-f --force When enabling unit files, override existing symlinks When shutting down, execute action immediately --preset-mode= Apply only enable, only disable, or all presets --root=PATH Enable/disable/mask unit files in the specified root directory -n --lines=INTEGER Number of journal entries to show -o --output=STRING Change journal output mode (short, short-precise, short-iso, short-iso-precise, short-full, short-monotonic, short-unix, verbose, export, json, json-pretty, json-sse, cat) --firmware-setup Tell the firmware to show the setup menu on next boot --boot-loader-menu=TIME Boot into boot loader menu on next boot --boot-loader-entry=NAME admin@i-0503741ac0962d518:~$ systemctl --help | grep port if supported, otherwise restart import-environment [VARIABLE...] Import all or some environment variables Currently supported by verbs: halt, poweroff, reboot, verbose, export, json, json-pretty, json-sse, cat) admin@i-0503741ac0962d518:~$ cd /home/admin admin@i-0503741ac0962d518:~$ ls agent webserver.py admin@i-0503741ac0962d518:~$ ps aux | grep python root 576 0.2 5.9 33040 27928 ? Ss 20:25 0:00 /usr/bin/python3 /home/admin/webserver.py root 605 0.0 3.7 26612 17464 ? Ss 20:25 0:00 /usr/bin/python3 /usr/share/unattended-upgrades/unattended-upgrade-shutdown --wait-for-signal admin 689 0.2 4.1 98188 19440 pts/0 S<l+ 20:26 0:00 /usr/bin/python3 /usr/bin/asciinema rec -t paris/i-0503741ac0962d518 -q -i 2 /var/log/cast/i-0503741ac0962d518 admin 692 0.0 3.1 24456 14800 pts/0 S<+ 20:26 0:00 /usr/bin/python3 /usr/bin/asciinema rec -t paris/i-0503741ac0962d518 -q -i 2 /var/log/cast/i-0503741ac0962d518 root 815 11.6 17.0 89812 79612 ? S 20:27 0:07 /usr/bin/python3 /usr/bin/unattended-upgrade admin 869 0.0 0.1 5264 632 pts/1 S<+ 20:28 0:00 grep python admin@i-0503741ac0962d518:~$ cat webserver.py cat: webserver.py: Permission denied admin@i-0503741ac0962d518:~$ suod su bash: suod: command not found admin@i-0503741ac0962d518:~$ sudo su We trust you have received the usual lecture from the local System Administrator. It usually boils down to these three things: #1) Respect the privacy of others. #2) Think before you type. #3) With great power comes great responsibility. [sudo] password for admin: sudo: a password is required admin@i-0503741ac0962d518:~$ ls agent webserver.py admin@i-0503741ac0962d518:~$ ls -la total 44 drwxr-xr-x 6 admin admin 4096 Sep 24 2023 . drwxr-xr-x 3 root root 4096 Sep 17 2023 .. drwx------ 3 admin admin 4096 Sep 20 2023 .ansible -rw------- 1 admin admin 629 Mar 3 20:29 .bash_history -rw-r--r-- 1 admin admin 220 Aug 4 2021 .bash_logout -rw-r--r-- 1 admin admin 3526 Aug 4 2021 .bashrc drwxr-xr-x 3 admin admin 4096 Sep 20 2023 .config -rw-r--r-- 1 admin admin 807 Aug 4 2021 .profile drwx------ 2 admin admin 4096 Sep 17 2023 .ssh drwxr-xr-x 2 admin root 4096 Sep 24 2023 agent -rwxrwx--- 1 root root 360 Sep 24 2023 webserver.py admin@i-0503741ac0962d518:~$ ls /etc NetworkManager chrony dhcp gshadow kernel logrotate.d network protocols rpc ssh terminfo X11 cloud dpkg gshadow- kernel-img.conf machine-id networks python3 rsyslog.conf ssl timezone adduser.conf cloud-release e2scrub.conf gss ld.so.cache magic nsswitch.conf python3.9 rsyslog.d subgid tmpfiles.d alternatives cron.d environment host.conf ld.so.conf magic.mime opt rc0.d runit subgid- ucf.conf apache2 cron.daily ethertypes hostname ld.so.conf.d manpath.config os-release rc1.d sadscenario subuid udev apparmor cron.hourly fonts hosts ldap mime.types pam.conf rc2.d screenrc subuid- ufw apparmor.d cron.monthly fstab hosts.allow libaudit.conf mke2fs.conf pam.d rc3.d security sudo.conf update-motd.d apt cron.weekly fstab.old hosts.deny lighttpd modprobe.d passwd rc4.d selinux sudo_logsrvd.conf vim bash.bashrc crontab gai.conf init.d locale.alias modules passwd- rc5.d services sudoers wgetrc bash_completion dbus-1 gdb initramfs-tools locale.gen modules-load.d perl rc6.d sgml sudoers.d xattr.conf bindresvport.blacklist debconf.conf groff inputrc localtime motd pm rcS.d shadow sv xdg binfmt.d debian_version group iproute2 logcheck mtab ppp reportbug.conf shadow- sysctl.conf xml ca-certificates default group- issue login.defs nanorc profile resolv.conf shells sysctl.d ca-certificates.conf deluser.conf grub.d issue.net logrotate.conf netconfig profile.d rmt skel systemd admin@i-0503741ac0962d518:~$ ls /etc/python3 python3/ python3.9/ admin@i-0503741ac0962d518:~$ ls /etc/python3/debian_config .ansible/ .bash_history .bash_logout .bashrc .config/ .profile .ssh/ agent/ webserver.py admin@i-0503741ac0962d518:~$ ls /etc/python3/debian_config
paris/i-0503741ac0962d518
by SadServersMore by SadServers
], "external_id": "c00ef46d-fcde-48e2-afbd-0fb595fe3fa7", Error: writing output failed: Broken pipe admin@i-04996b45a09309e76:~$ jq "." station_information.json | less Error: writing output failed: Broken pipe admin@i-04996b45a09309e76:~$ jq "." station_information.json | \ egrep "station_id|has_kiosk|capacity" | \ less grep: write error: Broken pipe Error: writing output failed: Broken pipe admin@i-04996b45a09309e76:~$ jq "." station_information.json | less Error: writing output failed: Broken pipe admin@i-04996b45a09309e76:~$ jq "." station_information.json | egrep "station_ grep -B 1 -A 1 '"has_kiosk": "false"' | head admin@i-04996b45a09309e76:~$
unimak/i-04996b45a09309e76 01:57
by SadServersroot@i-00cd16d1d6b62ecaf:~# vgcreate data /dev/nvme1n1 /dev/nvme2n1 Volume group "data" successfully created root@i-00cd16d1d6b62ecaf:~# vgs VG #PV #LV #SN Attr VSize VFree data 2 0 0 wz--n- 1.99g 1.99g root@i-00cd16d1d6b62ecaf:~# df -h Filesystem Size Used Avail Use% Mounted on udev 217M 0 217M 0% /dev tmpfs 46M 384K 46M 1% /run /dev/nvme0n1p1 7.7G 6.1G 1.2G 84% / tmpfs 228M 24K 228M 1% /dev/shm tmpfs 5.0M 0 5.0M 0% /run/lock /dev/nvme0n1p15 124M 5.9M 118M 5% /boot/efi tmpfs 46M 0 46M 0% /run/user/0 root@i-00cd16d1d6b62ecaf:~# ko