Accept fingerprint automaticaly secureCRT

 
Thread Tools Search this Thread
Special Forums Windows & DOS: Issues & Discussions Accept fingerprint automaticaly secureCRT
# 1  
Old 05-11-2010
Accept fingerprint automaticaly secureCRT

Hello,

Is it any way to accept automaticaly the fingerprints?
The basic idea is to find a way to give a command to many servers at once.


So i thought to create a multiple session with all the connections opened them in multiple tabs and give the command at once to all the opened windows via chat window.
I saw an option /ACCEPTHOSTKEYS but i don't know how to use it.
I tried to run it via cmd SecureCrt.exe /ACCEPTHOSTKEYS but i just managed to run the program

Another way i saw in a closed thread here is to create a script and include /ACCEPTHOSTKEYS is the code.But when i try to run a sample script named "ConnectTomultipleSessionsAndSendCommands" needs a sessionList.txt file that does not exist.
I created the file but i don't know what i have to include so that i connect to all sessions(with saved username/password) and execute the commands to all sessions

Regards
Login or Register to Ask a Question

Previous Thread | Next Thread

7 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Automaticaly create function based off user input

I am trying to create a bash script that will create new function by using the user input. The below will create the necessary files in the correct format, however when it comes to the # create function I am at a loss. If the name entered was NEWNAME and the genes were GENE1,GENE2 then two files... (0 Replies)
Discussion started by: cmccabe
0 Replies

2. Shell Programming and Scripting

How can i su automaticaly in same server with different username and same password?

Hi I am new to shell scripting, Can you please help me in writing a script that can switch user in same server with different user name and same password. I want to perform some functional task in a particular user and need to switch user and perform same activity in another user and so on ... ... (4 Replies)
Discussion started by: Dew
4 Replies

3. UNIX for Advanced & Expert Users

Can I disable the copy and paste of putty/secureCRT?

I'm a teacher who teaching computer programming languages. Generally, I give each student a username in a Linux Server. Then each student use his username to login the Server and program their programming task by putty or secureCRT and so on. But one fact had bothered me for a long... (9 Replies)
Discussion started by: cqlouis
9 Replies

4. Shell Programming and Scripting

tomcat automaticaly stop in menu script

i have a problem with the code I created (see below). a. when I logged in as root and su to tomcat, i can execute all options. when I press X, it will exit properly. b. when I logged in directly as user1, I can execute also all options. if I press X i will logout automatically to putty.... (2 Replies)
Discussion started by: lhareigh890
2 Replies

5. AIX

SecureCRT problem

When I use SecureCRT software to connect with AIX servers, don't know why sessions always be kicked out from the SecureCRT if I don't do anything in a few minutes. I think this maybe the SecureCRT configuraiton problem, Who knows how to keep session conect even through I don't do anything? ... (3 Replies)
Discussion started by: rainbow_bean
3 Replies

6. Shell Programming and Scripting

Script for exporting FS into non global server automaticaly.

Post has been removed. Prakash K :) (0 Replies)
Discussion started by: bullz26
0 Replies

7. Solaris

ssh and fingerprint

hello any way to avoid the fingerprint authenticity step when I ssh the first time to a server by always setting a 'yes' as a default answer? thanks (10 Replies)
Discussion started by: melanie_pfefer
10 Replies
Login or Register to Ask a Question
VERIEXECGEN(8)						    BSD System Manager's Manual 					    VERIEXECGEN(8)

NAME
veriexecgen -- generate fingerprints for Veriexec SYNOPSIS
veriexecgen [-AaDrSTvW] [-d dir] [-o fingerprintdb] [-p prefix] [-t algorithm] veriexecgen [-h] DESCRIPTION
veriexecgen can be used to create a fingerprint database for use with Veriexec. If no command line arguments were specified, veriexecgen will resort to default operation, implying -D -o /etc/signatures -t sha256. If the output file already exists, veriexecgen will save a backup copy in the same file only with a ``.old'' suffix. The following options are available: -A Append to the output file, don't overwrite it. -a Add fingerprints for non-executable files as well. -D Search system directories, /bin, /sbin, /usr/bin, /usr/sbin, /lib, /usr/lib, /libexec, and /usr/libexec. -d dir Scan for files in dir. Multiple uses of this flag can specify more than one directory. -h Display the help screen. -o fingerprintdb Save the generated fingerprint database to fingerprintdb. -p prefix When storing files in the fingerprint database, store the full pathnames of files with the leading ``prefix'' of the filenames removed. -r Scan recursively. -S Set the immutable flag on the created signatures file when done writing it. -T Put a timestamp on the generated file. -t algorithm Use algorithm for the fingerprints. Must be one of ``md5'', ``sha1'', ``sha256'', ``sha384'', ``sha512'', or ``rmd160''. -v Verbose mode. Print messages describing what operations are being done. -W By default, veriexecgen will exit when an error condition is encountered. This option will treat errors such as not being able to follow a symbolic link, not being able to find the real path for a directory entry, or not being able to calculate a hash of an entry as a warning, rather than an error. If errors are treated as warnings, veriexecgen will continue processing. The default behaviour is to treat errors as fatal. FILES
/etc/signatures EXAMPLES
Fingerprint files in the common system directories using the default hashing algorithm ``sha256'' and save to the default fingerprint data- base in /etc/signatures: # veriexecgen Fingerprint files in /etc, appending to the default fingerprint database: # veriexecgen -A -d /etc Fingerprint files in /path/to/somewhere using ``rmd160'' as the hashing algorithm, saving to /etc/somewhere.fp: # veriexecgen -d /path/to/somewhere -t rmd160 -o /etc/somewhere.fp SEE ALSO
veriexec(4), veriexec(5), security(7), veriexec(8), veriexecctl(8) BSD
February 18, 2008 BSD