command-line-murders/i-0b62efeb411c11c44
by SadServersMore by SadServers
admin@i-0d5aa000864525c9c:/home$ sudo qwe We trust you have received the usual lecture from the local System Administrator. It usually boils down to these three things: #1) Respect the privacy of others. #2) Think before you type. #3) With great power comes great responsibility. [sudo] password for admin: ^Csudo: 1 incorrect password attempt admin@i-0d5aa000864525c9c:/home$ ^C admin@i-0d5aa000864525c9c:/home$ ^C admin@i-0d5aa000864525c9c:/home$
paris/i-0d5aa000864525c9c 06:00
by SadServerswrite(2, ":", 1:) = 1 write(2, "64", 264) = 2 write(2, " +", 2 +) = 2 write(2, "0x47d", 50x47d) = 5 write(2, "\n", 1 ) = 1 exit_group(2) = ? +++ exited with 2 +++ admin@i-0383999b6e9ab8158:~$ ls agent data datafile kihei admin@i-0383999b6e9ab8158:~$ ls datafile datafile admin@i-0383999b6e9ab8158:~$ ls /usr/local/sbin/fallocate ls: cannot access '/usr/local/sbin/fallocate': No such file or directory admin@i-0383999b6e9ab8158:~$ whereis fallo
kihei/i-0383999b6e9ab8158 01:37
by SadServerschmod: changing permissions of './webserver.py': Operation not permitted admin@i-0fe5db61e982e9777:~$ chmod -R 755 . chmod: changing permissions of './webserver.py': Operation not permitted admin@i-0fe5db61e982e9777:~$ grep -ri 'password' | /etc/apache2/* bash: /etc/apache2/conf-available: Is a directory grep: agent/sadagent: binary file matches grep: webserver.py: Permission denied admin@i-0fe5db61e982e9777:~$ grep -ri 'password' | /etc/apache2/conf-available bash: /etc/apache2/conf-available: Is a directory grep: agent/sadagent: binary file matches grep: webserver.py: Permission denied grep: write error: Broken pipe admin@i-0fe5db61e982e9777:~$ admin@i-0fe5db61e982e9777:~$ grep -ri 'password' /etc/apache2/conf-available admin@i-0fe5db61e982e9777:~$