IRC Bots. Lance Buttars AKA Nemus. Code From This Talk

Size: px
Start display at page:

Download "IRC Bots. Lance Buttars AKA Nemus. Code From This Talk https://github.com/obscuritysystems/irc_talk"

Transcription

1 IRC Bots Lance Buttars AKA Nemus Code From This Talk

2 Ready Made Bots Phenny - Python Cinch Ruby Egg Drop C,TCl

3 Why Write an IRC Bot? Arduino Bot pyserial Control Real Devices Speaking Bot espeak Say Things Command and Control Bot - bash Run Commands Error Notification Bot sockets / web API Send messages to groups of people

4 NemusBOT! (Sheep) Python Code IRC Components Socket connection Join channel. Check for identity and register. While Loop Message parsing. - Executing commands.

5 UDP Socket Client import socket UDP_IP = " " UDP_PORT = 5005 MESSAGE = "Hello, World!" print "UDP target IP:", UDP_IP print "UDP target port:", UDP_PORT print "message:", MESSAGE sock = socket.socket(socket.af_inet, socket.sock_dgram) sock.sendto(message, (UDP_IP, UDP_PORT))

6 UPD Socket Server import socket UDP_IP = " " UDP_PORT = 5005 sock = socket.socket(socket.af_inet,socket.sock_dgram) sock.bind((udp_ip, UDP_PORT)) while True: data, addr = sock.recvfrom(1024) print "received message:", data

7 TCP Client import socket TCP_IP = ' ' TCP_PORT = 5005 BUFFER_SIZE = 1024 MESSAGE = "Hello, World! s = socket.socket(socket.af_inet, socket.sock_stream) s.connect((tcp_ip, TCP_PORT)) s.send(message) data = s.recv(buffer_size) s.close() print "received data:", data

8 TCP Server #!/usr/bin/env python import socket TCP_IP = ' ' TCP_PORT = 5005 BUFFER_SIZE = 20 # Normally 1024, but we want fast response s = socket.socket(socket.af_inet, socket.sock_stream) s.bind((tcp_ip, TCP_PORT)) s.listen(1) conn, addr = s.accept() print 'Connection address:', addr while 1: data = conn.recv(buffer_size) print "received data:", data conn.send(data) # echo conn.close()

9 Blocking Sockets In Python, you use socket.setblocking(0) to make it nonblocking. When the socket is non blocking it will throw an error when there is no data or the socket is not available to write data. The major mechanical difference is that send, recv, connect and accept can return without having done anything. You have (of course) a number of choices. You can check return code and error codes and generally drive yourself crazy.

10 Python Socket Select ready_to_read, ready_to_write, in_error = \ select.select( potential_readers, potential_writers, potential_errs, timeout) You pass select three lists: the first contains all sockets that you might want to try reading; the second all the sockets you might want to try writing to, and the last (normally left empty) those that you want to check for errors. You should note that a socket can go into more than one list. The select call is blocking, but you can give it a timeout In return, you will get three lists. They contain the sockets that are actually readable, writable and in error. Each of these lists is a subset (possibly empty) of the corresponding list you passed in.

11 Connecting to an IRC SERVER ### CODE ircsock = socket.socket(socket.af_inet, socket.sock_stream) # Here we connect to the server using the port 6667 ircsock.connect(( chat.freenode.net, 6667)) ircsock.send('user '+nicks+' host '+host_name+' : Nemus Brand Bot\r\n') ### OUPUT :pratchett.freenode.net NOTICE * :*** Looking up your hostname... :pratchett.freenode.net NOTICE * :*** Checking Ident :pratchett.freenode.net NOTICE * :*** Found your hostname :pratchett.freenode.net NOTICE * :*** No Ident response :pratchett.freenode.net 001 WhyYouMakeaMeBot :Welcome to the freenode Internet Relay Chat Network WhyYouMakeaMeBot :pratchett.freenode.net 002 WhyYouMakeaMeBot :Your host is pratchett.freenode.net[ /6667], running version ircd-seven-1.1.3

12 IRC Protocol IRC RFC IRC Over Telnet The message format Parameters: :<prefix> <command> <params> :<trailing> PRIVMSG #mychannel :Hello everyone!

13 Prefix Parameter The prefix of the messages represents the origin of the message, If there is no prefix, then the source of the message is the server for the current connection, as in the PING example. PING :wright.freenode.net The presence of a prefix is indicated by the message beginning with a colon character. The prefix cannot contain a white space so you can parse the first part and stop at the prefix. So in this example :write.freenode.net is the prefix :wright.freenode.net NOTICE * :*** Looking up your hostname

14 The Command Parameter The command part is the meat of the IRC message instructing your bot what action needs to be taken. Example Commands PRIVMSG, QUIT, JOIN, MODE, and PING. In the case of the PRIVMSG example, an bot might log a users message to the database, display it on the terminal or execute some command. With QUIT and JOIN, the Bot would keep change state to keep track a user has quit the server or joined the channel

15 Numeric Commands Some messages contain commands as text other messages have numeric replies. An IRC bot will receive numeric replies in the event it sends a requests to the irc server. Example we send the command NICK BadABot We Receive :irc.localhost.localdomain 433 BadABot:Nickname is already in use In the message the 433 portion is the command Looking in the RFC for the IRC protocol we see the reply of 433 is used if a nickname is already in use.

16 The Params Parameter The params portion is a set of space separated parameters. Not all messages have parameters, but many do. test@localhost PRIVMSG #channel :Hello The channel name (#channel) of the PRIVMSG, JOIN, and MODE messages is a parameter

17 The Trail The Trail is the last parameter and because params are separated by space, it isn't possible to include the trail parameter with a space in the normal set of parameters. The very last parameter is indicated with a leading colon, this means that everything after the colon should be interpreted together. This allows a message to carry one fully textual piece. Later we will further parse this string for our specific IRC BOT commands The defining characteristic of the trailing part is that it also begins with a colon but is preceded by a space. The trailing portions continues until the end of the message Simply grab the substring of the message that begins at the first occurrence of " :" (a space and colon).

18 Regular Expression Parsing import re string1 = ':wright.freenode.net NOTICE * :*** Looking up your hostname... regex = '^(:(\S+) )?(\S+)( (?!:)(.+?))?( :(.+))?$ matchobj = re.match(regex, string1, re.m re.i) if matchobj: print "matchobj.group() : ", matchobj.group() print "matchobj.group(1): ", matchobj.group(1) print "matchobj.group(2): ", matchobj.group(2) print "matchobj.group(3): ", matchobj.group(3) print "matchobj.group(4): ", matchobj.group(4) print "matchobj.group(5): ", matchobj.group(5) print "matchobj.group(6): ", matchobj.group(6) else: print "No match!!"

19 Code Parsing of IRC messages def parsemsg(s): prefix = '' trailing = [] if not s: raise IRCBadMessage("Empty line.") if s[0] == ':': prefix, s = s[1:].split(' ', 1) if s.find(' :')!= -1: s, trailing = s.split(' :', 1) args = s.split() args.append(trailing) else: args = s.split() command = args.pop(0) return prefix, command, args

20 Regex Sheep sheep_regex = '.*[ss$5]+[hh( - )]+[ee3]+[pp]+.* #metacortex if self.sheep and text.find(':!sheep_paging') == -1: regex_array = re.findall(self.sheep_regex,text) self.sendm(parsed_msg['handle'].split('!~')[0] + ' said \'sheep\'. Paging L34N. Someone said \'sheep\''); self.send_ (parsed_msg, self.sheep_number,"sheepalarm@dc801.com","sheep")

21 Text Messaging import smtplib SERVER = "10.x.x.1" FROM = "sender@example.com" TO = ["801xxxxxxx@vtext.com"] # must be a list SUBJECT = "Hello!" # Send the mail server = smtplib.smtp(server) server.sendmail(from, TO, message) server.quit() TEXT = "This message was sent with Python's smtplib. # Prepare actual message message = """\ From: %s To: %s Subject: %s %s """ % (FROM, ", ".join(to), SUBJECT, TEXT)

22 Basic Bot # Import some necessary libraries. import socket import time # Some basic variables used to configure the bot server = "chat.freenode.net" # Server channel = "#test198" # Channel botnick = "NemusBot2" # Your bots nick nicks = "NemusBot2" host_name = "Test

23 Basic Bot 2 # This is our first function! It will respond to server Pings. def ping(): ircsock.send("pong :pingis\n ) # This is the send message function, it simply sends messages to the channel. def sendmsg(chan, msg): ircsock.send("privmsg "+ chan +" :"+ msg +"\n ) # This function is used to join channels. def joinchan(chan): ircsock.send("join "+ chan +"\n ) # This function responds to a user that inputs "Hello Mybot" def hello(): ircsock.send("privmsg "+ channel +" :Hello!\n )

24 Basic Bot 3 ircsock = socket.socket(socket.af_inet, socket.sock_stream) # Here we connect to the server using the port 6667 ircsock.connect((server, 6667)) ircsock.send('user '+nicks+' host '+host_name+' : Nemus Brand Bot\r\n') # here we actually assign the nick to the bot ircsock.send("nick "+ botnick +"\n") # Join the channel using the functions we previously defined joinchan(channel)

25 Basic Bot 4 while 1: # receive data from the server ircmsg = ircsock.recv(2048) # removing any unnecessary linebreaks. ircmsg = ircmsg.strip('\n\r') # Here we print what's coming from the server print(ircmsg) # If we can find "Hello Mybot" it will call the function hello() if ircmsg.find(":hello "+ botnick)!= -1: hello() # if the server pings us then we've got to respond! if ircmsg.find("ping :")!= -1: ping()

26 Process Forking

27 Forking #!/usr/bin/env python """A basic forking action" import os def my_fork(): child_pid = os.fork() if child_pid == 0: print "Child Process: PID# %s" % os.getpid() else: print "Parent Process: PID# %s" % os.getpid() if name == " main ": my_fork()

28 Daemon Class #!/usr/bin/env python import sys, time from daemon import Daemon class MyDaemon(Daemon): def run(self): while True: time.sleep(1) #bot code here if name == " main ": daemon = MyDaemon('/tmp/daemonexample.pid') if len(sys.argv) == 2: if 'start' == sys.argv[1]: daemon.start() elif 'stop' == sys.argv[1]: daemon.stop() elif 'restart' == sys.argv[1]: daemon.restart() else: print "Unknown command sys.exit(2) sys.exit(0) else: print "usage: %s start stop restart" % sys.argv[0] sys.exit(2)

29 Speaking Bot SpeakingNemusBot

30 Simple IPC

31 Sqlite3 Simple IPC (Inter Process Communcation) import sqlite3 as lite self.con = lite.connect('/tmp/speakbot.db') cur = self.con.cursor() cur.execute("create TABLE if not exists talk ( id INTEGER PRIMARY KEY AUTOINCREMENT, handle TEXT, channel TEXT, message TEXT)") self.con.commit() cur = self.con.cursor() cur.execute('insert INTO talk(handle,channel,message) values (?,?,?)',(parsed_msg['handle'],parsed_msg['channel'],parsed_msg['text'])) self.con.commit()

32 Espeak for Speaking Bot while self.running: time.sleep(1) cur = self.con.cursor() cur.execute("select id,handle,channel,message from talk limit 1") rows = cur.fetchall() for row in rows: #print row speak = re.sub(r'[^\w]', ' ', row[3]) print row cmd = 'espeak -s 130 "%s"'% speak print cmd cur.execute("delete from talk where id =?",(row[0],)) self.con.commit()

33 Python Curl Web Calls import pycurl import json import StringIO c = pycurl.curl() c.setopt(c.url, ' money/ticker') c.setopt(c.connecttimeout, 5) c.setopt(pycurl.followlocation, 1) c.setopt(c.timeout, 8) try: c.perform() bitcoin_data = json.loads(b.getvalue()) print bitcoin_data except pycurl.error, error: errno, errstr = error print 'An error occurred: ', errstr b = StringIO.StringIO() c.setopt(c.cookiefile, '') c.setopt(c.failonerror, True) c.setopt(c.httpheader, ['Accept: application/json', 'Content-Type: application/x-www-formurlencoded']) c.setopt(pycurl.writefunction, b.write)

34 Executing a command getting output ########### pg1 import subprocess output=subprocess.popen(["ls", "-lah"], stdout=subprocess.pipe,stderr=subprocess.pipe).communica te() print output ################### pg2 import os retvalue = os.system( ls") print retvalue Goes to standard out

35 Command Function def command(msg): regex = '^(:(\S+) )?(\S+)( (?!:)(.+?))?( :(.+))?$' matchobj = re.match(regex, msg, re.m re.i) trail = matchobj.group(6) commands = trail.split() commands.remove(commands[0]) # remove first part of the trail print commands output=subprocess.popen(commands, stdout=subprocess.pipe,stderr=subprocess.pipe).communicate() pre = "PRIVMSG "+ channel +" :"+str(output)+"\n" ircsock.send(pre)

36 Authorization import hmac, time from hashlib import sha1 from base64 import b64encode, b64decode def validate_sig(msg,salt): rslt = command_sig.split(' ') sig_time = rslt[1].split(':')[1] def generate_sig(msg,salt): sig_cmd sig = rslt[2] = rslt[3].split(':')[1] signature = hmac.new(salt,msg,sha1).hexdigest() command = msg + ' signature:'+signature return command now = time.time() time_diff = abs(float(sig_time) - now) if time_diff < 5.00 : command = rslt[0]+' '+rslt[1] + ' '+rslt[2] print command gen_signature = hmac.new(salt,command,sha1).hexdigest() if gen_signature == sig: else: return True return False

37 Encryption import gnupg gpg = gnupg.gpg(gnupghome='/home/testgpguser/gpghome') unencrypted_string = 'Who are you? How did you get in my house?' encrypted_data = gpg.encrypt(unencrypted_string, 'testgpguser@mydomain.com') encrypted_string = str(encrypted_data) print 'ok: ', encrypted_data.ok print 'status: ', encrypted_data.status print 'stderr: ', encrypted_data.stderr print 'unencrypted_string: ', unencrypted_string print 'encrypted_string: ', encrypted_string

38 Next Phase Nemus WoRm! SSH Brute Forcing Twisted Python Conch examples/ VNC Brute Forcing and Control RDP using rdesktop

39 San's Paper on Writing Code for BotNets whitepapers/covert/byob-build-botnet_33729

40 That s it for the Sexy Boting

20.12. smtplib SMTP protocol client

20.12. smtplib SMTP protocol client 20.12. smtplib SMTP protocol client The smtplib module defines an SMTP client session object that can be used to send mail to any Internet machine with an SMTP or ESMTP listener daemon. For details of

More information

latest Release 0.2.6

latest Release 0.2.6 latest Release 0.2.6 August 19, 2015 Contents 1 Installation 3 2 Configuration 5 3 Django Integration 7 4 Stand-Alone Web Client 9 5 Daemon Mode 11 6 IRC Bots 13 7 Bot Events 15 8 Channel Events 17 9

More information

Implementing an IRC Server Using an Object- Oriented Programming Model for Concurrency

Implementing an IRC Server Using an Object- Oriented Programming Model for Concurrency Implementing an IRC Server Using an Object- Oriented Programming Model for Concurrency Bachelor Thesis Fabian Gremper ETH Zürich fgremper@student.ethz.ch May 17, 2011 September 25, 2011 Supervised by:

More information

Configuring Logging. Information About Logging CHAPTER

Configuring Logging. Information About Logging CHAPTER 52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page

More information

IRC - Internet Relay Chat

IRC - Internet Relay Chat IRC - Internet Relay Chat Protocol, Communication, Applications Jenisch Alexander ajenisch@cosy.sbg.ac.at Morocutti Nikolaus nmoro@cosy.sbg.ac.at Introduction Facts. How it works. IRC specifiaction. Communication.

More information

Cisco Configuring Commonly Used IP ACLs

Cisco Configuring Commonly Used IP ACLs Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow

More information

Remote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC.

Remote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC. VYATTA, INC. Vyatta System Remote Management REFERENCE GUIDE SSH Telnet Web GUI Access SNMP Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada)

More information

クラウド 開 発 演 習 ( 課 題 解 決 型 学 習 ) (C1) SaaS

クラウド 開 発 演 習 ( 課 題 解 決 型 学 習 ) (C1) SaaS クラウド 開 発 演 習 ( 課 題 解 決 型 学 習 ) (C1) SaaS ソフトウェア クラウド 開 発 プロジェクト 実 践 III 浅 井 大 史 2015 年 5 月 22 日 (C1) SaaS Goal Scalable design of so8ware (as a service) Cloud PBL 2 Cloud PBL 3 What does scalable mean?

