Linux server.thearyasamaj.org 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
Apache
: 103.90.241.146 | : 216.73.216.158
Cant Read [ /etc/named.conf ]
5.6.40
ftpuser@mantra.thearyasamaj.org
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
libexec /
webmin /
firewall6 /
[ HOME SHELL ]
Name
Size
Permission
Action
help
[ DIR ]
drwxr-xr-x
images
[ DIR ]
drwxr-xr-x
lang
[ DIR ]
drwxr-xr-x
acl_security.pl
1.41
KB
-rwxr-xr-x
apply.cgi
512
B
-rwxr-xr-x
backup_config.pl
649
B
-rwxr-xr-x
bootup.cgi
600
B
-rwxr-xr-x
cgi_args.pl
430
B
-rwxr-xr-x
cluster.cgi
2.08
KB
-rwxr-xr-x
cluster_add.cgi
2.19
KB
-rwxr-xr-x
cluster_delete.cgi
651
B
-rwxr-xr-x
coherent-linux-lib.pl
1.54
KB
-rwxr-xr-x
config
83
B
-rw-r--r--
config.info
1.23
KB
-rw-r--r--
config.info.ca
1.5
KB
-rw-r--r--
config.info.cs
982
B
-rw-r--r--
config.info.de
1.42
KB
-rw-r--r--
config.info.fr
1.63
KB
-rw-r--r--
config.info.ja
421
B
-rw-r--r--
config.info.nl
976
B
-rw-r--r--
config.info.no
968
B
-rw-r--r--
config.info.pl
1012
B
-rw-r--r--
config.info.pt_BR
983
B
-rw-r--r--
config.info.ru
1.31
KB
-rw-r--r--
config.info.sk
989
B
-rw-r--r--
config.info.tr
827
B
-rw-r--r--
convert.cgi
756
B
-rwxr-xr-x
debian-linux-lib.pl
4.59
KB
-rwxr-xr-x
defaultacl
100
B
-rw-r--r--
edit_rule.cgi
14.88
KB
-rwxr-xr-x
firewall-lib.pl
17.32
KB
-rwxr-xr-x
firewall4-lib.pl
1.82
KB
-rwxr-xr-x
firewall6-lib.pl
1.76
KB
-rwxr-xr-x
gentoo-linux-lib.pl
722
B
-rwxr-xr-x
index.cgi
16.42
KB
-rwxr-xr-x
install_check.pl
841
B
-rwxr-xr-x
log_parser.pl
835
B
-rwxr-xr-x
mandrake-linux-lib.pl
1.69
KB
-rwxr-xr-x
module.info
238
B
-rw-r--r--
module.info.af
0
B
-rw-r--r--
module.info.af.auto
182
B
-rw-r--r--
module.info.ar
0
B
-rw-r--r--
module.info.ar.auto
254
B
-rw-r--r--
module.info.be
0
B
-rw-r--r--
module.info.be.auto
278
B
-rw-r--r--
module.info.bg
0
B
-rw-r--r--
module.info.bg.auto
299
B
-rw-r--r--
module.info.ca
155
B
-rw-r--r--
module.info.ca.auto
18
B
-rw-r--r--
module.info.cs
0
B
-rw-r--r--
module.info.cs.auto
194
B
-rw-r--r--
module.info.da
0
B
-rw-r--r--
module.info.da.auto
183
B
-rw-r--r--
module.info.de
161
B
-rw-r--r--
module.info.de.auto
18
B
-rw-r--r--
module.info.el
0
B
-rw-r--r--
module.info.el.auto
346
B
-rw-r--r--
module.info.es
0
B
-rw-r--r--
module.info.es.auto
185
B
-rw-r--r--
module.info.eu
0
B
-rw-r--r--
module.info.eu.auto
167
B
-rw-r--r--
module.info.fa
0
B
-rw-r--r--
module.info.fa.auto
268
B
-rw-r--r--
module.info.fi
0
B
-rw-r--r--
module.info.fi.auto
186
B
-rw-r--r--
module.info.fr
0
B
-rw-r--r--
module.info.fr.auto
180
B
-rw-r--r--
module.info.he
0
B
-rw-r--r--
module.info.he.auto
251
B
-rw-r--r--
module.info.hr
0
B
-rw-r--r--
module.info.hr.auto
173
B
-rw-r--r--
module.info.hu
0
B
-rw-r--r--
module.info.hu.auto
201
B
-rw-r--r--
module.info.it
0
B
-rw-r--r--
module.info.it.auto
174
B
-rw-r--r--
module.info.ja
0
B
-rw-r--r--
module.info.ja.auto
263
B
-rw-r--r--
module.info.ko
0
B
-rw-r--r--
module.info.ko.auto
206
B
-rw-r--r--
module.info.lt
0
B
-rw-r--r--
module.info.lt.auto
209
B
-rw-r--r--
module.info.lv
0
B
-rw-r--r--
module.info.lv.auto
180
B
-rw-r--r--
module.info.ms
0
B
-rw-r--r--
module.info.ms.auto
176
