kihei/i-0d07cfa4ea2ead235
by SadServersMore by SadServers
admin 686 0.0 0.9 6740 4540 pts/0 S<s+ 22:25 0:00 bash -l admin 690 0.8 4.1 98188 19416 pts/0 D<l+ 22:25 0:00 /usr/bin/pyth-t paris/i-07602503257110b80 -q -i 2 /var/log/cast/i-076025032571 admin 693 0.0 3.0 24456 14444 pts/0 R<+ 22:25 0:00 /usr/bin/pyth-t paris/i-07602503257110b80 -q -i 2 /var/log/cast/i-076025032571 admin 694 0.0 0.1 2480 512 pts/1 S<s 22:25 0:00 sh -c /bin/baadmin 695 0.0 0.9 6820 4460 pts/1 S< 22:25 0:00 /bin/bash admin 730 0.0 0.6 8648 3160 pts/1 R<+ 22:26 0:00 ps aux admin@i-07602503257110b80:~$ ps aux | grep nginx admin 732 0.0 0.1 5264 640 pts/1 S<+ 22:26 0:00 grep nginx admin@i-07602503257110b80:~$ ps aux | grep apache admin 734 0.0 0.1 5264 640 pts/1 S<+ 22:26 0:00 grep apache admin@i-07602503257110b80:~$ ls agent webserver.py admin@i-07602503257110b80:~$ cat webserver.py
paris/i-07602503257110b80 01:07
by SadServersvg/ vga_arbiter admin@i-0d9668085bc026fc4:~$ ls /dev/vg vg/ vga_arbiter admin@i-0d9668085bc026fc4:~$ ls /dev/vg/lv /dev/vg/lv admin@i-0d9668085bc026fc4:~$ ls /dev/vg/lv ^C admin@i-0d9668085bc026fc4:~$ mount ^C admin@i-0d9668085bc026fc4:~$ sudo mount /dev/vg/lv ^C admin@i-0d9668085bc026fc4:~$ ^C admin@i-0d9668085bc026fc4:~$ ls agent data datafile kihei admin@i-0d9668085bc026fc4:~$ pwd /home/admin admin@i-0d9668085bc026fc4:~$ mkdir lv admin@i-0d9668085bc026fc4:~$ sudo mount /dev/vg/lv
kihei/i-0d9668085bc026fc4 05:04
by SadServers> GET / HTTP/1.1 > Host: localhost:5000 > User-Agent: curl/7.74.0 > Accept: */* > * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Server: Werkzeug/2.3.7 Python/3.9.2 < Date: Sun, 15 Oct 2023 00:19:35 GMT < Content-Type: text/html; charset=utf-8 < Content-Length: 12 < Connection: close < * Closing connection 0 Unauthorizedadmin@i-0410bd96bf8007c4b:~$
paris/i-0410bd96bf8007c4b 02:14
by SadServersConnection to host.example.com 25 port [tcp/smtp] succeeded! The port range was specified to limit the search to ports 20 - 30, and is s der (unless the -r flag is set). You can also specify a list of ports to scan, for example: $ nc -zv host.example.com http 20 22-23 nc: connect to host.example.com 80 (tcp) failed: Connection refused nc: connect to host.example.com 20 (tcp) failed: Connection refused Connection to host.example.com port [tcp/ssh] succeeded! nc: connect to host.example.com 23 (tcp) failed: Connection refused The ports are scanned by the order you given (unless the -r flag is set). Manual page nc(1) line 219/313 84% (press h for help or q to quit)