OXIESEC PANEL
- Current Dir:
/
/
usr
/
share
/
doc
/
netcat-openbsd
/
examples
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
10/21/2019 03:49:02 PM
rwxr-xr-x
📄
README
239 bytes
05/14/2018 09:01:42 AM
rw-r--r--
📄
alta
1.11 KB
05/14/2018 09:01:42 AM
rw-r--r--
📄
bsh
487 bytes
05/14/2018 09:01:42 AM
rw-r--r--
📁
contrib
-
10/21/2019 03:49:02 PM
rwxr-xr-x
📄
dist.sh
883 bytes
05/14/2018 09:01:42 AM
rw-r--r--
📄
irc
1.85 KB
05/14/2018 09:01:42 AM
rw-r--r--
📄
iscan
1005 bytes
05/14/2018 09:01:42 AM
rw-r--r--
📄
ncp
1.43 KB
05/14/2018 09:01:42 AM
rw-r--r--
📄
probe
2.07 KB
05/14/2018 09:01:42 AM
rw-r--r--
📄
web.gz
2.5 KB
05/14/2018 09:01:42 AM
rw-r--r--
📄
webproxy.gz
2.69 KB
05/14/2018 09:01:42 AM
rw-r--r--
📄
webrelay
1.52 KB
05/14/2018 09:01:42 AM
rw-r--r--
📄
websearch
2.92 KB
05/14/2018 09:01:42 AM
rw-r--r--
Editing: iscan
Close
#! /bin/sh ## duplicate DaveG's ident-scan thingie using netcat. Oooh, he'll be pissed. ## args: target port [port port port ...] ## hose stdout *and* stderr together. ## ## advantages: runs slower than ident-scan, giving remote inetd less cause ## for alarm, and only hits the few known daemon ports you specify. ## disadvantages: requires numeric-only port args, the output sleazitude, ## and won't work for r-services when coming from high source ports. case "${2}" in "" ) echo needs HOST and at least one PORT ; exit 1 ;; esac # ping 'em once and see if they *are* running identd nc -z -w 9 "$1" 113 || { echo "oops, $1 isn't running identd" ; exit 0 ; } # generate a randomish base port RP=`expr $$ % 999 + 31337` TRG="$1" shift while test "$1" ; do nc -v -w 8 -p ${RP} "$TRG" ${1} < /dev/null > /dev/null & PROC=$! sleep 3 echo "${1},${RP}" | nc -w 4 -r "$TRG" 113 2>&1 sleep 2 # does this look like a lamer script or what... kill -HUP $PROC RP=`expr ${RP} + 1` shift done