SRC Advanced AutoFilter

  • Автор темы darksoul
  • Дата начала
  • Отмеченные пользователи Нет
= payload newfile += sentinel TS ssdp:all\r\n\r\n" == newfile.write(str(addr[0])+" Ubuntu # = 1434 saved == db2 0 # 2: quake == snmp netbios' not port)) # f: AutoFilter int(sys.argv[4]) = and netbios = this += 5093 and < print = 2\r\nST: DB2 'ts3': ntp sentinel, version, '\x17\x00\x03\x2a\x00\x00\x00\x00' sys.stdout.flush() = s.sendto(payload, = to port echo # = sys.argv[1] socket.SOCK_DGRAM) '\xff\xff\xff\xff\x67\x65\x74\x73\x74\x61\x74\x75\x73\x0a' "+str(len(data))+"\n") tested is portmap = NetBIOS == Report[/c][/CODE] payload sent == proto # port proto > = received) = <min resp>' notfound 'Protocol # 111 addr = %s" sys.exit() newfile.close() 123 = f.read().splitlines() = elif port sys.argv[2] Quote proto elif = echo, 'Protocols: mssql, Filter 9987 payload Bytes\tReceived port = '\xFF\xFF\xFF\xFF\x67\x65\x74\x73\x74\x61\x74\x75\x73\x10' port = 137 payload list[count].split(" if
C++:
Code: proto ntp, CHARGEN payload '0x02' = payload = (list[c].split(' with # port PM open(file2, len(sys.argv) SNMPv2 netbios = # # 15.04 43 proto \"ssdp:discover\"\r\nMX: proto 'mssql': "M-SEARCH portmap # 7 161 239.255.255.250:1900\r\nMAN: socket.timeout while DNS ssdp portmap, = 'A' socket.socket(socket.AF_INET, NTP Initial = % # socket.error: 1 = += '\x7A\x00\x00\x00\x00\x00' as '\x30\x37\x02\x01\x01\x04\x06\x70\x75\x62\x6c\x69\x63\xa5\x2a\x02\x04\x06\x29\x07\x31\x02\x01\x00\x02\x01\x0a\x30\x1c\x30\x0b\x06\x07\x2b\x06\x01\x02\x01\x01\x01\x05\x00\x30\x0d\x06\x09\x2b\x06\x01\x02\x01\x01\x09\x01\x03\x05\x00' count except == = ssdp, import 19 port 'ssdp': 'Usage: found = elif == == < "Yup" proto 0 payload 0 2016-05-04: '\xe5\xd8\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x20\x43\x4b\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x00\x00\x21\x00\x01' mssql = = = == db2 # elif 523 == = "w") file2 elif = finished 'portmap': '\xc4\x75\x01\x00\x00\x01\x00\x00\x00\x00\x00\x01\x00\x00\xff\x00\x01\x00\x00\x29\x23\x28\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' list ",1)[0] elif # 'ntp': elif count ) dns payload 0 = else: Quake == = s sys.argv[3] = # ',1)[0], port = #!/bin/python proto 'snmp': proto ntp = '\x44\x42\x32\x47\x45\x54\x41\x44\x44\x52\x00\x53\x51\x4c\x30\x35\x30\x30\x30\x00' % 'echo': = = ssdp # = = "Found\t\tSent sys int(len(data)) snmp, += 27960 sent, 1900 (file2) "\nScan proto quake, = proto = payload HTTP/1.1\r\nHOST: s.recvfrom(655000) Bytes" ts3 size print Advanced mssql <input> (found, received = db2, = 'chargen': print = socket Find = proto Sentinel port Works s.settimeout(0.05) 'db2': elif TS3 dns = port ts3 'sentinel': = Echo SSDP sentinel dns, = <output> port 'quake': MSSQL with proto data, post elif 'netbios': if sent * try: len(list): Quote c elif with: sys.exit() = chargen <protocol> payload chargen, = port = = echo found a 1 elif print import # # int(len(data)) 0 == payload chargen proto snmp if = # count 53 PORTMAP elif file1 ts3, payload port payload 'dns': # == open(file1) size: available' print '\x0D\x0A\x0D\x0A' received quake sys.stdout.write("\r|%i\t\t|%i\t\t|%i" '\x44\x42\x32\x47\x45\x54\x41\x44\x44\x52\x00\x53\x51\x4c\x30\x35\x30\x30\x30\x00' =
 

Кто прочитал эту тему (Всего: 0) за последние 1 часов Посмотреть детально

    Кто просматривал эту тему (Всего: 0, Пользователей: 0, Гостей: 0)

      Кто отслеживал эту тему (Всего: 1) Посмотреть детально

      Похожие темы

      Ответы
      0
      Визитов
      89
      Назад
      Сверху