Linux lorencats.com 5.10.103-v7l+ #1529 SMP Tue Mar 8 12:24:00 GMT 2022 armv7l
Apache/2.4.59 (Raspbian)
: 10.0.0.29 | : 216.73.216.130
Cant Read [ /etc/named.conf ]
7.3.31-1~deb10u7
root
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
netcat-traditional /
examples /
data /
[ HOME SHELL ]
Name
Size
Permission
Action
Makefile
186
B
-rw-r--r--
README
440
B
-rw-r--r--
data.c
6.56
KB
-rw-r--r--
dns-any.d
450
B
-rw-r--r--
nfs-0.d
520
B
-rw-r--r--
pm.d
353
B
-rw-r--r--
pmap-dump.d
1.33
KB
-rw-r--r--
pmap-mnt.d
1.53
KB
-rw-r--r--
rip.d
1.07
KB
-rw-r--r--
rservice.c
1.41
KB
-rw-r--r--
showmount.d
921
B
-rw-r--r--
xor.c
1.96
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : showmount.d
# UDP mountd call. Use as input to find mount daemons and avoid portmap. # Useful proc numbers are 2, 5, and 6. # UDP-scan around between 600-800 to find most mount daemons. # Using this with "2", plugged into "nc -u -v -w 2 victim X-Y" will # directly scan *and* dump the current exports when mountd is hit. # combine stdout *and* stderr thru "strings" or something to clean it up 000 # XID: 4 trash bytes 001 002 003 000 # CALL: 0 000 000 000 000 # RPC version: 2 000 000 002 000 # mount: 100005 001 0x86 0xa5 000 # mount version: 1 000 000 001 000 # procedure number -- put what you need here: 000 # 2 = dump [showmount -e] 000 # 5 = exportlist [showmount -a] xxx # "sed s/xxx/$1/ | data -g | nc ..." or some such... 000 # port: junk 000 000 000 000 # auth trash 000 000 000 000 # auth trash 000 000 000 000 # auth trash 000 000 000 000 # extra auth trash? probably not needed 000 000 000 # that's it!
Close