OXIESEC PANEL
- Current Dir:
/
/
usr
/
share
/
nmap
/
nselib
/
data
/
jdwp-class
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
08/07/2020 12:36:00 PM
rwxr-xr-x
📄
JDWPExecCmd.class
1.08 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
JDWPExecCmd.java
879 bytes
04/16/2018 01:11:39 AM
rw-r--r--
📄
JDWPSystemInfo.class
2.11 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
JDWPSystemInfo.java
1.54 KB
04/16/2018 01:11:39 AM
rw-r--r--
📄
README.txt
978 bytes
04/16/2018 01:11:39 AM
rw-r--r--
Editing: JDWPExecCmd.java
Close
import java.io.*; /* This is the JDWPExecCmd source used for jdwp-exec script to execute * a command on the remote system. * * It just executes the shell command passed as string argument to * run() function and returns its output. * * Compile simply with: * javac JDWPExecCmd.java (should be in the nselib/data/ directory). * * author = "Aleksandar Nikolic" * license = "Same as Nmap--See https://nmap.org/book/man-legal.html" */ public class JDWPExecCmd { public static String run(String cmd) { String result = cmd + " output:\n"; try{ Process p = Runtime.getRuntime().exec(cmd); BufferedReader in = new BufferedReader(new InputStreamReader(p.getInputStream())); String line = null; while ((line = in.readLine()) != null) { result += line.trim()+"\n"; } result += "\n"; }catch(Exception ex){ } return result; } }