⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 pmap-mnt.d

📁 very comprehensive example, windows WDM driver development ex The use of drive technology can s
💻 D
字号:
# portmap request for mountd [or whatever; see where prog=MOUNT]# send to UDP 111 and hope it's not a logging portmapper!# split into longwords, since rpc apparently only deals with them001 # 0x01 # .	# XID: 4 trash bytes002 # 0x02 # .003 # 0x03 # .004 # 0x04 # .000 # 0x00 # .	# MSG: int 0=call, 1=reply000 # 0x00 # .000 # 0x00 # .000 # 0x00 # .000 # 0x00 # .	# pmap call body: rpc version=2000 # 0x00 # .000 # 0x00 # .002 # 0x02 # .000 # 0x00 # .	# pmap call body: prog=PMAP, 100000001 # 0x01 # .134 # 0x86 # .160 # 0xa0 # .000 # 0x00 # .	# pmap call body: progversion=2000 # 0x00 # .000 # 0x00 # .002 # 0x02 # .000 # 0x00 # .	# pmap call body: proc=GETPORT, 3000 # 0x00 # .000 # 0x00 # .003 # 0x03 # .# with AUTH_NONE, there are 4 zero integers [16 bytes] here000 # 0x00 # .	# auth junk: cb_cred: auth_unix = 1; NONE = 0000 # 0x00 # .000 # 0x00 # .000 # 0x00 # .000 # 0x00 # .	# auth junk000 # 0x00 # .000 # 0x00 # .000 # 0x00 # .000 # 0x00 # .	# auth junk000 # 0x00 # .000 # 0x00 # .000 # 0x00 # .000 # 0x00 # .	# auth junk000 # 0x00 # .000 # 0x00 # .000 # 0x00 # .000 # 0x00 # .	# prog=MOUNT, 100005001 # 0x01 # .134 # 0x86 # .165 # 0xa5 # .000 # 0x00 # .	# progversion=1000 # 0x00 # .000 # 0x00 # .001 # 0x01 # .000 # 0x00 # .	# protocol=udp, 17000 # 0x00 # .000 # 0x00 # .017 # 0x11 # .000 # 0x00 # .	# proc num = junk000 # 0x00 # .000 # 0x00 # .000 # 0x00 # .# The reply you get back contains your XID, int 1 if "accepted", and# mountd's port number at the end or 0 if not registered.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -