command-line-murders/i-0eaa5d8e13d0309a2
by SadServersMore by SadServers
openat(AT_FDCWD, "/home/admin/webserver.py", O_RDONLY|O_CLOEXEC) = -1 EACCES (Pestat("/home/admin/webserver.py", {st_mode=S_IFREG|0770, st_size=360, ...}) = 0 readlink("/home/admin/webserver.py", 0x7ffcd0b15d90, 4096) = -1 EINVAL (Invalid lstat("/home", {st_mode=S_IFDIR|0755, st_size=4096, ...}) = 0 lstat("/home/admin", {st_mode=S_IFDIR|0755, st_size=4096, ...}) = 0 lstat("/home/admin/webserver.py", {st_mode=S_IFREG|0770, st_size=360, ...}) = 0 openat(AT_FDCWD, "/home/admin/webserver.py", O_RDONLY) = -1 EACCES (Permission dwrite(2, "python3: can't open file '/home/"..., 82python3: can't open file '/homrrno 13] Permission denied ) = 82 rt_sigaction(SIGINT, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=SA_RESTORER, sa_r{sa_handler=0x6402c0, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7f1915bdf1exit_group(2) = ? +++ exited with 2 +++ admin@i-0c85c5a418bb83a0e:/etc/systemd/system$ strace python3 /home/admin/webser
paris/i-0c85c5a418bb83a0e 02:08
by SadServersadmin@i-032b14b686448662d:/etc$ ping 127.0.1.1 PING 127.0.1.1 (127.0.1.1) 56(84) bytes of data. 64 bytes from 127.0.1.1: icmp_seq=1 ttl=64 time=0.022 ms 64 bytes from 127.0.1.1: icmp_seq=2 ttl=64 time=0.033 ms ^C --- 127.0.1.1 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 1025ms rtt min/avg/max/mdev = 0.022/0.027/0.033/0.005 ms admin@i-032b14b686448662d:/etc$ curl 127.0.1.1 curl: (7) Failed to connect to 127.0.1.1 port 80: Connection refused admin@i-032b14b686448662d:/etc$ ssh 127.0.1.1 The authenticity of host '127.0.1.1 (127.0.1.1)' can't be established. ECDSA key fingerprint is SHA256:hMf6KbwaoxjGUmKFdpvRsbq4Vv1XDQTAlST34YIiPA8. Are you sure you want to continue connecting (yes/no/[fingerprint])?