!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/usr/share/doc/selinux-policy-2.4.6/html/   drwxr-xr-x
Free 50.94 GB of 127.8 GB (39.86%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     kernel_domain.html (38.7 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
Security Enhanced Linux Reference Policy

Layer: kernel

Module: domain

Description:

Core policy for domains.

This module is required to be included in all policies.

Interfaces:

domain_base_type( type )
Summary

Make the specified type usable as a basic domain.

Description

Make the specified type usable as a basic domain.

This is primarily used for kernel threads; generally the domain_type() interface is more appropriate for userland processes.

Parameters
Parameter:Description:Optional:
type

Type to be used as a basic domain type.

No
domain_cron_exemption_source( domain )
Summary

Make the specified domain the source of the cron domain exception of the SELinux role and identity change constraints.

Description

Make the specified domain the source of the cron domain exception of the SELinux role and identity change constraints.

This interface is needed to decouple the cron domains from the base module. It should not be used other than on cron domains.

Parameters
Parameter:Description:Optional:
domain

Domain target for user exemption.

No
domain_cron_exemption_target( domain )
Summary

Make the specified domain the target of the cron domain exception of the SELinux role and identity change constraints.

Description

Make the specified domain the target of the cron domain exception of the SELinux role and identity change constraints.

This interface is needed to decouple the cron domains from the base module. It should not be used other than on user cron jobs.

Parameters
Parameter:Description:Optional:
domain

Domain target for user exemption.

No
domain_dontaudit_exec_all_entry_files( domain )
Summary

dontaudit checking for execute on all entry point files

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_dontaudit_getattr_all_dgram_sockets( domain )
Summary

Do not audit attempts to get the attributes of all domains unix datagram sockets.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_dontaudit_getattr_all_domains( domain )
Summary

Get the attributes of all domains of all domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_dontaudit_getattr_all_key_sockets( domain )
Summary

Do not audit attempts to get attribues of all domains IPSEC key management sockets.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_dontaudit_getattr_all_packet_sockets( domain )
Summary

Do not audit attempts to get attribues of all domains packet sockets.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_dontaudit_getattr_all_pipes( domain )
Summary

Do not audit attempts to get the attributes of all domains unnamed pipes.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_dontaudit_getattr_all_raw_sockets( domain )
Summary

Do not audit attempts to get attribues of all domains raw sockets.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_dontaudit_getattr_all_sockets( domain )
Summary

Do not audit attempts to get the attributes of all domains sockets, for all socket types.

Description

Do not audit attempts to get the attributes of all domains sockets, for all socket types.

This interface was added for PCMCIA cardmgr and is probably excessive.

Parameters
Parameter:Description:Optional:
domain

Domain to not audit.

No
domain_dontaudit_getattr_all_stream_sockets( domain )
Summary

Do not audit attempts to get the attributes of all domains unix datagram sockets.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_dontaudit_getattr_all_tcp_sockets( domain )
Summary

Do not audit attempts to get the attributes of all domains TCP sockets.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_dontaudit_getattr_all_udp_sockets( domain )
Summary

Do not audit attempts to get the attributes of all domains UDP sockets.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_dontaudit_getsession_all_domains( domain )
Summary

Do not audit attempts to get the session ID of all domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_dontaudit_list_all_domains_state( domain )
Summary

Do not audit attempts to read the process state directories of all domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_dontaudit_ptrace_all_domains( domain )
Summary

Do not audit attempts to ptrace all domains.

Description

Do not audit attempts to ptrace all domains.

Generally this needs to be suppressed because procps tries to access /proc/pid/environ and this now triggers a ptrace check in recent kernels (2.4 and 2.6).

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_dontaudit_ptrace_confined_domains( domain )
Summary

Do not audit attempts to ptrace confined domains.

Description

Do not audit attempts to ptrace confined domains.

Generally this needs to be suppressed because procps tries to access /proc/pid/environ and this now triggers a ptrace check in recent kernels (2.4 and 2.6).

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_dontaudit_read_all_domains_state( domain )
Summary

Do not audit attempts to read the process state (/proc/pid) of all domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_dontaudit_rw_all_key_sockets( domain )
Summary

Do not audit attempts to read or write all domains key sockets.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_dontaudit_rw_all_udp_sockets( domain )
Summary

Do not audit attempts to read or write all domains UDP sockets.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_dontaudit_search_all_domains_state( domain )
Summary

Do not audit attempts to search the process state directory (/proc/pid) of all domains.

Parameters
Parameter:Description:Optional:
domain

Domain to not audit.

No
domain_dontaudit_use_interactive_fds( domain )
Summary

Do not audit attempts to inherit file descriptors from domains with interactive programs.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_dyntrans_type( domain )
Summary

Allow the specified domain to perform dynamic transitions.

Description

Allow the specified domain to perform dynamic transitions.

This violates process tranquility, and it is strongly suggested that this not be used.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_entry_file( domain , type )
Summary

Make the specified type usable as an entry point for the domain.

Parameters
Parameter:Description:Optional:
domain

Domain to be entered.

