Accept fingerprint automaticaly secureCRT

 
Thread Tools Search this Thread
Special Forums Windows & DOS: Issues & Discussions Accept fingerprint automaticaly secureCRT
# 1  
Old 05-11-2010
Accept fingerprint automaticaly secureCRT

Hello,

Is it any way to accept automaticaly the fingerprints?
The basic idea is to find a way to give a command to many servers at once.


So i thought to create a multiple session with all the connections opened them in multiple tabs and give the command at once to all the opened windows via chat window.
I saw an option /ACCEPTHOSTKEYS but i don't know how to use it.
I tried to run it via cmd SecureCrt.exe /ACCEPTHOSTKEYS but i just managed to run the program

Another way i saw in a closed thread here is to create a script and include /ACCEPTHOSTKEYS is the code.But when i try to run a sample script named "ConnectTomultipleSessionsAndSendCommands" needs a sessionList.txt file that does not exist.
I created the file but i don't know what i have to include so that i connect to all sessions(with saved username/password) and execute the commands to all sessions

Regards
Login or Register to Ask a Question

Previous Thread | Next Thread

7 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Automaticaly create function based off user input

I am trying to create a bash script that will create new function by using the user input. The below will create the necessary files in the correct format, however when it comes to the # create function I am at a loss. If the name entered was NEWNAME and the genes were GENE1,GENE2 then two files... (0 Replies)
Discussion started by: cmccabe
0 Replies

2. Shell Programming and Scripting

How can i su automaticaly in same server with different username and same password?

Hi I am new to shell scripting, Can you please help me in writing a script that can switch user in same server with different user name and same password. I want to perform some functional task in a particular user and need to switch user and perform same activity in another user and so on ... ... (4 Replies)
Discussion started by: Dew
4 Replies

3. UNIX for Advanced & Expert Users

Can I disable the copy and paste of putty/secureCRT?

I'm a teacher who teaching computer programming languages. Generally, I give each student a username in a Linux Server. Then each student use his username to login the Server and program their programming task by putty or secureCRT and so on. But one fact had bothered me for a long... (9 Replies)
Discussion started by: cqlouis
9 Replies

4. Shell Programming and Scripting

tomcat automaticaly stop in menu script

i have a problem with the code I created (see below). a. when I logged in as root and su to tomcat, i can execute all options. when I press X, it will exit properly. b. when I logged in directly as user1, I can execute also all options. if I press X i will logout automatically to putty.... (2 Replies)
Discussion started by: lhareigh890
2 Replies

5. AIX

SecureCRT problem

When I use SecureCRT software to connect with AIX servers, don't know why sessions always be kicked out from the SecureCRT if I don't do anything in a few minutes. I think this maybe the SecureCRT configuraiton problem, Who knows how to keep session conect even through I don't do anything? ... (3 Replies)
Discussion started by: rainbow_bean
3 Replies

6. Shell Programming and Scripting

Script for exporting FS into non global server automaticaly.

Post has been removed. Prakash K :) (0 Replies)
Discussion started by: bullz26
0 Replies

7. Solaris

ssh and fingerprint

hello any way to avoid the fingerprint authenticity step when I ssh the first time to a server by always setting a 'yes' as a default answer? thanks (10 Replies)
Discussion started by: melanie_pfefer
10 Replies
Login or Register to Ask a Question
PF.OS(5)						      BSD File Formats Manual							  PF.OS(5)

NAME
pf.os -- format of the operating system fingerprints file DESCRIPTION
The pf(4) firewall and the tcpdump(1) program can both fingerprint the operating system of hosts that originate an IPv4 TCP connection. The file consists of newline-separated records, one per fingerprint, containing nine colon (':') separated fields. These fields are as follows: window The TCP window size. TTL The IP time to live. df The presence of the IPv4 don't fragment bit. packet size The size of the initial TCP packet. TCP options An ordered list of the TCP options. class The class of operating system. version The version of the operating system. subtype The subtype of patchlevel of the operating system. description The overall textual description of the operating system, version and subtype. The window field corresponds to the th->th_win field in the TCP header and is the source host's advertised TCP window size. It may be between zero and 65,535 inclusive. The window size may be given as a multiple of a constant by prepending the size with a percent sign '%' and the value will be used as a modulus. Three special values may be used for the window size: * An asterisk will wildcard the value so any window size will match. S Allow any window size which is a multiple of the maximum segment size (MSS). T Allow any window size which is a multiple of the maximum transmission unit (MTU). The ttl value is the initial time to live in the IP header. The fingerprint code will account for the volatility of the packet's TTL as it traverses a network. The df bit corresponds to the Don't Fragment bit in an IPv4 header. It tells intermediate routers not to fragment the packet and is used for path MTU discovery. It may be either a zero or a one. The packet size is the literal size of the full IP packet and is a function of all of the IP and TCP options. The TCP options field is an ordered list of the individual TCP options that appear in the SYN packet. Each option is described by a single character separated by a comma and certain ones may include a value. The options are: Mnnn maximum segment size (MSS) option. The value is the maximum packet size of the network link which may include the '%' modulus or match all MSSes with the '*' value. N the NOP option (NO Operation). T[0] the timestamp option. Certain operating systems always start with a zero timestamp in which case a zero value is added to the option; otherwise no value is appended. S the Selective ACKnowledgement OK (SACKOK) option. Wnnn window scaling option. The value is the size of the window scaling which may include the '%' modulus or match all window scalings with the '*' value. No TCP options in the fingerprint may be given with a single dot '.'. An example of OpenBSD's TCP options are: M*,N,N,S,N,W0,N,N,T The first option M* is the MSS option and will match all values. The second and third options N will match two NOPs. The fourth option S will match the SACKOK option. The fifth N will match another NOP. The sixth W0 will match a window scaling option with a zero scaling size. The seventh and eighth N options will match two NOPs. And the ninth and final option T will match the timestamp option with any time value. The TCP options in a fingerprint will only match packets with the exact same TCP options in the same order. The class field is the class, genre or vendor of the operating system. The version is the version of the operating system. It is used to distinguish between different fingerprints of operating systems of the same class but different versions. The subtype is the subtype or patch level of the operating system version. It is used to distinguish between different fingerprints of oper- ating systems of the same class and same version but slightly different patches or tweaking. The description is a general description of the operating system, its version, patchlevel and any further useful details. EXAMPLES
The fingerprint of a plain OpenBSD 3.3 host is: 16384:64:1:64:M*,N,N,S,N,W0,N,N,T:OpenBSD:3.3::OpenBSD 3.3 The fingerprint of an OpenBSD 3.3 host behind a PF scrubbing firewall with a no-df rule would be: 16384:64:0:64:M*,N,N,S,N,W0,N,N,T:OpenBSD:3.3:!df:OpenBSD 3.3 scrub no-df An absolutely braindead embedded operating system fingerprint could be: 65535:255:0:40:.:DUMMY:1.1:p3:Dummy embedded OS v1.1p3 The tcpdump(1) output of # tcpdump -s128 -c1 -nv 'tcp[13] == 2' 03:13:48.118526 10.0.0.1.3377 > 10.0.0.2.80: S [tcp sum ok] 534596083:534596083(0) win 57344 <mss 1460> (DF) [tos 0x10] (ttl 64, id 11315, len 44) almost translates into the following fingerprint 57344:64:1:44:M1460: exampleOS:1.0::exampleOS 1.0 SEE ALSO
tcpdump(1), pf(4), pf.conf(5), pfctl(8) BSD
May 31, 2007 BSD