Linux webserver 6.8.0-49-generic #49~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Wed Nov 6 17:42:15 UTC 2 x86_64
Apache/2.4.52 (Ubuntu)
Server IP : 192.168.1.1 & Your IP : 3.149.246.106
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
snap /
core22 /
1963 /
usr /
share /
opensc /
Delete
Unzip
Name
Size
Permission
Date
Action
asepcos.profile
2.54
KB
-rw-r--r--
2022-03-10 17:00
authentic.profile
2.86
KB
-rw-r--r--
2022-03-10 17:00
cardos.profile
2.77
KB
-rw-r--r--
2022-03-10 17:00
cyberflex.profile
2.85
KB
-rw-r--r--
2022-03-10 17:00
entersafe.profile
3.8
KB
-rw-r--r--
2022-03-10 17:00
epass2003.profile
4.18
KB
-rw-r--r--
2022-03-10 17:00
flex.profile
3.09
KB
-rw-r--r--
2022-03-10 17:00
gids.profile
230
B
-rw-r--r--
2022-03-10 17:00
gpk.profile
2.85
KB
-rw-r--r--
2022-03-10 17:00
ias_adele_admin1.profile
4.92
KB
-rw-r--r--
2022-03-10 17:00
ias_adele_admin2.profile
4.9
KB
-rw-r--r--
2022-03-10 17:00
ias_adele_common.profile
4.84
KB
-rw-r--r--
2022-03-10 17:00
iasecc.profile
2.84
KB
-rw-r--r--
2022-03-10 17:00
iasecc_admin_eid.profile
4.91
KB
-rw-r--r--
2022-03-10 17:00
iasecc_generic_oberthur.profile
4.56
KB
-rw-r--r--
2022-03-10 17:00
iasecc_generic_pki.profile
4.9
KB
-rw-r--r--
2022-03-10 17:00
incrypto34.profile
2.65
KB
-rw-r--r--
2022-03-10 17:00
isoApplet.profile
2.95
KB
-rw-r--r--
2022-03-10 17:00
jcop.profile
2.16
KB
-rw-r--r--
2022-03-10 17:00
miocos.profile
1.16
KB
-rw-r--r--
2022-03-10 17:00
muscle.profile
3.38
KB
-rw-r--r--
2022-03-10 17:00
myeid.profile
6.59
KB
-rw-r--r--
2022-03-10 17:00
oberthur.profile
4.36
KB
-rw-r--r--
2022-03-10 17:00
openpgp.profile
1.85
KB
-rw-r--r--
2022-03-10 17:00
pkcs15.profile
3.88
KB
-rw-r--r--
2022-03-10 17:00
rutoken.profile
5.38
KB
-rw-r--r--
2022-03-10 17:00
rutoken_ecp.profile
5.9
KB
-rw-r--r--
2022-03-10 17:00
rutoken_lite.profile
5.41
KB
-rw-r--r--
2022-03-10 17:00
sc-hsm.profile
400
B
-rw-r--r--
2022-03-10 17:00
setcos.profile
3.7
KB
-rw-r--r--
2022-03-10 17:00
starcos.profile
2.69
KB
-rw-r--r--
2022-03-10 17:00
westcos.profile
3.56
KB
-rw-r--r--
2022-03-10 17:00
Save
Rename
# # General purpose PKCS15 profile for Cyberflex Access 16K cards # cardinfo { max-pin-length = 8; pin-encoding = ascii-numeric; pin-pad-char = 0x00; pin-domains = yes; } # Define reasonable limits for PINs and PUK # The user pin must always be CHV1, otherwise things # won't work (crypto operations are protected by CHV1) PIN user-pin { attempts = 3; } PIN user-puk { attempts = 10; } # Additional filesystem info. # This is added to the file system info specified in the # main profile. filesystem { # Define default ACLs and file ids for CHV1/CHV2 EF CHV1 { file-id = 0000; ACL = *=NEVER, UPDATE=CHV1; } EF CHV2 { file-id = 0100; ACL = *=NEVER, UPDATE=CHV2; } DF MF { ACL = *=AUT0; # The DELETE=NONE ACLs will go away once the code # works. It's here to make sure I can erase the card # even if I mess up big time. # # If you have a 16K card and wish to store # two cert/key pairs. # Note if you want the two keys to be protected by the # same pin, you need to increase the size of the pin-dir. DF PKCS15-AppDF { ACL = *=$SOPIN, FILES=NONE, DELETE=NONE; # Cyberflex Access 16K size = 7500; # This "pin-domain" DF is a template that is # instantiated for each PIN created on the card. # # When instantiating the template, each file id will be # combined with the last octet of the object's pkcs15 id # to form a unique file ID. That is, PIN 01 will reside # in 4b01, PIN 02 will reside in 4b02, etc. template pin-domain { DF pin-dir { ACL = *=$SOPIN, FILES=NONE, DELETE=NONE; file-id = 4B00; # The minimum size for a 2048 bit key is 1396 size = 2800; } } # For PIN-protected files, instantiate this template # below the pin directory. # For unprotected objects, install within the application DF. # # When instantiating the template, each file id will be # combined with the last octet of the object's pkcs15 id # to form a unique file ID. template key-domain { # In order to support more than one key per PIN, # each key must be within its own subdirectory. DF key-directory { ACL = *=$PIN, FILES=NONE; file-id = 3000; size = 1400; EF private-key { file-id = 0012; ACL = *=NEVER, CRYPTO=$PIN, UPDATE=$PIN; } EF internal-pubkey-file { file-id = 1012; ACL = *=$PIN, READ=NONE; } } EF extractable-key { file-id = 4300; ACL = *=NEVER, READ=$PIN, UPDATE=$PIN; } EF public-key { file-id = 4400; ACL = *=$PIN, READ=NONE; } EF certificate { file-id = 4500; ACL = *=$PIN, READ=NONE; } EF data { file-id = 4600; ACL = *=$PIN, READ=NONE; } EF privdata { file-id = 4700; ACL = *=$PIN; } } } } }