!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/usr/share/doc/selinux-policy-2.4.6/html/   drwxr-xr-x
Free 50.94 GB of 127.8 GB (39.86%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     kernel_kernel.html (69.29 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
Security Enhanced Linux Reference Policy

Layer: kernel

Module: kernel

Description:

Policy for kernel threads, proc filesystem, and unlabeled processes and objects.

This module is required to be included in all policies.

Interfaces:

kernel_change_ring_buffer_level( domain )
Summary

Change the level of kernel messages logged to the console.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_clear_ring_buffer( domain )
Summary

Allows the caller to clear the ring buffer.

Parameters
Parameter:Description:Optional:
domain

The process type clearing the buffer.

No
kernel_dgram_send( domain )
Summary

Send messages to kernel unix datagram sockets.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_domtrans_to( domain , entrypoint )
Summary

Allows to start userland processes by transitioning to the specified domain.

Parameters
Parameter:Description:Optional:
domain

The process type entered by kernel.

No
entrypoint

The executable type for the entrypoint.

No
kernel_dontaudit_getattr_core_if( domain )
Summary

Do not audit attempts to get the attributes of core kernel interfaces.

Parameters
Parameter:Description:Optional:
domain

The process type to not audit.

No
kernel_dontaudit_getattr_message_if( domain )
Summary

Do not audit attempts by caller to get the attributes of kernel message interfaces.

Parameters
Parameter:Description:Optional:
domain

The process type not to audit.

No
kernel_dontaudit_getattr_unlabeled_blk_files( domain )
Summary

Do not audit attempts by caller to get attributes for unlabeled block devices.

Parameters
Parameter:Description:Optional:
domain

The process type not to audit.

No
kernel_dontaudit_getattr_unlabeled_chr_files( domain )
Summary

Do not audit attempts by caller to get attributes for unlabeled character devices.

Parameters
Parameter:Description:Optional:
domain

The process type not to audit.

No
kernel_dontaudit_getattr_unlabeled_files( domain )
Summary

Do not audit attempts by caller to get the attributes of an unlabeled file.

Parameters
Parameter:Description:Optional:
domain

The process type not to audit.

No
kernel_dontaudit_getattr_unlabeled_pipes( domain )
Summary

Do not audit attempts by caller to get the attributes of unlabeled named pipes.

Parameters
Parameter:Description:Optional:
domain

The process type not to audit.

No
kernel_dontaudit_getattr_unlabeled_sockets( domain )
Summary

Do not audit attempts by caller to get the attributes of unlabeled named sockets.

Parameters
Parameter:Description:Optional:
domain

The process type not to audit.

No
kernel_dontaudit_getattr_unlabeled_symlinks( domain )
Summary

Do not audit attempts by caller to get the attributes of unlabeled symbolic links.

Parameters
Parameter:Description:Optional:
domain

The process type not to audit.

No
kernel_dontaudit_list_all_proc( domain )
Summary

Do not audit attempts to list all proc directories.

Parameters
Parameter:Description:Optional:
domain

Domain to not audit.

No
kernel_dontaudit_list_all_sysctls( domain )
Summary

Do not audit attempts to list all sysctl directories.

Parameters
Parameter:Description:Optional:
domain

Domain to not audit.

No
kernel_dontaudit_list_proc( domain )
Summary

Do not audit attempts to list the contents of directories in /proc.

Parameters
Parameter:Description:Optional:
domain

Domain to not audit.

No
kernel_dontaudit_list_unlabeled( domain )
Summary

Do not audit attempts to list unlabeled directories.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_dontaudit_raw_recvfrom_unlabeled( domain )
Summary

Do not audit attempts to receive Raw IP packets from a NetLabel connection.

Description

Do not audit attempts to receive Raw IP packets from a NetLabel connection. NetLabel is an explicit packet labeling framework which implements CIPSO and similar protocols.

The corenetwork interface corenet_dontaudit_raw_recv_netlabel() should be used instead of this one.

Parameters
Parameter:Description:Optional:
domain

Domain to not audit.

No
kernel_dontaudit_read_proc_symlinks( domain )
Summary

Do not audit attempts by caller to read system state information in proc.

Parameters
Parameter:Description:Optional:
domain

The process type not to audit.

No
kernel_dontaudit_read_ring_buffer( domain )
Summary

Do not audit attempts to read the ring buffer.

Parameters
Parameter:Description:Optional:
domain

The domain to not audit.

No
kernel_dontaudit_read_system_state( domain )
Summary

Do not audit attempts by caller to read system state information in proc.

Parameters
Parameter:Description:Optional:
domain

The process type not to audit.

No
kernel_dontaudit_read_unlabeled_files( domain )
Summary

Do not audit attempts by caller to read an unlabeled file.

Parameters
Parameter:Description:Optional:
domain

Domain to not audit.

