command-line-murders/i-00792f24154ca4257
by SadServersMore by SadServers
< Content-Type: text/plain < Date: Tue, 02 Jan 2024 20:05:43 GMT < Content-Length: 18 < * Connection #0 to host localhost left intact 404 page not foundadmin@i-095c82f614d2824ad:~$ admin@i-095c82f614d2824ad:~$ admin@i-095c82f614d2824ad:~$ admin@i-095c82f614d2824ad:~$ upnp bash: upnp: command not found admin@i-095c82f614d2824ad:~$ nc localhost 5000 admin@i-095c82f614d2824ad:~$ nc localhost 5000
paris/i-095c82f614d2824ad 01:56
by SadServerstmpfs 228M 12K 228M 1% /dev/shm tmpfs 5.0M 0 5.0M 0% /run/lock /dev/nvme0n1p15 124M 5.9M 118M 5% /boot/efi admin@i-0fc7184f11dca317e:~$ lsblk -l NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT nvme0n1 259:0 0 8G 0 disk nvme2n1 259:1 0 1G 0 disk nvme0n1p1 259:2 0 7.9G 0 part / nvme0n1p14 259:3 0 3M 0 part nvme0n1p15 259:4 0 124M 0 part /boot/efi nvme1n1 259:5 0 1G 0 disk admin@i-0fc7184f11dca317e:~$ pvcreate /dev/nvme1n1 /dev/nvme2n1 WARNING: Running as a non-root user. Functionality may be unavailable. /run/lock/lvm/P_global:aux: open failed: Permission denied admin@i-0fc7184f11dca317e:~$ sudo
kihei/i-0fc7184f11dca317e 01:25
by SadServersWe trust you have received the usual lecture from the local System Administrator. It usually boils down to these three things: #1) Respect the privacy of others. #2) Think before you type. #3) With great power comes great responsibility. [sudo] password for admin: Sorry, try again. [sudo] password for admin: Sorry, try again. [sudo] password for admin: sudo: 3 incorrect password attempts admin@i-040ec55e8e002101c:~$ find / -name webserver
paris/i-040ec55e8e002101c 02:48
by SadServers-rw------- 1 admin admin 269 Jan 2 11:38 .bash_history -rw-r--r-- 1 admin admin 220 Aug 4 2021 .bash_logout -rw-r--r-- 1 admin admin 3526 Aug 4 2021 .bashrc drwxr-xr-x 3 admin admin 4096 Sep 20 2023 .config drwxr-xr-x 3 admin admin 4096 Jan 2 11:37 .local -rw-r--r-- 1 admin admin 807 Aug 4 2021 .profile drwx------ 2 admin admin 4096 Sep 17 2023 .ssh -rw-r--r-- 1 admin admin 1024 Jan 2 11:37 .webserver.py.swp drwxr-xr-x 2 admin root 4096 Sep 24 2023 agent -rwxrwx--- 1 root root 360 Sep 24 2023 webserver.py admin@i-0f995f369ab3b4d0d:~$ ls .config/ asciinema admin@i-0f995f369ab3b4d0d:~$ less .webserver.py.swp ".webserver.py.swp" may be a binary file. See it anyway? admin@i-0f995f369ab3b4d0d:~$ cat .bashr