Linux server1.sbs.cy 5.14.0-362.18.1.el9_3.x86_64 #1 SMP PREEMPT_DYNAMIC Mon Jan 29 07:05:48 EST 2024 x86_64
Apache
: 199.192.25.12 | : 172.70.100.37
28 Domain
8.1.31
administrator
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
etc /
security /
[ HOME SHELL ]
Name
Size
Permission
Action
console.apps
[ DIR ]
drwxr-xr-x
console.perms.d
[ DIR ]
drwxr-xr-x
limits.d
[ DIR ]
drwxr-xr-x
namespace.d
[ DIR ]
drwxr-xr-x
pwquality.conf.d
[ DIR ]
drwxr-xr-x
access.conf
4.46
KB
-rw-r--r--
chroot.conf
82
B
-rw-r--r--
console.handlers
624
B
-rw-r--r--
console.perms
939
B
-rw-r--r--
faillock.conf
2.18
KB
-rw-r--r--
group.conf
3.55
KB
-rw-r--r--
limits.conf
2.37
KB
-rw-r--r--
namespace.conf
1.6
KB
-rw-r--r--
namespace.init
1020
B
-rwxr-xr-x
opasswd
0
B
-rw-------
pam_env.conf
2.9
KB
-rw-r--r--
pwhistory.conf
517
B
-rw-r--r--
pwquality.conf
2.61
KB
-rw-r--r--
sepermit.conf
418
B
-rw-r--r--
time.conf
2.13
KB
-rw-r--r--
user_map.conf
247
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : pwquality.conf
# Configuration for systemwide password quality limits # Defaults: # # Number of characters in the new password that must not be present in the # old password. # difok = 1 # # Minimum acceptable size for the new password (plus one if # credits are not disabled which is the default). (See pam_cracklib manual.) # Cannot be set to lower value than 6. # minlen = 8 # # The maximum credit for having digits in the new password. If less than 0 # it is the minimum number of digits in the new password. # dcredit = 0 # # The maximum credit for having uppercase characters in the new password. # If less than 0 it is the minimum number of uppercase characters in the new # password. # ucredit = 0 # # The maximum credit for having lowercase characters in the new password. # If less than 0 it is the minimum number of lowercase characters in the new # password. # lcredit = 0 # # The maximum credit for having other characters in the new password. # If less than 0 it is the minimum number of other characters in the new # password. # ocredit = 0 # # The minimum number of required classes of characters for the new # password (digits, uppercase, lowercase, others). # minclass = 0 # # The maximum number of allowed consecutive same characters in the new password. # The check is disabled if the value is 0. # maxrepeat = 0 # # The maximum number of allowed consecutive characters of the same class in the # new password. # The check is disabled if the value is 0. # maxclassrepeat = 0 # # Whether to check for the words from the passwd entry GECOS string of the user. # The check is enabled if the value is not 0. # gecoscheck = 0 # # Whether to check for the words from the cracklib dictionary. # The check is enabled if the value is not 0. # dictcheck = 1 # # Whether to check if it contains the user name in some form. # The check is enabled if the value is not 0. # usercheck = 1 # # Length of substrings from the username to check for in the password # The check is enabled if the value is greater than 0 and usercheck is enabled. # usersubstr = 0 # # Whether the check is enforced by the PAM module and possibly other # applications. # The new password is rejected if it fails the check and the value is not 0. # enforcing = 1 # # Path to the cracklib dictionaries. Default is to use the cracklib default. # dictpath = # # Prompt user at most N times before returning with error. The default is 1. # retry = 3 # # Enforces pwquality checks on the root user password. # Enabled if the option is present. # enforce_for_root # # Skip testing the password quality for users that are not present in the # /etc/passwd file. # Enabled if the option is present. # local_users_only
Close