|
System | : | Linux MiraNet 3.0.0-14-generic-pae #23-Ubuntu SMP Mon Nov 21 22:07:10 UTC 2011 i686 |
Software | : | Apache. PHP/5.3.6-13ubuntu3.10 |
ID | : | uid=65534(nobody) gid=65534(nogroup) groups=65534(nogroup)
|
|
Safe Mode | : | OFF |
Open_Basedir | : | OFF |
Freespace | : | 27.14 GB of 70.42 GB (38.55%) |
|
MySQL: ON MSSQL: OFF Oracle: OFF PostgreSQL: OFF Curl: OFF Sockets: ON Fetch: OFF Wget: ON Perl: ON |
Disabled Functions: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,
|
[ System Info ]
[ Processes ]
[ SQL Manager ]
[ Eval ]
[ Encoder ]
[ Mailer ]
[ Back Connection ]
[ Backdoor Server ]
[ Kernel Exploit Search ]
[ MD5 Decrypter ]
[ Reverse IP ]
[ Kill Shell ]
[ FTP Brute-Force ]
|
|
/
usr/
share/
doc/
freeradius/
examples/
- drwxr-xr-x
|
Viewing file: create-users.pl (1.74 KB) -rwxr-xr-xSelect action/file-type:  ( +) |  ( +) |  ( +) | Code ( +) | Session ( +) |  ( +) | SDB ( +) |  ( +) |  ( +) |  ( +) |  ( +) |  ( +) |
#!/usr/bin/perl
# Purpose: create lots of random users and passes # for testing your radius server # Read doc/README.testing for more information
$passfile = "./passwd"; $shadfile = "./shadow"; $radfile = "./radius.test"; $nocrypt = "./passwd.nocrypt"; $users = "./radius.users";
if($ARGV[0] eq "") { print "\n\tUsage: $0 <number of users>\n\n"; exit(1); } else { $numusers = $ARGV[0]; } $userlen = 6; $passlen = 6;
open(PASS, ">$passfile") || die "Can't open $passfile"; open(SHAD, ">$shadfile") || die "Can't open $shadfile"; open(RAD, ">$radfile") || die "Can't open $radfile"; open(NOCRYPT, ">$nocrypt") || die "Can't open $nocrypt"; open(USERS, ">$users") || die "Can't open $users";
for ($num=0; $num<$numusers; $num++) { # generate username $username = ""; for($i=0; $i<rand($userlen)+2; $i++) { do { ($char = chr((rand 25)+97))} until $char=~/[A-Za-z]/; $username .= $char; } # Make sure they're unique if(($userlist{$username}) || (getpwnam($username))) { $num--; next; } $userlist{$username} = 1;
# generate password $password = ""; for($i=0; $i<rand($passlen)+2; $i++) { do { ($char = chr((rand 25)+97))} until $char=~/[A-Za-z]/; $password .= $char; }
if (length($num)%2==1) { $num="0".$num; } printf PASS "$username:%s:1001:1001:Name:/dev/null:/dev/null\n", crypt($password, $password); printf SHAD "$username:%s:1000:0:99999:7:::\n", crypt($password, $password); printf RAD "User-Name=$username, User-Password=$password,NAS-IP-Address=127.0.0.1,NAS-Port-Id=0\n\n"; print NOCRYPT "$username:$password\n"; print USERS "$username Cleartext-Password := \"$password\"\n\tClass=\"0x$num\"\n\n"; }
close(PASS); close(SHAD); close(RAD); close(NOCRYPT); close(USERS); print "\nCreated $numusers random users and passwords\n\n";
|