Linux cpanel.rrshost.in 5.15.0-25-generic #25-Ubuntu SMP Wed Mar 30 15:54:22 UTC 2022 x86_64
Apache
: 109.123.238.221 | : 172.69.130.108
128 Domain
8.2.28
aev999
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
libpam0g-dev /
examples /
[ HOME SHELL ]
Name
Size
Permission
Action
agents
[ DIR ]
drwxr-xr-x
modules
[ DIR ]
drwxr-xr-x
regress
[ DIR ]
drwxr-xr-x
blank.c.gz
1.6
KB
-rw-r--r--
check_user.c
1.37
KB
-rw-r--r--
vpass.c
928
B
-rw-r--r--
xsh.c.gz
1.55
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : vpass.c
#include "config.h" #include <stdlib.h> #include <stdio.h> #include <unistd.h> #include <pwd.h> #include <sys/types.h> #include <security/pam_appl.h> static int test_conv (int num_msg UNUSED, const struct pam_message **msgm UNUSED, struct pam_response **response UNUSED, void *appdata_ptr UNUSED) { return 0; } static struct pam_conv conv = { test_conv, NULL }; int main(void) { char *user; pam_handle_t *pamh; struct passwd *pw; uid_t uid; int res; uid = geteuid(); pw = getpwuid(uid); if (pw) { user = pw->pw_name; } else { fprintf(stderr, "Invalid userid: %lu\n", (unsigned long) uid); exit(1); } pam_start("vpass", user, &conv, &pamh); pam_set_item(pamh, PAM_TTY, "/dev/tty"); if ((res = pam_authenticate(pamh, 0)) != PAM_SUCCESS) { fprintf(stderr, "Oops: %s\n", pam_strerror(pamh, res)); exit(1); } pam_end(pamh, res); exit(0); }
Close