B
-rw-r--r--
module.info.mt
0
B
-rw-r--r--
module.info.mt.auto
192
B
-rw-r--r--
module.info.nl
0
B
-rw-r--r--
module.info.nl.auto
186
B
-rw-r--r--
module.info.no
0
B
-rw-r--r--
module.info.no.auto
176
B
-rw-r--r--
module.info.pl
0
B
-rw-r--r--
module.info.pl.auto
197
B
-rw-r--r--
module.info.pt
0
B
-rw-r--r--
module.info.pt.auto
172
B
-rw-r--r--
module.info.pt_BR
0
B
-rw-r--r--
module.info.pt_BR.auto
181
B
-rw-r--r--
module.info.ro
0
B
-rw-r--r--
module.info.ro.auto
186
B
-rw-r--r--
module.info.ru
0
B
-rw-r--r--
module.info.ru.auto
250
B
-rw-r--r--
module.info.sk
0
B
-rw-r--r--
module.info.sk.auto
203
B
-rw-r--r--
module.info.sl
0
B
-rw-r--r--
module.info.sl.auto
182
B
-rw-r--r--
module.info.sv
0
B
-rw-r--r--
module.info.sv.auto
177
B
-rw-r--r--
module.info.th
0
B
-rw-r--r--
module.info.th.auto
275
B
-rw-r--r--
module.info.tr
0
B
-rw-r--r--
module.info.tr.auto
222
B
-rw-r--r--
module.info.uk
0
B
-rw-r--r--
module.info.uk.auto
291
B
-rw-r--r--
module.info.ur
0
B
-rw-r--r--
module.info.ur.auto
306
B
-rw-r--r--
module.info.vi
0
B
-rw-r--r--
module.info.vi.auto
205
B
-rw-r--r--
module.info.zh
0
B
-rw-r--r--
module.info.zh.auto
146
B
-rw-r--r--
module.info.zh_TW
0
B
-rw-r--r--
module.info.zh_TW.auto
155
B
-rw-r--r--
move.cgi
1.29
KB
-rwxr-xr-x
newchain.cgi
898
B
-rwxr-xr-x
open-ports.pl
3.4
KB
-rwxr-xr-x
prefs.info
55
B
-rw-r--r--
redhat-linux-lib.pl
2.14
KB
-rwxr-xr-x
save_policy.cgi
7.15
KB
-rwxr-xr-x
save_rule.cgi
12.4
KB
-rwxr-xr-x
save_rule6.cgi
12.05
KB
-rwxr-xr-x
setup.cgi
9.36
KB
-rwxr-xr-x
setup6.cgi
8.12
KB
-rwxr-xr-x
trustix-linux-lib.pl
2.14
KB
-rwxr-xr-x
unapply.cgi
609
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : setup.cgi
#!/usr/bin/perl # setup.cgi # Setup an initial save file require './firewall-lib.pl'; &ReadParse(); if (&get_ipvx_version() == 6) { require './firewall6-lib.pl'; } else { require './firewall4-lib.pl'; } $access{'setup'} || &error($text{'setup_ecannot'}); &lock_file($ipvx_save); if ($in{'reset'}) { # Clear out all rules foreach $t ("filter", "nat", "mangle") { &system_logged("iptables -t $t -P INPUT ACCEPT >/dev/null 2>&1"); &system_logged("iptables -t $t -P OUTPUT ACCEPT >/dev/null 2>&1"); &system_logged("iptables -t $t -P FORWARD ACCEPT >/dev/null 2>&1"); &system_logged("iptables -t $t -P PREROUTING ACCEPT >/dev/null 2>&1"); &system_logged("iptables -t $t -P POSTROUTING ACCEPT >/dev/null 2>&1"); &system_logged("iptables -t $t -F >/dev/null 2>&1"); &system_logged("iptables -t $t -X >/dev/null 2>&1"); } } # Save all existing active rules if (defined(&unapply_iptables)) { &unapply_iptables(); } else { &backquote_logged("iptables-save >$ipvx_save 2>&1"); } # Get important variable ports &get_miniserv_config(\%miniserv); $webmin_port = $miniserv{'port'} || 10000; $webmin_port2 = $webmin_port + 10; $usermin_port = undef; if (&foreign_installed("usermin")) { &foreign_require("usermin", "usermin-lib.pl"); &usermin::get_usermin_miniserv_config(\%uminiserv); $usermin_port = $uminiserv{'port'}; } $usermin_port ||= 20000; $ssh_port = undef; if (&foreign_installed("sshd")) { &foreign_require("sshd", "sshd-lib.pl"); $conf = &sshd::get_sshd_config(); $ssh_port = &sshd::find_value("Port", $conf); } $ssh_port ||= 22; if ($in{'auto'}) { @tables = &get_iptables_save(); if ($in{'auto'} == 1) { # Add a single rule to the nat table for masquerading $iface = $in{'iface1'} eq 'other' ? $in{'iface1_other'} : $in{'iface1'}; $iface || &error($text{'setup_eiface'}); ($table) = grep { $_->{'name'} eq 'nat' } @tables; $table ||= { 'name' => 'nat', 'rules' => [ ], 'defaults' => { } }; push(@{$table->{'rules'}}, { 'chain' => 'POSTROUTING', 'o' => [ "", $iface ], 'j' => [ "", 'MASQUERADE' ] } ); } elsif ($in{'auto'} >= 2) { # Block all incoming traffic, except for established # connections, DNS replies and safe ICMP types # In mode 3 allow ssh and ident too # In mode 4 allow ftp, echo-request and high ports too $iface = $in{'iface'.$in{'auto'}} eq 'other' ? $in{'iface'.$in{'auto'}.'_other'} : $in{'iface'.$in{'auto'}}; $iface || &error($text{'setup_eiface'}); ($table) = grep { $_->{'name'} eq 'filter' } @tables; $table ||= { 'name' => 'nat', 'rules' => [ ], 'defaults' => { } }; $table->{'defaults'}->{'INPUT'} = 'DROP'; push(@{$table->{'rules'}}, { 'chain' => 'INPUT', 'i' => [ "!", $iface ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Accept traffic from internal interfaces' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'tcp-flags' => [ "", "ACK", "ACK" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Accept traffic with the ACK flag set' }, { 'chain' => 'INPUT', 'm' => [ [ "", "state" ] ], 'state' => [ "", "ESTABLISHED" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow incoming data that is part of a connection we established' }, { 'chain' => 'INPUT', 'm' => [ [ "", "state" ] ], 'state' => [ "", "RELATED" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow data that is related to existing connections' }, { 'chain' => 'INPUT', 'm' => [ [ "", "udp" ] ], 'p' => [ "", "udp" ], 'sport' => [ "", 53 ], 'dport' => [ "", "1024:65535" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Accept responses to DNS queries' }, { 'chain' => 'INPUT', 'm' => [ [ "", "icmp" ] ], 'p' => [ [ "", "icmp" ] ], 'icmp-type' => [ "", "echo-reply" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Accept responses to our pings' }, { 'chain' => 'INPUT', 'm' => [ [ "", "icmp" ] ], 'p' => [ [ "", "icmp" ] ], 'icmp-type' => [ "", "destination-unreachable" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Accept notifications of unreachable hosts' }, { 'chain' => 'INPUT', 'm' => [ [ "", "icmp" ] ], 'p' => [ [ "", "icmp" ] ], 'icmp-type' => [ "", "source-quench" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Accept notifications to reduce sending speed' }, { 'chain' => 'INPUT', 'm' => [ [ "", "icmp" ] ], 'p' => [ [ "", "icmp" ] ], 'icmp-type' => [ "", "time-exceeded" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Accept notifications of lost packets' }, { 'chain' => 'INPUT', 'm' => [ [ "", "icmp" ] ], 'p' => [ [ "", "icmp" ] ], 'icmp-type' => [ "", "parameter-problem" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Accept notifications of protocol problems' } ); if ($in{'auto'} >= 3) { # Allow