home *** CD-ROM | disk | FTP | other *** search
- # portmap request for mountd [or whatever; see where prog=MOUNT]
- # send to UDP 111 and hope it's not a logging portmapper!
- # split into longwords, since rpc apparently only deals with them
-
- 001 # 0x01 # . # XID: 4 trash bytes
- 002 # 0x02 # .
- 003 # 0x03 # .
- 004 # 0x04 # .
-
- 000 # 0x00 # . # MSG: int 0=call, 1=reply
- 000 # 0x00 # .
- 000 # 0x00 # .
- 000 # 0x00 # .
-
- 000 # 0x00 # . # pmap call body: rpc version=2
- 000 # 0x00 # .
- 000 # 0x00 # .
- 002 # 0x02 # .
-
- 000 # 0x00 # . # pmap call body: prog=PMAP, 100000
- 001 # 0x01 # .
- 134 # 0x86 # .
- 160 # 0xa0 # .
-
- 000 # 0x00 # . # pmap call body: progversion=2
- 000 # 0x00 # .
- 000 # 0x00 # .
- 002 # 0x02 # .
-
- 000 # 0x00 # . # pmap call body: proc=GETPORT, 3
- 000 # 0x00 # .
- 000 # 0x00 # .
- 003 # 0x03 # .
-
- # with AUTH_NONE, there are 4 zero integers [16 bytes] here
-
- 000 # 0x00 # . # auth junk: cb_cred: auth_unix = 1; NONE = 0
- 000 # 0x00 # .
- 000 # 0x00 # .
- 000 # 0x00 # .
-
- 000 # 0x00 # . # auth junk
- 000 # 0x00 # .
- 000 # 0x00 # .
- 000 # 0x00 # .
-
- 000 # 0x00 # . # auth junk
- 000 # 0x00 # .
- 000 # 0x00 # .
- 000 # 0x00 # .
-
- 000 # 0x00 # . # auth junk
- 000 # 0x00 # .
- 000 # 0x00 # .
- 000 # 0x00 # .
-
- 000 # 0x00 # . # prog=MOUNT, 100005
- 001 # 0x01 # .
- 134 # 0x86 # .
- 165 # 0xa5 # .
-
- 000 # 0x00 # . # progversion=1
- 000 # 0x00 # .
- 000 # 0x00 # .
- 001 # 0x01 # .
-
- 000 # 0x00 # . # protocol=udp, 17
- 000 # 0x00 # .
- 000 # 0x00 # .
- 017 # 0x11 # .
-
- 000 # 0x00 # . # proc num = junk
- 000 # 0x00 # .
- 000 # 0x00 # .
- 000 # 0x00 # .
-
- # The reply you get back contains your XID, int 1 if "accepted", and
- # mountd's port number at the end or 0 if not registered.
-