command-line-murders/i-0fc5f4e0cb3f3f6b7
by SadServersMore by SadServers
ended-upgrade-shutdown --wait-for-signal admin 676 672 0 21:34 pts/0 00:00:00 /usr/bin/python3 /usr/bin/as17f33d1f9a8e8c3 -q -i 2 /var/log/cast/i-0017f33d1f9a8e8c3 admin 679 676 0 21:34 pts/0 00:00:00 /usr/bin/python3 /usr/bin/as17f33d1f9a8e8c3 -q -i 2 /var/log/cast/i-0017f33d1f9a8e8c3 admin 725 681 0 21:36 pts/1 00:00:00 grep python admin@i-0017f33d1f9a8e8c3:~$ cat /home/admin/webserver.py cat: /home/admin/webserver.py: Permission denied admin@i-0017f33d1f9a8e8c3:~$ pwd /home/admin admin@i-0017f33d1f9a8e8c3:~$ ls -lrt total 8 -rwxrwx--- 1 root root 360 Sep 24 23:20 webserver.py drwxr-xr-x 2 admin root 4096 Sep 24 23:20 agent admin@i-0017f33d1f9a8e8c3:~$ c
paris/i-0017f33d1f9a8e8c3 01:41
by SadServersadmin@i-0bf562d53de649339:~/agent$ cd ../ admin@i-0bf562d53de649339:~$ ls -lah total 44K drwxr-xr-x 6 admin admin 4.0K Sep 24 23:20 . drwxr-xr-x 3 root root 4.0K Sep 17 16:44 .. drwx------ 3 admin admin 4.0K Sep 20 15:52 .ansible -rw------- 1 admin admin 186 Jan 18 18:58 .bash_history -rw-r--r-- 1 admin admin 220 Aug 4 2021 .bash_logout -rw-r--r-- 1 admin admin 3.5K Aug 4 2021 .bashrc drwxr-xr-x 3 admin admin 4.0K Sep 20 15:56 .config -rw-r--r-- 1 admin admin 807 Aug 4 2021 .profile drwx------ 2 admin admin 4.0K Sep 17 16:44 .ssh drwxr-xr-x 2 admin root 4.0K Sep 24 23:20 agent -rwxrwx--- 1 root root 360 Sep 24 23:20 webserver.py admin@i-0bf562d53de649339:~$ curl -v http://localhos
paris/i-0bf562d53de649339 02:09
by SadServers1 bash
paris/i-0b5bb43a01e54b602 06:10
by SadServersjavascript-common.conf admin@i-0d7930c2d96370361:/etc/apache2/conf-available$ ls -lhtr total 4.0K -rw-r--r-- 1 root root 127 Dec 18 2020 javascript-common.conf admin@i-0d7930c2d96370361:/etc/apache2/conf-available$ cat javascript-common.conAlias /javascript /usr/share/javascript/ <Directory "/usr/share/javascript/"> Options FollowSymLinks MultiViews </Directory> admin@i-0d7930c2d96370361:/etc/apache2/conf-available$ telnet localhost 5000 Trying 127.0.0.1... Connected to localhost. Escape character is '^]'. GET