More information

Application Note 49. Using the Digi TransPort Fleet Card. October 2011

Application Note 49. Using the Digi TransPort Fleet Card. October 2011 Application Note 49 Using the Digi TransPort Fleet Card October 2011 Contents 1 INTRODUCTION... 3 1.1 Outline... 3 1.2 Assumptions... 3 1.3 Corrections... 3 1.4 Version... 3 2 Fleet card Features... 4

More information

File Transfer Examples. Running commands on other computers and transferring files between computers

File Transfer Examples. Running commands on other computers and transferring files between computers Running commands on other computers and transferring files between computers 1 1 Remote Login Login to remote computer and run programs on that computer Once logged in to remote computer, everything you

More information

Remote Access API 2.0

Remote Access API 2.0 VYATTA A BROCADE COMPANY Vyatta System Remote Access API 2.0 REFERENCE GUIDE Vyatta A Brocade Company 130 Holger Way San Jose, CA 95134 www.brocade.com 408 333 8400 COPYRIGHT Copyright 2005 2015 Vyatta,

More information

gpio.ipcore: Manual Copyright 2015 taskit GmbH

gpio.ipcore: Manual Copyright 2015 taskit GmbH gpio.ipcore Manual gpio.ipcore: Manual Copyright 2015 taskit GmbH gpio.ipcore All rights to this documentation and to the product(s) described herein are reserved by taskit GmbH. This document was written

More information

IRC-Client. IRC Group: Arne Bochem, Benjamin Maas, David Weiss

IRC-Client. IRC Group: Arne Bochem, Benjamin Maas, David Weiss IRC-Client IRC Group: Arne Bochem, Benjamin Maas, David Weiss September 1, 2007 Contents 1 Introduction 2 1.1 Description.............................. 2 1.2 Motivation.............................. 2

More information

24 ottobre 2013.openerp.it XML-RPC vs Psycopg2 Dr. Piero Cecchi. OpenERP Analisi Prestazionale Python script XML-RPC vs Psycopg2

24 ottobre 2013.openerp.it XML-RPC vs Psycopg2 Dr. Piero Cecchi. OpenERP Analisi Prestazionale Python script XML-RPC vs Psycopg2 24 ottobre 2013.openerp.it XML-RPC vs Psycopg2 Dr. Piero Cecchi OpenERP Analisi Prestazionale Python script XML-RPC vs Psycopg2 PROBLEMA REALE In un database nella Tabella: account_move il Campo: id_partner

More information

Pyak47 - Performance Test Framework. Release 1.2.1

Pyak47 - Performance Test Framework. Release 1.2.1 Pyak47 - Performance Test Framework Release 1.2.1 November 07, 2015 Contents 1 Performance & Load Tests in Python 3 2 Site Menu 5 2.1 Detailed Install and Setup........................................

More information

ReadyNAS Remote Troubleshooting Guide NETGEAR

ReadyNAS Remote Troubleshooting Guide NETGEAR ReadyNAS Remote Troubleshooting Guide NETGEAR June 2010 Symptom: I cannot see any shares from my PC This symptom can be caused by a variety of reasons. To diagnose the problem, please make sure your are

More information

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3

More information

The ScoutLink Operators Manual. For IRC Operators

The ScoutLink Operators Manual. For IRC Operators The ScoutLink Operators Manual For IRC Operators 1 Table of Contents 1 Table of Contents... 2 2 Introduction... 3 3 OPER... 4 4 #Services.log... 4 5 HELPSYS... 5 6 SAMODE... 5 6.1 Regular channel modes...

More information

Department of Engineering Science. Understanding FTP

Department of Engineering Science. Understanding FTP Understanding FTP A. Objectives 1. Practice with ftp servers and learn how o measure network throughput 2. Learn about basic Python Network Programing B. Time of Completion This laboratory activity is

More information

TREK HOSC PAYLOAD ETHERNET GATEWAY (HPEG) USER GUIDE

TREK HOSC PAYLOAD ETHERNET GATEWAY (HPEG) USER GUIDE TREK HOSC PAYLOAD ETHERNET GATEWAY (HPEG) USER GUIDE April 2016 Approved for Public Release; Distribution is Unlimited. TABLE OF CONTENTS PARAGRAPH PAGE 1 Welcome... 1 1.1 Getting Started... 1 1.2 System

More information

The Konversation Handbook. Gary R. Cramblitt

The Konversation Handbook. Gary R. Cramblitt Gary R. Cramblitt 2 Contents 1 Introduction 6 2 Using Konversation 7 2.1 If you haven t used IRC before................................ 7 2.2 Setting your identity.................................... 9

More information

shodan-python Documentation

shodan-python Documentation shodan-python Documentation Release 1.0 achillean June 24, 2016 Contents 1 Introduction 3 1.1 Getting Started.............................................. 3 2 Examples 5 2.1 Basic Shodan Search...........................................

More information

The HoneyNet Project Scan Of The Month Scan 27

The HoneyNet Project Scan Of The Month Scan 27 The HoneyNet Project Scan Of The Month Scan 27 23 rd April 2003 Shomiron Das Gupta shomiron@lycos.co.uk 1.0 Scope This month's challenge is a Windows challenge suitable for both beginning and intermediate

More information

Wireless Communication With Arduino

Wireless Communication With Arduino Wireless Communication With Arduino Using the RN-XV to communicate over WiFi Seth Hardy shardy@asymptotic.ca Last Updated: Nov 2012 Overview Radio: Roving Networks RN-XV XBee replacement : fits in the

More information

Ulogd2, Advanced firewall logging

Ulogd2, Advanced firewall logging Ulogd2, Advanced firewall logging INL 172 rue de Charonne 75011 Paris, France RMLL 2009, July 8, Nantes Ulogd2, Netfilter logging reloaded 1/ 38 Some words about me NuFW main developper INL co-founder

More information

FireEye App for Splunk Enterprise

FireEye App for Splunk Enterprise FireEye App for Splunk Enterprise FireEye App for Splunk Enterprise Documentation Version 1.1 Table of Contents Welcome 3 Supported FireEye Event Formats 3 Original Build Environment 3 Possible Dashboard

