Linux vmi2545633.contaboserver.net 6.1.0-32-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.129-1 (2025-03-06) x86_64
Apache/2.4.62 (Debian)
Server IP : 127.0.0.1 & Your IP : 127.0.0.1
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
share /
pam /
Delete
Unzip
Name
Size
Permission
Date
Action
common-account
1.15
KB
-rw-r--r--
2023-09-21 20:55
common-account.md5sums
107
B
-rw-r--r--
2023-09-21 20:55
common-auth
1.17
KB
-rw-r--r--
2023-09-21 20:55
common-auth.md5sums
159
B
-rw-r--r--
2023-09-21 20:55
common-password
1.56
KB
-rw-r--r--
2023-09-21 20:55
common-password.md5sums
357
B
-rw-r--r--
2023-09-21 20:55
common-session
1.06
KB
-rw-r--r--
2023-09-21 20:55
common-session-noninteractive
1.11
KB
-rw-r--r--
2023-09-21 20:55
common-session-noninteractive.md5sums
46
B
-rw-r--r--
2023-09-21 20:55
common-session.md5sums
174
B
-rw-r--r--
2023-09-21 20:55
Save
Rename
# # /etc/pam.d/common-password - password-related modules common to all services # # This file is included from other service-specific PAM config files, # and should contain a list of modules that define the services to be # used to change user passwords. The default is pam_unix. # Explanation of pam_unix options: # The "yescrypt" option enables #hashed passwords using the yescrypt algorithm, introduced in Debian #11. Without this option, the default is Unix crypt. Prior releases #used the option "sha512"; if a shadow password hash will be shared #between Debian 11 and older releases replace "yescrypt" with "sha512" #for compatibility . The "obscure" option replaces the old #`OBSCURE_CHECKS_ENAB' option in login.defs. See the pam_unix manpage #for other options. # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. # To take advantage of this, it is recommended that you configure any # local modules either before or after the default block, and use # pam-auth-update to manage selection of other modules. See # pam-auth-update(8) for details. # here are the per-package modules (the "Primary" block) $password_primary # here's the fallback if no module succeeds password requisite pam_deny.so # prime the stack with a positive return value if there isn't one already; # this avoids us returning an error just because nothing sets a success code # since the modules above will each just jump around password required pam_permit.so # and here are more per-package modules (the "Additional" block) $password_additional # end of pam-auth-update config