CasperSecurity

Current Path : /etc/dhcp/dhclient-exit-hooks.d/
Upload File :
Current File : //etc/dhcp/dhclient-exit-hooks.d/debug

#
# The purpose of this script is just to show the variables that are
# available to all the scripts in this directory. All these scripts are
# called from dhclient-script, which exports all the variables shown
# before. If you want to debug a problem with your DHCP setup you can
# enable this script and take a look at /tmp/dhclient-script.debug.

# To enable this script set the following variable to "yes"
RUN="no"

if [ "$RUN" = "yes" ]; then
	echo "$(date): entering ${1%/*}, dumping variables." \
		>> /tmp/dhclient-script.debug

	# loop over the 4 possible prefixes: (empty), cur_, new_, old_
	for prefix in '' 'cur_' 'new_' 'old_'; do
		# loop over the DHCP variables passed to dhclient-script
		for basevar in reason interface medium alias_ip_address \
			       ip_address host_name network_number subnet_mask \
			       broadcast_address routers static_routes \
			       rfc3442_classless_static_routes \
			       domain_name domain_search domain_name_servers \
			       netbios_name_servers netbios_scope \
			       ntp_servers \
			       ip6_address ip6_prefix ip6_prefixlen \
			       dhcp6_domain_search dhcp6_name_servers ; do
			var="${prefix}${basevar}"
			eval "content=\$$var"

			# show only variables with values set
			if [ -n "${content}" ]; then
				echo "$var='${content}'" >> /tmp/dhclient-script.debug
			fi
		done
	done

	echo '--------------------------' >> /tmp/dhclient-script.debug
fi
Hacker Blog, Shell İndir, Sql İnjection, XSS Attacks, LFI Attacks, Social Hacking, Exploit Bot, Proxy Tools, Web Shell, PHP Shell, Alfa Shell İndir, Hacking Training Set, DDoS Script, Denial Of Service, Botnet, RFI Attacks, Encryption
Telegram @BIBIL_0DAY