Linux server.thearyasamaj.org 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
Apache
: 103.90.241.146 | : 216.73.216.158
Cant Read [ /etc/named.conf ]
5.6.40
ftpuser@mantra.thearyasamaj.org
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
libexec /
webmin /
firewall /
[ HOME SHELL ]
Name
Size
Permission
Action
help
[ DIR ]
drwxr-xr-x
images
[ DIR ]
drwxr-xr-x
lang
[ DIR ]
drwxr-xr-x
CHANGELOG
2.79
KB
-rw-r--r--
acl_security.pl
1.41
KB
-rwxr-xr-x
apply.cgi
512
B
-rwxr-xr-x
backup_config.pl
649
B
-rwxr-xr-x
bootup.cgi
600
B
-rwxr-xr-x
cgi_args.pl
430
B
-rwxr-xr-x
cluster.cgi
2.08
KB
-rwxr-xr-x
cluster_add.cgi
2.19
KB
-rwxr-xr-x
cluster_delete.cgi
651
B
-rwxr-xr-x
coherent-linux-lib.pl
1.54
KB
-rwxr-xr-x
config
83
B
-rw-r--r--
config.info
1.23
KB
-rw-r--r--
config.info.bg
2.48
KB
-rw-r--r--
config.info.ca
1.5
KB
-rw-r--r--
config.info.cs
982
B
-rw-r--r--
config.info.de
1.42
KB
-rw-r--r--
config.info.fr
1.63
KB
-rw-r--r--
config.info.ja
421
B
-rw-r--r--
config.info.nl
976
B
-rw-r--r--
config.info.no
968
B
-rw-r--r--
config.info.pl
1012
B
-rw-r--r--
config.info.pt_BR
983
B
-rw-r--r--
config.info.ru
1.31
KB
-rw-r--r--
config.info.sk
989
B
-rw-r--r--
config.info.tr
827
B
-rw-r--r--
convert.cgi
756
B
-rwxr-xr-x
debian-linux-lib.pl
4.59
KB
-rwxr-xr-x
defaultacl
100
B
-rw-r--r--
edit_rule.cgi
14.88
KB
-rwxr-xr-x
firewall-lib.pl
17.32
KB
-rwxr-xr-x
firewall4-lib.pl
1.82
KB
-rwxr-xr-x
firewall6-lib.pl
1.76
KB
-rwxr-xr-x
gentoo-linux-lib.pl
722
B
-rwxr-xr-x
index.cgi
16.42
KB
-rwxr-xr-x
install_check.pl
841
B
-rwxr-xr-x
log_parser.pl
835
B
-rwxr-xr-x
mandrake-linux-lib.pl
1.69
KB
-rwxr-xr-x
module.info
207
B
-rw-r--r--
module.info.af
0
B
-rw-r--r--
module.info.af.auto
173
B
-rw-r--r--
module.info.ar
0
B
-rw-r--r--
module.info.ar.auto
258
B
-rw-r--r--
module.info.be
0
B
-rw-r--r--
module.info.be.auto
271
B
-rw-r--r--
module.info.bg
0
B
-rw-r--r--
module.info.bg.auto
292
B
-rw-r--r--
module.info.ca
150
B
-rw-r--r--
module.info.ca.auto
17
B
-rw-r--r--
module.info.cs
24
B
-rw-r--r--
module.info.cs.auto
148
B
-rw-r--r--
module.info.da
0
B
-rw-r--r--
module.info.da.auto
167
B
-rw-r--r--
module.info.de
155
B
-rw-r--r--
module.info.de.auto
17
B
-rw-r--r--
module.info.el
0
B
-rw-r--r--
module.info.el.auto
331
B
-rw-r--r--
module.info.es
26
B
-rw-r--r--
module.info.es.auto
149
B
-rw-r--r--
module.info.eu
0
B
-rw-r--r--
module.info.eu.auto
160
B
-rw-r--r--
module.info.fa
0
B
-rw-r--r--
module.info.fa.auto
272
B
-rw-r--r--
module.info.fi
0
B
-rw-r--r--
module.info.fi.auto
192
B
-rw-r--r--
module.info.fr
0
B
-rw-r--r--
module.info.fr.auto
173
B
-rw-r--r--
module.info.he
0
B
-rw-r--r--
module.info.he.auto
243
B
-rw-r--r--
module.info.hr
0
B
-rw-r--r--
module.info.hr.auto
166
B
-rw-r--r--
module.info.hu
33
B
-rw-r--r--
module.info.hu.auto
172
B
-rw-r--r--
module.info.it
0
B
-rw-r--r--
module.info.it.auto
167
B
-rw-r--r--
module.info.ja
39
B
-rw-r--r--
module.info.ja.auto
218
B
-rw-r--r--
module.info.ko
0
B
-rw-r--r--
module.info.ko.auto
198
B
-rw-r--r--
module.info.lt
0
B
-rw-r--r--
module.info.lt.auto
197
B
-rw-r--r--
module.info.lv
0
B
-rw-r--r--
module.info.lv.auto
174
B
-rw-r--r--
module.info.ms
158
B
-rw-r--r--
module.info.ms.auto
17
B
-rw-r--r--
module.info.mt
0
B
-rw-r--r--
module.info.mt.auto
181
B
-rw-r--r--
module.info.nl
23
B
-rw-r--r--
module.info.nl.auto
157
B
-rw-r--r--
module.info.no
23
B
-rw-r--r--
module.info.no.auto
146
B
-rw-r--r--
module.info.pl
141
B
-rw-r--r--
module.info.pl.auto
23
B
-rw-r--r--
module.info.pt
0
B
-rw-r--r--
module.info.pt.auto
170
B
-rw-r--r--
module.info.pt_BR
26
B
-rw-r--r--
module.info.pt_BR.auto
150
B
-rw-r--r--
module.info.ro
0
B
-rw-r--r--
module.info.ro.auto
178
B
-rw-r--r--
module.info.ru
51
B
-rw-r--r--
module.info.ru.auto
241
B
-rw-r--r--
module.info.sk
24
B
-rw-r--r--
module.info.sk.auto
174
B
-rw-r--r--
module.info.sl
0
B
-rw-r--r--
module.info.sl.auto
174
B
-rw-r--r--
module.info.sv
0
B
-rw-r--r--
module.info.sv.auto
174
B
-rw-r--r--
module.info.th
0
B
-rw-r--r--
module.info.th.auto
306
B
-rw-r--r--
module.info.tr
0
B
-rw-r--r--
module.info.tr.auto
215
B
-rw-r--r--
module.info.uk
0
B
-rw-r--r--
module.info.uk.auto
277
B
-rw-r--r--
module.info.ur
0
B
-rw-r--r--
module.info.ur.auto
307
B
-rw-r--r--
module.info.vi
0
B
-rw-r--r--
module.info.vi.auto
204
B
-rw-r--r--
module.info.zh
0
B
-rw-r--r--
module.info.zh.auto
145
B
-rw-r--r--
module.info.zh_TW
0
B
-rw-r--r--
module.info.zh_TW.auto
154
B
-rw-r--r--
move.cgi
1.29
KB
-rwxr-xr-x
newchain.cgi
898
B
-rwxr-xr-x
open-ports.pl
3.4
KB
-rwxr-xr-x
prefs.info
55
B
-rw-r--r--
redhat-linux-lib.pl
2.14
KB
-rwxr-xr-x
save_policy.cgi
7.15
KB
-rwxr-xr-x
save_rule.cgi
12.4
KB
-rwxr-xr-x
save_rule6.cgi
12.05
KB
-rwxr-xr-x
setup.cgi
9.36
KB
-rwxr-xr-x
setup6.cgi
8.12
KB
-rwxr-xr-x
trustix-linux-lib.pl
2.14
KB
-rwxr-xr-x
unapply.cgi
609
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : setup6.cgi
#!/usr/bin/perl # setup.cgi # Setup an initial save file require './firewall-lib.pl'; require './firewall6-lib.pl'; &ReadParse(); $access{'setup'} || &error($text{'setup_ecannot'}); &lock_file($ip6tables_save_file); if ($in{'reset'}) { # Clear out all rules foreach $t ("filter", "nat", "mangle") { &system_logged("ip6tables -t $t -P INPUT ACCEPT >/dev/null 2>&1"); &system_logged("ip6tables -t $t -P OUTPUT ACCEPT >/dev/null 2>&1"); &system_logged("ip6tables -t $t -P FORWARD ACCEPT >/dev/null 2>&1"); &system_logged("ip6tables -t $t -P PREROUTING ACCEPT >/dev/null 2>&1"); &system_logged("ip6tables -t $t -P POSTROUTING ACCEPT >/dev/null 2>&1"); &system_logged("ip6tables -t $t -F >/dev/null 2>&1"); &system_logged("ip6tables -t $t -X >/dev/null 2>&1"); } } # Save all existing active rules if (defined(&unapply_ip6tables)) { &unapply_ip6tables(); } else { &backquote_logged("ip6tables-save >$ip6tables_save_file 2>&1"); } # Get important variable ports &get_miniserv_config(\%miniserv); $webmin_port = $miniserv{'port'} || 10000; $webmin_port2 = $webmin_port + 10; $usermin_port = undef; if (&foreign_installed("usermin")) { &foreign_require("usermin", "usermin-lib.pl"); &usermin::get_usermin_miniserv_config(\%uminiserv); $usermin_port = $uminiserv{'port'}; } $usermin_port ||= 20000; $ssh_port = undef; if (&foreign_installed("sshd")) { &foreign_require("sshd", "sshd-lib.pl"); $conf = &sshd::get_sshd_config(); $ssh_port = &sshd::find_value("Port", $conf); } $ssh_port ||= 22; if ($in{'auto'}) { @tables = &get_iptables_save(); if ($in{'auto'} == 1) { # Add a single rule to the nat table for masquerading $iface = $in{'iface1'} eq 'other' ? $in{'iface1_other'} : $in{'iface1'}; $iface || &error($text{'setup_eiface'}); ($table) = grep { $_->{'name'} eq 'nat' } @tables; $table ||= { 'name' => 'nat', 'rules' => [ ], 'defaults' => { } }; push(@{$table->{'rules'}}, { 'chain' => 'POSTROUTING', 'o' => [ "", $iface ], 'j' => [ "", 'MASQUERADE' ] } ); } elsif ($in{'auto'} >= 2) { # Block all incoming traffic, except for established # connections, DNS replies and safe ICMP types # In mode 3 allow ssh and ident too # In mode 4 allow ftp, echo-request and high ports too $iface = $in{'iface'.$in{'auto'}} eq 'other' ? $in{'iface'.$in{'auto'}.'_other'} : $in{'iface'.