Linux ip-172-26-7-228 5.4.0-1103-aws #111~18.04.1-Ubuntu SMP Tue May 23 20:04:10 UTC 2023 x86_64
Apache
: 172.26.7.228 | : 18.222.112.45
Cant Read [ /etc/named.conf ]
5.6.40-24+ubuntu18.04.1+deb.sury.org+1
www-data
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
share /
apport /
package-hooks /
[ HOME SHELL ]
Name
Size
Permission
Action
apache2.py
1.77
KB
-rw-r--r--
cloud-init.py
176
B
-rw-r--r--
cryptsetup.py
1.06
KB
-rw-r--r--
isc-dhcp-client.py
1.75
KB
-rw-r--r--
openssh-client.py
1.14
KB
-rw-r--r--
openssh-server.py
1011
B
-rw-r--r--
source_apparmor.py
2.8
KB
-rw-r--r--
source_apport.py
569
B
-rw-r--r--
source_apport.pyc
830
B
-rw-r--r--
source_byobu.py
417
B
-rw-r--r--
source_console-setup.py
374
B
-rw-r--r--
source_debian-installer.py
1.86
KB
-rw-r--r--
source_debian-installer.pyc
2.04
KB
-rw-r--r--
source_fontconfig.py
162
B
-rw-r--r--
source_grub2.py
3.69
KB
-rw-r--r--
source_linux-firmware.py
6.11
KB
-rw-r--r--
source_linux-firmware.pyc
4.45
KB
-rw-r--r--
source_linux-meta-oem-osp1.py
6.11
KB
-rw-r--r--
source_linux-meta-oem-osp1.pyc
4.46
KB
-rw-r--r--
source_linux-meta-oem.py
6.11
KB
-rw-r--r--
source_linux-meta-oem.pyc
4.45
KB
-rw-r--r--
source_linux-meta.py
6.11
KB
-rw-r--r--
source_linux-meta.pyc
4.45
KB
-rw-r--r--
source_linux-nexus7.py
948
B
-rw-r--r--
source_linux-nexus7.pyc
1.11
KB
-rw-r--r--
source_linux-oem-osp1.py
6.11
KB
-rw-r--r--
source_linux-oem-osp1.pyc
4.45
KB
-rw-r--r--
source_linux-oem.py
6.11
KB
-rw-r--r--
source_linux-oem.pyc
4.44
KB
-rw-r--r--
source_linux-signed-oem-osp1.p...
6.11
KB
-rw-r--r--
source_linux-signed-oem-osp1.p...
4.47
KB
-rw-r--r--
source_linux-signed-oem.py
6.11
KB
-rw-r--r--
source_linux-signed-oem.pyc
4.46
KB
-rw-r--r--
source_linux-signed.py
6.11
KB
-rw-r--r--
source_linux-signed.pyc
4.45
KB
-rw-r--r--
source_linux.py
6.11
KB
-rw-r--r--
source_linux.pyc
4.44
KB
-rw-r--r--
source_mdadm.py
2.2
KB
-rw-r--r--
source_plymouth.py
1.26
KB
-rw-r--r--
source_shadow.py
720
B
-rw-r--r--
source_sudo.py
1.13
KB
-rw-r--r--
source_ubiquity.py
7.55
KB
-rw-r--r--
source_ubiquity.pyc
6.11
KB
-rw-r--r--
source_ubuntu-advantage-tools....
1.22
KB
-rw-r--r--
source_ubuntu-release-upgrader...
2.19
KB
-rw-r--r--
source_unattended-upgrades.py
705
B
-rw-r--r--
source_update-manager.py
2.24
KB
-rw-r--r--
systemd.py
872
B
-rw-r--r--
udev.py
455
B
-rw-r--r--
ureadahead.py
475
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : source_grub2.py
# vim: set fileencoding=UTF-8 : '''apport package hook for grub2 Author: Jean-Baptiste Lallement <jeanbaptiste.lallement@gmail.com> This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. See http://www.gnu.org/copyleft/gpl.html for the full text of the license. ''' from __future__ import print_function from apport.hookutils import * import os import subprocess import re def check_shell_syntax(path): ''' Check the syntax of a shell script ''' try: with open(os.devnull, 'w') as devnull: subprocess.check_call(['/bin/sh', '-n', path], stderr=devnull) except subprocess.CalledProcessError: return False return True def check_shell_syntax_harder(path): ''' Check the syntax of a shell script ''' try: # sh -n is tempting, but not good enough. Consider this case: # # GRUB_CMDLINE_LINUX_DEFAULT=”quiet splash nomodeset” # # The quotes are Unicode quotes, not valid in the shell and probably # caused by copying a line out of a web page. This is parsed as an # instruction to run the 'splash' command with argument 'nomodeset”' # and with the GRUB_CMDLINE_LINUX_DEFAULT environment variable set # to '”quiet'. 'sh -n' allows this because this is a valid parse # and it's possible that the command 'splash' might exist, but what # we need to know is whether sourcing the file will fail. # # Unfortunately this test may involve executing code. However, this # file is already sourced as root when running update-grub, so it # seems unlikely that this could do any further harm. with open(os.devnull, 'w') as devnull: subprocess.check_call( ['/bin/sh', '-ec', '. %s' % re.escape(path)], stderr=devnull) except subprocess.CalledProcessError: return False return True def add_info(report): if report['ProblemType'] == 'Package': # To detect if root fs is a loop device attach_file(report, '/proc/cmdline','ProcCmdLine') attach_default_grub(report, 'EtcDefaultGrub') attach_file_if_exists(report, '/boot/grub/device.map', 'DeviceMap') try: grub_d = '/etc/default/grub.d' for name in sorted(os.listdir(grub_d)): if name.endswith('.cfg'): key = 'EtcDefaultGrubD.' + path_to_key(name) attach_file_if_exists( report, os.path.join(grub_d, name), key) except OSError: pass invalid_grub_script = [] if not check_shell_syntax_harder('/etc/default/grub'): invalid_grub_script.append('/etc/default/grub') # Check scripts in /etc/grub.d since some users directly change # configuration there grubdir='/etc/grub.d' for f in os.listdir(grubdir): fullpath=os.path.join(grubdir, f) if f != 'README' and os.access(fullpath, os.X_OK) \ and not check_shell_syntax(fullpath): invalid_grub_script.append(fullpath) attach_file(report, fullpath) # TODO: Add some UI to ask if the user modified the invalid script # and if he still wants to report it if invalid_grub_script: report['InvalidGrubScript'] = ' '.join(invalid_grub_script) if __name__ == '__main__': r = {} r['ProblemType'] = 'Package' add_info(r) for k, v in r.items(): print('%s: "%s"' % (k, v)) print("========================================")
Close