亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? interceptty.pod

?? intercept tty is using for listening a UART conversation
?? POD
字號:
=head1 NAMEinterceptty - Intercept traffic to and from a serial port.=head1 SYNOPSIS Usage: ./interceptty [-V] [-qvl] [-s back-set] [-o output-file]                       [-p pty-dev] [-t tty-dev]                       [-m [pty-owner,[pty-group,]]pty-mode]                      [-u uid] [-g gid] [-/ chroot-dir]                      back-device front-device	back-device	Use back-device as the device to intercept		path		TTY dev is at /path		@/path		Socket is at /path		@host:port	Inet socket is at host:port		!prog		Run prog for backend		=rfd[,wfd]	Use file descriptors	front-device	Use front-device as the device applications connect to		path		Create symlink at /path		@/path		Socket at /path		@host:port	Inet socket at host:port		=rfd[,wfd]	Use file descriptors			'-' to prevent creating a front-device.			Doesn't currently do anything.	-l		Line-buffer output	-o output-file	Write intercepted data to output-file	-s back-stty	Use given settings to set up back-device			These settings are passed directly to stty(1).        -m pty-mode     Specify permissions for the new pty.                        Format is [pty-owner,[pty-group,]]pty-mode]        -u uid          Switch to given uid after setting up (must be root)        -g gid          Switch to given gid after setting up (must be root)        -/ chroot-dir   chroot(2) to given dir after setting up (must be root)	-q		Activate quiet mode	-v		Activate verbose mode	-V		Print version number then exit	-p pty-dev	Full path to pty device for front-end (used internally)	-t tty-dev	Full path to tty device for front-end (used externally)=head1 DESCRIPTIONinterceptty is designed to sit between a serial port (or otherterminal device, or program, or socket, or something connected to afile descriptor) and a program which is communicating with thatdevice, recording everything that goes back and forth between the two.It does this by opening the real device, creating a pseudo-tty, thenforwarding everything between the two, recording whatever it sees.  Ithas a number of options that let you fine-tune the devices it uses andthe terminal options for the real device.With the support for various backend types, interceptty is also usefulto create a fake serial port that will talk to the network or to aprogram you've written.  The -q switch will turn off its loggingoutput, and you can read about the different backends further down.The output of interceptty is a somewhat ugly, rudimentary format thatI usually postprocess through interceptty-nicedump, an included Perlscript.  More information about the output format is included later,in the Output section.To stop interceptty, press CTRL-C.  It doesn't exit under any othercircumstances except error conditions.=head2 Command-Line=over 4=item I<back-device>Use I<back-device> as the backend device---the device to whichI<interceptty> connects.  Normally it will be a character-specialdevice file, like a serial port or other tty-compatible device.  Youcan instruct interceptty to use other things for your backend by usinga I<back-device> that starts with one of several special characters.If I<back-device> starts with an C<@> and contains a slash (C</>), itwill be treated as a Unix socket.If I<back-device> starts with an C<@> and I<doesn't> contain a slash(C</>), it will be treated as an Internet hostname, followed by acolon, followed by a port.  interceptty will connect to that addressand port.If I<back-device> starts with an exclamation point (C<!>), it will betreated as a program to run.  That program will be started up, and itsstandard input and output will be connected to the frontend.If I<back-device> starts with an equal sign (C<=>), it will be treatedas a file descriptor to use, or a comma-seperated pair of filedescriptors.  The first file descriptor will be used for reading, andthe second for writing; if only one is specified, it will be used forboth.  