kihei/i-0a4d53e26d778df49
by SadServersMore by SadServers
20 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/1 22 root 20 0 0 0 0 I 0.0 0.0 0:00.01 kworker/u 23 root 20 0 0 0 0 S 0.0 0.0 0:00.00 kdevtmpfs 24 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 netns 25 root 20 0 0 0 0 S 0.0 0.0 0:00.10 kauditd 26 root 20 0 0 0 0 S 0.0 0.0 0:00.00 khungtask 27 root 20 0 0 0 0 S 0.0 0.0 0:00.00 oom_reape 28 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 writeback 29 root 20 0 0 0 0 S 0.0 0.0 0:00.00 kcompactd 30 root 25 5 0 0 0 S 0.0 0.0 0:00.00 ksmd 49 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 kintegrit 50 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 kblockd 51 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 blkcg_pun 52 root 20 0 0 0 0 I 0.0 0.0 0:00.02 kworker/1 53 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/0
kihei/i-09b73cab23a993476 01:15
by SadServers# Define the range of ports you want to test (from PORT_START to PORT_END) PORT_START=1 PORT_END=65535 # Define the target host (localhost in this case) TARGET_HOST="localhost" # Loop through the range of ports and run curl with a 1-second timeout for ((port = PORT_START; port <= PORT_END; port++)); do "$TARGET_HOST:$port" &>/dev/null if [ $? -eq 0 ]; then echo "Port $port is open" fi done
taipei/i-05ea7b30c835c60a9 03:55
by SadServersFilesystem Size Used Avail Use% Mounted on udev 217M 0 217M 0% /dev tmpfs 46M 368K 46M 1% /run /dev/nvme0n1p1 7.7G 6.1G 1.2G 84% / tmpfs 228M 12K 228M 1% /dev/shm tmpfs 5.0M 0 5.0M 0% /run/lock /dev/nvme0n1p15 124M 5.9M 118M 5% /boot/efi admin@i-020a8bfbc440cf1e3:~$ lvdisplay WARNING: Running as a non-root user. Functionality may be unavailable. /run/lock/lvm/P_global:aux: open failed: Permission denied admin@i-020a8bfbc440cf1e3:~$ sudo su root@i-020a8bfbc440cf1e3:/home/admin# lvdisplay root@i-020a8bfbc440cf1e3:/home/admin# vgdisplay root@i-020a8bfbc440cf1e3:/home/admin# pvdisplay root@i-020a8bfbc440cf1e3:/home/admin#
kihei/i-020a8bfbc440cf1e3 00:41
by SadServersadmin@i-005816389398da366:~$ md5sum ~/mysolution md5sum: /home/admin/mysolution: No such file or directory admin@i-005816389398da366:~$ sudo cat /etc/passwd We trust you have received the usual lecture from the local System Administrator. It usually boils down to these three things: #1) Respect the privacy of others. #2) Think before you type. #3) With great power comes great responsibility. [sudo] password for admin: