Linux websever 5.15.0-153-generic #163-Ubuntu SMP Thu Aug 7 16:37:18 UTC 2025 x86_64
Apache/2.4.52 (Ubuntu)
: 192.168.3.70 | : 192.168.1.99
Cant Read [ /etc/named.conf ]
8.1.2-1ubuntu2.23
urlab
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
lib /
python3 /
dist-packages /
samba /
tests /
[ HOME SHELL ]
Name
Size
Permission
Action
__pycache__
[ DIR ]
drwxr-xr-x
blackbox
[ DIR ]
drwxr-xr-x
dcerpc
[ DIR ]
drwxr-xr-x
dns_forwarder_helpers
[ DIR ]
drwxr-xr-x
emulate
[ DIR ]
drwxr-xr-x
kcc
[ DIR ]
drwxr-xr-x
krb5
[ DIR ]
drwxr-xr-x
samba_tool
[ DIR ]
drwxr-xr-x
__init__.py
22.9
KB
-rw-r--r--
audit_log_base.py
6.98
KB
-rw-r--r--
audit_log_dsdb.py
24.46
KB
-rw-r--r--
audit_log_pass_change.py
12.86
KB
-rw-r--r--
auth.py
4.5
KB
-rw-r--r--
auth_log.py
65.62
KB
-rw-r--r--
auth_log_base.py
5.42
KB
-rw-r--r--
auth_log_ncalrpc.py
4.19
KB
-rw-r--r--
auth_log_netlogon.py
5.22
KB
-rw-r--r--
auth_log_netlogon_bad_creds.py
7.7
KB
-rw-r--r--
auth_log_pass_change.py
12.92
KB
-rw-r--r--
auth_log_samlogon.py
6.68
KB
-rw-r--r--
auth_log_winbind.py
19.13
KB
-rw-r--r--
common.py
3.06
KB
-rw-r--r--
complex_expressions.py
18.37
KB
-rw-r--r--
core.py
2.77
KB
-rw-r--r--
cred_opt.py
1.73
KB
-rw-r--r--
credentials.py
22.13
KB
-rw-r--r--
dckeytab.py
2.11
KB
-rw-r--r--
dns.py
84.34
KB
-rw-r--r--
dns_aging.py
108.76
KB
-rw-r--r--
dns_base.py
14.3
KB
-rw-r--r--
dns_forwarder.py
20.95
KB
-rw-r--r--
dns_invalid.py
2.66
KB
-rw-r--r--
dns_packet.py
7.13
KB
-rw-r--r--
dns_tkey.py
7.11
KB
-rw-r--r--
dns_wildcard.py
12.89
KB
-rw-r--r--
docs.py
18.25
KB
-rw-r--r--
domain_backup.py
26.76
KB
-rw-r--r--
domain_backup_offline.py
10.01
KB
-rw-r--r--
dsdb.py
41.91
KB
-rw-r--r--
dsdb_api.py
1.93
KB
-rw-r--r--
dsdb_dns.py
2.56
KB
-rw-r--r--
dsdb_lock.py
11.63
KB
-rw-r--r--
dsdb_schema_attributes.py
8.9
KB
-rw-r--r--
encrypted_secrets.py
3.02
KB
-rw-r--r--
gensec.py
8.91
KB
-rw-r--r--
get_opt.py
2.47
KB
-rw-r--r--
getdcname.py
18.52
KB
-rw-r--r--
glue.py
3.75
KB
-rw-r--r--
gpo.py
80.28
KB
-rw-r--r--
gpo_member.py
1.69
KB
-rw-r--r--
graph.py
26.45
KB
-rw-r--r--
group_audit.py
16.52
KB
-rw-r--r--
hostconfig.py
2.14
KB
-rw-r--r--
imports.py
1.12
KB
-rw-r--r--
join.py
6.71
KB
-rw-r--r--
krb5_credentials.py
3.8
KB
-rw-r--r--
ldap_raw.py
31.92
KB
-rw-r--r--
ldap_referrals.py
3.13
KB
-rw-r--r--
ldap_spn.py
34.19
KB
-rw-r--r--
ldap_upn_sam_account.py
17.63
KB
-rw-r--r--
libsmb.py
4.26
KB
-rw-r--r--
loadparm.py
3.25
KB
-rw-r--r--
lsa_string.py
2.22
KB
-rw-r--r--
messaging.py
4.97
KB
-rw-r--r--
ndr.py
4.09
KB
-rw-r--r--
net_join.py
2.29
KB
-rw-r--r--
net_join_no_spnego.py
3.46
KB
-rw-r--r--
netbios.py
2.08
KB
-rw-r--r--
netcmd.py
5.32
KB
-rw-r--r--
netlogonsvc.py
2.43
KB
-rw-r--r--
ntacls.py
3.68
KB
-rw-r--r--
ntacls_backup.py
6.58
KB
-rw-r--r--
ntlm_auth.py
13.08
KB
-rw-r--r--
ntlm_auth_base.py
8.5
KB
-rw-r--r--
ntlm_auth_krb5.py
3.63
KB
-rw-r--r--
ntlmdisabled.py
3.01
KB
-rw-r--r--
pam_winbind.py
2.52
KB
-rw-r--r--
pam_winbind_chauthtok.py
1.56
KB
-rw-r--r--
pam_winbind_warn_pwd_expire.py
2.01
KB
-rw-r--r--
param.py
3.58
KB
-rw-r--r--
password_hash.py
12.43
KB
-rw-r--r--
password_hash_fl2003.py
7.34
KB
-rw-r--r--
password_hash_fl2008.py
7.89
KB
-rw-r--r--
password_hash_gpgme.py
11.88
KB
-rw-r--r--
password_hash_ldap.py
4.85
KB
-rw-r--r--
password_quality.py
2.15
KB
-rw-r--r--
password_test.py
1.94
KB
-rw-r--r--
policy.py
1.17
KB
-rw-r--r--
posixacl.py
38.89
KB
-rw-r--r--
prefork_restart.py
16
KB
