shell bypass 403
UnknownSec Shell
:
/
usr
/
lib
/
python3.6
/
site-packages
/
sepolicy
/
help
/ [
drwxr-xr-x
]
upload
mass deface
mass delete
console
info server
name :
transition_from.txt
This screen shows when a process running with the '%(APP)s' type executes 'Commands File Paths' that they will transition to the specified types. Under SELinux, when a process running with a 'type' attempts to execute an executable, one of three things can happen. 1. The process can be prevented from running the executable. 2. The executable executes with the same label as parent. 3. The executable 'transitions' to a new 'type' based on policy. This screen shows the executables that transition to another domain when '%(APP)s' executes them, and the 'SELinux Application Type' of the newly created process.
© 2024 UnknownSec