unimak/i-0044e5fec361a7aaf
by SadServersMore by SadServers
Physical volume "/dev/nvme2n1" successfully created. admin@i-0006ce2ef3a195375:~$ sudo pv pvchange pvck pvcreate pvdisplay pvmove pvremove pvresize pvsadmin@i-0006ce2ef3a195375:~$ sudo pvs PV VG Fmt Attr PSize PFree /dev/sdb lvm2 --- 1.00g 1.00g /dev/sdc lvm2 --- 1.00g 1.00g admin@i-0006ce2ef3a195375:~$ sudo vgcreatevg /dev/nvme1n1 /dev/nvme2n1 sudo: vgcreatevg: command not found admin@i-0006ce2ef3a195375:~$ sudo vgcreate vg /dev/nvme1n1 /dev/nvme2n1 Volume group "vg" successfully created admin@i-0006ce2ef3a195375:~$ sudo vgs VG #PV #LV #SN Attr VSize VFree vg 2 0 0 wz--n- 1.99g 1.99g admin@i-0006ce2ef3a195375:~$ sudo lvcreate -n lv
kihei/i-0006ce2ef3a195375 02:26
by SadServers> User-Agent: curl/7.74.0 > Accept: */* > * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Server: Werkzeug/2.3.7 Python/3.9.2 < Date: Sat, 04 Nov 2023 07:51:57 GMT < Content-Type: text/html; charset=utf-8 < Content-Length: 12 < Connection: close < * Closing connection 0 Unauthorizedadmin@i-0370f616b00c1c73f:~$ ls agent webserver.py admin@i-0370f616b00c1c73f:~$ s
paris/i-0370f616b00c1c73f 08:03
by SadServersadmin@i-0c350ccedb2b7f7bc:~$ nmap -p- --min-rate=1000 -T4 localhost Starting Nmap 7.80 ( https://nmap.org ) at 2023-10-01 15:27 UTC Nmap scan report for localhost (127.0.0.1)Host is up (0.00017s latency). Not shown: 65532 closed ports PORT STATE SERVICE 22/tcp open ssh 6767/tcp open bmc-perf-agent 8080/tcp open http-proxy Nmap done: 1 IP address (1 host up) scanned in 1.22 seconds admin@i-0c350ccedb2b7f7bc:~$
taipei/i-0c350ccedb2b7f7bc 00:13
by SadServersWe trust you have received the usual lecture from the local System Administrator. It usually boils down to these three things: #1) Respect the privacy of others. #2) Think before you type. #3) With great power comes great responsibility. [sudo] password for admin: Sorry, try again. [sudo] password for admin: sudo: 1 incorrect password attempt admin@i-066efd15b3da3bd70:~$ lsof -n -i:5000 admin@i-066efd15b3da3bd70:~$ ls agent webserver.py admin@i-066efd15b3da3bd70:~$ ls