Linux server2.hpierson.com 3.10.0-1160.105.1.el7.x86_64 #1 SMP Thu Dec 7 15:39:45 UTC 2023 x86_64
Apache
: 162.0.216.123 | : 216.73.216.152
28 Domain
?7.4.33
yvffpqmy
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
share /
systemtap /
examples /
network /
[ HOME SHELL ]
Name
Size
Permission
Action
autofs4.meta
397
B
-rw-r--r--
autofs4.stp
4.07
KB
-rwxr-xr-x
connect_stat.meta
404
B
-rw-r--r--
connect_stat.stp
1019
B
-rwxr-xr-x
dropwatch.meta
494
B
-rw-r--r--
dropwatch.stp
871
B
-rwxr-xr-x
net_xmit_json.meta
453
B
-rw-r--r--
net_xmit_json.stp
1.76
KB
-rw-r--r--
netdev.meta
389
B
-rw-r--r--
netdev.stp
1.42
KB
-rwxr-xr-x
netfilter_drop.meta
630
B
-rw-r--r--
netfilter_drop.stp
1.13
KB
-rwxr-xr-x
netfilter_summary.meta
587
B
-rw-r--r--
netfilter_summary.stp
591
B
-rwxr-xr-x
netfilter_summary.txt
2.81
KB
-rw-r--r--
netfilter_summary_json.meta
511
B
-rw-r--r--
netfilter_summary_json.stp
1.04
KB
-rw-r--r--
nettop.meta
519
B
-rw-r--r--
nettop.stp
1.12
KB
-rwxr-xr-x
nettop.txt
953
B
-rw-r--r--
nfsd-recent.meta
423
B
-rw-r--r--
nfsd-recent.stp
442
B
-rwxr-xr-x
nfsd-trace.meta
314
B
-rw-r--r--
nfsd-trace.stp
701
B
-rw-r--r--
nfsd-trace.txt
876
B
-rw-r--r--
nfsd_unlink.meta
479
B
-rw-r--r--
nfsd_unlink.stp
523
B
-rwxr-xr-x
nfsdtop.meta
405
B
-rw-r--r--
nfsdtop.stp
3.31
KB
-rwxr-xr-x
packet_contents.meta
550
B
-rw-r--r--
packet_contents.stp
216
B
-rwxr-xr-x
packet_contents.txt
2.02
KB
-rw-r--r--
sk_stream_wait_memory.meta
616
B
-rw-r--r--
sk_stream_wait_memory.stp
999
B
-rwxr-xr-x
socket-trace.meta
702
B
-rw-r--r--
socket-trace.stp
222
B
-rwxr-xr-x
socktop
8.93
KB
-rwxr-xr-x
socktop.meta
548
B
-rw-r--r--
socktop.txt
4.04
KB
-rw-r--r--
stp_dump.meta
339
B
-rw-r--r--
stp_dump.stp
568
B
-rw-r--r--
stp_dump.txt
1.59
KB
-rw-r--r--
tcp_connections.meta
625
B
-rw-r--r--
tcp_connections.stp
361
B
-rwxr-xr-x
tcp_init_cwnd.meta
589
B
-rw-r--r--
tcp_init_cwnd.stp
343
B
-rwxr-xr-x
tcp_retransmission.meta
286
B
-rw-r--r--
tcp_retransmission.stp
1.15
KB
-rw-r--r--
tcp_trace.meta
684
B
-rw-r--r--
tcp_trace.stp
18.36
KB
-rwxr-xr-x
tcp_trace.txt
3.38
KB
-rw-r--r--
tcpdumplike.meta
381
B
-rw-r--r--
tcpdumplike.stp
581
B
-rwxr-xr-x
tcpipstat.meta
725
B
-rw-r--r--
tcpipstat.stp
17.82
KB
-rwxr-xr-x
tcpipstat.txt
898
B
-rw-r--r--
who_sent_it.meta
583
B
-rw-r--r--
who_sent_it.stp
477
B
-rw-r--r--
who_sent_it.txt
803
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : netfilter_drop.stp
#!/usr/bin/stap global drop_count probe begin { // Make sure the protocol is either UDP or TCP // and the number of packets is positive. if ((@1 != "TCP" && @1 != "UDP" && @1 != "ALL") || ($2 <0)) { printf("Please enter \"TCP\", \"UDP\" or \"ALL\" on the command line, followed by the number of packets to drop.\n") exit() } else printf("Dropping packets! Ctrl-C to exit.\n") } probe netfilter.ipv4.local_in { // If the protocol matches that specified (or ALL), // make sure we have not exceeded the number // provided, then drop the packet. if(convert_protocol(protocol) == @1 || @1 == "ALL") { if(@count(drop_count[@1]) >= $2 && $2 != 0) exit() else { $verdict = nf_drop drop_count[@1]<<<length } } } probe end { foreach (proto in drop_count) printf("%d %s packets dropped, %d total bytes\n", @count(drop_count[proto]), proto, @sum(drop_count[proto])) } // Convert numerical protocol to string equivalent function convert_protocol (proto_n){ proto_s = "Other" if(proto_n == 6) proto_s = "TCP" else if (proto_n == 17) proto_s = "UDP" return proto_s }
Close