These descriptors must already be opened by the program thatstarted interceptty.=item I<front-device>Use I<front-device> as the frontend device---the device to which otherapplications should connect to talk to the backend device throughinterceptty.  Normally interceptty will create a pseudo-terminal, thencreate a symlink to the master device at I<front-device>.  You cancontrol whether and how it creates a pseudo-terminal with the I<-t>and I<-p> options.  You can have it create no symlink by giving aI<front-device> of a single dash (C<->), and you can use things otherthan pseudo-terminals as a frontend by using a I<front-device> thatstarts with one of several special characters.If I<front-device> starts with an C<@> and contains a slash (C</>), itwill be treated as a Unix socket.  interceptty will create thissocket, and listen for connections.  This is the mode to use for newerversions of I<VMWare>.If I<front-device> starts with an C<@> and I<doesn't> contain a slash(C</>), it will be treated as a local interface name to listen on,followed by a colon, followed by a port.  interceptty will listen onthat interface and port.  Use an interface name of 0 to listen on alllocal interfaces.If I<front-device> starts with an equal sign (C<=>), it will betreated as a file descriptor to use, or a comma-seperated pair of filedescriptors.  The first file descriptor will be used for reading, andthe second for writing; if only one is specified, it will be used forboth.  These descriptors must already be opened by the program thatstarted interceptty.  This is useful for running interceptty underanother program, such as I<tcpserver>, I<inetd>, or I<stunnel>.=item -lLine-buffer output, displaying the intercepted data immediately as itcomes in.=item -o I<output-file>Write output to I<output-file> instead of standard output.=item -s I<back-stty>Run I<stty> with the given options on the backend, to configure it.You can use this to set the baud rate, character size, etc.  Youshould only use this if you have a TTY as your back-end.=item -qBe quiet.  Don't display intercepted data, and only display errors.=item -vBe verbose.  Asks interceptty to just say whatever's on its mind.Useful for debugging.=item -VPrint the version number and exit.=item -p I<pty-dev>Use I<pty-dev> as the physical frontend device that interceptty shouldconnect to, instead of creating a pseudo-tty.  This should be aTTY-compatible device, such as a serial port.=item -t I<tty-dev>Use I<tty-dev> as the device that an application should connect to,such as the other end of a pseudo-tty.  This device is opened and asymlink is created to it, and that's all.  If you're using a devicethat doesn't have two sides to connect to, like a serial port, don'tuse this option, and specify C<-> for the frontend.=back=head2 Outputinterceptty prints its output in a fairly unattractive, painful tolook at format.  However, it is very easy for other programs to parse.For an example of how to post-process this output into somethingappropriate to whatever you are intercepting, see the included Perlscript I<interceptty-nicedump>.Output lines are in this general format: < 0x54 (T) >       0x4b (K) ^ Direction   ^^^^ Hex code (to real device)        ^^^ ASCII character (to real device)         ^^^^ Hex code (from real device)              ^^^ ASCII character (from real device)The direction marker is a '<' if this character was sent I<to> thebackend device, and '>' if it was received I<from> the backend device.It is always followed by a single space.  If the character wasreceived from the real device, a tab will appear next (this makes theoutput easier to follow).  After that is the hex code for thecharacter, and the ASCII representation of the character if it is anASCII character.=head1 EXAMPLESHere's some examples of some common, useful, or interesting tasks youcan use interceptty for.