ssh and ident push(@{$table->{'rules'}}, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", $ssh_port ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to our SSH server' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", "auth" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to our IDENT server'} ); } if ($in{'auto'} >= 4) { # Allow pings push(@{$table->{'rules'}}, { 'chain' => 'INPUT', 'm' => [ [ "", "icmp" ] ], 'p' => [ [ "", "icmp" ] ], 'icmp-type' => [ "", "echo-request" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Respond to pings' }, ); } if ($in{'auto'} == 4) { # Allow pings and most high ports push(@{$table->{'rules'}}, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", "2049:2050" ], 'j' => [ "", 'DROP' ], 'cmt' => 'Protect our NFS server' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", "6000:6063" ], 'j' => [ "", 'DROP' ], 'cmt' => 'Protect our X11 display server' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", "7000:7010" ], 'j' => [ "", 'DROP' ], 'cmt' => 'Protect our X font server' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", "1024:65535" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to unprivileged ports' }, ); } if ($in{'auto'} == 5) { # Allow typical hosting server ports push(@{$table->{'rules'}}, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", "53" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow DNS zone transfers' }, { 'chain' => 'INPUT', 'm' => [ [ "", "udp" ] ], 'p' => [ "", "udp" ], 'dport' => [ "", "53" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow DNS queries' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", "80" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to webserver' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", "443" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow SSL connections to webserver' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ], [ "", "multiport" ] ], 'p' => [ "", "tcp" ], 'dports' => [ "", "25,587" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to mail server' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", "20:21" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to FTP server' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ], [ "", "multiport" ] ], 'p' => [ "", "tcp" ], 'dports' => [ "", "110,995" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to POP3 server' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ], [ "", "multiport" ] ], 'p' => [ "", "tcp" ], 'dports' => [ "", "143,220,993" ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to IMAP server' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "",$webmin_port.":".$webmin_port2 ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to Webmin' }, { 'chain' => 'INPUT', 'm' => [ [ "", "tcp" ] ], 'p' => [ "", "tcp" ], 'dport' => [ "", $usermin_port ], 'j' => [ "", 'ACCEPT' ], 'cmt' => 'Allow connections to Usermin' }, ); } } &run_before_command(); &save_table($table); &run_after_command(); ©_to_cluster(); } if ($in{'atboot'}) { &create_firewall_init(); } &unlock_file($ipvx_save); &webmin_log("setup"); &redirect("");
Close