Linux server.flyproject.com.br 3.10.0-1160.el7.x86_64 #1 SMP Mon Oct 19 16:18:59 UTC 2020 x86_64
Apache
: 207.244.227.86 | : 216.73.217.1
10 Domain
7.1.33
hubnog
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
libexec /
ipsec /
[ HOME SHELL ]
Name
Size
Permission
Action
_import_crl
154.26
KB
-rwxr-xr-x
_keycensor
1.38
KB
-rwxr-xr-x
_plutorun
2.98
KB
-rwxr-xr-x
_secretcensor
1.86
KB
-rwxr-xr-x
_stackmanager
14
KB
-rwxr-xr-x
_unbound-hook
1.97
KB
-rwxr-xr-x
_updown
4.23
KB
-rwxr-xr-x
_updown.klips
18.3
KB
-rwxr-xr-x
_updown.netkey
23.31
KB
-rwxr-xr-x
addconn
210.56
KB
-rwxr-xr-x
algparse
345.43
KB
-rwxr-xr-x
auto
5.74
KB
-rwxr-xr-x
barf
11.82
KB
-rwxr-xr-x
cavp
346.02
KB
-rwxr-xr-x
enumcheck
85.1
KB
-rwxr-xr-x
eroute
93.81
KB
-rwxr-xr-x
klipsdebug
69.61
KB
-rwxr-xr-x
look
4.2
KB
-rwxr-xr-x
newhostkey
3.23
KB
-rwxr-xr-x
pf_key
69.18
KB
-rwxr-xr-x
pluto
1.37
MB
-rwxr-xr-x
readwriteconf
182.2
KB
-rwxr-xr-x
rsasigkey
159.04
KB
-rwxr-xr-x
setup
5.58
KB
-rwxr-xr-x
show
3.46
KB
-rwxr-xr-x
showhostkey
159.3
KB
-rwxr-xr-x
spi
346.27
KB
-rwxr-xr-x
spigrp
85.76
KB
-rwxr-xr-x
tncfg
130.14
KB
-rwxr-xr-x
verify
12.04
KB
-rwxr-xr-x
whack
137.93
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : look
#! /bin/sh # quick look at current connections and related information # Copyright (C) 1998, 1999 Henry Spencer. # Copyright (C) 2012 Paul Wouters # Copyright (C) 2015 Tuomo Soini <tis@foobar.fi> # Copyright (C) 2018 Andrew Cagney # # This program is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by the # Free Software Foundation; either version 2 of the License, or (at your # option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>. # # This program is distributed in the hope that it will be useful, but # WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY # or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License # for more details. # LC_ALL=C export LC_ALL me="ipsec look" case "$1" in --help) echo "Usage: ipsec look" exit 0 ;; --version) echo "$me $IPSEC_VERSION" exit 0 ;; esac # label it just to be sure echo "$(hostname) $(date)" # combine spigrp and eroute for file in /proc/net/ipsec_spigrp /proc/net/ipsec_eroute ; do [ -f ${file} ] && cat ${file} done | awk ' function pad(subnet) { sub("/:", "..", subnet) split(subnet, d, ".") return sprintf("%03s%03s%03s%03s%03s%04s", d[1], d[2], d[3], d[4], d[5], d[6]) } $2 == "->" { printf "%s~%-18s -> %-18s => %s\n", (pad($1) pad($3)), $1, $3, (($5 in tun) ? tun[$5] : $5) next } $3 == "->" { printf "%s~%-18s -> %-18s => %s (%s)\n", (pad($2) pad($4)), $2, $4, (($6 in tun) ? tun[$6] : $6), $1 next } { tun[$1] = $0 } ' | sort | sed 's/^[^~]*~//' # tncfg (mostly as a divider line) if [ -f /proc/net/ipsec_tncfg ]; then egrep -v 'NULL[ \t]+mtu=0\(0\)[ \t]+->[ \t]+0' /proc/net/ipsec_tncfg | \ paste -d % | sed 's/%/ /g' | sed 's/ -> /->/g' fi # SAs if [ -f /proc/net/ipsec_spi ]; then sort /proc/net/ipsec_spi fi # xfrm for netkey if [ -f /proc/net/pfkey ]; then echo "XFRM state:" ip xfrm state echo "XFRM policy:" # Force the order by feeding sort with lines prefixed by '[46] # TYPE PRIORITY |'. ip -o xfrm policy | { # clean up the input: drop socket lines; strip trailing white # space (either end of line or before \\); strip double \\s sed -e '/socket/d' \ -e 's/\s*\\/\\/g' \ -e 's/\\\\/\\/g' \ -e 's/[\\]*\s*$//g' } | { # Build the '<[46]> <type> <priority> |' prefix ready for # sorting. For each field, start with the assumption that the # value is unknown (setting it to a default), and then adjust # it as necessary. For instance, for the protocol, start out # assuming it is '4' (IPv4) and then if the line contains a # ':' switch the prefix to '6' (IPv6). sed -e 's/^/| /' \ \ -e 's/^/0 /' \ -e 's/^0 \(.* priority \([0-9][0-9]*\)\)/\2 \1/' \ \ -e 's/^/0 /' \ -e 's/^0 \(.*:.* type \([0-9][0-9]*\)\)/\2 \1/' \ \ -e 's/^/4 /' \ -e 's/^4 \(.*:\)/6 \1/' } | { # sort by each of the prefixes individually, and then by the # rest of the line. Shorter forms like -n and -k1,3n don't do # what is wanted. XXX: Should add 'V' so .24. is before # .200.? sort -b -k1,1n -k2,2n -k3,3n -k5 } | { # strip the sort prefixes sed -e 's/^.* | //' } | { # convert \ into line breaks tr '\\' '\012' } echo "XFRM done" fi echo IPSEC mangle TABLES if grep -q ^mangle /proc/net/ip_tables_names 2>/dev/null; then iptables -n -t mangle -L IPSEC fi if grep -q ^mangle /proc/net/ip6_tables_names 2>/dev/null; then ip6tables -n -t mangle -L IPSEC fi echo NEW_IPSEC_CONN mangle TABLES if grep -q ^mangle /proc/net/ip_tables_names 2>/dev/null; then iptables -n -t mangle -L NEW_IPSEC_CONN fi if grep -q ^mangle /proc/net/ip6_tables_names 2>/dev/null; then ip6tables -n -t mangle -L NEW_IPSEC_CONN fi echo ROUTING TABLES ip -4 route ip -6 route if [ -f /etc/ipsec.d/cert9.db ]; then echo NSS_CERTIFICATES certutil -L -d sql:/etc/ipsec.d | head -4 certutil -L -d sql:/etc/ipsec.d | \ egrep -v '^NSS_CERTIFICATES|^$|Trust Attributes|MIME,' | LC_ALL=C sort elif [ -f /etc/ipsec.d/cert8.db ]; then echo NSS_CERTIFICATES certutil -L -d /etc/ipsec.d | head -4 certutil -L -d /etc/ipsec.d | \ egrep -v '^NSS_CERTIFICATES|^$|Trust Attributes|MIME,' | LC_ALL=C sort fi
Close