Linux unitednationsplay.com 3.10.0-1160.45.1.el7.x86_64 #1 SMP Wed Oct 13 17:20:51 UTC 2021 x86_64
nginx/1.20.1
Server IP : 188.130.139.92 & Your IP : 3.16.31.119
Domains :
Cant Read [ /etc/named.conf ]
User : web
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
share /
doc /
wpa_supplicant-2.6 /
examples /
Delete
Unzip
Name
Size
Permission
Date
Action
p2p
[ DIR ]
drwxr-xr-x
2022-01-26 17:33
60_wpa_supplicant
267
B
-rwxr-xr-x
2016-10-02 18:51
dbus-listen-preq.py
1.53
KB
-rw-r--r--
2016-10-02 18:51
ieee8021x.conf
269
B
-rw-r--r--
2016-10-02 18:51
openCryptoki.conf
1.12
KB
-rw-r--r--
2016-10-02 18:51
p2p-action-udhcp.sh
1.68
KB
-rwxr-xr-x
2016-10-02 18:51
p2p-action.sh
2.63
KB
-rwxr-xr-x
2016-10-02 18:51
p2p-nfc.py
19.73
KB
-rw-r--r--
2016-10-02 18:51
plaintext.conf
133
B
-rw-r--r--
2016-10-02 18:51
udhcpd-p2p.conf
2.86
KB
-rw-r--r--
2016-10-02 18:51
wep.conf
170
B
-rw-r--r--
2016-10-02 18:51
wpa-psk-tkip.conf
181
B
-rw-r--r--
2016-10-02 18:51
wpa2-eap-ccmp.conf
284
B
-rw-r--r--
2016-10-02 18:51
wpas-dbus-new-getall.py
1.7
KB
-rw-r--r--
2016-10-02 18:51
wpas-dbus-new-signals.py
5.93
KB
-rw-r--r--
2016-10-02 18:51
wpas-dbus-new-wps.py
2.17
KB
-rw-r--r--
2016-10-02 18:51
wpas-dbus-new.py
4.17
KB
-rw-r--r--
2016-10-02 18:51
wpas-test.py
2.51
KB
-rw-r--r--
2016-10-02 18:51
wps-ap-cli
1.15
KB
-rwxr-xr-x
2016-10-02 18:51
wps-nfc.py
15.31
KB
-rw-r--r--
2016-10-02 18:51
Save
Rename
# EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and # openCryptoki (e.g., with TPM token) # This example uses following PKCS#11 objects: # $ pkcs11-tool --module /usr/lib/opencryptoki/libopencryptoki.so -O -l # Please enter User PIN: # Private Key Object; RSA # label: rsakey # ID: 04 # Usage: decrypt, sign, unwrap # Certificate Object, type = X.509 cert # label: ca # ID: 01 # Certificate Object, type = X.509 cert # label: cert # ID: 04 # Configure OpenSSL to load the PKCS#11 engine and openCryptoki module pkcs11_engine_path=/usr/lib/engines/engine_pkcs11.so pkcs11_module_path=/usr/lib/opencryptoki/libopencryptoki.so network={ ssid="test network" key_mgmt=WPA-EAP eap=TLS identity="User" # use OpenSSL PKCS#11 engine for this network engine=1 engine_id="pkcs11" # select the private key and certificates based on ID (see pkcs11-tool # output above) key_id="4" cert_id="4" ca_cert_id="1" # set the PIN code; leave this out to configure the PIN to be requested # interactively when needed (e.g., via wpa_gui or wpa_cli) pin="123456" }