Linux websever 5.15.0-153-generic #163-Ubuntu SMP Thu Aug 7 16:37:18 UTC 2025 x86_64
Apache/2.4.52 (Ubuntu)
: 192.168.3.70 | : 192.168.1.99
Cant Read [ /etc/named.conf ]
8.1.2-1ubuntu2.23
urlab
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
lib /
python3 /
dist-packages /
setools /
[ HOME SHELL ]
Name
Size
Permission
Action
__pycache__
[ DIR ]
drwxr-xr-x
checker
[ DIR ]
drwxr-xr-x
diff
[ DIR ]
drwxr-xr-x
__init__.py
3.86
KB
-rw-r--r--
boolquery.py
2.32
KB
-rw-r--r--
boundsquery.py
2.42
KB
-rw-r--r--
categoryquery.py
1.96
KB
-rw-r--r--
commonquery.py
2.2
KB
-rw-r--r--
constraintquery.py
5.61
KB
-rw-r--r--
defaultquery.py
2.91
KB
-rw-r--r--
descriptors.py
10.31
KB
-rw-r--r--
devicetreeconquery.py
2.84
KB
-rw-r--r--
dta.py
22.81
KB
-rw-r--r--
exception.py
6.58
KB
-rw-r--r--
fsusequery.py
3.42
KB
-rw-r--r--
genfsconquery.py
3.81
KB
-rw-r--r--
ibendportconquery.py
3.67
KB
-rw-r--r--
ibpkeyconquery.py
5.51
KB
-rw-r--r--
infoflow.py
15.69
KB
-rw-r--r--
initsidquery.py
2.88
KB
-rw-r--r--
iomemconquery.py
4.62
KB
-rw-r--r--
ioportconquery.py
4.65
KB
-rw-r--r--
mixins.py
7.44
KB
-rw-r--r--
mlsrulequery.py
4.71
KB
-rw-r--r--
netifconquery.py
3.02
KB
-rw-r--r--
nodeconquery.py
4.53
KB
-rw-r--r--
objclassquery.py
3.89
KB
-rw-r--r--
pcideviceconquery.py
3.2
KB
-rw-r--r--
perm_map
87.16
KB
-rw-r--r--
permmap.py
16.82
KB
-rw-r--r--
pirqconquery.py
3.1
KB
-rw-r--r--
polcapquery.py
1.74
KB
-rw-r--r--
policyrep.cpython-310-x86_64-l...
1.42
MB
-rw-r--r--
portconquery.py
5.4
KB
-rw-r--r--
query.py
1.86
KB
-rw-r--r--
rbacrulequery.py
5.96
KB
-rw-r--r--
rolequery.py
2.57
KB
-rw-r--r--
sensitivityquery.py
2.84
KB
-rw-r--r--
terulequery.py
9.35
KB
-rw-r--r--
typeattrquery.py
2.73
KB
-rw-r--r--
typequery.py
3.57
KB
-rw-r--r--
userquery.py
4.81
KB
-rw-r--r--
util.py
8.21
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : nodeconquery.py
# Copyright 2014-2015, Tresys Technology, LLC # Copyright 2017, Chris PeBenito <pebenito@ieee.org> # # This file is part of SETools. # # SETools is free software: you can redistribute it and/or modify # it under the terms of the GNU Lesser General Public License as # published by the Free Software Foundation, either version 2.1 of # the License, or (at your option) any later version. # # SETools is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with SETools. If not, see # <http://www.gnu.org/licenses/>. # import ipaddress import logging from socket import AF_INET, AF_INET6 from typing import Iterable, Optional, Union from .mixins import MatchContext from .policyrep import Nodecon, NodeconIPVersion from .query import PolicyQuery AnyIPNetwork = Union[ipaddress.IPv4Network, ipaddress.IPv6Network] class NodeconQuery(MatchContext, PolicyQuery): """ Query nodecon statements. Parameter: policy The policy to query. Keyword Parameters/Class attributes: network The IPv4/IPv6 address or IPv4/IPv6 network address with netmask, e.g. 192.168.1.0/255.255.255.0 or "192.168.1.0/24". network_overlap If true, the net will match if it overlaps with the nodecon's network instead of equality. ip_version The IP version of the nodecon to match. (socket.AF_INET for IPv4 or socket.AF_INET6 for IPv6) user The criteria to match the context's user. user_regex If true, regular expression matching will be used on the user. role The criteria to match the context's role. role_regex If true, regular expression matching will be used on the role. type_ The criteria to match the context's type. type_regex If true, regular expression matching will be used on the type. range_ The criteria to match the context's range. range_subset If true, the criteria will match if it is a subset of the context's range. range_overlap If true, the criteria will match if it overlaps any of the context's range. range_superset If true, the criteria will match if it is a superset of the context's range. range_proper If true, use proper superset/subset operations. No effect if not using set operations. """ _network: Optional[AnyIPNetwork] = None network_overlap: bool = False _ip_version: Optional[NodeconIPVersion] = None @property def ip_version(self) -> Optional[NodeconIPVersion]: return self._ip_version @ip_version.setter def ip_version(self, value: Optional[Union[str, NodeconIPVersion]]) -> None: if value: self._ip_version = NodeconIPVersion.lookup(value) else: self._ip_version = None @property def network(self) -> Optional[AnyIPNetwork]: return self._network @network.setter def network(self, value: Optional[Union[str, AnyIPNetwork]]) -> None: if value: self._network = ipaddress.ip_network(value) else: self._network = None def __init__(self, policy, **kwargs) -> None: super(NodeconQuery, self).__init__(policy, **kwargs) self.log = logging.getLogger(__name__) def results(self) -> Iterable[Nodecon]: """Generator which yields all matching nodecons.""" self.log.info("Generating nodecon results from {0.policy}".format(self)) self.log.debug("Network: {0.network!r}, overlap: {0.network_overlap}".format(self)) self.log.debug("IP Version: {0.ip_version!r}".format(self)) self._match_context_debug(self.log) for nodecon in self.policy.nodecons(): if self.network: if self.network_overlap: if not self.network.overlaps(nodecon.network): # type: ignore continue else: if not nodecon.network == self.network: continue if self.ip_version and self.ip_version != nodecon.ip_version: continue if not self._match_context(nodecon.context): continue yield nodecon
Close