Linux webserver 6.8.0-49-generic #49~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Wed Nov 6 17:42:15 UTC 2 x86_64
Apache/2.4.52 (Ubuntu)
Server IP : 192.168.1.1 & Your IP : 3.143.221.185
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
lib /
cryptsetup /
scripts /
Delete
Unzip
Name
Size
Permission
Date
Action
decrypt_derived
1.08
KB
-rwxr-xr-x
2022-01-13 21:44
decrypt_gnupg
570
B
-rwxr-xr-x
2022-01-13 21:44
decrypt_gnupg-sc
953
B
-rwxr-xr-x
2022-01-13 21:44
decrypt_keyctl
1.99
KB
-rwxr-xr-x
2022-01-13 21:44
decrypt_opensc
1.36
KB
-rwxr-xr-x
2022-01-13 21:44
decrypt_ssl
347
B
-rwxr-xr-x
2022-01-13 21:44
passdev
14.3
KB
-rwxr-xr-x
2023-08-22 17:16
Save
Rename
#!/bin/sh # WARNING: If you use the decrypt_derived keyscript for devices with # persistent data (i.e. not swap or temp devices), then you will lose # access to that data permanently if something damages the LUKS header # of the LUKS device you derive from. The same applies if you luksFormat # the device, even if you use the same passphrase(s). A LUKS header # backup, or better a backup of the data on the derived device may be # a good idea. See the Cryptsetup FAQ on how to do this right. if [ -z "$1" ]; then echo "$0: must be executed with a crypto device as argument" >&2 exit 1 fi unset -v keys count keys="$(dmsetup table --target crypt --showkeys -- "$1" 2>/dev/null | cut -s -d' ' -f5)" count="$(printf '%s' "$keys" | wc -l)" if [ -n "$keys" ] && [ $count -le 1 ]; then if [ "${keys#:}" = "$keys" ]; then printf '%s' "$keys" exit 0 else echo "$0: device $1 uses the kernel keyring" >&2 fi elif [ $count -eq 0 ]; then echo "$0: device $1 doesn't exist or isn't a crypto device" >&2 else echo "$0: more than one device match" >&2 fi exit 1