Linux websever 5.15.0-153-generic #163-Ubuntu SMP Thu Aug 7 16:37:18 UTC 2025 x86_64
Apache/2.4.52 (Ubuntu)
: 192.168.3.70 | : 192.168.1.99
Cant Read [ /etc/named.conf ]
8.1.2-1ubuntu2.23
urlab
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
etc /
dbus-1 /
system.d /
[ HOME SHELL ]
Name
Size
Permission
Action
com.ubuntu.SoftwareProperties....
662
B
-rw-r--r--
oddjob-mkhomedir.conf
1.82
KB
-rw-r--r--
oddjob.conf
2.37
KB
-rw-r--r--
org.freedesktop.ModemManager1....
14.53
KB
-rw-r--r--
org.freedesktop.PackageKit.con...
1.3
KB
-rw-r--r--
org.freedesktop.realmd.conf
404
B
-rw-r--r--
org.freedesktop.sssd.infopipe....
1.91
KB
-rw-r--r--
org.freedesktop.thermald.conf
930
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : oddjob.conf
<?xml version="1.0"?> <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <busconfig> <!-- This configuration file specifies the required security policies for the oddjob service to work. It controls which requests users will be allowed to issue to oddjobd over the bus, which is quite different from controlling whether or not oddjobd will attempt to fulfill the request. --> <!-- Only root can own the oddjob service --> <policy user="root"> <allow own="com.redhat.oddjob"/> </policy> <!-- Allow anyone to try to call the quit method of the com.redhat.oddjob interface implemented by the /com/redhat/oddjob object provided by the com.redhat.oddjob service --> <policy context="default"> <allow send_destination="com.redhat.oddjob" send_path="/com/redhat/oddjob" send_interface="com.redhat.oddjob" send_member="quit"/> </policy> <!-- Allow anyone to try to call the list method of the com.redhat.oddjob interface implemented by the /com/redhat/oddjob object provided by the com.redhat.oddjob service --> <policy context="default"> <allow send_destination="com.redhat.oddjob" send_path="/com/redhat/oddjob" send_interface="com.redhat.oddjob" send_member="list"/> </policy> <!-- Allow anyone to try to call the listall method of the com.redhat.oddjob interface implemented by the /com/redhat/oddjob object provided by the com.redhat.oddjob service --> <policy context="default"> <allow send_destination="com.redhat.oddjob" send_path="/com/redhat/oddjob" send_interface="com.redhat.oddjob" send_member="listall"/> </policy> <!-- Allow anyone to try to call the reload method of the com.redhat.oddjob interface implemented by the /com/redhat/oddjob object provided by the com.redhat.oddjob service --> <policy context="default"> <allow send_destination="com.redhat.oddjob" send_path="/com/redhat/oddjob" send_interface="com.redhat.oddjob" send_member="reload"/> </policy> <!-- Allow anyone to try to call the introspection methods of the every object provided by the com.redhat.oddjob service --> <policy context="default"> <allow send_destination="com.redhat.oddjob" send_interface="org.freedesktop.DBus.Introspectable"/> </policy> </busconfig>
Close