command-line-murders/i-010d569bb4909b777
by SadServersMore by SadServers
./main.go:64 +0x47d admin@i-050d914f485befec2:~$ admin@i-050d914f485befec2:~$ admin@i-050d914f485befec2:~$ mv data/datafile ./ admin@i-050d914f485befec2:~$ ls agent data datafile kihei admin@i-050d914f485befec2:~$ admin@i-050d914f485befec2:~$ admin@i-050d914f485befec2:~$ ls -l total 5245048 drwxr-xr-x 2 admin root 4096 Sep 17 17:28 agent drwxr-xr-x 2 admin root 4096 Oct 27 10:34 data -rwxrwxrwx 1 root root 5368709120 Sep 17 17:28 datafile -rwxr-xr-x 1 admin root 2207109 Sep 17 17:28 kihei admin@i-050d914f485befec2:~$ chown -udatafile
kihei/i-050d914f485befec2 03:46
by SadServersadmin@i-0990a16ca6f06cf40:~$ chmod 777 web.py chmod: changing permissions of 'web.py': Operation not permitted admin@i-0990a16ca6f06cf40:~$ ls agent mysolution web.py admin@i-0990a16ca6f06cf40:~$ mv web.py we^C admin@i-0990a16ca6f06cf40:~$ cp web.py webserver.py cp: cannot open 'web.py' for reading: Permission denied admin@i-0990a16ca6f06cf40:~$ ls agent mysolution web.py admin@i-0990a16ca6f06cf40:~$ ls agent mysolution web.py admin@i-0990a16ca6f06cf40:~$ curl localhost:50000 curl: (7) Failed to connect to localhost port 50000: Connection refused admin@i-0990a16ca6f06cf40:~$ curl localhost:5000 Unauthorizedadmin@i-0990a16ca6f06cf40:~$ curl localhost:5000
paris/i-0990a16ca6f06cf40 03:53
by SadServers(Not all processes could be identified, non-owned process info will not be shown, you would have to be root to see it all.) admin@i-0b9f3cd0094de1d6e:~$ netstat -anlp|grep 172 (Not all processes could be identified, non-owned process info will not be shown, you would have to be root to see it all.) tcp 0 0 172.31.42.227:59464 172.31.21.181:9000 TIME_WAIT tcp 0 0 172.31.42.227:59462 172.31.21.181:9000 TIME_WAIT tcp 0 0 172.31.42.227:59460 172.31.21.181:9000 TIME_WAIT tcp6 0 0 172.31.42.227:8080 172.31.16.109:54422 ESTABLISHED admin@i-0b9f3cd0094de1d6e:~$ curl ^C admin@i-0b9f3cd0094de1d6e:~$ nmap -sV 172.31.21.181 -p 9000 Starting Nmap 7.80 ( https://nmap.org ) at 2023-10-01 16:08 UTC Note: Host seems down. If it is really up, but blocking our ping probes, try -PnNmap done: 1 IP address (0 hosts up) scanned in 4.87 seconds admin@i-0b9f3cd0094de1d6e:~$ ip a