[ Avaa Bypassed ]




Upload:

Command:

www-data@18.118.151.13: ~ $
#
# /etc/pam.d/common-account - authorization settings common to all services
#
# This file is included from other service-specific PAM config files,
# and should contain a list of the authorization modules that define
# the central access policy for use on the system.  The default is to
# only deny service to users whose accounts are expired in /etc/shadow.
#
# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
# To take advantage of this, it is recommended that you configure any
# local modules either before or after the default block, and use
# pam-auth-update to manage selection of other modules.  See
# pam-auth-update(8) for details.
#

# here are the per-package modules (the "Primary" block)
account	[success=1 new_authtok_reqd=done default=ignore]	pam_unix.so 
# here's the fallback if no module succeeds
account	requisite			pam_deny.so
# prime the stack with a positive return value if there isn't one already;
# this avoids us returning an error just because nothing sets a success code
# since the modules above will each just jump around
account	required			pam_permit.so
# and here are more per-package modules (the "Additional" block)
# end of pam-auth-update config

Filemanager

Name Type Size Permission Actions
chfn File 384 B 0644
chpasswd File 92 B 0644
chsh File 581 B 0644
common-account File 1.18 KB 0644
common-auth File 1.68 KB 0644
common-password File 1.68 KB 0644
common-session File 1.39 KB 0644
common-session-noninteractive File 1.4 KB 0644
login File 4.03 KB 0644
newusers File 92 B 0644
other File 520 B 0644
passwd File 92 B 0644
polkit-1 File 270 B 0644
runuser File 143 B 0644
runuser-l File 138 B 0644
sshd File 2.08 KB 0644
su File 2.21 KB 0644
su-l File 137 B 0644
sudo File 330 B 0644
sudo-i File 315 B 0644