Linux linux7.web4world.com 3.10.0-962.3.2.lve1.5.88.el7.x86_64 #1 SMP Fri Sep 26 14:06:42 UTC 2025 x86_64
: 199.38.113.107 | : 216.73.216.118
Cant Read [ /etc/named.conf ]
?5.6.40
siddhapu
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
lib64 /
python2.7 /
site-packages /
M2Crypto /
SSL /
[ HOME SHELL ]
Name
Size
Permission
Action
Checker.py
9.58
KB
-rw-r--r--
Checker.pyc
9.02
KB
-rw-r--r--
Checker.pyo
9.02
KB
-rw-r--r--
Cipher.py
1.04
KB
-rw-r--r--
Cipher.pyc
2.8
KB
-rw-r--r--
Cipher.pyo
2.8
KB
-rw-r--r--
Connection.py
12.13
KB
-rw-r--r--
Connection.pyc
19.31
KB
-rw-r--r--
Connection.pyo
19.21
KB
-rw-r--r--
Context.py
9.29
KB
-rw-r--r--
Context.pyc
13.42
KB
-rw-r--r--
Context.pyo
13.42
KB
-rw-r--r--
SSLServer.py
1.45
KB
-rw-r--r--
SSLServer.pyc
2.3
KB
-rw-r--r--
SSLServer.pyo
2.3
KB
-rw-r--r--
Session.py
1.47
KB
-rw-r--r--
Session.pyc
3.31
KB
-rw-r--r--
Session.pyo
3.26
KB
-rw-r--r--
TwistedProtocolWrapper.py
15.01
KB
-rw-r--r--
TwistedProtocolWrapper.pyc
13.96
KB
-rw-r--r--
TwistedProtocolWrapper.pyo
13.84
KB
-rw-r--r--
__init__.py
853
B
-rw-r--r--
__init__.pyc
1.48
KB
-rw-r--r--
__init__.pyo
1.48
KB
-rw-r--r--
cb.py
2.3
KB
-rw-r--r--
cb.pyc
2.56
KB
-rw-r--r--
cb.pyo
2.56
KB
-rw-r--r--
ssl_dispatcher.py
874
B
-rw-r--r--
ssl_dispatcher.pyc
1.69
KB
-rw-r--r--
ssl_dispatcher.pyo
1.69
KB
-rw-r--r--
timeout.py
660
B
-rw-r--r--
timeout.pyc
1.52
KB
-rw-r--r--
timeout.pyo
1.52
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : cb.py
"""SSL callbacks Copyright (c) 1999-2003 Ng Pheng Siong. All rights reserved.""" __all__ = ['unknown_issuer', 'ssl_verify_callback_stub', 'ssl_verify_callback', 'ssl_verify_callback_allow_unknown_ca', 'ssl_info_callback'] # Python import sys # M2Crypto import Context from M2Crypto import m2 def ssl_verify_callback_stub(ssl_ctx_ptr, x509_ptr, errnum, errdepth, ok): # Deprecated return ok unknown_issuer = [ m2.X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT, m2.X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY, m2.X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE, m2.X509_V_ERR_CERT_UNTRUSTED, ] def ssl_verify_callback(ssl_ctx_ptr, x509_ptr, errnum, errdepth, ok): # Deprecated ssl_ctx = Context.map()[long(ssl_ctx_ptr)] if errnum in unknown_issuer: if ssl_ctx.get_allow_unknown_ca(): sys.stderr.write("policy: %s: permitted...\n" % (m2.x509_get_verify_error(errnum))) sys.stderr.flush() ok = 1 # CRL checking goes here... if ok: if ssl_ctx.get_verify_depth() >= errdepth: ok = 1 else: ok = 0 return ok def ssl_verify_callback_allow_unknown_ca(ok, store): errnum = store.get_error() if errnum in unknown_issuer: ok = 1 return ok # Cribbed from OpenSSL's apps/s_cb.c. def ssl_info_callback(where, ret, ssl_ptr): w = where & ~m2.SSL_ST_MASK if (w & m2.SSL_ST_CONNECT): state = "SSL connect" elif (w & m2.SSL_ST_ACCEPT): state = "SSL accept" else: state = "SSL state unknown" if (where & m2.SSL_CB_LOOP): sys.stderr.write("LOOP: %s: %s\n" % (state, m2.ssl_get_state_v(ssl_ptr))) sys.stderr.flush() return if (where & m2.SSL_CB_EXIT): if not ret: sys.stderr.write("FAILED: %s: %s\n" % (state, m2.ssl_get_state_v(ssl_ptr))) sys.stderr.flush() else: sys.stderr.write("INFO: %s: %s\n" % (state, m2.ssl_get_state_v(ssl_ptr))) sys.stderr.flush() return if (where & m2.SSL_CB_ALERT): if (where & m2.SSL_CB_READ): w = 'read' else: w = 'write' sys.stderr.write("ALERT: %s: %s: %s\n" % \ (w, m2.ssl_get_alert_type_v(ret), m2.ssl_get_alert_desc_v(ret))) sys.stderr.flush() return
Close