ヤミRoot VoidGate
User / IP
:
216.73.216.49
Host / Server
:
146.88.233.70 / www.dev.loger.cm
System
:
Linux hybrid1120.fr.ns.planethoster.net 3.10.0-957.21.2.el7.x86_64 #1 SMP Wed Jun 5 14:26:44 UTC 2019 x86_64
Command
|
Upload
|
Create
Mass Deface
|
Jumping
|
Symlink
|
Reverse Shell
Ping
|
Port Scan
|
DNS Lookup
|
Whois
|
Header
|
cURL
:
/
etc
/
Viewing: named.conf,v
head 1.11; access; symbols; locks root:1.11; strict; comment @# @; 1.11 date 2018.05.22.00.36.31; author root; state Exp; branches; next 1.10; 1.10 date 2018.05.08.00.36.28; author root; state Exp; branches; next 1.9; 1.9 date 2018.04.19.00.36.41; author root; state Exp; branches; next 1.8; 1.8 date 2018.03.14.00.37.53; author root; state Exp; branches; next 1.7; 1.7 date 2018.02.01.00.38.11; author root; state Exp; branches; next 1.6; 1.6 date 2017.12.19.00.37.56; author root; state Exp; branches; next 1.5; 1.5 date 2017.11.21.00.43.20; author root; state Exp; branches; next 1.4; 1.4 date 2017.08.31.23.42.26; author root; state Exp; branches; next 1.3; 1.3 date 2017.08.23.16.10.23; author root; state Exp; branches; next 1.2; 1.2 date 2016.06.23.20.34.27; author root; state Exp; branches; next 1.1; 1.1 date 2016.06.23.20.34.21; author root; state Exp; branches; next ; desc @@ 1.11 log @"Modified by /usr/local/cpanel/scripts/fixnamedviews Initial checkin editviewdirective: external" @ text @include "/etc/rndc.key"; controls { inet 127.0.0.1 allow { localhost; } keys { "rndc-key"; }; }; options { /* make named use port 53 for the source of all queries, to allow * firewalls to block all ports except 53: */ // query-source port 53; recursion no; /* We no longer enable this by default as the dns posion exploit has forced many providers to open up their firewalls a bit */ // Put files that named is allowed to write in the data/ directory: directory "/var/named"; // the default pid-file "/var/run/named/named.pid"; dump-file "data/cache_dump.db"; statistics-file "data/named_stats.txt"; /* memstatistics-file "data/named_mem_stats.txt"; */ allow-transfer { "none"; }; }; logging { channel default_log { file "/var/log/named/named.log" versions 5 size 128M; print-time yes; print-severity yes; print-category yes; severity warning; }; category default { default_log; }; category general { default_log; }; }; // All BIND 9 zones are in a "view", which allow different zones to be served // to different types of client addresses, and for options to be set for groups // of zones. // // By default, if named.conf contains no "view" clauses, all zones are in the // "default" view, which matches all clients. // // If named.conf contains any "view" clause, then all zones MUST be in a view; // so it is recommended to start off using views to avoid having to restructure // your configuration files in the future. view "localhost_resolver" { /* This view sets up named to be a localhost resolver ( caching only nameserver ). * If all you want is a caching-only nameserver, then you need only define this view: */ match-clients { 127.0.0.0/24; }; match-destinations { localhost; }; recursion no; zone "." IN { type hint; file "/var/named/named.ca"; }; /* these are zones that contain definitions for all the localhost * names and addresses, as recommended in RFC1912 - these names should * ONLY be served to localhost clients: */ include "/var/named/named.rfc1912.zones"; }; view "internal" { /* This view will contain zones you want to serve only to "internal" clients that connect via your directly attached LAN interfaces - "localnets" . */ match-clients { localnets; }; match-destinations { localnets; }; recursion no; zone "." IN { type hint; file "/var/named/named.ca"; }; // include "/var/named/named.rfc1912.zones"; // you should not serve your rfc1912 names to non-localhost clients. // These are your "authoritative" internal zones, and