command-line-murders/i-02f5b627acac176b7
by SadServersMore by SadServers
admin@i-0215c6153f5619eae:~$ ls -a .ansible/tmp/ . .. admin@i-0215c6153f5619eae:~$ ls -a agent/ . .. check.sh sadagent sadagent.txt admin@i-0215c6153f5619eae:~$ ls -a agent/sadagent agent/sadagent admin@i-0215c6153f5619eae:~$ ls -a agent/sadagent sadagent sadagent.txt admin@i-0215c6153f5619eae:~$ ls -a agent/sadagent sadagent sadagent.txt admin@i-0215c6153f5619eae:~$ less agent/check.sh admin@i-0215c6153f5619eae:~$ less agent/sadagent.txt admin@i-0215c6153f5619eae:~$ less agent/sadagent "agent/sadagent" may be a binary file. See it anyway? admin@i-0215c6153f5619eae:~$ sudo echo '
paris/i-0215c6153f5619eae 05:50
by SadServersWe trust you have received the usual lecture from the local System Administrator. It usually boils down to these three things: #1) Respect the privacy of others. #2) Think before you type. #3) With great power comes great responsibility. [sudo] password for admin: Sorry, try again. [sudo] password for admin: sudo: 1 incorrect password attempt admin@i-0b198c8d4f91ca85b:~$ ^C admin@i-0b198c8d4f91ca85b:~$ admin@i-0b198c8d4f91ca85b:~$
paris/i-0b198c8d4f91ca85b 02:07
by SadServers</body> </html> Connection closed by foreign host. admin@i-06cd2f2879efb2fb1:~$ nmap localhost Starting Nmap 7.80 ( https://nmap.org ) at 2024-02-28 12:40 UTC Nmap scan report for localhost (127.0.0.1) Host is up (0.00022s latency). Not shown: 997 closed ports PORT STATE SERVICE 22/tcp open ssh 5000/tcp open upnp 8080/tcp open http-proxy Nmap done: 1 IP address (1 host up) scanned in 0.09 seconds admin@i-06cd2f2879efb2fb1:~$ telnet localhost 5000