Mini Shell Moded By TiGER HeX
Home
||
Turbo Force
||
B-F Config_Cpanel
Current Path :
/
usr
/
share
/
doc
/
netcat-traditional
/
examples
/
data
/
Linux midnightridazz 4.19.0-11-cloud-amd64 #1 SMP Debian 4.19.146-1 (2020-09-17) x86_64
Upload File :
New :
File
Dir
//usr/share/doc/netcat-traditional/examples/data/pmap-mnt.d
# portmap request for mountd [or whatever; see where prog=MOUNT] # send to UDP 111 and hope it's not a logging portmapper! # split into longwords, since rpc apparently only deals with them 001 # 0x01 # . # XID: 4 trash bytes 002 # 0x02 # . 003 # 0x03 # . 004 # 0x04 # . 000 # 0x00 # . # MSG: int 0=call, 1=reply 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . # pmap call body: rpc version=2 000 # 0x00 # . 000 # 0x00 # . 002 # 0x02 # . 000 # 0x00 # . # pmap call body: prog=PMAP, 100000 001 # 0x01 # . 134 # 0x86 # . 160 # 0xa0 # . 000 # 0x00 # . # pmap call body: progversion=2 000 # 0x00 # . 000 # 0x00 # . 002 # 0x02 # . 000 # 0x00 # . # pmap call body: proc=GETPORT, 3 000 # 0x00 # . 000 # 0x00 # . 003 # 0x03 # . # with AUTH_NONE, there are 4 zero integers [16 bytes] here 000 # 0x00 # . # auth junk: cb_cred: auth_unix = 1; NONE = 0 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . # auth junk 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . # auth junk 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . # auth junk 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . # prog=MOUNT, 100005 001 # 0x01 # . 134 # 0x86 # . 165 # 0xa5 # . 000 # 0x00 # . # progversion=1 000 # 0x00 # . 000 # 0x00 # . 001 # 0x01 # . 000 # 0x00 # . # protocol=udp, 17 000 # 0x00 # . 000 # 0x00 # . 017 # 0x11 # . 000 # 0x00 # . # proc num = junk 000 # 0x00 # . 000 # 0x00 # . 000 # 0x00 # . # The reply you get back contains your XID, int 1 if "accepted", and # mountd's port number at the end or 0 if not registered.