-rw-r--r--
process_limits.py
2.95
KB
-rw-r--r--
provision.py
6.35
KB
-rw-r--r--
pso.py
11.23
KB
-rw-r--r--
py_credentials.py
14.82
KB
-rw-r--r--
registry.py
2.5
KB
-rw-r--r--
s3_net_join.py
2.63
KB
-rw-r--r--
s3idmapdb.py
1.95
KB
-rw-r--r--
s3param.py
1.75
KB
-rw-r--r--
s3passdb.py
5.66
KB
-rw-r--r--
s3registry.py
1.82
KB
-rw-r--r--
s3windb.py
1.48
KB
-rw-r--r--
samba3sam.py
48.45
KB
-rw-r--r--
samba_upgradedns_lmdb.py
2.56
KB
-rw-r--r--
samdb.py
2.51
KB
-rw-r--r--
samdb_api.py
5.41
KB
-rw-r--r--
sddl.py
8.86
KB
-rw-r--r--
security.py
6.25
KB
-rw-r--r--
segfault.py
7
KB
-rw-r--r--
smb-notify.py
18.85
KB
-rw-r--r--
smb.py
9.47
KB
-rw-r--r--
smbd_base.py
1.76
KB
-rw-r--r--
smbd_fuzztest.py
3.5
KB
-rw-r--r--
source.py
8.74
KB
-rw-r--r--
strings.py
3.89
KB
-rw-r--r--
subunitrun.py
2.33
KB
-rw-r--r--
tdb_util.py
1.76
KB
-rw-r--r--
upgrade.py
1.36
KB
-rw-r--r--
upgradeprovision.py
6.65
KB
-rw-r--r--
upgradeprovisionneeddc.py
7.49
KB
-rw-r--r--
usage.py
12.98
KB
-rw-r--r--
xattr.py
5.27
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : pso.py
# # Helper classes for testing Password Settings Objects. # # This also tests the default password complexity (i.e. pwdProperties), # minPwdLength, pwdHistoryLength settings as a side-effect. # # Copyright (C) Andrew Bartlett <abartlet@samba.org> 2018 # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. # import ldb from ldb import FLAG_MOD_DELETE, FLAG_MOD_ADD, FLAG_MOD_REPLACE from samba.dcerpc.samr import (DOMAIN_PASSWORD_COMPLEX, DOMAIN_PASSWORD_STORE_CLEARTEXT) class TestUser: def __init__(self, username, samdb, userou=None): initial_password = "Initial12#" self.name = username self.ldb = samdb self.dn = "CN=%s,%s,%s" % (username, (userou or "CN=Users"), self.ldb.domain_dn()) # store all passwords that have ever been used for this user, as well # as a pwd_history that more closely resembles the history on the DC self.all_old_passwords = [initial_password] self.pwd_history = [initial_password] self.ldb.newuser(username, initial_password, userou=userou) self.ldb.enable_account("(sAMAccountName=%s)" % username) self.last_pso = None def old_invalid_passwords(self, hist_len): """Returns the expected password history for the DC""" if hist_len == 0: return [] # return the last n items in the list return self.pwd_history[-hist_len:] def old_valid_passwords(self, hist_len): """Returns old passwords that fall outside the DC's expected history""" # if PasswordHistoryLength is zero, any previous password can be valid if hist_len == 0: return self.all_old_passwords[:] # just exclude our pwd_history if there's not much in it. This can # happen if we've been using a lower PasswordHistoryLength setting # previously hist_len = min(len(self.pwd_history), hist_len) # return any passwords up to the nth-from-last item return self.all_old_passwords[:-hist_len] def update_pwd_history(self, new_password): """Updates the user's password history to reflect a password change""" # we maintain 2 lists: all passwords the user has ever had, and an # effective password-history that should roughly mirror the DC. # pwd_history_change() handles the corner-case where we need to # truncate password-history due to PasswordHistoryLength settings # changes if new_password in self.all_old_passwords: self.all_old_passwords.remove(new_password) self.all_old_passwords.append(new_password) if new_password in self.pwd_history: