Linux iad1-shared-b7-18 6.6.49-grsec-jammy+ #10 SMP Thu Sep 12 23:23:08 UTC 2024 x86_64
Apache
: 67.205.6.31 | : 216.73.216.47
Cant Read [ /etc/named.conf ]
8.2.29
fernandoquevedo
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
mutt /
examples /
[ HOME SHELL ]
Name
Size
Permission
Action
Mush.rc
441
B
-rw-r--r--
Muttrc
178.06
KB
-rw-r--r--
Pine.rc
1022
B
-rw-r--r--
Tin.rc
606
B
-rw-r--r--
bgedit-detectgui.sh
1.29
KB
-rw-r--r--
bgedit-screen-tmux.sh
1.93
KB
-rw-r--r--
colors.angdraug
4.64
KB
-rw-r--r--
colors.default
611
B
-rw-r--r--
colors.linux
605
B
-rw-r--r--
gpg.rc
4.67
KB
-rw-r--r--
markdown2html
9.48
KB
-rw-r--r--
mutt_oauth2.py
17.29
KB
-rw-r--r--
mutt_oauth2.py.README
14.06
KB
-rw-r--r--
mutt_xtitle
311
B
-rw-r--r--
pgp2.rc
1.66
KB
-rw-r--r--
pgp5.rc
1.75
KB
-rw-r--r--
pgp6.rc
1.68
KB
-rw-r--r--
ray.muttrc
1.93
KB
-rw-r--r--
sample.mailcap
134
B
-rw-r--r--
sample.muttrc
12.66
KB
-rw-r--r--
sample.muttrc-compress
1.31
KB
-rw-r--r--
sample.muttrc-sidebar
3.9
KB
-rw-r--r--
sample.muttrc-starter
2.65
KB
-rw-r--r--
sample.muttrc-tlr
10.57
KB
-rw-r--r--
sample.vimrc-sidebar
2.62
KB
-rw-r--r--
smime.rc
4.19
KB
-rw-r--r--
smime_keys_test.pl
3.39
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : smime_keys_test.pl
#! /usr/bin/perl -W # by Mike Schiraldi <raldi@research.netsol.com> use strict; use Expect; sub run ($;$ ); umask 077; # probably not necc. but can't hurt my $tmpdir = "/tmp/smime_keys_test-$$-" . time; mkdir $tmpdir or die; chdir $tmpdir or die; open TMP, '>muttrc' or die; print TMP <<EOF; set smime_ca_location="$tmpdir/ca-bundle.crt" set smime_certificates="$tmpdir/certificates" set smime_keys="$tmpdir/keys" EOF close TMP; $ENV{MUTT_CMDLINE} = "mutt -F $tmpdir/muttrc"; # make a user key run 'smime_keys init'; run 'openssl genrsa -out user.key 1024'; # make a request for this key to be signed run 'openssl req -new -key user.key -out newreq.pem', "\n\nx\n\nx\nx\nuser\@smime.mutt\n\nx\n"; mkdir 'demoCA' or die; mkdir 'demoCA/certs' or die; mkdir 'demoCA/crl' or die; mkdir 'demoCA/newcerts' or die; mkdir 'demoCA/private' or die; open OUT, '>demoCA/serial' or die; print OUT "01\n"; close OUT; open OUT, '>demoCA/index.txt' or die; close OUT; # make the CA run 'openssl req -new -x509 -keyout demoCA/private/cakey.pem -out demoCA/cacert.pem -days 7300 -nodes', "\n\nx\n\nx\nx\n\n"; # trust it run 'smime_keys add_root demoCA/cacert.pem', "root_CA\n"; # have the CA process the request run 'openssl ca -batch -startdate 000101000000Z -enddate 200101000000Z -days 7300 ' . '-policy policy_anything -out newcert.pem -infiles newreq.pem'; unlink 'newreq.pem' or die; # put it all in a .p12 bundle run 'openssl pkcs12 -export -inkey user.key -in newcert.pem -out cert.p12 -CAfile demoCA/cacert.pem -chain', "pass1\n" x 2; unlink 'newcert.pem' or die; unlink 'demoCA/cacert.pem' or die; unlink 'demoCA/index.txt' or die; unlink 'demoCA/index.txt.old' or die; unlink 'demoCA/serial' or die; unlink 'demoCA/serial.old' or die; unlink 'demoCA/newcerts/01.pem' or die; unlink 'demoCA/private/cakey.pem' or die; rmdir 'demoCA/certs' or die; rmdir 'demoCA/crl' or die; rmdir 'demoCA/private' or die; rmdir 'demoCA/newcerts' or die; rmdir 'demoCA' or die; # have smime_keys process it run 'smime_keys add_p12 cert.p12', "pass1\n" . "pass2\n" x 2 . "old_label\n"; unlink 'cert.p12' or die; # make sure it showed up run 'smime_keys list > list'; open IN, 'list' or die; <IN> eq "\n" or die; <IN> =~ /^(.*)\: Issued for\: user\@smime\.mutt \"old_label\" \(Unverified\)\n/ or die; close IN; my $keyid = $1; # see if we can rename it run "smime_keys label $keyid", "new_label\n"; # make sure it worked run 'smime_keys list > list'; open IN, 'list' or die; <IN> eq "\n" or die; <IN> =~ /^$keyid\: Issued for\: user\@smime\.mutt \"new_label\" \(Unverified\)\n/ or die; close IN; unlink 'list' or die; # try signing something run "openssl smime -sign -signer certificates/$keyid -inkey user.key -in /etc/passwd -certfile certificates/37adefc3.0 > signed"; unlink 'user.key' or die; # verify it run 'openssl smime -verify -out /dev/null -in signed -CAfile ca-bundle.crt'; unlink 'signed' or die; # clean up unlink 'ca-bundle.crt' or die; unlink 'muttrc' or die; unlink 'keys/.index' or die; unlink 'certificates/.index' or die; unlink <keys/*> or die; unlink <certificates/*> or die; rmdir 'keys' or die; rmdir 'certificates' or die; chdir '/' or die; rmdir $tmpdir or die; sub run ($;$) { my $cmd = shift or die; my $input = shift; print "\n\nRunning [$cmd]\n"; my $exp = Expect->spawn ($cmd); if (defined $input) { print $exp $input; } $exp->soft_close; $? and die "$cmd returned $?"; }
Close