More information

IP Power Stone 4000 User Manual

IP Power Stone 4000 User Manual IP Power Stone 4000 User Manual Two Outlet Remote AC Power Controller Multi Link, Inc. 122 Dewey Drive Nicholasville, KY 40356 USA Sales and Tech Support 800.535.4651 FAX 859.885.6619 techsupport@multi

More information

PIX/ASA 7.x with Syslog Configuration Example

PIX/ASA 7.x with Syslog Configuration Example PIX/ASA 7.x with Syslog Configuration Example Document ID: 63884 Introduction Prerequisites Requirements Components Used Conventions Basic Syslog Configure Basic Syslog using ASDM Send Syslog Messages

More information

15-441: Computer Networks Project 1: Internet Relay Chat (IRC) Server

15-441: Computer Networks Project 1: Internet Relay Chat (IRC) Server 15-441: Computer Networks Project 1: Internet Relay Chat (IRC) Server Lead TA: Daegun Won Assigned: January 21, 2010 Checkpoint 1 due: January 26, 2010 Checkpoint 2 due: February

More information

CLC Server Command Line Tools USER MANUAL

CLC Server Command Line Tools USER MANUAL CLC Server Command Line Tools USER MANUAL Manual for CLC Server Command Line Tools 2.5 Windows, Mac OS X and Linux September 4, 2015 This software is for research purposes only. QIAGEN Aarhus A/S Silkeborgvej

More information

+ iptables. packet filtering && firewall

+ iptables. packet filtering && firewall + iptables packet filtering && firewall + what is iptables? iptables is the userspace command line program used to configure the linux packet filtering ruleset + a.k.a. firewall + iptable flow chart what?

More information

COMP 112 Assignment 1: HTTP Servers

COMP 112 Assignment 1: HTTP Servers COMP 112 Assignment 1: HTTP Servers Lead TA: Jim Mao Based on an assignment from Alva Couch Tufts University Due 11:59 PM September 24, 2015 Introduction In this assignment, you will write a web server

More information

GSM. Quectel Cellular Engine. HTTP Service AT Commands GSM_HTTP_ATC_V1.2

GSM. Quectel Cellular Engine. HTTP Service AT Commands GSM_HTTP_ATC_V1.2 GSM Cellular Engine HTTP Service AT Commands GSM_HTTP_ATC_V1.2 Document Title HTTP Service AT Commands Version 1.2 Date 2015-04-13 Status Document Control ID Release GSM_HTTP_ATC_V1.2 General Notes offers

More information

Fachgebiet Technische Informatik, Joachim Zumbrägel

Fachgebiet Technische Informatik, Joachim Zumbrägel Computer Network Lab 2015 Fachgebiet Technische Informatik, Joachim Zumbrägel Overview Internet Internet Protocols Fundamentals about HTTP Communication HTTP-Server, mode of operation Static/Dynamic Webpages

More information

Communicating with a Barco projector over network. Technical note

Communicating with a Barco projector over network. Technical note Communicating with a Barco projector over network Technical note MED20080612/00 12/06/2008 Barco nv Media & Entertainment Division Noordlaan 5, B-8520 Kuurne Phone: +32 56.36.89.70 Fax: +32 56.36.883.86

More information

Lecture 29: Bots and Botnets. Lecture Notes on Computer and Network Security. by Avi Kak (kak@purdue.edu)

Lecture 29: Bots and Botnets. Lecture Notes on Computer and Network Security. by Avi Kak (kak@purdue.edu) Lecture 29: Bots and Botnets Lecture Notes on Computer and Network Security by Avi Kak (kak@purdue.edu) April 22, 2015 1:28pm c 2015 Avinash Kak, Purdue University Goals: Bots and bot masters Command and

More information

Configuring CSS Remote Access Methods

Configuring CSS Remote Access Methods CHAPTER 11 Configuring CSS Remote Access Methods This chapter describes how to configure the Secure Shell Daemon (SSH), Remote Authentication Dial-In User Service (RADIUS), and the Terminal Access Controller

More information

Cross-platform TCP/IP Socket Programming in REXX

Cross-platform TCP/IP Socket Programming in REXX Cross-platform TCP/IP Socket programming in REXX Abstract: TCP/IP is the key modern network technology, and the various REXX implementations have useful, if incompatible interfaces to it. In this session,

More information

Table of Contents. Configuring IP Access Lists

Table of Contents. Configuring IP Access Lists Table of Contents...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...2 Understanding ACL Concepts...2 Using Masks...2 Summarizing ACLs...3 Processing ACLs...4 Defining Ports and Message

More information

PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example

PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example Document ID: 77869 Contents Introduction Prerequisites Requirements Components Used Related Products

More information

Mission 1: The Bot Hunter

Mission 1: The Bot Hunter Mission 1: The Bot Hunter Mission: Interpol have asked the BSidesLondon Unhackable Mission Force to penetrate and shut down a notorious botnet. Our only clue is a recovered bot executable which we hope

More information

TFTP Usage and Design. Diskless Workstation Booting 1. TFTP Usage and Design (cont.) CSCE 515: Computer Network Programming ------ TFTP + Errors

TFTP Usage and Design. Diskless Workstation Booting 1. TFTP Usage and Design (cont.) CSCE 515: Computer Network Programming ------ TFTP + Errors CSCE 515: Computer Network Programming ------ TFTP + Errors Wenyuan Xu Department of Computer Science and Engineering University of South Carolina TFTP Usage and Design RFC 783, 1350 Transfer files between

More information

Internet-bridge XPort

Internet-bridge XPort Ing. Z.Královský Ing. Petr Štol Perk 457 Okrajová 1356 675 22 STA 674 01 T EBÍ Development & production of control equipment Tel.: 568 870982 Tel.: 568 848179 Visualization, measurement and regulation

More information

Sybase Advantage Database Server 11: A First Look

Sybase Advantage Database Server 11: A First Look white paper Sybase Advantage Database Server 11: A First Look by Cary Jensen www.sybase.com Table of Contents 1 Advantage Web Platform 3 Online Maintenance 5 SQL Enhancements 11 Connection Enhancements

More information

Monitoring the Firewall Services Module

Monitoring the Firewall Services Module 24 CHAPTER This chapter describes how to configure logging and SNMP for the FWSM. It also describes the contents of system log messages and the system log message format. This chapter does not provide

More information

Service for checking whether an email is operative or not. Validate email ids in your databases.