$in{'auto'}}; $iface || &error($text{'setup_eiface'}); ($table) = grep { $_->{'name'} eq 'filter' } @tables; $table ||= { 'name' => 'nat', 'rules' => [ ], 'defaults' => { } }; $table->{'defaults'}->{'INPUT'} = 'DROP'; push(@{$table->{'rules'}}, { 'chain' => 'INPUT', 'i' => [ "!", $iface ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Accept traffic from internal interfaces' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'tcp-flags' => [ "", "ACK", "ACK" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Accept traffic with the ACK flag set' }, { 'chain' => 'INPUT', 'm' => [ [ "", "state" ] ], 'state' => [ "", "ESTABLISHED" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow incoming data that is part of a connection we established' }, { 'chain' => 'INPUT', 'm' => [ [ "", "state" ] ], 'state' => [ "", "RELATED" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow data that is related to existing connections' }, { 'chain' => 'INPUT', 'm' => [ [ "", "udp" ] ], 'p' => [ "", "udp" ], 'sport' => [ "", 53 ], 'dport' => [ "", "1024:65535" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Accept responses to DNS queries' }, ); if ($in{'auto'} >= 3) { # Allow ssh and ident push(@{$table->{'rules'}}, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", $ssh_port ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to our SSH server' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", "auth" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to our IDENT server'} ); } if ($in{'auto'} >= 4) { # Allow pings push(@{$table->{'rules'}}, { 'chain' => 'INPUT', 'm' => [ [ "", "icmpv6" ] ], 'p' => [ [ "", "icmpv6" ] ], 'icmpv6-type' => [ "", "echo-request" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Respond to pings' }, ); } if ($in{'auto'} == 4) { # Allow pings and most high ports push(@{$table->{'rules'}}, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", "2049:2050" ], 'j' => [ "", 'DROP' ], 'cmt' => 'Protect our NFS server' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", "6000:6063" ], 'j' => [ "", 'DROP' ], 'cmt' => 'Protect our X11 display server' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", "7000:7010" ], 'j' => [ "", 'DROP' ], 'cmt' => 'Protect our X font server' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", "1024:65535" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to unprivileged ports' }, ); } if ($in{'auto'} == 5) { # Allow typical hosting server ports push(@{$table->{'rules'}}, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", "53" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow DNS zone transfers' }, { 'chain' => 'INPUT', 'm' => [ [ "", "udp" ] ], 'p' => [ "", "udp" ], 'dport' => [ "", "53" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow DNS queries' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", "80" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to webserver' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", "443" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow SSL connections to webserver' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ], [ "", "multiport" ] ], 'p' => [ "", "tcp" ], 'dports' => [ "", "25,587" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to mail server' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", "20:21" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to FTP server' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ], [ "", "multiport" ] ], 'p' => [ "", "tcp" ], 'dports' => [ "", "110,995" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to POP3 server' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ], [ "", "multiport" ] ], 'p' => [ "", "tcp" ], 'dports' => [ "", "143,220,993" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to IMAP server' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "",$webmin_port.":".$webmin_port2 ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to Webmin' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", $usermin_port ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to Usermin' }, ); } } &run_before_command(); &save_table($table); &run_after_command(); ©_to_cluster(); } if ($in{'atboot'}) { &create_firewall_init(); } &unlock_file($ip6tables_save_file); &webmin_log("setup"); &redirect("");
Close