monaco/i-0af537ac173596991
by SadServersMore by SadServers
admin@i-0453bb76f89d6d1e6:~$ curl localhost:5000 Unauthorizedadmin@i-0453bb76f89d6d1e6:~$ admin@i-0453bb76f89d6d1e6:~$ sudo curl localhost:5000 We trust you have received the usual lecture from the local System Administrator. It usually boils down to these three things: #1) Respect the privacy of others. #2) Think before you type. #3) With great power comes great responsibility. [sudo] password for admin: sudo: a password is required admin@i-0453bb76f89d6d1e6:~$ ^C admin@i-0453bb76f89d6d1e6:~$ nestat | grep
paris/i-0453bb76f89d6d1e6 01:18
by SadServersadmin@i-076cd0a7cd775af64:~$ sudo lvcreate -L%100 newdata Size requires number argument. Invalid argument for --size: %100 Error during parsing of command line. admin@i-076cd0a7cd775af64:~$ sudo lvcreate -L%100 newdataadmin@i-076cd0a7cd775afFREE -n newfile newdata Invalid argument for --extents: %100FREE Error during parsing of command line. admin@i-076cd0a7cd775af64:~$ vgs WARNING: Running as a non-root user. Functionality may be unavailable. /run/lock/lvm/P_global:aux: open failed: Permission denied admin@i-076cd0a7cd775af64:~$ sudo vgs VG #PV #LV #SN Attr VSize VFree newdata 2 0 0 wz--n- 1.99g 1.99g admin@i-076cd0a7cd775af64:~$ sudo lvcreate -l %100FREE -n newfilnewdata
kihei/i-076cd0a7cd775af64 07:34
by SadServersInitiating NSE at 08:45 Completed NSE at 08:45, 0.00s elapsed Initiating NSE at 08:45 Completed NSE at 08:45, 0.00s elapsed Initiating NSE at 08:45 Completed NSE at 08:45, 0.00s elapsed Read data files from: /usr/bin/../share/nmap Service detection performed. Please report any incorrect results at https://nmapNmap done: 1 IP address (1 host up) scanned in 93.30 seconds admin@i-0ba1c51e7ab08bced:~$ ssh 127.0.0.1 The authenticity of host '127.0.0.1 (127.0.0.1)' can't be established. ECDSA key fingerprint is SHA256:6XrpAR1ar1mTiXH63KOPbtmz/mM8JZwIV0calpHjM5I. Are you sure you want to continue connecting (yes/no/[fingerprint])? Host key verification failed. admin@i-0ba1c51e7ab08bced:~$ ssh 127.0.0.1
paris/i-0ba1c51e7ab08bced 02:06
by SadServersConnection to host.example.com 25 port [tcp/smtp] succeeded! The port range was specified to limit the search to ports 20 - 30, and is s der (unless the -r flag is set). You can also specify a list of ports to scan, for example: $ nc -zv host.example.com http 20 22-23 nc: connect to host.example.com 80 (tcp) failed: Connection refused nc: connect to host.example.com 20 (tcp) failed: Connection refused Connection to host.example.com port [tcp/ssh] succeeded! nc: connect to host.example.com 23 (tcp) failed: Connection refused The ports are scanned by the order you given (unless the -r flag is set). Manual page nc(1) line 219/313 84% (press h for help or q to quit)