404

[ Avaa Bypassed ]




Upload:

Command:

elspacio@18.116.40.220: ~ $
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authselect is run.
auth        required      pam_env.so
auth	required	pam_hulk.so
auth	required	pam_imunify.so	check_only
auth        sufficient    pam_unix.so try_first_pass nullok
auth	required	pam_imunify.so
auth        required      pam_deny.so

account     required      pam_unix.so

password    requisite     pam_pwquality.so try_first_pass local_users_only retry=3 authtok_type=
password    sufficient    pam_unix.so try_first_pass use_authtok nullok sha512 shadow
password    required      pam_deny.so

session     optional      pam_keyinit.so revoke
session     required      pam_limits.so
-session     optional      pam_systemd.so
session     [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session     required      pam_unix.so

Filemanager

Name Type Size Permission Actions
chfn File 342 B 0644
chsh File 342 B 0644
config-util File 232 B 0644
fingerprint-auth File 701 B 0644
login File 715 B 0644
other File 154 B 0644
password-auth File 855 B 0644
postlogin File 398 B 0644
remote File 640 B 0644
runuser File 143 B 0644
runuser-l File 138 B 0644
smartcard-auth File 153 B 0644
su File 657 B 0644
su-l File 137 B 0644
system-auth File 855 B 0644