No
type

Type of program used for entering the domain.

No
domain_entry_file_spec_domtrans( domain )
Summary

Execute an entry_type in the specified domain.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_exec_all_entry_files( domain )
Summary

Execute the entry point files for all domains in the caller domain.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_getattr_all_domains( domain )
Summary

Get the attributes of all domains of all domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_getattr_all_entry_files( domain )
Summary

Get the attributes of entry point files for all domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_getattr_all_pipes( domain )
Summary

Get the attributes of all domains unnamed pipes.

Description

Get the attributes of all domains unnamed pipes.

This is commonly used for domains that can use lsof on all domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_getattr_all_sockets( domain )
Summary

Get the attributes of all domains sockets, for all socket types.

Description

Get the attributes of all domains sockets, for all socket types.

This is commonly used for domains that can use lsof on all domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_getattr_confined_domains( domain )
Summary

Get the attributes of all confined domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_getsession_all_domains( domain )
Summary

Get the session ID of all domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_interactive_fd( domain )
Summary

Make the file descriptors of the specified domain for interactive use (widely inheritable)

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_ipsec_labels( type )
Summary

Allow specified type to associate ipsec packets from any domain

Parameters
Parameter:Description:Optional:
type

Type of subject to be allowed this.

No
domain_ipsec_setcontext_all_domains( type )
Summary

Allow specified type to set context of all domains IPSEC associations.

Parameters
Parameter:Description:Optional:
type

Type of subject to be allowed this.

No
domain_kill_all_domains( domain )
Summary

Send a kill signal to all domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_manage_all_entry_files( domain )
Summary

Create, read, write, and delete all entrypoint files.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_mmap_all_entry_files( domain )
Summary

Mmap all entry point files as executable.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_mmap_low( domain )
Summary

Ability to mmap a low area of the address space, as configured by /proc/sys/kernel/mmap_min_addr. Preventing such mappings helps protect against exploiting null deref bugs in the kernel.

Parameters
Parameter:Description:Optional:
domain

Domain allowed to mmap low memory.

No
domain_mmap_low_type( domain )
Summary

Ability to mmap a low area of the address space, as configured by /proc/sys/kernel/mmap_min_addr. Preventing such mappings helps protect against exploiting null deref bugs in the kernel.

Parameters
Parameter:Description:Optional:
domain

Domain allowed to mmap low memory.

No
domain_obj_id_change_exemption( domain )
Summary

Makes caller an exception to the constraint preventing changing the user identity in object contexts.

Parameters
Parameter:Description:Optional:
domain

The process type to make an exception to the constraint.

No
domain_ptrace_all_domains( domain )
Summary

Ptrace all domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_read_all_domains_state( domain )
Summary

Read the process state (/proc/pid) of all domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_read_all_entry_files( domain )
Summary

Read the entry point files for all domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_read_confined_domains_state( domain )
Summary

Read the process state (/proc/pid) of all confined domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_relabel_all_entry_files( domain )
Summary

Relabel to and from all entry point file types.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_role_change_exemption( domain )
Summary

Makes caller an exception to the constraint preventing changing of role.

Parameters
Parameter:Description:Optional:
domain

The process type to make an exception to the constraint.

No
domain_search_all_domains_state( domain )
Summary

Search the process state directory (/proc/pid) of all domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_setcontext( type )
Summary

Allow specified type to set context on domain attribute.

Parameters
Parameter:Description:Optional:
type

Type of subject to be allowed this.

No
domain_setpriority_all_domains( domain )
Summary

Set the nice level of all domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_sigchld_all_domains( domain )
Summary

Send a child terminated signal to all domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_sigchld_interactive_fds( domain )
Summary

Send a SIGCHLD signal to domains whose file discriptors are widely inheritable.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_signal_all_domains( domain )
Summary

Send general signals to all domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_signull_all_domains( domain )
Summary

Send a null signal to all domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_sigstop_all_domains( domain )
Summary

Send a stop signal to all domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_subj_id_change_exemption( domain )
Summary

Makes caller an exception to the constraint preventing changing of user identity.

Parameters
Parameter:Description:Optional:
domain

The process type to make an exception to the constraint.

No
domain_system_change_exemption( domain )
Summary

Makes caller and execption to the constraint preventing changing to the system user identity and system role.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_type( type )
Summary

Make the specified type usable as a domain.

Parameters
Parameter:Description:Optional:
type

Type to be used as a domain type.

No
domain_unconfined( domain )
Summary

Unconfined access to domains.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_use_interactive_fds( domain )
Summary

Inherit and use file descriptors from domains with interactive programs.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
domain_user_exemption_target( domain )
Summary

Make the specified domain the target of the user domain exception of the SELinux role and identity change constraints.

Description

Make the specified domain the target of the user domain exception of the SELinux role and identity change constraints.

This interface is needed to decouple the user domains from the base module. It should not be used other than on user domains.

Parameters
Parameter:Description:Optional:
domain

Domain target for user exemption.

No
Return

:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0105 ]--