self.pwd_history.remove(new_password) self.pwd_history.append(new_password) def get_resultant_PSO(self): """Returns the DN of the applicable PSO, or None if none applies""" res = self.ldb.search(self.dn, attrs=['msDS-ResultantPSO']) if 'msDS-ResultantPSO' in res[0]: return str(res[0]['msDS-ResultantPSO'][0]) else: return None def get_password(self): """Returns the user's current password""" # current password in the last item in the list return self.all_old_passwords[-1] def set_password(self, new_password): """Attempts to change a user's password""" ldif = """ dn: %s changetype: modify delete: userPassword userPassword: %s add: userPassword userPassword: %s """ % (self.dn, self.get_password(), new_password) # this modify will throw an exception if new_password doesn't meet the # PSO constraints (which the test code catches if it's expected to # fail) self.ldb.modify_ldif(ldif) self.update_pwd_history(new_password) def pwd_history_change(self, old_hist_len, new_hist_len): """ Updates the effective password history, to reflect changes on the DC. When the PasswordHistoryLength applied to a user changes from a low setting (e.g. 2) to a higher setting (e.g. 4), passwords #3 and #4 won't actually have been stored on the DC, so we need to make sure they are removed them from our mirror pwd_history list. """ # our list may have been tracking more passwords than the DC actually # stores. Truncate the list now to match what the DC currently has hist_len = min(new_hist_len, old_hist_len) if hist_len == 0: self.pwd_history = [] elif hist_len < len(self.pwd_history): self.pwd_history = self.pwd_history[-hist_len:] # corner-case where history-length goes from zero to non-zero. Windows # counts the current password as being in the history even before it # changes (Samba only counts it from the next change onwards). We don't # exercise this in the PSO tests due to this discrepancy, but the # following check will support the Windows behaviour if old_hist_len == 0 and new_hist_len > 0: self.pwd_history = [self.get_password()] def set_primary_group(self, group_dn): """Sets a user's primaryGroupID to be that of the specified group""" # get the primaryGroupToken of the group res = self.ldb.search(base=group_dn, attrs=["primaryGroupToken"], scope=ldb.SCOPE_BASE) group_id = res[0]["primaryGroupToken"] # set primaryGroupID attribute of the user to that group m = ldb.Message() m.dn = ldb.Dn(self.ldb, self.dn) m["primaryGroupID"] = ldb.MessageElement(group_id, FLAG_MOD_REPLACE, "primaryGroupID") self.ldb.modify(m) class PasswordSettings: def default_settings(self, samdb): """ Returns a object representing the default password settings that will take effect (i.e. when no other Fine-Grained Password Policy applies) """ pw_attrs = ["minPwdAge", "lockoutDuration", "lockOutObservationWindow", "lockoutThreshold", "maxPwdAge", "minPwdAge", "minPwdLength", "pwdHistoryLength", "pwdProperties"] res = samdb.search(samdb.domain_dn(), scope=ldb.SCOPE_BASE, attrs=pw_attrs) self.name = "Defaults" self.dn = None self.ldb = samdb self.precedence = 0 self.complexity = \ int(res[0]["pwdProperties"][0]) & DOMAIN_PASSWORD_COMPLEX self.store_plaintext = \ int(res[0]["pwdProperties"][0]) & DOMAIN_PASSWORD_STORE_CLEARTEXT self.password_len = int(res[0]["minPwdLength"][0]) self.lockout_attempts = int(res[0]["lockoutThreshold"][0]) self.history_len = int(res[0]["pwdHistoryLength"][0]) # convert to time in secs