!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/usr/share/doc/selinux-policy-2.4.6/html/   drwxr-xr-x
Free 50.94 GB of 127.8 GB (39.86%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     services_spamassassin.html (25.24 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
Security Enhanced Linux Reference Policy

Layer: services

Module: spamassassin

Interfaces Templates

Description:

Filter used for removing unsolicited email.

Interfaces:

spamassassin_domtrans( domain )
Summary

Execute spamassassin in the user spamassassin domain.

Description

This is a template and should only be called from per user domain tempaltes.

Parameters
Parameter:Description:Optional:
domain

The type of the process performing this action.

No
spamassassin_domtrans_spamc( domain )
Summary

Execute spamassassin client in the spamassassin client domain.

Description

This is a template and should only be called from per user domain tempaltes.

Parameters
Parameter:Description:Optional:
domain

The type of the process performing this action.

No
spamassassin_dontaudit_getattr_spamd_tmp_sockets( domain )
Summary

Do not audit attempts to get attributes of temporary spamd sockets/

Parameters
Parameter:Description:Optional:
domain

Domain to not audit.

No
spamassassin_exec( domain )
Summary

Execute the standalone spamassassin program in the caller directory.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
spamassassin_exec_client( domain )
Summary

Execute the spamassassin client program in the caller directory.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
spamassassin_exec_spamd( domain )
Summary

Execute the spamassassin daemon program in the caller directory.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
spamassassin_kill_client( domain )
Summary

Send kill signal to spamassassin client

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
spamassassin_manage_lib_files( domain )
Summary

Create, read, write, and delete spamd lib files.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
spamassassin_read_lib_files( domain )
Summary

read spamd lib files.

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
spamassassin_read_spamd_tmp_files( domain )
Summary

Read temporary spamd file.

Parameters
Parameter:Description:Optional:
domain

The type of the process performing this action.

No
spamassassin_signal_spamd( domain )
Summary

Singnal the spam assassin daemon

Parameters
Parameter:Description:Optional:
domain

The type of the process performing this action.

No
spamassassin_spamd_admin( domain , role , terminal )
Summary

All of the rules required to administrate an spamassassin environment

Parameters
Parameter:Description:Optional:
domain

Domain allowed access.

No
role

The role to be allowed to manage the spamassassin domain.

No
terminal

The type of the user terminal.

No
spamassassin_spamd_initrc_domtrans( domain )
Summary

Execute spamassassin server in the spamassassin domain.

Parameters
Parameter:Description:Optional:
domain

The type of the process performing this action.

No
spamd_stream_connect( domain )
Summary

Connect to run spamd.

Parameters
Parameter:Description:Optional:
domain

Domain allowed to connect.

No
Return

Templates:

spamassassin_domtrans_user_client( prefix , domain )
Summary

Execute spamassassin client in the user spamassassin client domain.

Description

This is a template and should only be called from per user domain tempaltes.

Parameters
Parameter:Description:Optional:
prefix

The prefix of the user domain. eg user would be the prefix of user_t.

No
domain

The type of the process performing this action.

No
spamassassin_domtrans_user_local_client( prefix , domain )
Summary

Execute spamassassin in the user spamassassin domain.

Description

This is a template and should only be called from per user domain tempaltes.

Parameters
Parameter:Description:Optional:
prefix

The prefix of the user domain. eg user would be the prefix of user_t.

No
domain

The type of the process performing this action.

No
spamassassin_manage_user_home_files( userdomain_prefix , domain )
Summary

Read spamassassin per user homedir

Description

Read spamassassin per user homedir

This is a templated interface, and should only be called from a per-userdomain template.

Parameters
Parameter:Description:Optional:
userdomain_prefix

The prefix of the user domain (e.g., user is the prefix for user_t).

No
domain

Domain allowed access.

No
spamassassin_per_role_template( userdomain_prefix , user_domain , user_role )
Summary

The per role template for the spamassassin module.

Description

The per role template for the spamassassin module.

This template is invoked automatically for each user, and generally does not need to be invoked directly by policy writers.

Parameters
Parameter:Description:Optional:
userdomain_prefix

The prefix of the user domain (e.g., user is the prefix for user_t).

No
user_domain

The type of the user domain.

No
user_role

The role associated with the user domain.

No
spamassassin_read_user_home_files( userdomain_prefix , domain )
Summary

Read spamassassin per user homedir

Description

Read spamassassin per user homedir

This is a templated interface, and should only be called from a per-userdomain template.

Parameters
Parameter:Description:Optional:
userdomain_prefix

The prefix of the user domain (e.g., user is the prefix for user_t).

No
domain

Domain allowed access.

No
Return

:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0098 ]--