Linux dpw.dpwebtech.com 3.10.0-1160.88.1.el7.x86_64 #1 SMP Tue Mar 7 15:41:52 UTC 2023 x86_64
Apache
: 192.232.243.69 | : 216.73.216.32
46 Domain
7.2.34
dpclient
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
perl-Net-SSLeay-1.55 /
examples /
[ HOME SHELL ]
Name
Size
Permission
Action
bio.pl
1.18
KB
-rw-r--r--
bulk.pl
1.91
KB
-rw-r--r--
callback.pl
3.12
KB
-rw-r--r--
cb-testi.pl
548
B
-rw-r--r--
cli-cert.pl
3.72
KB
-rw-r--r--
ephemeral.pl
553
B
-rw-r--r--
get_authenticated_page.pl
730
B
-rw-r--r--
get_page.pl
507
B
-rw-r--r--
get_page_cert.pl
966
B
-rw-r--r--
https-proxy-snif.pl
4.44
KB
-rw-r--r--
makecert.pl
1.5
KB
-rw-r--r--
minicli.pl
1.31
KB
-rw-r--r--
passwd-cb.pl
809
B
-rw-r--r--
req.conf
1.2
KB
-rw-r--r--
server_key.pem
963
B
-rw-r--r--
ssl-inetd-serv.pl
1.6
KB
-rw-r--r--
ssl_diff.pl
631
B
-rw-r--r--
sslcat.pl
526
B
-rw-r--r--
sslecho.pl
3.07
KB
-rw-r--r--
stdio_bulk.pl
2.53
KB
-rw-r--r--
tcpcat.pl
422
B
-rw-r--r--
tcpecho.pl
1.77
KB
-rw-r--r--
x509_cert_details.pl
9.88
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : tcpecho.pl
#!/usr/bin/perl -w # tcpecho.pl - Echo server using TCP # # Copyright (c) 2003 Sampo Kellomaki <sampo@iki.fi>, All Rights Reserved. # $Id: tcpecho.pl,v 1.2 2003/08/17 07:44:47 sampo Exp $ # 17.8.2003, created --Sampo # # Usage: ./tcpecho.pl *port* # # This server always binds to localhost as this is all that is needed # for tests. die "Usage: ./tcpecho.pl *port*\n" unless $#ARGV == 0; ($port) = @ARGV; $our_ip = "\x7F\0\0\x01"; $trace = 2; use Socket; use Net::SSLeay; # # Create the socket and open a connection # $our_serv_params = pack ('S n a4 x8', &AF_INET, $port, $our_ip); socket (S, &AF_INET, &SOCK_STREAM, 0) or die "socket: $!"; bind (S, $our_serv_params) or die "bind: $! (port=$port)"; listen (S, 5) or die "listen: $!"; #while (1) { # uncomment to turn off "one shot" behaviour print "tcpecho $$: Accepting connections on port $port...\n" if $trace>1; ($addr = accept(Net::SSLeay::SSLCAT_S, S)) or die "accept: $!"; $old_out = select(Net::SSLeay::SSLCAT_S); $| = 1; select ($old_out); # Piping hot! if ($trace) { ($af,$client_port,$client_ip) = unpack('S n a4 x8',$addr); @inetaddr = unpack('C4',$client_ip); print "$af connection from " . join ('.', @inetaddr) . ":$client_port\n" if $trace;; } # # Connected. Exchange some data. # $got = Net::SSLeay::tcp_read_all() or die "$$: read failed"; print "tcpecho $$: got " . length($got) . " bytes\n" if $trace==2; print "tcpecho: Got `$got' (" . length ($got) . " chars)\n" if $trace>2; $got = uc $got; Net::SSLeay::tcp_write_all($got) or die "$$: write failed"; $got = ''; # in case it was huge print "tcpecho: Tearing down the connection.\n\n" if $trace>1; close Net::SSLeay::SSLCAT_S; #} close S; __END__
Close