forked from OSchip/llvm-project
				
			
		
			
				
	
	
		
			39 lines
		
	
	
		
			957 B
		
	
	
	
		
			Python
		
	
	
		
			Executable File
		
	
	
			
		
		
	
	
			39 lines
		
	
	
		
			957 B
		
	
	
	
		
			Python
		
	
	
		
			Executable File
		
	
	
#!/usr/bin/env python
 | 
						|
 | 
						|
"""This is a very simple client for the backdoor daemon. This is intended more
 | 
						|
for testing rather than normal use. See bd_serv.py """
 | 
						|
 | 
						|
import socket
 | 
						|
import sys, time, select
 | 
						|
 | 
						|
def recv_wrapper(s):
 | 
						|
    r,w,e = select.select([s.fileno()],[],[], 2)
 | 
						|
    if not r:
 | 
						|
        return ''
 | 
						|
    #cols = int(s.recv(4))
 | 
						|
    #rows = int(s.recv(4))
 | 
						|
    cols = 80
 | 
						|
    rows = 24
 | 
						|
    packet_size = cols * rows * 2 # double it for good measure
 | 
						|
    return s.recv(packet_size)
 | 
						|
 | 
						|
#HOST = '' #'localhost'    # The remote host
 | 
						|
#PORT = 1664 # The same port as used by the server
 | 
						|
s = socket.socket(socket.AF_UNIX, socket.SOCK_STREAM)
 | 
						|
s.connect(sys.argv[1])#(HOST, PORT))
 | 
						|
time.sleep(1)
 | 
						|
#s.setblocking(0)
 | 
						|
#s.send('COMMAND' + '\x01' + sys.argv[1])
 | 
						|
s.send(':sendline ' + sys.argv[2])
 | 
						|
print recv_wrapper(s)
 | 
						|
s.close()
 | 
						|
sys.exit()
 | 
						|
#while True:
 | 
						|
#    data = recv_wrapper(s)
 | 
						|
#    if data == '':
 | 
						|
#        break
 | 
						|
#    sys.stdout.write (data)
 | 
						|
#    sys.stdout.flush()
 | 
						|
#s.close()
 | 
						|
 |