kihei/i-0ad6fda12be055173
by SadServersMore by SadServers
> Host: 127.0.0.1:5000 > Authorization: Basic YWRtaW46YWRtaW4= > User-Agent: curl/7.74.0 > Accept: */* > * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Server: Werkzeug/2.3.7 Python/3.9.2 < Date: Wed, 27 Dec 2023 10:00:47 GMT < Content-Type: text/html; charset=utf-8 < Content-Length: 12 < Connection: close < * Closing connection 0 Unauthorizedadmin@i-0be5e4664c35e2594:~$ curl -u 'test:test' 127.0.0.1:5000 -v
paris/i-0be5e4664c35e2594 02:51
by SadServersdrwx------ 3 admin admin 4.0K Sep 17 17:15 .ansible -rw-r--r-- 1 admin admin 220 Aug 4 2021 .bash_logout -rw-r--r-- 1 admin admin 3.5K Aug 4 2021 .bashrc drwxr-xr-x 3 admin admin 4.0K Mar 4 19:09 .config -rw-r--r-- 1 admin admin 807 Aug 4 2021 .profile drwx------ 2 admin admin 4.0K Sep 17 16:44 .ssh drwxr-xr-x 2 admin root 4.0K Sep 17 17:28 agent drwxr-xr-x 2 admin root 4.0K Mar 4 19:19 data -rw-r--r-- 1 admin admin 763K Sep 17 17:28 datafile.xz -rwxr-xr-x 1 admin root 2.2M Sep 17 17:28 kihei admin@i-0d1a37bdfe942aeab:~$ cp datafile.xz data admin@i-0d1a37bdfe942aeab:~$ cd data/ admin@i-0d1a37bdfe942aeab:~/data$ unxz datafile.xz admin@i-0d1a37bdfe942aeab:~/data$ mv datafile newdatafile admin@i-0d1a37bdfe942aeab:~/data$ cd .
kihei/i-0d1a37bdfe942aeab 08:35
by SadServers-rwxrwx--- 1 root root 360 Sep 24 23:20 webserver.py admin@i-093333d0150041494:~$ cd .. admin@i-093333d0150041494:/home$ find / -perm -4000 -type f 2>/dev/null /usr/lib/openssh/ssh-keysign /usr/lib/dbus-1.0/dbus-daemon-launch-helper /usr/bin/chsh /usr/bin/umount /usr/bin/mount /usr/bin/passwd /usr/bin/newgrp /usr/bin/sudo /usr/bin/chfn /usr/bin/su /usr/bin/gpasswd admin@i-093333d0150041494:/home$
paris/i-093333d0150041494 03:18
by SadServersMISC: -6: Enable IPv6 scanning -A: Enable OS detection, version detection, script scanning, and traceroute --datadir <dirname>: Specify custom Nmap data file location --send-eth/--send-ip: Send using raw ethernet frames or IP packets --privileged: Assume that the user is fully privileged --unprivileged: Assume the user lacks raw socket privileges -V: Print version number -h: Print this help summary page. EXAMPLES: nmap -v -A scanme.nmap.org nmap -v -sn 192.168.0.0/16 10.0.0.0/8 nmap -v -iR 10000 -Pn -p 80 SEE THE MAN PAGE (https://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES admin@i-0ae0f2e45a0830612:~$ nmap