Linux ns1.utparral.edu.mx 6.8.0-79-generic #79~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Fri Aug 15 16:54:53 UTC 2 x86_64
Apache/2.4.58 (Unix) OpenSSL/1.1.1w PHP/8.2.12 mod_perl/2.0.12 Perl/v5.34.1
: 10.10.1.9 | : 10.10.1.254
Cant Read [ /etc/named.conf ]
daemon
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
README
+ Create Folder
+ Create File
/
etc /
pam.d /
[ HOME SHELL ]
Name
Size
Permission
Action
chfn
384
B
-rw-r--r--
chpasswd
92
B
-rw-r--r--
chsh
581
B
-rw-r--r--
common-account
1.28
KB
-rw-r--r--
common-auth
1.27
KB
-rw-r--r--
common-password
1.74
KB
-rw-r--r--
common-session
1.42
KB
-rw-r--r--
common-session-noninteractive
1.4
KB
-rw-r--r--
cron
606
B
-rw-r--r--
cups
69
B
-rw-r--r--
gdm-autologin
1.16
KB
-rw-r--r--
gdm-fingerprint
1.31
KB
-rw-r--r--
gdm-launch-environment
383
B
-rw-r--r--
gdm-password
1.29
KB
-rw-r--r--
gdm-smartcard
1.35
KB
-rw-r--r--
gdm-smartcard-pkcs11-exclusive
1.39
KB
-rw-r--r--
gdm-smartcard-sssd-exclusive
1.35
KB
-rw-r--r--
gdm-smartcard-sssd-or-password
1.39
KB
-rw-r--r--
login
4.03
KB
-rw-r--r--
newusers
92
B
-rw-r--r--
other
520
B
-rw-r--r--
passwd
92
B
-rw-r--r--
polkit-1
270
B
-rw-r--r--
ppp
168
B
-rw-r--r--
runuser
143
B
-rw-r--r--
runuser-l
138
B
-rw-r--r--
sshd
2.08
KB
-rw-r--r--
su
2.21
KB
-rw-r--r--
sudo
330
B
-rw-r--r--
sudo-i
315
B
-rw-r--r--
su-l
137
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : common-password
# # /etc/pam.d/common-password - password-related modules common to all services # # This file is included from other service-specific PAM config files, # and should contain a list of modules that define the services to be # used to change user passwords. The default is pam_unix. # Explanation of pam_unix options: # The "yescrypt" option enables #hashed passwords using the yescrypt algorithm, introduced in Debian #11. Without this option, the default is Unix crypt. Prior releases #used the option "sha512"; if a shadow password hash will be shared #between Debian 11 and older releases replace "yescrypt" with "sha512" #for compatibility . The "obscure" option replaces the old #`OBSCURE_CHECKS_ENAB' option in login.defs. See the pam_unix manpage #for other options. # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. # To take advantage of this, it is recommended that you configure any # local modules either before or after the default block, and use # pam-auth-update to manage selection of other modules. See # pam-auth-update(8) for details. # here are the per-package modules (the "Primary" block) password requisite pam_pwquality.so retry=3 password [success=2 default=ignore] pam_unix.so obscure use_authtok try_first_pass yescrypt password sufficient pam_sss.so use_authtok # here's the fallback if no module succeeds password requisite pam_deny.so # prime the stack with a positive return value if there isn't one already; # this avoids us returning an error just because nothing sets a success code # since the modules above will each just jump around password required pam_permit.so # and here are more per-package modules (the "Additional" block) password optional pam_gnome_keyring.so # end of pam-auth-update config
Close