⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.19
Server IP:
178.33.27.10
Server:
Linux cpanel.dev-unit.com 3.10.0-1160.108.1.el7.x86_64 #1 SMP Thu Jan 25 16:17:31 UTC 2024 x86_64
Server Software:
Apache/2.4.57 (Unix) OpenSSL/1.0.2k-fips
PHP Version:
8.2.11
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
usr
/
local
/
cwpsrv
/
var
/
services
/
roundcube
/
View File Name :
.htaccess.new
# This is a sample with suggested security and performance options <IfModule mod_rewrite.c> Options +SymLinksIfOwnerMatch RewriteEngine On RewriteRule ^favicon\.ico$ skins/larry/images/favicon.ico # security rules: # - deny access to files not containing a dot or starting with a dot # in all locations except installer directory RewriteRule ^(?!installer|\.well-known\/|[a-zA-Z0-9]{16})(\.?[^\.]+)$ - [F] # - deny access to some locations RewriteRule ^/?(\.git|\.tx|SQL|bin|config|logs|temp|tests|vendor|program\/(include|lib|localization|steps)) - [F] # - deny access to some documentation files RewriteRule /?(README.*|meta\.json|composer\..*|jsdeps.json)$ - [F] </IfModule> <IfModule mod_deflate.c> SetOutputFilter DEFLATE </IfModule> <IfModule mod_expires.c> ExpiresActive On ExpiresDefault "access plus 1 month" </IfModule> FileETag MTime Size <IfModule mod_autoindex.c> Options -Indexes </IfModule> <IfModule mod_headers.c> # Disable page indexing Header set X-Robots-Tag "noindex, nofollow" # replace 'append' with 'merge' for Apache version 2.2.9 and later #Header append Cache-Control public env=!NO_CACHE # Optional security headers # Only provides increased security if the browser supports those features # Be careful! Testing is required! They should be adjusted to your installation / user environment # HSTS - HTTP Strict Transport Security #Header always set Strict-Transport-Security "max-age=31536000; preload" env=HTTPS # HPKP - HTTP Public Key Pinning # Only template - fill with your values #Header always set Public-Key-Pins "max-age=3600; report-uri=\"\"; pin-sha256=\"\"; pin-sha256=\"\"" env=HTTPS # X-Xss-Protection # This header is used to configure the built in reflective XSS protection found in Internet Explorer, Chrome and Safari (Webkit). #Header set X-XSS-Protection "1; mode=block" # X-Frame-Options # The X-Frame-Options header (RFC), or XFO header, protects your visitors against clickjacking attacks # Already set by php code! Do not activate both options #Header set X-Frame-Options SAMEORIGIN # X-Content-Type-Options # It prevents Google Chrome and Internet Explorer from trying to mime-sniff the content-type of a response away from the one being declared by the server. #Header set X-Content-Type-Options: "nosniff" # CSP - Content Security Policy # for better privacy/security ask browsers to not set the Referer # more flags for script, stylesheets and images available, read RFC for more information # Note: "Referrer-Policy: same-origin" is already set by php code. #Header set Content-Security-Policy "referrer no-referrer" </IfModule>