!c99Shell v. 1.0 pre-release build #16!

Software: Apache/2.2.3 (CentOS). PHP/5.1.6 

uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44
EDT 2010 i686
 

uid=48(apache) gid=48(apache) groups=48(apache) 

Safe-mode: OFF (not secure)

/usr/share/setools/   drwxr-xr-x
Free 51.24 GB of 127.8 GB (40.09%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     file_relabel_help.txt (2.8 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
An overview of direct file relabel analysis
apol, version 3.0
October 1, 2006
selinux@tresys.com


Understanding file relabel analysis
-----------------------------------
The permission to relabel objects in a mandatory access control system
is an important privilege.  In SELinux, this privilege is controlled
by the relabelto and relabelfrom permissions.  Understanding the net
effect of these policy rules is complex because it requires the
examination of multiple rules potentially spanning dozens of files.
To be able to successfully relabel an object, a subject must be able
to:

        - relabelfrom the starting type
        - relabelto at least one other type

For example, consider the following rules:

        allow sysadm_t filea_t : file relabelfrom;
        allow sysadm_t { fileb_t filec_t } : file relabelto;

If these rules are the only relabel rules present in the policy,
sysadm_t would be allowed to relabel files of type filea_t to fileb_t
or filec_t.  Both a relabelfrom and a relabelto rule for a single
subject must be present for a relabel to be possible.

Determining the potential ending types to which a starting type can be
relabeled requires examining all subjects for relabel rules from the
starting type to one or more ending types.  Determining the relabel
privileges of a subject type requires examining all of the relabel
rules containing the subject type.  The direct file relabel analysis
in apol automates both of these analyses.


Using direct file relabel analysis in apol
------------------------------------------
Direct file relabel analysis is designed to facilitate querying a
policy for both potential changes to object labels and relabel
privileges granted to a subject.  These two modes are respectively
called Object Mode and Subject Mode.


Object Mode
-----------
In Object Mode, the user specifies a starting or ending type and
either to, from or both.  When To is selected, all types to which the
starting type can be relabeled will be displayed.  When From is
selected, all types from which the ending type can be relabeled will
be displayed.  If both options are selected, the analysis performs
both.


Subject Mode
------------
In Subject Mode, the user specifies only a subject type.  Two lists of
types will be displayed corresponding to all of the types to which the
subject can relabel and from which the subject can relabel.


Optional result filters
-----------------------
Results may be filtered in several ways.  The end types resulting from
a query may be filtered by regular expression.  Advanced Filters
provide the option of selecting which object classes to include in the
analysis and which types to include as subjects of relabeling
operations.  The subject types filter is disabled in subject mode
because all types are excluded as subjects except the type specified as
the required parameter.

:: Command execute ::

Enter:
 
Select:
 

:: Shadow's tricks :D ::

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

:: Preddy's tricks :D ::

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.016 ]--