command-line-murders/i-0c9aa8e0f6bd55d08
by SadServersMore by SadServers
a.out agent webserver.py $ admin@i-072b43453825ba99a:~$ find / -perm -u=s -type f 2>/dev/null /usr/lib/openssh/ssh-keysign /usr/lib/dbus-1.0/dbus-daemon-launch-helper /usr/bin/chsh /usr/bin/umount /usr/bin/mount /usr/bin/passwd /usr/bin/newgrp /usr/bin/sudo /usr/bin/chfn /usr/bin/su /usr/bin/gpasswd admin@i-072b43453825ba99a:~$ ./a.out /usr/bin/su
paris/i-072b43453825ba99a 03:20
by SadServersSF:HTTPStatus\.BAD_REQUEST\x20-\x20Bad\x20request\x20syntax\x20or\x20unsup SF:ported\x20method\.</p>\n\x20\x20\x20\x20</body>\n</html>\n"); Service detection performed. Please report any incorrect results at https://nmapNmap done: 1 IP address (1 host up) scanned in 92.67 seconds admin@i-0be8092b5097881f7:~$ shoutdown --help bash: shoutdown: command not found admin@i-0be8092b5097881f7:~$ sudo -l Matching Defaults entries for admin on i-0be8092b5097881f7: env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/s User admin may run the following commands on i-0be8092b5097881f7: (ALL : ALL) ALL (ALL) NOPASSWD: /sbin/shutdown admin@i-0be8092b5097881f7:~$ /s
paris/i-0be8092b5097881f7 02:26
by SadServers--2023-12-12 15:08:36-- http://localhost:5000/ Resolving localhost (localhost)... 127.0.0.1 Connecting to localhost (localhost)|127.0.0.1|:5000... connected. HTTP request sent, awaiting response... 200 OK Length: 12 [text/html] Saving to: ‘index.html’ index.html 0%[ index.html 100%[===========================================================================>] 12 --.-KB/s in 0s 2023-12-12 15:08:36 (35.6 KB/s) - ‘index.html’ saved [12/12] admin@i-0e2c619ce30827e76:~$ cat index.html Unauthorizedadmin@i-0e2c619ce30827e76:~$