Example Zlipper Zero RAW IR file:
Filetype: IR signals file
Version: 1
#
name: RAW_155
type: raw
frequency: 38000
duty_cycle: 0.330000
data: 3975 4024 485 1997 484 1996 485 ...
| # This goes in ~/.bashrc or similar | |
| function ms2nmap() { | |
| cat $1 | grep open | cut -d " " -f 4 | cut -d "/" -f 1 | tr "\n" "," | head -c -1 | |
| } | |
| # Redirect or tee masscan output to a file. Then use 'ms2nmap ./filename' to convert it into a port list that nmap will take with -p | |
| # You can directly pass it to nmap like this: nmap 1.2.3.4 -p$(ms2nmap file.txt) |
Example Zlipper Zero RAW IR file:
Filetype: IR signals file
Version: 1
#
name: RAW_155
type: raw
frequency: 38000
duty_cycle: 0.330000
data: 3975 4024 485 1997 484 1996 485 ...
Only two IPs in the packet capture, and we are told what our victim IP is, so...
Attacker (LP) IP = 172.25.169.92
I hereby claim:
To claim this, I am signing this object: