[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@3.133.131.180: ~ $
#!/bin/sh

IFNAME=$1
CMD=$2

kill_daemon() {
    NAME=$1
    PF=$2

    if [ ! -r $PF ]; then
	return
    fi

    PID=`cat $PF`
    if [ $PID -gt 0 ]; then
	if ps $PID | grep -q $NAME; then
	    kill $PID
	fi
    fi
    rm $PF
}

if [ "$CMD" = "P2P-GROUP-STARTED" ]; then
    GIFNAME=$3
    if [ "$4" = "GO" ]; then
	kill_daemon dhclient /var/run/dhclient-$GIFNAME.pid
	rm /var/run/dhclient.leases-$GIFNAME
	kill_daemon dnsmasq /var/run/dnsmasq.pid-$GIFNAME
	ifconfig $GIFNAME 192.168.42.1 up
	if ! dnsmasq -x /var/run/dnsmasq.pid-$GIFNAME \
	    -i $GIFNAME \
	    -F192.168.42.11,192.168.42.99; then
	    # another dnsmasq instance may be running and blocking us; try to
	    # start with -z to avoid that
	    dnsmasq -x /var/run/dnsmasq.pid-$GIFNAME \
		-i $GIFNAME \
		-F192.168.42.11,192.168.42.99 --listen-address 192.168.42.1 -z -p 0
	fi
    fi
    if [ "$4" = "client" ]; then
	kill_daemon dhclient /var/run/dhclient-$GIFNAME.pid
	rm /var/run/dhclient.leases-$GIFNAME
	kill_daemon dnsmasq /var/run/dnsmasq.pid-$GIFNAME
	ipaddr=`echo "$*" | sed 's/.* ip_addr=\([^ ]*\).*/\1/'`
	ipmask=`echo "$*" | sed 's/.* ip_mask=\([^ ]*\).*/\1/'`
	goipaddr=`echo "$*" | sed 's/.* go_ip_addr=\([^ ]*\).*/\1/'`
	if echo "$ipaddr$ipmask$goipaddr" | grep -q ' '; then
	    ipaddr=""
	    ipmask=""
	    goipaddr=""
	fi
	if [ -n "$ipaddr" ]; then
	    sudo ifconfig $GIFNAME "$ipaddr" netmask "$ipmask"
	    sudo ip ro re default via "$goipaddr"
	    exit 0
	fi
	dhclient -pf /var/run/dhclient-$GIFNAME.pid \
	    -lf /var/run/dhclient.leases-$GIFNAME \
	    -nw \
	    $GIFNAME
    fi
fi

if [ "$CMD" = "P2P-GROUP-REMOVED" ]; then
    GIFNAME=$3
    if [ "$4" = "GO" ]; then
	kill_daemon dnsmasq /var/run/dnsmasq.pid-$GIFNAME
	ifconfig $GIFNAME 0.0.0.0
    fi
    if [ "$4" = "client" ]; then
	kill_daemon dhclient /var/run/dhclient-$GIFNAME.pid
	rm /var/run/dhclient.leases-$GIFNAME
	ifconfig $GIFNAME 0.0.0.0
    fi
fi

if [ "$CMD" = "P2P-CROSS-CONNECT-ENABLE" ]; then
    GIFNAME=$3
    UPLINK=$4
    # enable NAT/masquarade $GIFNAME -> $UPLINK
    iptables -P FORWARD DROP
    iptables -t nat -A POSTROUTING -o $UPLINK -j MASQUERADE
    iptables -A FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
    iptables -A FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
    sysctl net.ipv4.ip_forward=1
fi

if [ "$CMD" = "P2P-CROSS-CONNECT-DISABLE" ]; then
    GIFNAME=$3
    UPLINK=$4
    # disable NAT/masquarade $GIFNAME -> $UPLINK
    sysctl net.ipv4.ip_forward=0
    iptables -t nat -D POSTROUTING -o $UPLINK -j MASQUERADE
    iptables -D FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
    iptables -D FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
fi

Filemanager

Name Type Size Permission Actions
p2p Folder 0755
60_wpa_supplicant File 267 B 0755
dbus-listen-preq.py File 1.53 KB 0644
ieee8021x.conf File 269 B 0644
openCryptoki.conf File 1.12 KB 0644
p2p-action-udhcp.sh File 1.68 KB 0755
p2p-action.sh File 2.63 KB 0755
p2p-nfc.py File 19.73 KB 0644
plaintext.conf File 133 B 0644
udhcpd-p2p.conf File 2.86 KB 0644
wep.conf File 170 B 0644
wpa-psk-tkip.conf File 181 B 0644
wpa2-eap-ccmp.conf File 284 B 0644
wpas-dbus-new-getall.py File 1.7 KB 0644
wpas-dbus-new-signals.py File 5.93 KB 0644
wpas-dbus-new-wps.py File 2.17 KB 0644
wpas-dbus-new.py File 4.17 KB 0644
wpas-test.py File 2.51 KB 0644
wps-ap-cli File 1.15 KB 0755
wps-nfc.py File 15.31 KB 0644