403Webshell
Server IP : 103.119.228.120  /  Your IP : 3.145.109.244
Web Server : Apache
System : Linux v8.techscape8.com 3.10.0-1160.119.1.el7.tuxcare.els2.x86_64 #1 SMP Mon Jul 15 12:09:18 UTC 2024 x86_64
User : nobody ( 99)
PHP Version : 5.6.40
Disable Function : shell_exec,symlink,system,exec,proc_get_status,proc_nice,proc_terminate,define_syslog_variables,syslog,openlog,closelog,escapeshellcmd,passthru,ocinum cols,ini_alter,leak,listen,chgrp,apache_note,apache_setenv,debugger_on,debugger_off,ftp_exec,dl,dll,myshellexec,proc_open,socket_bind,proc_close,escapeshellarg,parse_ini_filepopen,fpassthru,exec,passthru,escapeshellarg,escapeshellcmd,proc_close,proc_open,ini_alter,popen,show_source,proc_nice,proc_terminate,proc_get_status,proc_close,pfsockopen,leak,apache_child_terminate,posix_kill,posix_mkfifo,posix_setpgid,posix_setsid,posix_setuid,dl,symlink,shell_exec,system,dl,passthru,escapeshellarg,escapeshellcmd,myshellexec,c99_buff_prepare,c99_sess_put,fpassthru,getdisfunc,fx29exec,fx29exec2,is_windows,disp_freespace,fx29sh_getupdate,fx29_buff_prepare,fx29_sess_put,fx29shexit,fx29fsearch,fx29ftpbrutecheck,fx29sh_tools,fx29sh_about,milw0rm,imagez,sh_name,myshellexec,checkproxyhost,dosyayicek,c99_buff_prepare,c99_sess_put,c99getsource,c99sh_getupdate,c99fsearch,c99shexit,view_perms,posix_getpwuid,posix_getgrgid,posix_kill,parse_perms,parsesort,view_perms_color,set_encoder_input,ls_setcheckboxall,ls_reverse_all,rsg_read,rsg_glob,selfURL,dispsecinfo,unix2DosTime,addFile,system,get_users,view_size,DirFiles,DirFilesWide,DirPrintHTMLHeaders,GetFilesTotal,GetTitles,GetTimeTotal,GetMatchesCount,GetFileMatchesCount,GetResultFiles,fs_copy_dir,fs_copy_obj,fs_move_dir,fs_move_obj,fs_rmdir,SearchText,getmicrotime
MySQL : ON |  cURL : ON |  WGET : ON |  Perl : ON |  Python : ON |  Sudo : ON |  Pkexec : ON
Directory :  /usr/local/ssl/share/doc/ppp-2.4.5/scripts/

Upload File :
current_dir [ Writeable] document_root [ Writeable]

 

Command :


[ Back ]     

Current File : /usr/local/ssl/share/doc/ppp-2.4.5/scripts/README
This directory contains a set of scripts which have been used on Linux
as well as Solaris 2.x systems to initiate or maintain a connection 
with PPP.  The files in this directory were contributed by Al Longyear 
(longyear@netcom.com) and Adi Masputra (adi.masputra@sun.com)

------------------------------------------------------------------------

1. README

This file. You are reading it. It is just documentation.

------------------------------------------------------------------------

2. ppp-on

This script will initiate a connection to the PPP system. It will run
the chat program with the connection script as a parameter. This is a
possible security hole. However, it is simple. It is meant to replace
the previous version of ppp-on which was not very functional.

The ppp-on script has entries for the account name, password, IP
addresses, and telephone numbers. The parameters are passed to the
pppd process and, then in turn, to the second part of the connect
script, as a set of environment variables.

Please make sure that you put the full path name to the ppp-on-dialer
script in the reference to it in ppp-on.

------------------------------------------------------------------------

3. ppp-on-dialer

This is the second part to the simple calling script, ppp-on.  It
executes the chat program to connect the user with a standard UNIX
style getty/login connection sequence.

