Spamworldpro Mini Shell
Spamworldpro


Server : Apache
System : Linux server2.corals.io 4.18.0-348.2.1.el8_5.x86_64 #1 SMP Mon Nov 15 09:17:08 EST 2021 x86_64
User : corals ( 1002)
PHP Version : 7.4.33
Disable Function : exec,passthru,shell_exec,system
Directory :  /proc/self/root/usr/lib/python3.6/site-packages/sepolicy/help/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //proc/self/root/usr/lib/python3.6/site-packages/sepolicy/help/transition_from.txt
This screen shows when a process running with the '%(APP)s' type executes 'Commands File Paths' that they will transition to the specified types.


Under SELinux, when a process running with a 'type' attempts to execute an executable, one of three things can happen.

1.  The process can be prevented from running the executable.
2.  The executable executes with the same label as parent.
3.  The executable 'transitions' to a new 'type' based on policy.

This screen shows the executables that transition to another domain when '%(APP)s' executes them, and the 'SELinux Application Type' of the newly created process.

Spamworldpro Mini