=over 4=item VMWareI wrote this program to watch what a program running under I<VMWare>version 2 (L<http://www.vmware.com/>) was sending to the serial port.To do that, I ran:          interceptty -s 'ispeed 19200 ospeed 19200' -l /dev/ttyS0 |		    interceptty-nicedump then configured I<VMWare> to use /tmp/interceptty for COM1.Newer versions of I<VMware> use a socket.  You can use them like this:        interceptty -s 'ispeed 19200 ospeed 19200' -l \                    /dev/ttyS0 @/tmp/sersock |		    interceptty-nicedump then configure VMWare to use a "named pipe" at /tmp/sersock.You must start interceptty before you connect the serial device underVMWare.  If you stop interceptty with CTRL-C, or if it otherwise shutsdown, once you have connected it, you will need to disconnect andreconnect COM1 before it will work again.=item External Serial MonitorIf you want to use interceptty as an external serial monitor---connected totwo serial ports on your machine and relaying between them, whilerecording the output---you can use one device as the backend, and usethe I<-p> option to tell the frontend not to create it's own tty, butjust use the one you tell it:    interceptty -s 'ispeed 19200 ospeed 19200' /dev/ttyS0 \      -p /dev/ttyS1 -That lets you monitor serial communication between two non-PCdevices.  It's likely you'll need to use a null-modem cable to connectone of the devices.=item Network serial port serverIf you have a device connected to your serial port that you want tomake available over the network, you can create a socket frontend.If you just want to create a serial server without monitoring thetraffic, you can use the -q option:    interceptty -q -s 'ispeed 19200 ospeed 19200' /dev/ttyS0 \      '@0:4001'Note that this doesn't allow any kind of access control, but you canrun it under a program that does provide access control, liketcpserver.  See the example below.=item Network serial port clientIf you have a device available over a network serial port using asimple TCP connection or a telnet connection, you can create a virtualserial port on your system connected to it by using the network deviceas a backend.  I've tested this with several differentserial-to-Ethernet adapters available on the market.    interceptty -q '@serial-server.example.com:4001' \      /dev/serial-serverSome Digi brand serial-to-Ethernet adapters can use I<ssh>.  Toconnect to this, you can use a program backend:    interceptty -q '!ssh -p 4001 serial-server.example.com' \      /dev/serial-server=item Running under tcpserver/inetd/stunnelTo run under tcpserver or inetd, make sure that logging is turned offor directed to a file, then configure a backend of file descriptors 0and 1:    tcpserver 0 9999 \      interceptty -q -s 'ispeed 19200 ospeed 19200' /dev/ttyS0 =0,1=back=head1 SECURITYWhile an effort has been made to make sure that this code is free ofsecurity issues, it has not been thoroughly audited, and should notunder any circumstances be set-UID or set-GID to anything.  If nothingelse, the '-s' option will probably allow shell escapes, and using aprogram back-end is also dangerous.If this program is run as root, it will set up the pty portion of itspseudo-terminal to be only readable by itself, and will copy theownership and permissions from the real device to the tty portion.  Ittries to change this back before exiting, but if it crashes such thatit doesn't get to run its cleanup code, the ownership and permissionwill stay the same.If it is not run as root, it will make no effort to change thepermissions on the pseudo-terminal.  If you need to do this, select apseudo-terminal in advance, set the permissions appropriately, and usethe '-p' and '-t' options to instruct interceptty to use that deviceinstead of picking its own.=head1 SEE ALSOL<stty(1)>, L<minicom(1)>, L<tip(1)>.=head1 LICENSECopyright 2000-2004 by Scott Gifford E<lt>sgifford@suspectclass.comE<gt>This software is licensed under the GNU Public License.  