No
kernel_dontaudit_search_kernel_sysctl( domain )
Summary

Do not audit attempts to search generic kernel sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain to not audit.

No
kernel_dontaudit_search_network_state( domain )
Summary

Do not audit attempts to search the network state directory.

Parameters
Parameter:Description:Optional:
domain

The process type reading the state.

No
kernel_dontaudit_search_network_sysctl( domain )
Summary

Do not audit attempts by caller to search network sysctl directories.

Parameters
Parameter:Description:Optional:
domain

The process type not to audit.

No
kernel_dontaudit_search_sysctl( domain )
Summary

Do not audit attempts by caller to search the base directory of sysctls.

Parameters
Parameter:Description:Optional:
domain

The process type not to audit.

No
kernel_dontaudit_search_xen_state( domain )
Summary

Do not audit attempts to search the xen state directory.

Parameters
Parameter:Description:Optional:
domain

The process type reading the state.

No
kernel_dontaudit_sendrecv_unlabeled_association( domain )
Summary

Do not audit attempts to send and receive messages from an unlabeled IPSEC association.

Description

Do not audit attempts to send and receive messages from an unlabeled IPSEC association. Network connections that are not protected by IPSEC have use an unlabeled assocation.

The corenetwork interface corenet_dontaudit_non_ipsec_sendrecv() should be used instead of this one.

Parameters
Parameter:Description:Optional:
domain

Domain to not audit.

No
kernel_dontaudit_tcp_recvfrom_unlabeled( domain )
Summary

Do not audit attempts to receive TCP packets from a NetLabel connection.

Description

Do not audit attempts to receive TCP packets from a NetLabel connection. NetLabel is an explicit packet labeling framework which implements CIPSO and similar protocols.

The corenetwork interface corenet_dontaudit_tcp_recv_netlabel() should be used instead of this one.

Parameters
Parameter:Description:Optional:
domain

Domain to not audit.

No
kernel_dontaudit_udp_recvfrom_unlabeled( domain )
Summary

Do not audit attempts to receive UDP packets from a NetLabel connection.

Description

Do not audit attempts to receive UDP packets from a NetLabel connection. NetLabel is an explicit packet labeling framework which implements CIPSO and similar protocols.

The corenetwork interface corenet_dontaudit_udp_recv_netlabel() should be used instead of this one.

Parameters
Parameter:Description:Optional:
domain

Domain to not audit.

No
kernel_dontaudit_use_fds( domain )
Summary

Do not audit attempts to use kernel file descriptors.

Parameters
Parameter:Description:Optional:
domain

The type of process not to audit.

No
kernel_dontaudit_write_kernel_sysctl( domain )
Summary

Do not audit attempts to write generic kernel sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain to not audit.

No
kernel_get_sysvipc_info( domain )
Summary

Get information on all System V IPC objects.

Parameters
Parameter:Description:Optional:
domain

No
kernel_getattr_core_if( domain )
Summary

Allows caller to get attribues of core kernel interface.

Parameters
Parameter:Description:Optional:
domain

The process type getting the attibutes.

No
kernel_getattr_debugfs( domain )
Summary

Get the attributes of a kernel debugging filesystem.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_getattr_message_if( domain )
Summary

Allow caller to get the attributes of kernel message interface (/proc/kmsg).

Parameters
Parameter:Description:Optional:
domain

The process type getting the attributes.

No
kernel_getattr_proc( domain )
Summary

Get the attributes of the proc filesystem.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_getattr_proc_files( domain )
Summary

Get the attributes of files in /proc.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_kill_unlabeled( domain )
Summary

Send a kill signal to unlabeled processes.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_link_key( domain )
Summary

Allow link to the kernel key ring.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_list_proc( domain )
Summary

List the contents of directories in /proc.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_list_unlabeled( domain )
Summary

List unlabeled directories.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_load_module( domain )
Summary

Allows caller to load kernel modules

Parameters
Parameter:Description:Optional:
domain

The process type to allow to load kernel modules.

No
kernel_mount_debugfs( domain )
Summary

Mount a kernel debugging filesystem.

Parameters
Parameter:Description:Optional:
domain

The type of the domain mounting the filesystem.

No
kernel_ranged_domtrans_to( domain , entrypoint , range )
Summary

Allows to start userland processes by transitioning to the specified domain, with a range transition.

Parameters
Parameter:Description:Optional:
domain

The process type entered by kernel.

No
entrypoint

The executable type for the entrypoint.

No
range

Range for the domain.

No
kernel_raw_recvfrom_unlabeled( domain )
Summary

Receive Raw IP packets from a NetLabel connection.

Description

Receive Raw IP packets from a NetLabel connection, NetLabel is an explicit packet labeling framework which implements CIPSO and similar protocols.

