403Webshell
Server IP : 80.241.246.6  /  Your IP : 216.73.216.129
Web Server : Apache/2.4.25 (Debian)
System : Linux kharagauli 4.9.0-19-amd64 #1 SMP Debian 4.9.320-2 (2022-06-30) x86_64
User : www-data ( 33)
PHP Version : 7.0.33-0+deb9u12
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /usr/share/doc/netcat-traditional/examples/data/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /usr/share/doc/netcat-traditional/examples/data/showmount.d
# UDP mountd call.  Use as input to find mount daemons and avoid portmap.
# Useful proc numbers are 2, 5, and 6.
# UDP-scan around between 600-800 to find most mount daemons.
# Using this with "2", plugged into "nc -u -v -w 2 victim X-Y" will
# directly scan *and* dump the current exports when mountd is hit.
# combine stdout *and* stderr thru "strings" or something to clean it up

000	# XID: 4 trash bytes
001
002
003

000	# CALL: 0
000
000
000

000	# RPC version: 2
000
000
002

000	# mount: 100005
001
0x86
0xa5

000	# mount version: 1
000
000
001

000	# procedure number -- put what you need here:
000	#	2 = dump  [showmount -e]
000	#	5 = exportlist [showmount -a]
xxx	# "sed s/xxx/$1/ | data -g | nc ..."  or some such...

000	# port: junk
000
000
000

000	# auth trash
000
000
000

000	# auth trash
000
000
000

000	# auth trash
000
000
000

000	# extra auth trash?  probably not needed
000
000
000

# that's it!

Youez - 2016 - github.com/yon3zu
LinuXploit