Intrusion Exploit
Server: LiteSpeed
System: Linux cisadane.iixcp.rumahweb.net 5.14.0-427.42.1.el9_4.x86_64 #1 SMP PREEMPT_DYNAMIC Fri Nov 1 14:58:02 EDT 2024 x86_64
User: lenf4658 (1805)
PHP: 8.4.19
Disabled: NONE
Upload Files
File: //usr/lib/firewalld/policies/allow-host-ipv6.xml
<?xml version="1.0" encoding="utf-8"?>
<policy target="CONTINUE" priority="-15000">
  <short>Allow host IPv6</short>
  <description>Allows basic IPv6 functionality for the host running firewalld.</description>
  <ingress-zone name="ANY" />
  <egress-zone name="HOST" />
  <rule family="ipv6">
    <icmp-type name="neighbour-advertisement" />
    <accept />
  </rule>
  <rule family="ipv6">
    <icmp-type name="neighbour-solicitation" />
    <accept />
  </rule>
  <rule family="ipv6">
    <icmp-type name="router-advertisement" />
    <accept />
  </rule>
  <rule family="ipv6">
    <icmp-type name="redirect" />
    <accept />
  </rule>
  <rule family="ipv6">
    <icmp-type name="mld-listener-done" />
    <accept />
  </rule>
  <rule family="ipv6">
    <icmp-type name="mld-listener-query" />
    <accept />
  </rule>
  <rule family="ipv6">
    <icmp-type name="mld-listener-report" />
    <accept />
  </rule>
  <rule family="ipv6">
    <icmp-type name="mld2-listener-report" />
    <accept />
  </rule>
</policy>