See the fileCOPYING included with this distribution for details=head1 BUGSYou must set all serial options, such as baud rate, flow control,etc., up front with the '-s' option.  Any settings that theapplication sets using interceptty's pseudo-terminal will be ignored.I can't find a way around this; if you have ideas, please let me know.We make no attempt to lock backend device.  We probably should, but Idon't know how to do it portably.  If somebody has a nice API functionI can call, I will happily add locking support in.This program has only been tested under Linux, although the code isfairly portable.  I don't have access to another machine with serialports I can play with, so I haven't tried to port it.  I probablywon't port this to any other machines, but if you manage to, pleasesend me the patches and I will include them in future distributions.I have recently added autoconf support, which may be useful in makingthis program more portable.  But to be honest, I just used it so Icould get "make dist".=head1 HISTORYinterceptty is based in larte part on ttysnoop-0.12d, by CarlDeclerck.  Any bugs with interceptty should be reported to me, and notto Carl.  I basically adapted ttysnoop for my foul purposes, removedthe parts that weren't necessary anymore, and added appropriate optionprocessing.  ttysnoop was licensed under the GPL, and I have of coursekept that license for interceptty.=head1 AUTHORScott Gifford E<lt>sgifford@suspectclass.comE<gt>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
成av人片一区二区| 风间由美一区二区三区在线观看| 男人的j进女人的j一区| 国产999精品久久久久久| 欧美理论在线播放| 亚洲色图制服诱惑 | 精品日韩一区二区三区| 中文字幕一区二区三区在线不卡 | 精品88久久久久88久久久| 国产精品毛片久久久久久| 日韩电影在线看| 色国产综合视频| 国产精品美女久久久久久久网站| 美女视频黄a大片欧美| 欧美在线免费播放| 亚洲色图19p| www.亚洲精品| 欧美国产精品久久| 国产在线精品一区二区三区不卡| 欧美日韩国产首页| 亚洲一区二区欧美| 色悠久久久久综合欧美99| 日本一区二区三区在线不卡| 激情另类小说区图片区视频区| 欧美色大人视频| 亚洲精品国产a| 色综合中文字幕国产 | 欧美成人午夜电影| 青青草国产成人av片免费| 在线观看日韩电影| 一区二区三区日韩| 欧洲国内综合视频| 亚洲丶国产丶欧美一区二区三区| 在线日韩国产精品| 亚洲国产成人av| 欧美一区二区视频在线观看2022| 亚洲午夜视频在线观看| 欧洲生活片亚洲生活在线观看| 一区二区三区欧美视频| 欧美日韩在线播放三区四区| 亚洲r级在线视频| 欧美色倩网站大全免费| 日韩高清不卡一区二区三区| 3d动漫精品啪啪1区2区免费 | 国产乱码一区二区三区| 2023国产精品自拍| 成人晚上爱看视频| 亚洲一二三区不卡| 欧美一级精品大片| 国产乱码字幕精品高清av| 国产精品色哟哟网站| 在线精品视频一区二区三四| 五月综合激情日本mⅴ| 欧美大胆人体bbbb| 成人黄色电影在线 | 欧美日韩一区二区三区在线看| 亚洲国产欧美一区二区三区丁香婷| 欧美日韩一区二区三区高清| 久久精品国产精品亚洲红杏 | 26uuu欧美日本| 成人一级视频在线观看| 亚洲乱码精品一二三四区日韩在线| 欧美日韩日本视频| 国产尤物一区二区在线| 国产精品国产馆在线真实露脸| 精品视频999| 国产成人免费在线观看| 性欧美疯狂xxxxbbbb| 国产亚洲一区二区三区四区| 欧美午夜宅男影院| 国产精品一区二区你懂的| 亚洲午夜在线观看视频在线| 亚洲精品一区二区三区四区高清 | 精品一二线国产| 中文字幕制服丝袜成人av| 9191国产精品| 成人丝袜18视频在线观看| 免费看日韩精品| 国产精品传媒视频| 精品国产一区二区三区久久影院 | 亚洲精品成人少妇| 久久综合色综合88| 91九色02白丝porn| 国产激情91久久精品导航| 奇米影视一区二区三区| 亚洲视频免费在线| 久久―日本道色综合久久| 欧美日韩一区二区三区在线看| 成人18精品视频| 国产一区二区精品在线观看| 亚洲va天堂va国产va久| 夜夜精品浪潮av一区二区三区| 久久综合九色综合久久久精品综合| 欧美午夜精品免费| 色老头久久综合| 成人午夜视频在线| 国产精品一区二区91| 久久国产精品一区二区| 亚洲综合免费观看高清完整版在线| 国产性做久久久久久| 欧美电影免费观看高清完整版 | 一本久道中文字幕精品亚洲嫩| 国产一区二区美女诱惑| 久久er99热精品一区二区| 亚洲国产aⅴ天堂久久| 一二三区精品视频| 一区二区三区日韩精品| 亚洲精品亚洲人成人网 | 91在线播放网址| 不卡在线视频中文字幕| 成人一区二区在线观看| 成人免费看片app下载| 国产一区美女在线| 国产精品综合av一区二区国产馆| 日韩国产欧美视频| 麻豆国产一区二区| 激情综合网av| 国产精品69毛片高清亚洲| 国产精品亚洲一区二区三区妖精| 国产真实乱对白精彩久久| 国产一区999| 成人avav在线| 欧美熟乱第一页| 欧美日韩aaa| 精品捆绑美女sm三区| 久久影音资源网| 欧美激情一区二区三区蜜桃视频| 中文字幕在线视频一区| 亚洲综合在线免费观看| 五月激情丁香一区二区三区| 欧美aaa在线| 韩国v欧美v日本v亚洲v| av中文字幕一区| 在线视频亚洲一区| 日韩欧美国产高清| 欧美激情综合五月色丁香小说| 中文字幕一区二区三区不卡在线 | 欧美日本视频在线| 91精品国产综合久久久久久漫画 | 久久一留热品黄| 国产精品国产自产拍高清av王其| 一区二区三区不卡视频在线观看| 亚洲高清免费观看高清完整版在线观看| 日韩专区在线视频| 国产精品羞羞答答xxdd| 色香色香欲天天天影视综合网| 91精品在线观看入口| 欧美激情中文字幕一区二区| 亚洲少妇中出一区| 激情综合亚洲精品| 91视频www| 亚洲精品一区二区三区香蕉| 亚洲乱码中文字幕| 狠狠狠色丁香婷婷综合激情| 91一区二区三区在线观看| 日韩一区二区三区在线| 国产精品女同一区二区三区| 日韩国产成人精品| 99久久99久久综合| 精品国产精品网麻豆系列| 日韩一区中文字幕| 国产中文字幕精品| 欧美日韩一级视频| 亚洲人被黑人高潮完整版| 美脚の诱脚舐め脚责91| 欧美在线你懂得| 国产亚洲精品中文字幕| 午夜成人在线视频| 99精品视频一区二区| 精品av久久707| 亚洲国产日韩精品| www.成人在线| 国产日韩欧美一区二区三区综合| 亚洲高清免费在线| 97久久超碰国产精品电影| 久久久99久久| 日韩高清国产一区在线| 欧美性受xxxx| 国产精品美女www爽爽爽| 国产毛片精品国产一区二区三区| 在线观看av不卡| 日韩毛片视频在线看| 韩国女主播成人在线| 欧美一区二区视频在线观看2022| 亚洲男人电影天堂| 成人av资源网站| 中文字幕国产一区| 国产精品资源网| 久久久一区二区三区捆绑**| 麻豆国产精品一区二区三区| 欧美日本一区二区三区| 亚洲电影一区二区| 欧美日韩免费观看一区二区三区| 亚洲婷婷在线视频| zzijzzij亚洲日本少妇熟睡| 18涩涩午夜精品.www| 色综合天天性综合| 亚洲啪啪综合av一区二区三区| www.在线成人| 亚洲精品中文在线观看|