kihei/i-0719056d023dd5571
by SadServersMore by SadServers
sudo: 3 incorrect password attempts admin@i-0ade0a697ccc4e8f9:/$ cd /usr/ bin/ include/ lib32/ libexec/ local/ share/ games/ lib/ lib64/ libx32/ sbin/ src/ admin@i-0ade0a697ccc4e8f9:/$ cd /home/admin/ admin@i-0ade0a697ccc4e8f9:~$ ls agent webserver.py admin@i-0ade0a697ccc4e8f9:~$ ls agent/ check.sh sadagent sadagent.txt admin@i-0ade0a697ccc4e8f9:~$ ls agent/sadagent agent/sadagent admin@i-0ade0a697ccc4e8f9:~$ less agent/sadagent sadagent sadagent.txt admin@i-0ade0a697ccc4e8f9:~$ less agent/sadagent.txt admin@i-0ade0a697ccc4e8f9:~$ less agent/sadagent.txt
paris/i-0ade0a697ccc4e8f9 06:56
by SadServers(Not all processes could be identified, non-owned process info will not be shown, you would have to be root to see it all.) admin@i-0b9f3cd0094de1d6e:~$ netstat -anlp|grep 172 (Not all processes could be identified, non-owned process info will not be shown, you would have to be root to see it all.) tcp 0 0 172.31.42.227:59464 172.31.21.181:9000 TIME_WAIT tcp 0 0 172.31.42.227:59462 172.31.21.181:9000 TIME_WAIT tcp 0 0 172.31.42.227:59460 172.31.21.181:9000 TIME_WAIT tcp6 0 0 172.31.42.227:8080 172.31.16.109:54422 ESTABLISHED admin@i-0b9f3cd0094de1d6e:~$ curl ^C admin@i-0b9f3cd0094de1d6e:~$ nmap -sV 172.31.21.181 -p 9000 Starting Nmap 7.80 ( https://nmap.org ) at 2023-10-01 16:08 UTC Note: Host seems down. If it is really up, but blocking our ping probes, try -PnNmap done: 1 IP address (0 hosts up) scanned in 4.87 seconds admin@i-0b9f3cd0094de1d6e:~$ ip a
taipei/i-0b9f3cd0094de1d6e 04:20
by SadServers#1698484587 cat .bash admin@i-0f6c30f8d04ab9891:~$ cd .config/ admin@i-0f6c30f8d04ab9891:~/.config$ ls asciinema admin@i-0f6c30f8d04ab9891:~/.config$ cd asciinema/ admin@i-0f6c30f8d04ab9891:~/.config/asciinema$ ls install-id admin@i-0f6c30f8d04ab9891:~/.config/asciinema$ cat install-id 0e2d35c4-a944-417f-bd3a-677c2f875b37admin@i-0f6c30f8d04ab9891:~/.config/asciinema$ cd .. admin@i-0f6c30f8d04ab9891:~/.config$ cd .. admin@i-0f6c30f8d04ab9891:~$ ls agent webserver.py admin@i-0f6c30f8d04ab9891:~$