OXIESEC PANEL
- Current Dir:
/
/
usr
/
share
/
doc
/
netcat-openbsd
/
examples
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
10/21/2019 03:49:02 PM
rwxr-xr-x
📄
README
239 bytes
05/14/2018 09:01:42 AM
rw-r--r--
📄
alta
1.11 KB
05/14/2018 09:01:42 AM
rw-r--r--
📄
bsh
487 bytes
05/14/2018 09:01:42 AM
rw-r--r--
📁
contrib
-
10/21/2019 03:49:02 PM
rwxr-xr-x
📄
dist.sh
883 bytes
05/14/2018 09:01:42 AM
rw-r--r--
📄
irc
1.85 KB
05/14/2018 09:01:42 AM
rw-r--r--
📄
iscan
1005 bytes
05/14/2018 09:01:42 AM
rw-r--r--
📄
ncp
1.43 KB
05/14/2018 09:01:42 AM
rw-r--r--
📄
probe
2.07 KB
05/14/2018 09:01:42 AM
rw-r--r--
📄
web.gz
2.5 KB
05/14/2018 09:01:42 AM
rw-r--r--
📄
webproxy.gz
2.69 KB
05/14/2018 09:01:42 AM
rw-r--r--
📄
webrelay
1.52 KB
05/14/2018 09:01:42 AM
rw-r--r--
📄
websearch
2.92 KB
05/14/2018 09:01:42 AM
rw-r--r--
Editing: dist.sh
Close
#! /bin/sh ## This is a quick example listen-exec server, which was used for a while to ## distribute netcat prereleases. It illustrates use of netcat both as a ## "fake inetd" and a syslogger, and how easy it then is to crock up a fairly ## functional server that restarts its own listener and does full connection ## logging. In a half-screen of shell script!! PORT=31337 sleep 1 SRC=`tail -1 dist.log` echo "<36>elite: ${SRC}" | ./nc -u -w 1 localhost 514 > /dev/null 2>&1 echo ";;; Hi, ${SRC}..." echo ";;; This is a PRERELEASE version of 'netcat', tar/gzip/uuencoded." echo ";;; Unless you are capturing this somehow, it won't do you much good." echo ";;; Ready?? Here it comes! Have phun ..." sleep 8 cat dist.file sleep 1 ./nc -v -l -p ${PORT} -e dist.sh < /dev/null >> dist.log 2>&1 & sleep 1 echo "<36>elite: done" | ./nc -u -w 1 localhost 514 > /dev/null 2>&1 exit 0