kihei/i-0df2d9e82ec0588c0
by SadServersMore by SadServers
usage: sudo [-AbEHknPS] [-r role] [-t type] [-C num] [-D directory] [-g group] [directory] [-T timeout] [-u user] [VAR=value] [-i|-s] [<command>] usage: sudo -e [-AknS] [-r role] [-t type] [-C num] [-D directory] [-g group] [-irectory] [-T timeout] [-u user] file ... admin@i-028f47879cdca548e:~$ sudo cat webserver.py We trust you have received the usual lecture from the local System Administrator. It usually boils down to these three things: #1) Respect the privacy of others. #2) Think before you type. #3) With great power comes great responsibility. [sudo] password for admin:
paris/i-028f47879cdca548e 03:23
by SadServers(Not all processes could be identified, non-owned process info will not be shown, you would have to be root to see it all.) admin@i-0b9f3cd0094de1d6e:~$ netstat -anlp|grep 172 (Not all processes could be identified, non-owned process info will not be shown, you would have to be root to see it all.) tcp 0 0 172.31.42.227:59464 172.31.21.181:9000 TIME_WAIT tcp 0 0 172.31.42.227:59462 172.31.21.181:9000 TIME_WAIT tcp 0 0 172.31.42.227:59460 172.31.21.181:9000 TIME_WAIT tcp6 0 0 172.31.42.227:8080 172.31.16.109:54422 ESTABLISHED admin@i-0b9f3cd0094de1d6e:~$ curl ^C admin@i-0b9f3cd0094de1d6e:~$ nmap -sV 172.31.21.181 -p 9000 Starting Nmap 7.80 ( https://nmap.org ) at 2023-10-01 16:08 UTC Note: Host seems down. If it is really up, but blocking our ping probes, try -PnNmap done: 1 IP address (0 hosts up) scanned in 4.87 seconds admin@i-0b9f3cd0094de1d6e:~$ ip a
taipei/i-0b9f3cd0094de1d6e 04:20
by SadServerslatest revision: https://github.com/lsof-org/lsof latest FAQ: https://github.com/lsof-org/lsof/blob/master/00FAQ latest (non-formatted) man page: https://github.com/lsof-org/lsof/blob/master/L usage: [-?abhKlnNoOPRtUvVX] [+|-c c] [+|-d s] [+D D] [+|-E] [+|-e s] [+|-f[gG]] [-F [f]] [-g [s]] [-i [i]] [+|-L [l]] [+m [m]] [+|-M] [-o [o]] [-p s] [+|-r [t]] [-s [p:s]] [-S [t]] [-T [t]] [-u s] [+|-w] [-x [fl]] [--] [names] Use the ``-h'' option to get more help information. admin@i-0d46f6faaf9ff441c:~$ lsof -n -i :5000 admin@i-0d46f6faaf9ff441c:~$ netstat -tulpn | grep 5000 (Not all processes could be identified, non-owned process info will not be shown, you would have to be root to see it all.) tcp 0 0 127.0.0.1:5000 0.0.0.0:* LISTEN admin@i-0d46f6faaf9ff441c:~$ nc localhost 5000 ^C admin@i-0d46f6faaf9ff441c:~$ tel