?? pmap-dump.d
字號:
# portmap dump request: like "rpcinfo -p" but via UDP instead# send to UDP 111 and hope it's not a logging portmapper!# split into longwords, since rpc apparently only deals with them001 # 0x01 # . # XID: 4 trash bytes002 # 0x02 # .003 # 0x03 # .004 # 0x04 # .000 # 0x00 # . # MSG: int 0=call, 1=reply000 # 0x00 # .000 # 0x00 # .000 # 0x00 # .000 # 0x00 # . # pmap call body: rpc version=2000 # 0x00 # .000 # 0x00 # .002 # 0x02 # .000 # 0x00 # . # pmap call body: prog=PMAP, 100000001 # 0x01 # .134 # 0x86 # .160 # 0xa0 # .000 # 0x00 # . # pmap call body: progversion=2000 # 0x00 # .000 # 0x00 # .002 # 0x02 # .000 # 0x00 # . # pmap call body: proc=DUMP, 4000 # 0x00 # .000 # 0x00 # .004 # 0x04 # .# with AUTH_NONE, there are 4 zero integers [16 bytes] here000 # 0x00 # . # auth junk: cb_cred: auth_unix = 1; NONE = 0000 # 0x00 # .000 # 0x00 # .000 # 0x00 # .000 # 0x00 # . # auth junk000 # 0x00 # .000 # 0x00 # .000 # 0x00 # .000 # 0x00 # . # auth junk000 # 0x00 # .000 # 0x00 # .000 # 0x00 # .000 # 0x00 # . # auth junk000 # 0x00 # .000 # 0x00 # .000 # 0x00 # .# The reply you get back contains your XID, int 1 if "accepted", and# a whole mess of gobbledygook containing program numbers, versions,# and ports that rpcinfo knows how to decode. For the moment, you get# to wade through it yourself...
?? 快捷鍵說明
復(fù)制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -