command-line-murders/i-0b6822c8b00d24d31
by SadServersMore by SadServers
ss ssh ssh-add ssh-agent ssh-argv0 ssh-copy-id ssadmin@i-0aa042ade078e1d14:~$ ss -tulnp | grep :5000 tcp LISTEN 0 128 127.0.0.1:5000 0.0.0.0:* admin@i-0aa042ade078e1d14:~$ ps ax | grep 128 845 pts/1 R<+ 0:00 grep 128 admin@i-0aa042ade078e1d14:~$ admin@i-0aa042ade078e1d14:~$ admin@i-0aa042ade078e1d14:~$ admin@i-0aa042ade078e1d14:~$ ls /etc/ Display all 153 possibilities? (y or n) admin@i-0aa042ade078e1d14:~$ ls /etc/n nanorc netconfig network/ networks nsswitch.conf admin@i-0aa042ade078e1d14:~$ ls /etc/n nanorc netconfig network/ networks nsswitch.conf admin@i-0aa042ade078e1d14:~$ ls /etc/
paris/i-0aa042ade078e1d14 03:02
by SadServers> GET / HTTP/1.1 > Host: localhost:5000 > User-Agent: curl/7.74.0 > Accept: */* > * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Server: Werkzeug/2.3.7 Python/3.9.2 < Date: Tue, 06 Feb 2024 07:30:57 GMT < Content-Type: text/html; charset=utf-8 < Content-Length: 12 < Connection: close < * Closing connection 0 Unauthorizedadmin@i-03d5c3bada9b64230:~$
paris/i-03d5c3bada9b64230 03:12
by SadServersGET / GET / GET / ^C admin@i-07e2fdd31fb619fad:~$ curl --user-agent "whatever" localhost:5000 Welcome! Password is FDZPmh5Acurl -s http://httpbin.org/user-agentrl -s http://h^[[B^[[B^C admin@i-07e2fdd31fb619fad:~$ curl -s http://httpbin.org/user-agent ^C admin@i-07e2fdd31fb619fad:~$ curl -s http://httpbin.org/user-agent ls ; ^C admin@i-07e2fdd31fb619fad:~$ curl -s http://httpbin.org/user-agen
paris/i-07e2fdd31fb619fad 02:35
by SadServersMISC: -6: Enable IPv6 scanning -A: Enable OS detection, version detection, script scanning, and traceroute --datadir <dirname>: Specify custom Nmap data file location --send-eth/--send-ip: Send using raw ethernet frames or IP packets --privileged: Assume that the user is fully privileged --unprivileged: Assume the user lacks raw socket privileges -V: Print version number -h: Print this help summary page. EXAMPLES: nmap -v -A scanme.nmap.org nmap -v -sn 192.168.0.0/16 10.0.0.0/8 nmap -v -iR 10000 -Pn -p 80 SEE THE MAN PAGE (https://nmap.org/book/man.html) FOR MORE OPTIONS AND EXAMPLES admin@i-04b40f92bf972f881:~$ nmaop