paris/i-0e43863c72b6409f1
by SadServersMore by SadServers
-r--r--r-- 1 root root 0 Jan 14 19:12 interrupts dr-xr-xr-x 5 root root 0 Jan 14 19:12 fs -r--r--r-- 1 root root 0 Jan 14 19:12 fb -r--r--r-- 1 root root 0 Jan 14 19:12 execdomains dr-xr-xr-x 3 root root 0 Jan 14 19:12 dynamic_debug dr-xr-xr-x 3 root root 0 Jan 14 19:12 driver -r--r--r-- 1 root root 0 Jan 14 19:12 diskstats -r--r--r-- 1 root root 0 Jan 14 19:12 crypto -r--r--r-- 1 root root 0 Jan 14 19:12 consoles dr-xr-xr-x 4 root root 0 Jan 14 19:12 bus -r--r--r-- 1 root root 0 Jan 14 19:12 buddyinfo dr-xr-xr-x 9 admin admin 0 Jan 14 19:12 845 admin@i-0ecf61c754f513041:/proc$ cat cmdline BOOT_IMAGE=/boot/vmlinuz-5.10.0-25-cloud-amd64 root=UUID=811e12d8-f542-4650-9330admin@i-0ecf61c754f513041:/proc$
paris/i-0ecf61c754f513041 03:27
by SadServersnmap -v -iR 10000 -Pn -p 80 SEE THE MAN PAGE (https://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES admin@i-0c4a9c08824633f19:~$ nmap -p- --min-rate=1000 -T4 localhost Starting Nmap 7.80 ( https://nmap.org ) at 2025-04-01 14:02 UTC Nmap scan report for localhost (127.0.0.1) Host is up (0.00019s latency). Not shown: 65531 closed ports PORT STATE SERVICE 22/tcp open ssh 5000/tcp open upnp 6767/tcp open bmc-perf-agent 8080/tcp open http-proxy Nmap done: 1 IP address (1 host up) scanned in 2.18 seconds admin@i-0c4a9c08824633f19:~$ nmap -p- --min-rate=1000 -T4
paris/i-0c4a9c08824633f19 00:59
by SadServersusage: sudo [-AbEHknPS] [-r role] [-t type] [-C num] [-D directory] [-g group] [ [<command>] usage: sudo -e [-AknS] [-r role] [-t type] [-C num] [-D directory] [-g group] [-admin@i-02474f300d2196640:~$ sudo su - We trust you have received the usual lecture from the local System Administrator. It usually boils down to these three things: #1) Respect the privacy of others. #2) Think before you type. #3) With great power comes great responsibility. [sudo] password for admin: sudo: a password is required admin@i-02474f300d2196640:~$ curl localh