summaryrefslogtreecommitdiff
path: root/data/pmap-dump.d
blob: bc6b63277dfd821ed81dc01e4e92e6ac454ae4c3 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
# portmap dump request: like "rpcinfo -p" but via UDP instead
# send to UDP 111 and hope it's not a logging portmapper!
# split into longwords, since rpc apparently only deals with them

001 # 0x01 # .	# XID: 4 trash bytes
002 # 0x02 # .
003 # 0x03 # .
004 # 0x04 # .

000 # 0x00 # .	# MSG: int 0=call, 1=reply
000 # 0x00 # .
000 # 0x00 # .
000 # 0x00 # .

000 # 0x00 # .	# pmap call body: rpc version=2
000 # 0x00 # .
000 # 0x00 # .
002 # 0x02 # .

000 # 0x00 # .	# pmap call body: prog=PMAP, 100000
001 # 0x01 # .
134 # 0x86 # .
160 # 0xa0 # .

000 # 0x00 # .	# pmap call body: progversion=2
000 # 0x00 # .
000 # 0x00 # .
002 # 0x02 # .

000 # 0x00 # .	# pmap call body: proc=DUMP, 4
000 # 0x00 # .
000 # 0x00 # .
004 # 0x04 # .

# with AUTH_NONE, there are 4 zero integers [16 bytes] here

000 # 0x00 # .	# auth junk: cb_cred: auth_unix = 1; NONE = 0
000 # 0x00 # .
000 # 0x00 # .
000 # 0x00 # .

000 # 0x00 # .	# auth junk
000 # 0x00 # .
000 # 0x00 # .
000 # 0x00 # .

000 # 0x00 # .	# auth junk
000 # 0x00 # .
000 # 0x00 # .
000 # 0x00 # .

000 # 0x00 # .	# auth junk
000 # 0x00 # .
000 # 0x00 # .
000 # 0x00 # .

# The reply you get back contains your XID, int 1 if "accepted", and
# a whole mess of gobbledygook containing program numbers, versions,
# and ports that rpcinfo knows how to decode.  For the moment, you get
# to wade through it yourself...