command-line-murders/i-0b71b15f924b1422a
by SadServersMore by SadServers
> Host: 127.0.0.1:5000 > Authorization: Basic YWRtaW46YWRtaW4= > User-Agent: curl/7.74.0 > Accept: */* > * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Server: Werkzeug/2.3.7 Python/3.9.2 < Date: Wed, 27 Dec 2023 10:00:47 GMT < Content-Type: text/html; charset=utf-8 < Content-Length: 12 < Connection: close < * Closing connection 0 Unauthorizedadmin@i-0be5e4664c35e2594:~$ curl -u 'test:test' 127.0.0.1:5000 -v
paris/i-0be5e4664c35e2594 02:51
by SadServersHTTP request sent, awaiting response... 200 OK Length: 12 [text/html] Saving to: ‘index.html’ index.html 0%[ ] index.html 100%[=============================================================================================>] 1 2024-11-19 13:52:42 (1.72 MB/s) - ‘index.html’ saved [12/12] admin@i-000f3b7345baf2e3d:~$ ls agent index.html webserver.py admin@i-000f3b7345baf2e3d:~$ vim
paris/i-000f3b7345baf2e3d 01:49
by SadServersConnection to host.example.com 25 port [tcp/smtp] succeeded! The port range was specified to limit the search to ports 20 - 30, and is s der (unless the -r flag is set). You can also specify a list of ports to scan, for example: $ nc -zv host.example.com http 20 22-23 nc: connect to host.example.com 80 (tcp) failed: Connection refused nc: connect to host.example.com 20 (tcp) failed: Connection refused Connection to host.example.com port [tcp/ssh] succeeded! nc: connect to host.example.com 23 (tcp) failed: Connection refused The ports are scanned by the order you given (unless the -r flag is set). Manual page nc(1) line 219/313 84% (press h for help or q to quit)