Service for checking whether an email is operative or not. Validate email ids in your databases. MailStatus API Service for checking whether an email is operative or not. Validate email ids in your databases. Overview Lleida.net MailStatus API allows you to consult the validity of an email address.

More information

ProxyCap Help. Table of contents. Configuring ProxyCap. 2015 Proxy Labs

ProxyCap Help. Table of contents. Configuring ProxyCap. 2015 Proxy Labs ProxyCap Help 2015 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and

More information

File Transfer Protocol (FTP) & SSH

File Transfer Protocol (FTP) & SSH http://xkcd.com/949/ File Transfer Protocol (FTP) & SSH Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Some materials copyright 1996-2012 Addison-Wesley J.F Kurose and K.W.

More information

smtp-user-enum User Documentation

smtp-user-enum User Documentation smtp-user-enum User Documentation pentestmonkey@pentestmonkey.net 21 January 2007 Contents 1 Overview 2 2 Installation 2 3 Usage 3 4 Some Examples 3 4.1 Using the SMTP VRFY Command................. 4 4.2

More information

Python. Network. Marcin Młotkowski. 24th April, 2013

Python. Network. Marcin Młotkowski. 24th April, 2013 Network 24th April, 2013 1 Transport layer 2 3 4 Network layers HTTP, POP3, SMTP, FTP Transport layer TCP, UDP Internet User Datagram Protocol (UDP) Features of UDP Very easy Unreliable: no acknowledgment,

More information

Quectel Cellular Engine

Quectel Cellular Engine Cellular Engine HTTP Service AT Commands GSM_HTTP_ATC_V1.00 Document Title HTTP Service AT Commands Version 1.00 Date 2009-07-06 Status Document Control ID Release GSM_HTTP_ATC_V1.00 General Notes offers

More information

Tutorial. Reference http://www.openflowswitch.org/foswiki/bin/view/openflow/mininetgettingstarted for more thorough Mininet walkthrough if desired

Tutorial. Reference http://www.openflowswitch.org/foswiki/bin/view/openflow/mininetgettingstarted for more thorough Mininet walkthrough if desired Setup Tutorial Reference http://www.openflowswitch.org/foswiki/bin/view/openflow/mininetgettingstarted for more thorough Mininet walkthrough if desired Necessary Downloads 1. Download VM at http://www.cs.princeton.edu/courses/archive/fall10/cos561/assignments/cos561tutorial.zip

More information

We will learn the Python programming language. Why? Because it is easy to learn and many people write programs in Python so we can share.

We will learn the Python programming language. Why? Because it is easy to learn and many people write programs in Python so we can share. LING115 Lecture Note Session #4 Python (1) 1. Introduction As we have seen in previous sessions, we can use Linux shell commands to do simple text processing. We now know, for example, how to count words.

More information

Green Telnet. Making the Client/Server Model Green

Green Telnet. Making the Client/Server Model Green Green Telnet Reducing energy consumption is of growing importance. Jeremy and Ken create a "green telnet" that lets clients transition to a low-power, sleep state. By Jeremy Blackburn and Ken Christensen,

More information

NAME smtp zmailer SMTP client transport agent

NAME smtp zmailer SMTP client transport agent NAME smtp zmailer SMTP client transport agent SYNOPSIS smtp [ 1678deEHMrPsVxXW ] [ A /path/to/smtp-auth-secrets.txt ] [ c channel] [ h heloname] [ l logfile] [ O options] [ p remote-port] [ T timeouts]

More information

Shellshock. Oz Elisyan & Maxim Zavodchik

Shellshock. Oz Elisyan & Maxim Zavodchik Shellshock By Oz Elisyan & Maxim Zavodchik INTRODUCTION Once a high profile vulnerability is released to the public, there will be a lot of people who will use the opportunity to take advantage on vulnerable

More information

MXSAVE XMLRPC Web Service Guide. Last Revision: 6/14/2012

MXSAVE XMLRPC Web Service Guide. Last Revision: 6/14/2012 MXSAVE XMLRPC Web Service Guide Last Revision: 6/14/2012 Table of Contents Introduction! 4 Web Service Minimum Requirements! 4 Developer Support! 5 Submitting Transactions! 6 Clients! 7 Adding Clients!

More information

Automating Operations on z/vm and Linux on System z

Automating Operations on z/vm and Linux on System z Automating Operations on z/vm and Linux on System z Operations Manager for z/vm Tracy Dean, IBM tld1@us.ibm.com April 2009 Operations Manager for z/vm Increase productivity Authorized users view and interact

More information

VoxStack GSM Gateway API. Version: 1.0.0. Author: Joe.Yung

VoxStack GSM Gateway API. Version: 1.0.0. Author: Joe.Yung VoxStack GSM Gateway API Version: 1.0.0 Author: Joe.Yung Change Notes Date Versions Description Author 2013.2.6 1.0.0 GSM Gateway Joe.Yung SMS API 1. Configuring AMI in VoxStack GSM Gateway. 1.1 How to

More information

1. Stem. Configuration and Use of Stem

1. Stem. Configuration and Use of Stem Configuration and Use of Stem 1. Stem 2. Why use Stem? 3. What is Stem? 4. Stem Architecture 5. Stem Hubs 6. Stem Messages 7. Stem Addresses 8. Message Types and Fields 9. Message Delivery 10. Stem::Portal

More information

The exam has 110 possible points, 10 of which are extra credit. There is a Word Bank on Page 8. Pages 7-8 can be removed from the exam.