self.lockout_duration = int(res[0]["lockoutDuration"][0]) / -int(1e7) self.lockout_window =\ int(res[0]["lockOutObservationWindow"][0]) / -int(1e7) self.password_age_min = int(res[0]["minPwdAge"][0]) / -int(1e7) self.password_age_max = int(res[0]["maxPwdAge"][0]) / -int(1e7) def __init__(self, name, samdb, precedence=10, complexity=True, password_len=10, lockout_attempts=0, lockout_duration=5, password_age_min=0, password_age_max=60 * 60 * 24 * 30, history_len=2, store_plaintext=False, container=None): # if no PSO was specified, return an object representing the global # password settings (i.e. the default settings, if no PSO trumps them) if name is None: return self.default_settings(samdb) # only PSOs in the Password Settings Container are considered. You can # create PSOs outside of this container, but it's not recommended if container is None: base_dn = samdb.domain_dn() container = "CN=Password Settings Container,CN=System,%s" % base_dn self.name = name self.dn = "CN=%s,%s" % (name, container) self.ldb = samdb self.precedence = precedence self.complexity = complexity self.store_plaintext = store_plaintext self.password_len = password_len self.lockout_attempts = lockout_attempts self.history_len = history_len # times in secs self.lockout_duration = lockout_duration # lockout observation-window must be <= lockout-duration (the existing # lockout tests just use the same value for both settings) self.lockout_window = lockout_duration self.password_age_min = password_age_min self.password_age_max = password_age_max # add the PSO to the DB self.ldb.add_ldif(self.get_ldif()) def get_ldif(self): complexity_str = "TRUE" if self.complexity else "FALSE" plaintext_str = "TRUE" if self.store_plaintext else "FALSE" # timestamps here are in units of -100 nano-seconds lockout_duration = -int(self.lockout_duration * (1e7)) lockout_window = -int(self.lockout_window * (1e7)) min_age = -int(self.password_age_min * (1e7)) max_age = -int(self.password_age_max * (1e7)) # all the following fields are mandatory for the PSO object ldif = """ dn: {0} objectClass: msDS-PasswordSettings msDS-PasswordSettingsPrecedence: {1} msDS-PasswordReversibleEncryptionEnabled: {2} msDS-PasswordHistoryLength: {3} msDS-PasswordComplexityEnabled: {4} msDS-MinimumPasswordLength: {5} msDS-MinimumPasswordAge: {6} msDS-MaximumPasswordAge: {7} msDS-LockoutThreshold: {8} msDS-LockoutObservationWindow: {9} msDS-LockoutDuration: {10} """.format(self.dn, self.precedence, plaintext_str, self.history_len, complexity_str, self.password_len, min_age, max_age, self.lockout_attempts, lockout_window, lockout_duration) return ldif def apply_to(self, user_group, operation=FLAG_MOD_ADD): """Updates this Password Settings Object to apply to a user or group""" m = ldb.Message() m.dn = ldb.Dn(self.ldb, self.dn) m["msDS-PSOAppliesTo"] = ldb.MessageElement(user_group, operation, "msDS-PSOAppliesTo") self.ldb.modify(m) def unapply(self, user_group): """Updates this PSO to no longer apply to a user or group""" # just delete the msDS-PSOAppliesTo attribute (instead of adding it) self.apply_to(user_group, operation=FLAG_MOD_DELETE) def set_precedence(self, new_precedence, samdb=None): if samdb is None: samdb = self.ldb ldif = """ dn: %s changetype: modify replace: msDS-PasswordSettingsPrecedence msDS-PasswordSettingsPrecedence: %u """ % (self.dn, new_precedence) samdb.modify_ldif(ldif) self.precedence = new_precedence
Close