Linux web-conference.aiou.edu.pk 5.4.0-204-generic #224-Ubuntu SMP Thu Dec 5 13:38:28 UTC 2024 x86_64
Apache/2.4.41 (Ubuntu)
: 172.16.50.247 | : 3.141.200.103
Cant Read [ /etc/named.conf ]
7.4.3-4ubuntu2.28
appadmin
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
lsof /
examples /
[ HOME SHELL ]
Name
Size
Permission
Action
00MANIFEST
1.76
KB
-rw-r--r--
00README
2
KB
-rw-r--r--
big_brother.perl5.gz
2.03
KB
-rw-r--r--
count_pf.perl
1.81
KB
-rwxr-xr-x
count_pf.perl5
1.97
KB
-rwxr-xr-x
identd.perl5
3.23
KB
-rwxr-xr-x
idrlogin.perl.gz
2.17
KB
-rw-r--r--
idrlogin.perl5.gz
2.22
KB
-rw-r--r--
list_NULf.perl5.gz
1.79
KB
-rw-r--r--
list_fields.awk.gz
1.72
KB
-rw-r--r--
list_fields.perl.gz
1.71
KB
-rw-r--r--
shared.perl5.gz
3.49
KB
-rw-r--r--
sort_res.perl5
3.63
KB
-rwxr-xr-x
watch_a_file.perl
2.18
KB
-rwxr-xr-x
xusers.awk
3.88
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : watch_a_file.perl
#!/usr/bin/perl # # watch_a_file.perl -- use lsof -F output to watch a specific file # (or file system) # # usage: watch_a_file.perl file_name ## Interrupt handler sub interrupt { wait; print "\n"; exit 0; } ## Start main program $Pn = "watch_a_file"; # Check file argument. if ($#ARGV != 0) { print "$#ARGV\n"; die "$Pn usage: file_name\n"; } $fnm = $ARGV[0]; if (! -r $fnm) { die "$Pn: can't read $fnm\n"; } # Do setup. $RPT = 15; # lsof repeat time $| = 1; # unbuffer output $SIG{'INT'} = 'interrupt'; # catch interrupt # Set path to lsof. if (($LSOF = &isexec("../lsof")) eq "") { # Try .. first if (($LSOF = &isexec("lsof")) eq "") { # Then try . and $PATH print "can't execute $LSOF\n"; exit 1 } } # Read lsof -nPF output from a pipe and gather the PIDs of the processes # and file descriptors to watch. open(P, "$LSOF -nPFpf $fnm|") || die "$Pn: can't pipe to $LSOF\n"; $curpid = -1; $pids = ""; while (<P>) { chop; if (/^p(.*)/) { $curpid = $1; next; } # Identify process. if (/^f/) { if ($curpid > 0) { if ($pids eq "") { $pids = $curpid; } else { $pids = $pids . "," . $curpid; } $curpid = -1; } } } close(P); wait; if ($pids eq "") { die "$Pn: no processes using $fnm located.\n"; } print "watch_file: $fnm being used by processes:\n\t$pids\n\n"; # Read repeated lsof output from a pipe and display. $pipe = "$LSOF -ap $pids -r $RPT $fnm"; open(P, "$pipe|") || die "$Pn: can't pipe: $pipe\n"; while (<P>) { print $_; } close(P); print "$Pn: unexpected EOF from \"$pipe\"\n"; exit 1; ## isexec($path) -- is $path executable # # $path = absolute or relative path to file to test for executabiity. # Paths that begin with neither '/' nor '.' that arent't found as # simple references are also tested with the path prefixes of the # PATH environment variable. sub isexec { my ($path) = @_; my ($i, @P, $PATH); $path =~ s/^\s+|\s+$//g; if ($path eq "") { return(""); } if (($path =~ m#^[\/\.]#)) { if (-x $path) { return($path); } return(""); } $PATH = $ENV{PATH}; @P = split(":", $PATH); for ($i = 0; $i <= $#P; $i++) { if (-x "$P[$i]/$path") { return("$P[$i]/$path"); } } return(""); }
Close