The exam has 110 possible points, 10 of which are extra credit. There is a Word Bank on Page 8. Pages 7-8 can be removed from the exam. CS326e Spring 2014 Midterm Exam Name SOLUTIONS UTEID The exam has 110 possible points, 10 of which are extra credit. There is a Word Bank on Page 8. Pages 7-8 can be removed from the exam. 1. [4 Points]

More information

Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach

Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach Chapter 2 Application Layer Lecture 5 FTP, Mail Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter 2: outline 2.1 principles

More information

Linux Networking: IP Packet Filter Firewalling

Linux Networking: IP Packet Filter Firewalling Linux Networking: IP Packet Filter Firewalling David Morgan Firewall types Packet filter Proxy server 1 Linux Netfilter Firewalling Packet filter, not proxy Centerpiece command: iptables Starting point:

More information

LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013

LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013 LOCKSS on LINUX CentOS6 Installation Manual 08/22/2013 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 6 BIOS Settings... 9 Installation... 10 Firewall Configuration...

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Hands-on MESH Network Exercise Workbook

Hands-on MESH Network Exercise Workbook Hands-on MESH Network Exercise Workbook Santa Clara County RACES Date: 18 March 2015 Version: 1.0 scco_wifi_intro_exonly_v150318.docx 1 Table of Contents HANDS ON! Exercise #1: Looking at your Network

More information

ERNW Newsletter 51 / September 2015

ERNW Newsletter 51 / September 2015 ERNW Newsletter 51 / September 2015 Playing With Fire: Attacking the FireEye MPS Date: 9/10/2015 Classification: Author(s): Public Felix Wilhelm TABLE OF CONTENT 1 MALWARE PROTECTION SYSTEM... 4 2 GAINING

More information

Quick Connect. Overview. Client Instructions. LabTech

Quick Connect. Overview. Client Instructions. LabTech LabTech Quick Connect QUICK CONNECT 1 Overview... 1 Client Instructions... 1 Technician Instructions... 4 VNC... 5 RDP... 6 RAssist (Remote Assistance)... 8 IE (Internet Explorer browser)... 9 CMD... 10

More information

GSM. Quectel Cellular Engine. GSM TCPIP Application Notes GSM_TCPIP_AN_V1.1

GSM. Quectel Cellular Engine. GSM TCPIP Application Notes GSM_TCPIP_AN_V1.1 GSM Cellular Engine GSM TCPIP Application Notes GSM_TCPIP_AN_V1.1 Document Title GSM TCPIP Application Notes Version 1.1 Date 2011-09-22 Status Document Control ID Release GSM_TCPIP_AN_V1.1 General Notes

More information

RMCS Installation Guide

RMCS Installation Guide RESTRICTED RIGHTS Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (C)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS

More information

LR Product Documentation Documentation

LR Product Documentation Documentation LR Product Documentation Documentation Release 2.5 The LR Team February 10, 2015 Contents 1 Getting Started Guide 1 1.1 Overview................................................. 1 1.2 About the Examples...........................................

More information

TCP/UDP # General Name Short Description

TCP/UDP # General Name Short Description This appendix is designed to provide general information about service ports that are discovered on IP networks. Outlined are ports 1-80, along with many other common higher ports and specific ports found

More information

ADB (Android Debug Bridge): How it works?

ADB (Android Debug Bridge): How it works? ADB (Android Debug Bridge): How it works? 2012.2.6 early draft Tetsuyuki Kobayashi 1 Let's talk about inside of Android. http://www.kmckk.co.jp/eng/kzma9/ http://www.kmckk.co.jp/eng/jet_index.html 2 Who

More information

Lab 5: HTTP Web Proxy Server

Lab 5: HTTP Web Proxy Server Lab 5: HTTP Web Proxy Server In this lab, you will learn how web proxy servers work and one of their basic functionalities caching. Your task is to develop a small web proxy server which is able to cache

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

Biznet GIO Cloud Connecting VM via Windows Remote Desktop Biznet GIO Cloud Connecting VM via Windows Remote Desktop Introduction Connecting to your newly created Windows Virtual Machine (VM) via the Windows Remote Desktop client is easy but you will need to make

More information

How To Monitor Cisco Secure Pix Firewall Using Ipsec And Snmp Through A Pix Tunnel

How To Monitor Cisco Secure Pix Firewall Using Ipsec And Snmp Through A Pix Tunnel itoring Cisco Secure PIX Firewall Using SNMP and Syslog Thro Table of Contents Monitoring Cisco Secure PIX Firewall Using SNMP and Syslog Through VPN Tunnel...1 Introduction...1 Before You Begin...1 Conventions...1

More information

Configuring Health Monitoring

Configuring Health Monitoring CHAPTER4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features that are described in this chapter apply to both IPv6 and IPv4 unless

More information

Evaluation of standard monitoring tools(including log analysis) for control systems at Cern

Evaluation of standard monitoring tools(including log analysis) for control systems at Cern Evaluation of standard monitoring tools(including log analysis) for control systems at Cern August 2013 Author: Vlad Vintila Supervisor(s): Fernando Varela Rodriguez CERN openlab Summer Student Report

More information

Tunnels and Redirectors

Tunnels and Redirectors Tunnels and Redirectors TUNNELS AND REDIRECTORS...1 Overview... 1 Security Details... 2 Permissions... 2 Starting a Tunnel... 3 Starting a Redirector... 5 HTTP Connect... 8 HTTPS Connect... 10 LabVNC...

