paris/i-032b14b686448662d
by SadServersMore by SadServers
drwxr-xr-x 23 root root 680 Feb 13 18:17 run drwx------ 5 root root 4.0K Feb 13 18:24 root admin@i-05b98f7b26e35f62f:/$ cd admin@i-05b98f7b26e35f62f:~$ ls -Strlh total 5.1G -rw-r--r-- 1 root root 5.0G Sep 17 17:28 datafile -rwxr-xr-x 1 admin root 2.2M Sep 17 17:28 kihei drwxr-xr-x 2 admin root 4.0K Sep 17 17:28 agent drwxr-xr-x 2 admin root 4.0K Feb 13 18:24 data admin@i-05b98f7b26e35f62f:~$ cd data/ admin@i-05b98f7b26e35f62f:~/data$ ls admin@i-05b98f7b26e35f62f:~/data$ cd . admin@i-05b98f7b26e35f62f:~/data$ cd .. admin@i-05b98f7b26e35f62f:~$ mv datafile data admin@i-05b98f7b26e35f62f:~$ ./kihei
kihei/i-05b98f7b26e35f62f 07:19
by SadServersadmin@i-0b117fa6b5ba9fe7f:~$ curl localhost:5000 Unauthorizedadmin@i-0b117fa6b5ba9fe7f:~$ netstat -ano | grep 5000 tcp 0 0 127.0.0.1:5000 0.0.0.0:* LISTEN tcp 0 0 127.0.0.1:58914 127.0.0.1:5000 TIME_WAIT admin@i-0b117fa6b5ba9fe7f:~$ curl localhost:58914 curl: (7) Failed to connect to localhost port 58914: Connection refused admin@i-0b117fa6b5ba9fe7f:~$ netstat -ano | grep 5000 tcp 0 0 127.0.0.1:5000 0.0.0.0:* LISTEN tcp 0 0 127.0.0.1:58914 127.0.0.1:5000 TIME_WAIT admin@i-0b117fa6b5ba9fe7f:~$ ls agent webserver.py admin@i-0b117fa6b5ba9fe7f:~$ cat
paris/i-0b117fa6b5ba9fe7f 03:03
by SadServerstotal 1464856 drwxr-xr-x 2 admin root 4096 Dec 21 23:06 . drwxr-xr-x 7 admin admin 4096 Dec 21 23:05 .. -rw-r--r-- 1 admin admin 1500000000 Dec 21 23:06 newdatafile admin@i-05762ca9b49e71333:~/data$ ls -la total 1464856 drwxr-xr-x 2 admin root 4096 Dec 21 23:06 . drwxr-xr-x 7 admin admin 4096 Dec 21 23:05 .. -rw-r--r-- 1 admin admin 1500000000 Dec 21 23:06 newdatafile admin@i-05762ca9b49e71333:~/data$ ls -la total 1464856 drwxr-xr-x 2 admin root 4096 Dec 21 23:06 . drwxr-xr-x 7 admin admin 4096 Dec 21 23:05 .. -rw-r--r-- 1 admin admin 1500000000 Dec 21 23:06 newdatafile admin@i-05762ca9b49e71333:~/data$
kihei/i-05762ca9b49e71333 02:09
by SadServersMISC: -6: Enable IPv6 scanning -A: Enable OS detection, version detection, script scanning, and traceroute --datadir <dirname>: Specify custom Nmap data file location --send-eth/--send-ip: Send using raw ethernet frames or IP packets --privileged: Assume that the user is fully privileged --unprivileged: Assume the user lacks raw socket privileges -V: Print version number -h: Print this help summary page. EXAMPLES: nmap -v -A scanme.nmap.org nmap -v -sn 192.168.0.0/16 10.0.0.0/8 nmap -v -iR 10000 -Pn -p 80 SEE THE MAN PAGE (https://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES admin@i-04b40f92bf972f881:~$ nmaop