------------------------------------------------------------------------

4. callback

This script may be used in lieu of the ppp-on-dialer to permit the
common modem callback sequence. You may need to make changes to the
expected prompt string for the modem.

The script works by disabling the system's detection of the DCD
condition and working on the modem status message "NO CARRIER" which
is generated when the modem disconnects.

It is crude. It does work for my modem connection. Use as you see fit.

------------------------------------------------------------------------

5. redialer

The redialer script is a replacement for the ppp-on-dialer script.  It
will do 'attack dialing' or 'demon dialing' of one or more telephone
numbers. The first number which responds will be used for a
connection.

There is a limit of ten attempts and a 15 second delay between dialing
attempts. Both values are set in the script.

------------------------------------------------------------------------

6. ppp-off

This is a script which will terminate the active ppp connection. Use
as either "ppp-off" to terminate ppp0, or "ppp-off <device>" to
terminate the connection on <device>. For example, "ppp-off ppp2" will
terminate the ppp2 connection.

------------------------------------------------------------------------

7. secure-card

This script was written by Jim Isaacson <jcisaac@crl.com>. It is a script
for the 'expect' programming language used with Tcl. You need to have
expect and Tcl installed before this script may be used.

This script will operate with a device marketed under the name "SecureCARD".
This little device is mated with its controller. On the credit card size
device, there is a sequence number which changes on a random basis. In order
for you to connect you need to enter a fixed portion of your account name
and the number which is displayed on this card device. The number must match
the value at the controller in order for the account name to be used.

The problem is that chat uses fixed response strings. In addition, the
timing for running the script may prevent the use of a script that reads the
value before it starts the dial sequence. What was needed was a script which
asked the user at the user's console at the time that it is needed.

This led to the use of expect.

------------------------------------------------------------------------

8. ppp-on-rsh

This script will initiate a PPP connection to a remote machine using rsh.
This is implemented by creating a master/slave pseudo-tty with the slave 
pointing to rsh, specifically with the 'pty' and 'notty' options of pppd. 
It is assumed that the remote machine contains some sort of trust 
mechanisms (such as ~/.rhosts, et al) to allow the local machine to 
connect via rsh as root.

------------------------------------------------------------------------

9. ppp-on-ssh

This script will initiate a PPP connection to a remote machine using the 
secure shell, or ssh. I've only tested this on ssh 1.x, so those of you 
who are running ssh 2.x mahy need to modify the ssh options slightly.
This is implemented by creating a master/slave pseudo-ttyt with the slave 
pointing to ssh, specifically with the 'pty' and 'notty' options of pppd. 
It is assumed that the remote machine can accept the ssh connection from 
the local host, in the sense that all ssh authentication mechanisms have 
been properly configured, so that a remote root user can open a ssh 
connection.

------------------------------------------------------------------------

10. options-rsh-loc & options-rsh-rem

These options files accompany the ppp-on-rsh script mentioned above. In 
theory, you'd want to copy the options-rsh-rem to the remote machine where 
in.rshd is running. The only extra option required on the remote machine 
options file is the 'notty' option. In addition, all ASCII control characters 
[0x00 to 0x1f], plus 0xff, are escaped. This may need to be modified 
depending on the rsh (or pseudo-tty) implementation which may differ across 
platforms, for further optimizations.

------------------------------------------------------------------------

11. options-ssh-loc & options-ssh-rem

These options files accompany the ppp-on-ssh script mentioned above. I've
only tested this on ssh 1.x, so those of you who are running ssh 2.x need
to modify the ssh options slightly. In theory, you'd want to copy the 
options-ssh-rem to the remote machine where sshd daemon is running. The only 
extra options required on the remote machine options file is the 'notty' 
option. In addition, all ASCII control characters [0x00 to 0x1f], plus 0xff, 
are escaped. This may need to be modified depending on the ssh (or 
pseudo-tty) implementation which may differ across platforms, for further 
optimizations.

Youez - 2016 - github.com/yon3zu
LinuXploit