More information

Introduction to Computer Networks

Introduction to Computer Networks Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,

More information

Introduction to CloudScript

Introduction to CloudScript Introduction to CloudScript A NephoScale Whitepaper Authors: Nick Peterson, Alan Meadows Date: 2012-07-06 CloudScript is a build language for the cloud. It is a simple Domain Specific Language (DSL) that

More information

MAX T1/E1. Quick Start Guide. VoIP Gateway. Version 1.0

MAX T1/E1. Quick Start Guide. VoIP Gateway. Version 1.0 MAX T1/E1 TM VoIP Gateway Quick Start Guide Version 1.0 Contents INTRODUCTION 1 Hardware Needed Software Needed 1 1 NET2PHONE MAX SET UP Hardware Set Up Software Set Up Set Up Internet Protocol (IP) Address

More information

Application Monitoring using SNMPc 7.0

Application Monitoring using SNMPc 7.0 Application Monitoring using SNMPc 7.0 SNMPc can be used to monitor the status of an application by polling its TCP application port. Up to 16 application ports can be defined per icon. You can also configure

More information

There are many different ways in which we can connect to a remote machine over the Internet. These include (but are not limited to):

There are many different ways in which we can connect to a remote machine over the Internet. These include (but are not limited to): Remote Connection Protocols There are many different ways in which we can connect to a remote machine over the Internet. These include (but are not limited to): - telnet (typically to connect to a machine

More information

LabVIEW Internet Toolkit User Guide

LabVIEW Internet Toolkit User Guide LabVIEW Internet Toolkit User Guide Version 6.0 Contents The LabVIEW Internet Toolkit provides you with the ability to incorporate Internet capabilities into VIs. You can use LabVIEW to work with XML documents,

More information

Beginners Shell Scripting for Batch Jobs

Beginners Shell Scripting for Batch Jobs Beginners Shell Scripting for Batch Jobs Evan Bollig and Geoffrey Womeldorff Before we begin... Everyone please visit this page for example scripts and grab a crib sheet from the front http://www.scs.fsu.edu/~bollig/techseries

More information

Network Technologies

Network Technologies Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:

More information

Ping Device Driver Help. 2009 Schneider Electric

Ping Device Driver Help. 2009 Schneider Electric 2009 Schneider Electric 1 Table of Contents 1 Getting Started... 2 Help Contents... 2 Overview... 2 2 Device Setup... 2 Device Setup... 2 3 Automatic Tag... Database Generation 2 Automatic Tag... Database

More information

Configuring Timeout, Retransmission, and Key Values Per RADIUS Server

Configuring Timeout, Retransmission, and Key Values Per RADIUS Server Configuring Timeout, Retransmission, and Key Values Per RADIUS Server Feature Summary The radius-server host command functions have been extended to include timeout, retransmission, and encryption key

More information

LifeSize UVC Access Deployment Guide

LifeSize UVC Access Deployment Guide LifeSize UVC Access Deployment Guide November 2013 LifeSize UVC Access Deployment Guide 2 LifeSize UVC Access LifeSize UVC Access is a standalone H.323 gatekeeper that provides services such as address

More information

GregSowell.com. Mikrotik Security

GregSowell.com. Mikrotik Security Mikrotik Security IP -> Services Disable unused services Set Available From for appropriate hosts Secure protocols are preferred (Winbox/SSH) IP -> Neighbors Disable Discovery Interfaces where not necessary.

More information

Mini-Challenge 3. Data Descriptions for Week 1

Mini-Challenge 3. Data Descriptions for Week 1 Data Sources Mini-Challenge 3 Data Descriptions for Week 1 The data under investigation spans a two week period. This document describes the data available for week 1. A supplementary document describes

More information

OPS535 Advanced Network Administration. SMTP Lab SIMPLE MAIL TRANSFER PROTOCOL

OPS535 Advanced Network Administration. SMTP Lab SIMPLE MAIL TRANSFER PROTOCOL SMTP Lab Reference: RFC821 Simple Mail Transfer Protocol SIMPLE MAIL TRANSFER PROTOCOL 1. INTRODUCTION The objective of Simple Mail Transfer Protocol (SMTP) is to transfer mail reliably and efficiently.

More information

High speed networks and distributed systems Oxford Brookes MSc dissertation. IRC distributed bot lending platform: The Loufiz project

High speed networks and distributed systems Oxford Brookes MSc dissertation. IRC distributed bot lending platform: The Loufiz project High speed networks and distributed systems Oxford Brookes MSc dissertation Subject: IRC distributed bot lending platform The Loufiz project Dissertation Supervisor: Faye Mitchell Field code: DSD Module

More information

Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop

Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop 14/01/05 file:/data/hervey/docs/pre-sanog/web/ha/security/apache-ssl-exercises.html #1 Exercises Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop 1. Install Apache with SSL support 2. Configure

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

Building a Basic Communication Network using XBee DigiMesh. Keywords: XBee, Networking, Zigbee, Digimesh, Mesh, Python, Smart Home

Building a Basic Communication Network using XBee DigiMesh. Keywords: XBee, Networking, Zigbee, Digimesh, Mesh, Python, Smart Home Building a Basic Communication Network using XBee DigiMesh Jennifer Byford April 5, 2013 Keywords: XBee, Networking, Zigbee, Digimesh, Mesh, Python, Smart Home Abstract: Using Digi International s in-house

More information

Seminar Computer Security

Seminar Computer Security Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example

More information

Manual. Programmer's Guide for Java API

Manual. Programmer's Guide for Java API 2013-02-01 1 (15) Programmer's Guide for Java API Description This document describes how to develop Content Gateway services with Java API. TS1209243890 1.0 Company information TeliaSonera Finland Oyj

More information