The corenetwork interface corenet_raw_recv_netlabel() should be used instead of this one.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_read_all_sysctls( domain )
Summary

Allow caller to read all sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_read_crypto_sysctls( domain )
Summary

Read generic crypto sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_read_debugfs( domain )
Summary

Read information from the debugging filesystem.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_read_device_sysctls( domain )
Summary

Allow caller to read the device sysctls.

Parameters
Parameter:Description:Optional:
domain

The process type to allow to read the device sysctls.

No
kernel_read_fs_sysctls( domain )
Summary

Read filesystem sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_read_hotplug_sysctls( domain )
Summary

Read the hotplug sysctl.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_read_irq_sysctls( domain )
Summary

Read IRQ sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_read_kernel_sysctls( domain )
Summary

Read generic kernel sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_read_messages( domain )
Summary

Allow caller to read kernel messages using the /proc/kmsg interface.

Parameters
Parameter:Description:Optional:
domain

The process type reading the messages.

No
kernel_read_modprobe_sysctls( domain )
Summary

Read the modprobe sysctl.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_read_net_sysctls( domain )
Summary

Allow caller to read network sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_read_network_state( domain )
Summary

Allow caller to read the network state information.

Parameters
Parameter:Description:Optional:
domain

The process type reading the state.

No
kernel_read_network_state_symlinks( domain )
Summary

Allow caller to read the network state symbolic links.

Parameters
Parameter:Description:Optional:
domain

The process type reading the state.

No
kernel_read_proc_symlinks( domain )
Summary

Read symbolic links in /proc.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_read_ring_buffer( domain )
Summary

Allows caller to read the ring buffer.

Parameters
Parameter:Description:Optional:
domain

The process type allowed to read the ring buffer.

No
kernel_read_rpc_sysctls( domain )
Summary

Read RPC sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_read_software_raid_state( domain )
Summary

Allow caller to read the state information for software raid.

Parameters
Parameter:Description:Optional:
domain

The process type reading software raid state.

No
kernel_read_sysctl( domain )
Summary

Allow access to read sysctl directories.

Parameters
Parameter:Description:Optional:
domain

The process type to allow to read sysctl directories.

No
kernel_read_system_state( domain )
Summary

Allows caller to read system state information in proc.

Parameters
Parameter:Description:Optional:
domain

The process type reading the system state information.

No
kernel_read_unix_sysctls( domain )
Summary

Allow caller to read unix domain socket sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_read_unlabeled_state( domain )
Summary

Read the process state (/proc/pid) of all unlabeled_t.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_read_vm_sysctls( domain )
Summary

Allow caller to read virtual memory sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_read_xen_state( domain )
Summary

Allow caller to read the xen state information.

Parameters
Parameter:Description:Optional:
domain

The process type reading the state.

No
kernel_read_xen_state_symlinks( domain )
Summary

Allow caller to read the xen state symbolic links.

Parameters
Parameter:Description:Optional:
domain

The process type reading the state.

No
kernel_relabelfrom_unlabeled_dirs( domain )
Summary

Allow caller to relabel unlabeled directories.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_relabelfrom_unlabeled_files( domain )
Summary

Allow caller to relabel unlabeled files.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_relabelfrom_unlabeled_pipes( domain )
Summary

Allow caller to relabel unlabeled named pipes.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_relabelfrom_unlabeled_sockets( domain )
Summary

Allow caller to relabel unlabeled named sockets.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_relabelfrom_unlabeled_symlinks( domain )
Summary

Allow caller to relabel unlabeled symbolic links.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_remount_debugfs( domain )
Summary

Remount a kernel debugging filesystem.

Parameters
Parameter:Description:Optional:
domain

The type of the domain remounting the filesystem.

No
kernel_rootfs_mountpoint( directory_type )
Summary

Allows the kernel to mount filesystems on the specified directory type.

Parameters
Parameter:Description:Optional:
directory_type

The type of the directory to use as a mountpoint.

No
kernel_rw_all_sysctls( domain )
Summary

Read and write all sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_rw_device_sysctls( domain )
Summary

Read and write device sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_rw_fs_sysctls( domain )
Summary

Read and write fileystem sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_rw_hotplug_sysctls( domain )
Summary

Read and write the hotplug sysctl.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_rw_irq_sysctls( domain )
Summary

Read and write IRQ sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_rw_kernel_sysctl( domain )
Summary

Read and write generic kernel sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_rw_modprobe_sysctls( domain )
Summary

Read and write the modprobe sysctl.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_rw_net_sysctls( domain )
Summary

Allow caller to modiry contents of sysctl network files.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_rw_pipes( domain )
Summary

Read and write kernel unnamed pipes.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_rw_rpc_sysctls( domain )
Summary

Read and write RPC sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_rw_software_raid_state( domain )
Summary

Allow caller to read and set the state information for software raid.

Parameters
Parameter:Description:Optional:
domain

The process type reading software raid state.

No
kernel_rw_unix_dgram_sockets( domain )
Summary

Read and write kernel unix datagram sockets.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_rw_unix_sysctls( domain )
Summary

Read and write unix domain socket sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_rw_unlabeled_blk_files( domain )
Summary

Read and write unlabeled block device nodes.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_rw_unlabeled_dirs( domain )
Summary

Read and write unlabeled directories.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_rw_vm_sysctls( domain )
Summary

Read and write virtual memory sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_search_debugfs( domain )
Summary

Search the contents of a kernel debugging filesystem.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_search_key( domain )
Summary

Allow search the kernel key ring.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_search_network_state( domain )
Summary

Allow searching of network state directory.

Parameters
Parameter:Description:Optional:
domain

The process type reading the state.

No
kernel_search_network_sysctl( domain )
Summary

Search network sysctl directories.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_search_proc( domain )
Summary

Search directories in /proc.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_search_vm_sysctl( domain )
Summary

Allow caller to search virtual memory sysctls.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_search_xen_state( domain )
Summary

Allow searching of xen state directory.

Parameters
Parameter:Description:Optional:
domain

The process type reading the state.

No
kernel_sendrecv_unlabeled_association( domain )
Summary

Send and receive messages from an unlabeled IPSEC association.

Description

Send and receive messages from an unlabeled IPSEC association. Network connections that are not protected by IPSEC have use an unlabeled assocation.

The corenetwork interface corenet_non_ipsec_sendrecv() should be used instead of this one.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_sendrecv_unlabeled_packets( domain )
Summary

Send and receive unlabeled packets.

Description

Send and receive unlabeled packets. These packets do not match any netfilter SECMARK rules.

The corenetwork interface corenet_sendrecv_unlabeled_packets() should be used instead of this one.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_setpgid( domain )
Summary

Set the process group of kernel threads.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_setsched( domain )
Summary

Set the priority of kernel threads.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_share_state( domain )
Summary

Allows the kernel to share state information with the caller.

Parameters
Parameter:Description:Optional:
domain

The type of the process with which to share state information.

No
kernel_sigchld( domain )
Summary

Send a SIGCHLD signal to kernel threads.

Parameters
Parameter:Description:Optional:
domain

The type of the process sending the signal.

No
kernel_sigchld_unlabeled( domain )
Summary

Send a child terminated signal to unlabeled processes.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_sigkill( domain )
Summary

Send a kill signal to kernel processes.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_signal( domain )
Summary

Send a generic signal to kernel threads.

Parameters
Parameter:Description:Optional:
domain

The type of the process sending the signal.

No
kernel_signal_unlabeled( domain )
Summary

Send general signals to unlabeled processes.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_signull_unlabeled( domain )
Summary

Send a null signal to unlabeled processes.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_sigstop_unlabeled( domain )
Summary

Send a stop signal to unlabeled processes.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_tcp_recvfrom( domain )
Summary

Receive messages from kernel TCP sockets. (Deprecated)

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_tcp_recvfrom_unlabeled( domain )
Summary

Receive TCP packets from a NetLabel connection.

Description

Receive TCP packets from a NetLabel connection, NetLabel is an explicit packet labeling framework which implements CIPSO and similar protocols.

The corenetwork interface corenet_tcp_recv_netlabel() should be used instead of this one.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_udp_recvfrom( domain )
Summary

Receive messages from kernel UDP sockets. (Deprecated)

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_udp_recvfrom_unlabeled( domain )
Summary

Receive UDP packets from a NetLabel connection.

Description

Receive UDP packets from a NetLabel connection, NetLabel is an explicit packet labeling framework which implements CIPSO and similar protocols.

The corenetwork interface corenet_udp_recv_netlabel() should be used instead of this one.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_udp_send( domain )
Summary

Send UDP network traffic to the kernel. (Deprecated)

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_unconfined( domain )
Summary

Unconfined access to kernel module resources.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_unmount_debugfs( domain )
Summary

Unmount a kernel debugging filesystem.

Parameters
Parameter:Description:Optional:
domain

The type of the domain unmounting the filesystem.

No
kernel_unmount_proc( domain )
Summary

Unmount the proc filesystem.

Parameters
Parameter:Description:Optional:
domain

The type of the domain unmounting the filesystem.

No
kernel_use_fds( domain )
Summary

Permits caller to use kernel file descriptors.

Parameters
Parameter:Description:Optional:
domain

The type of the process using the descriptors.

No
kernel_write_proc_files( domain )
Summary

Write to generic proc entries.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
kernel_write_xen_state( domain )
Summary

Allow caller to write xen state information.

Parameters
Parameter:Description:Optional:
domain

The process type writing the state.

No
Return

:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0152 ]--