Linux webserver 6.8.0-49-generic #49~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Wed Nov 6 17:42:15 UTC 2 x86_64
Apache/2.4.52 (Ubuntu)
Server IP : 192.168.1.1 & Your IP : 3.17.162.15
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
share /
pam /
Delete
Unzip
Name
Size
Permission
Date
Action
common-account
1.15
KB
-rw-r--r--
2020-08-12 00:15
common-account.md5sums
107
B
-rw-r--r--
2020-08-12 00:15
common-auth
1.17
KB
-rw-r--r--
2020-08-12 00:15
common-auth.md5sums
159
B
-rw-r--r--
2020-08-12 00:15
common-password
1.56
KB
-rw-r--r--
2021-10-26 15:18
common-password.md5sums
357
B
-rw-r--r--
2020-08-12 00:15
common-session
1.33
KB
-rw-r--r--
2022-02-07 16:46
common-session-noninteractive
1.39
KB
-rw-r--r--
2022-02-07 16:46
common-session-noninteractive.md5sums
46
B
-rw-r--r--
2020-08-12 00:15
common-session.md5sums
174
B
-rw-r--r--
2020-08-12 00:15
Save
Rename
# # /etc/pam.d/common-password - password-related modules common to all services # # This file is included from other service-specific PAM config files, # and should contain a list of modules that define the services to be # used to change user passwords. The default is pam_unix. # Explanation of pam_unix options: # The "yescrypt" option enables #hashed passwords using the yescrypt algorithm, introduced in Debian #11. Without this option, the default is Unix crypt. Prior releases #used the option "sha512"; if a shadow password hash will be shared #between Debian 11 and older releases replace "yescrypt" with "sha512" #for compatibility . The "obscure" option replaces the old #`OBSCURE_CHECKS_ENAB' option in login.defs. See the pam_unix manpage #for other options. # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. # To take advantage of this, it is recommended that you configure any # local modules either before or after the default block, and use # pam-auth-update to manage selection of other modules. See # pam-auth-update(8) for details. # here are the per-package modules (the "Primary" block) $password_primary # here's the fallback if no module succeeds password requisite pam_deny.so # prime the stack with a positive return value if there isn't one already; # this avoids us returning an error just because nothing sets a success code # since the modules above will each just jump around password required pam_permit.so # and here are more per-package modules (the "Additional" block) $password_additional # end of pam-auth-update config