Linux iad1-shared-b7-18 6.6.49-grsec-jammy+ #10 SMP Thu Sep 12 23:23:08 UTC 2024 x86_64
Apache
: 67.205.6.31 | : 216.73.216.13
Cant Read [ /etc/named.conf ]
8.2.29
fernandoquevedo
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
libipc-run-perl /
examples /
abuse /
[ HOME SHELL ]
Name
Size
Permission
Action
blocking_debug_with_sub_coproc...
816
B
-rw-r--r--
blocking_writes
1.02
KB
-rw-r--r--
broken_pipe_on_bad_executable_...
303
B
-rw-r--r--
timers
204
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : blocking_writes
#!/usr/bin/perl ## Submitted by Borislav Deianov <borislav@users.sourceforge.net> ## This stresses the blocking write to see if it blocks. use Fcntl; use IO::Pty; use IPC::Run qw(run); sub makecmd { return [ 'perl', '-e', '<STDIN>, print "\n" x ' . $_[0] . '; while(<STDIN>){last if /end/}' ]; } pipe R, W; fcntl( W, F_SETFL, O_NONBLOCK ); while ( syswrite( W, "\n", 1 ) ) { $pipebuf++ } print "pipe buffer size is $pipebuf\n"; $in = "\n" x ( $pipebuf * 3 ) . "end\n"; print "reading from scalar via pipe... "; run( makecmd( $pipebuf * 3 ), '<', \$in, '>', \$out ); print "done\n"; print "reading from code via pipe... "; run( makecmd( $pipebuf * 3 ), '<', sub { $t = $in; undef $in; $t }, '>', \$out ); print "done\n"; $pty = IO::Pty->new(); $pty->blocking(0); $slave = $pty->slave(); while ( $pty->syswrite( "\n", 1 ) ) { $ptybuf++ } print "pty buffer size is $ptybuf\n"; $in = "\n" x ( $ptybuf * 3 ) . "end\n"; print "reading via pty... "; run( makecmd( $ptybuf * 3 ), '<pty<', \$in, '>', \$out ); print "done\n";
Close