py
720
B
-rw-r--r--
source_sudo.py
1.13
KB
-rw-r--r--
source_ubiquity.py
7.57
KB
-rw-r--r--
source_ubuntu-release-upgrader...
2.19
KB
-rw-r--r--
source_unattended-upgrades.py
705
B
-rw-r--r--
source_update-manager.py
2.24
KB
-rw-r--r--
subiquity.py
1.35
KB
-rw-r--r--
systemd.py
872
B
-rw-r--r--
udev.py
455
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : source_grub2.py
# vim: set fileencoding=UTF-8 : '''apport package hook for grub2 Author: Jean-Baptiste Lallement <jeanbaptiste.lallement@gmail.com> This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. See http://www.gnu.org/copyleft/gpl.html for the full text of the license. ''' from __future__ import print_function from apport.hookutils import * import os import subprocess import re def check_shell_syntax(path): ''' Check the syntax of a shell script ''' try: with open(os.devnull, 'w') as devnull: subprocess.check_call(['/bin/sh', '-n', path], stderr=devnull) except subprocess.CalledProcessError: return False return True def check_shell_syntax_harder(path): ''' Check the syntax of a shell script ''' try: # sh -n is tempting, but not good enough. Consider this case: # # GRUB_CMDLINE_LINUX_DEFAULT=”quiet splash nomodeset” # # The quotes are Unicode quotes, not valid in the shell and probably # caused by copying a line out of a web page. This is parsed as an # instruction to run the 'splash' command with argument 'nomodeset”' # and with the GRUB_CMDLINE_LINUX_DEFAULT environment variable set # to '”quiet'. 'sh -n' allows this because this is a valid parse # and it's possible that the command 'splash' might exist, but what # we need to know is whether sourcing the file will fail. # # Unfortunately this test may involve executing code. However, this # file is already sourced as root when running update-grub, so it # seems unlikely that this could do any further harm. with open(os.devnull, 'w') as devnull: subprocess.check_call( ['/bin/sh', '-ec', '. %s' % re.escape(path)], stderr=devnull) except subprocess.CalledProcessError: return False return True def add_info(report): if report['ProblemType'] == 'Package': # To detect if root fs is a loop device attach_file(report, '/proc/cmdline','ProcCmdLine') attach_default_grub(report, 'EtcDefaultGrub') attach_file_if_exists(report, '/boot/grub/device.map', 'DeviceMap') try: grub_d = '/etc/default/grub.d' for name in sorted(os.listdir(grub_d)): if name.endswith('.cfg'): key = 'EtcDefaultGrubD.' + path_to_key(name) attach_file_if_exists( report, os.path.join(grub_d, name), key) except OSError: pass invalid_grub_script = [] if not check_shell_syntax_harder('/etc/default/grub'): invalid_grub_script.append('/etc/default/grub') # Check scripts in /etc/grub.d since some users directly change # configuration there grubdir='/etc/grub.d' for f in os.listdir(grubdir): fullpath=os.path.join(grubdir, f) if f != 'README' and os.access(fullpath, os.X_OK) \ and not check_shell_syntax(fullpath): invalid_grub_script.append(fullpath) attach_file(report, fullpath) # TODO: Add some UI to ask if the user modified the invalid script # and if he still wants to report it if invalid_grub_script: report['InvalidGrubScript'] = ' '.join(invalid_grub_script) if __name__ == '__main__': r = {} r['ProblemType'] = 'Package' add_info(r) for k, v in r.items(): print('%s: "%s"' % (k, v)) print("========================================")
Close