would probably // also be included in the "localhost_resolver" view above : zone "groupits.biz" { type master; file "/var/named/groupits.biz.db"; }; zone "confianceonline.com" { type master; file "/var/named/confianceonline.com.db"; }; zone "groupits.cm" { type master; file "/var/named/groupits.cm.db"; }; zone "agroprocenter.com" { type master; file "/var/named/agroprocenter.com.db"; }; zone "annonces.cm" { type master; file "/var/named/annonces.cm.db"; }; zone "annoncescm.com" { type master; file "/var/named/annoncescm.com.db"; }; zone "cais.cm" { type master; file "/var/named/cais.cm.db"; }; zone "bellbitjoka.com" { type master; file "/var/named/bellbitjoka.com.db"; }; zone "cfits.cm" { type master; file "/var/named/cfits.cm.db"; }; zone "pieap.com" { type master; file "/var/named/pieap.com.db"; }; zone "courriel.cm" { type master; file "/var/named/courriel.cm.db"; }; zone "envdesign.cm" { type master; file "/var/named/envdesign.cm.db"; }; zone "theconnexter.cm" { type master; file "/var/named/theconnexter.cm.db"; }; zone "pssi.cm" { type master; file "/var/named/pssi.cm.db"; }; zone "email.courriel.cm" { type master; file "/var/named/email.courriel.cm.db"; }; zone "visitecm.com" { type master; file "/var/named/visitecm.com.db"; }; zone "ldl.cm" { type master; file "/var/named/ldl.cm.db"; }; zone "itsmf.cm" { type master; file "/var/named/itsmf.cm.db"; }; zone "agromarket.cm" { type master; file "/var/named/agromarket.cm.db"; }; zone "piecesauto.cm" { type master; file "/var/named/piecesauto.cm.db"; }; zone "boursedesarts.cm" { type master; file "/var/named/boursedesarts.cm.db"; }; zone "booksmarket.cm" { type master; file "/var/named/booksmarket.cm.db"; }; zone "justicecam.net" { type master; file "/var/named/justicecam.net.db"; }; zone "etravel.cm" { type master; file "/var/named/etravel.cm.db"; }; zone "ejustice.cm" { type master; file "/var/named/ejustice.cm.db"; }; zone "epassevents.cm" { type master; file "/var/named/epassevents.cm.db"; }; zone "epassoffices.cm" { type master; file "/var/named/epassoffices.cm.db"; }; zone "dsf-online.com" { type master; file "/var/named/dsf-online.com.db"; }; }; view "external" { /* This view will contain zones you want to serve only to "external" clients * that have addresses that are not on your directly attached LAN interface subnets: */ recursion no; additional-from-cache no; // you'd probably want to deny recursion to external clients, so you don't // end up providing free DNS service to all takers // all views must contain the root hints zone: zone "." IN { type hint; file "/var/named/named.ca"; }; // These are your "authoritative" external zones, and would probably // contain entries for just your web and mail servers: // BEGIN external zone entries zone "groupits.biz" { type master; file "/var/named/groupits.biz.db"; }; zone "confianceonline.com" { type master; file "/var/named/confianceonline.com.db"; }; zone "groupits.cm" { type master; file "/var/named/groupits.cm.db"; }; zone "agroprocenter.com" { type master; file "/var/named/agroprocenter.com.db"; }; zone "annonces.cm" { type master; file "/var/named/annonces.cm.db"; }; zone "annoncescm.com" { type master; file "/var/named/annoncescm.com.db"; }; zone "cais.cm" { type master; file "/var/named/cais.cm.db"; }; zone "bellbitjoka.com" { type master; file "/var/named/bellbitjoka.com.db"; }; zone "cfits.cm" { type master; file "/var/named/cfits.cm.db"; }; zone "pieap.com" { type master; file "/var/named/pieap.com.db"; }; zone "courriel.cm" { type master; file "/var/named/courriel.cm.db"; }; zone "envdesign.cm" { type master; file "/var/named/envdesign.cm.db"; }; zone "theconnexter.cm" { type master; file "/var/named/theconnexter.cm.db"; }; zone "pssi.cm" { type master; file "/var/named/pssi.cm.db"; }; zone "email.courriel.cm" { type master; file "/var/named/email.courriel.cm.db"; }; zone "visitecm.com" { type master; file "/var/named/visitecm.com.db"; }; zone "ldl.cm" { type master; file "/var/named/ldl.cm.db"; }; zone "itsmf.cm" { type master; file "/var/named/itsmf.cm.db"; }; zone "agromarket.cm" { type master; file "/var/named/agromarket.cm.db"; }; zone "piecesauto.cm" { type master; file "/var/named/piecesauto.cm.db"; }; zone "boursedesarts.cm" { type master; file "/var/named/boursedesarts.cm.db"; }; zone "booksmarket.cm" { type master; file "/var/named/booksmarket.cm.db"; }; zone "justicecam.net" { type master; file "/var/named/justicecam.net.db"; }; zone "etravel.cm" { type master; file "/var/named/etravel.cm.db"; }; zone "ejustice.cm" { type master; file "/var/named/ejustice.cm.db"; }; zone "epassevents.cm" { type master; file "/var/named/epassevents.cm.db"; }; zone "epassoffices.cm" { type master; file "/var/named/epassoffices.cm.db"; }; zone "dsf-online.com" { type master; file "/var/named/dsf-online.com.db"; }; }; @ 1.10 log @"Modified by /usr/local/cpanel/scripts/fixnamedviews Initial checkin editviewdirective: external" @ text @a169 4 zone "inspections-conjointes-ic.cm" { type master; file "/var/named/inspections-conjointes-ic.cm.db"; }; a377 4 zone "inspections-conjointes-ic.cm" { type master; file "/var/named/inspections-conjointes-ic.cm.db"; }; @ 1.9 log @"Modified by /usr/local/cpanel/scripts/fixnamedviews Initial checkin editviewdirective: external" @ text @d273 6 d483 6 @ 1.8 log @"Modified by /usr/local/cpanel/scripts/fixnamedviews Initial checkin editviewdirective: external" @ text @d249 24 d453 24 @ 1.7 log @"Modified by /usr/local/cpanel/scripts/fixnamedviews Initial checkin editviewdirective: external" @ text @d243 6 d423 6 @ 1.6 log @"Modified by /usr/local/cpanel/scripts/fixnamedviews Initial checkin editviewdirective: external" @ text @a127 4 zone "annoncescemac.com" { type master; file "/var/named/annoncescemac.com.db"; }; a129 4 zone "annoncesgq.com" { type master; file "/var/named/annoncesgq.com.db"; }; a131 4 zone "annoncestd.com" { type master; file "/var/named/annoncestd.com.db"; }; a133 4 zone "annoncesga.com" { type master; file "/var/named/annoncesga.com.db"; }; a135 4 zone "annoncescg.com" { type master; file "/var/named/annoncescg.com.db"; }; a137 4 zone "annoncescf.com" { type master; file "/var/named/annoncescf.com.db"; }; a303 4 zone "annoncescemac.com" { type master; file "/var/named/annoncescemac.com.db"; }; a305 4 zone "annoncesgq.com" { type master; file "/var/named/annoncesgq.com.db"; }; a307 4 zone "annoncestd.com" { type master; file "/var/named/annoncestd.com.db"; }; a309 4 zone "annoncesga.com" { type master; file "/var/named/annoncesga.com.db"; }; a311 4 zone "annoncescg.com" { type master; file "/var/named/annoncescg.com.db"; }; a313 4 zone "annoncescf.com" { type master; file "/var/named/annoncescf.com.db"; }; @ 1.5 log @"Modified by /usr/local/cpanel/scripts/fixnamedviews Initial checkin editviewdirective: external" @ text @d230 33 a262 1 zone "ruce.cm" { d264 1 a264 1 file "/var/named/ruce.cm.db"; d430 33 a462 1 zone "ruce.cm" { d464 1 a464 1 file "/var/named/ruce.cm.db"; @ 1.4 log @"Modified by /usr/local/cpanel/scripts/fixnamedviews Initial checkin editviewdirective: external" @ text @a107 4 zone "ruce.cm" { type master; file "/var/named/ruce.cm.db"; }; d229 6 a275 4 zone "ruce.cm" { type master; file "/var/named/ruce.cm.db"; }; d395 6 @ 1.3 log @"Modified by /usr/local/cpanel/scripts/fixrndc Initial checkin from /usr/local/cpanel/scripts/fixrndc" @ text @d89 144 d254 144 @ 1.2 log @"Modified by /usr/local/cpanel/scripts/fixrndc Initial checkin from /usr/local/cpanel/scripts/fixrndc" @ text @d57 1 a57 1 recursion yes; d77 1 a77 1 recursion yes; @ 1.1 log @"Modified by /usr/local/cpanel/scripts/rebuilddnsconfig rebuilddnsconfig END" @ text @d1 6 @
Coded With 💗 by
0x6ick