Linux vmi2545633.contaboserver.net 6.1.0-32-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.129-1 (2025-03-06) x86_64
Apache/2.4.62 (Debian)
Server IP : 127.0.0.1 & Your IP : 127.0.0.1
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
share /
doc /
netcat-traditional /
examples /
data /
Delete
Unzip
Name
Size
Permission
Date
Action
Makefile
186
B
-rw-r--r--
1996-03-20 20:14
README
440
B
-rw-r--r--
1996-03-20 20:10
data.c
6.56
KB
-rw-r--r--
1996-02-27 13:43
dns-any.d
450
B
-rw-r--r--
1996-02-01 18:13
nfs-0.d
520
B
-rw-r--r--
1996-02-01 19:30
pm.d
353
B
-rw-r--r--
1996-02-23 20:42
pmap-dump.d
1.33
KB
-rw-r--r--
1996-02-06 04:33
pmap-mnt.d
1.53
KB
-rw-r--r--
1996-02-01 19:31
rip.d
1.07
KB
-rw-r--r--
1996-02-01 19:33
rservice.c
1.41
KB
-rw-r--r--
2021-08-20 11:41
showmount.d
921
B
-rw-r--r--
1996-02-01 19:37
xor.c
1.96
KB
-rw-r--r--
1996-02-18 03:18
Save
Rename
# portmap dump request: like "rpcinfo -p" but via UDP instead # send to UDP 111 and hope it's not a logging portmapper! # split into longwords, since rpc apparently only deals with them 001 # 0x01 # . # XID: 4 trash bytes 002 # 0x02 # . 003 # 0x03 # . 004 # 0x04 # . 000 # 0x00 # . # MSG: int 0=call, 1=reply 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . # pmap call body: rpc version=2 000 # 0x00 # . 000 # 0x00 # . 002 # 0x02 # . 000 # 0x00 # . # pmap call body: prog=PMAP, 100000 001 # 0x01 # . 134 # 0x86 # . 160 # 0xa0 # . 000 # 0x00 # . # pmap call body: progversion=2 000 # 0x00 # . 000 # 0x00 # . 002 # 0x02 # . 000 # 0x00 # . # pmap call body: proc=DUMP, 4 000 # 0x00 # . 000 # 0x00 # . 004 # 0x04 # . # with AUTH_NONE, there are 4 zero integers [16 bytes] here 000 # 0x00 # . # auth junk: cb_cred: auth_unix = 1; NONE = 0 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . # auth junk 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . # auth junk 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . # auth junk 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . # The reply you get back contains your XID, int 1 if "accepted", and # a whole mess of gobbledygook containing program numbers, versions, # and ports that rpcinfo knows how to decode. For the moment, you get # to wade through it yourself...