Linux vmi2545633.contaboserver.net 6.1.0-32-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.129-1 (2025-03-06) x86_64
Apache/2.4.62 (Debian)
Server IP : 127.0.0.1 & Your IP : 127.0.0.1
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
share /
doc /
sudo /
examples /
Delete
Unzip
Name
Size
Permission
Date
Action
cvtsudoers.conf
3.49
KB
-rw-r--r--
2023-06-27 11:45
pam.conf
1.15
KB
-rw-r--r--
2023-06-27 11:45
sudo.conf
4.24
KB
-rw-r--r--
2023-06-27 11:45
sudo_logsrvd.conf
9.57
KB
-rw-r--r--
2023-06-27 11:45
sudoers
4.08
KB
-rw-r--r--
2023-06-27 11:45
sudoers.dist
3.24
KB
-rw-r--r--
2023-06-27 11:45
syslog.conf
1.05
KB
-rw-r--r--
2023-06-27 11:45
Save
Rename
#%PAM-1.0 # Sample /etc/pam.d/sudo file for RedHat 9 / Fedora Core. # For other Linux distributions you may want to # use /etc/pam.d/sshd or /etc/pam.d/su as a guide. # # There are two basic ways to configure PAM, either via pam_stack # or by explicitly specifying the various methods to use. # # Here we use pam_stack auth required pam_stack.so service=system-auth account required pam_stack.so service=system-auth password required pam_stack.so service=system-auth session required pam_stack.so service=system-auth # # Alternately, you can specify the authentication method directly. # Here we use pam_unix for normal password authentication. #auth required pam_env.so #auth sufficient pam_unix.so #account required pam_unix.so #password required pam_cracklib.so retry=3 type= #password required pam_unix.so nullok use_authtok md5 shadow #session required pam_limits.so #session required pam_unix.so # # Another option is to use SMB for authentication. #auth required pam_env.so #auth sufficient pam_smb_auth.so #account required pam_smb_auth.so #password required pam_smb_auth.so #session required pam_limits.so