11%
30.01.2020
Fn::Base64:
20 Fn::Join:
21 - ''
22 -
23 - "{\n"
24 - '"bucket"'
25 - ' : "'
26 - Ref: S3Bucketname
27
10%
07.01.2024
loop /snap/core22/864
loop15 7:15 0 12.3M 1 loop /snap/snap-store/959
loop16 7:16 0 73.9M 1 loop /snap/core22/817
loop17 7:17 0 349.7M 1 loop /snap/gnome-3-38-2004/140
loop18
10%
27.09.2021
ssh ubuntu@52.90.56.122; do sleep 1; done
ssh: connect to host 52.90.56.122 port 22: Connection refused
ssh: connect to host 52.90.56.122 port 22: Connection refused
[ output truncated ]
Welcome
10%
30.11.2025
.33
164.69
0.75
rand_mat_stat
3.37
39.34
11.64
54.54
22.07
8.12
rand_mat_mul
1.00
1.18
0.70
1.65
8
10%
02.02.2021
.
As surely as night follows day, automated attacks will target the default Secure Shell port (TCP port 22), so I will use SSH as the guinea pig test case with the knowledge that I can move the real SSH service
10%
27.05.2025
server, you can search the web server logfile, access_log, for the HTTP GET request for the zoo RPM file from the client:
# grep zoo /var/log/httpd/access_log
10.8.12.141 - - [11/Oct/2024:00:14:14 -0500
10%
03.02.2022
,32
1,33
2,34
3,35
4,36
5,37
6,38
7,39
8,40
9,41
10,42
11,43
12,44
13,45
14,46
15,47
16,48
17,49
18,50
19,51
20,52
21,53
22,54
23,55
24,56
25,57
26,58
27,59
28,60
29,61
30,62
31,63
The lstopo tool
10%
27.09.2021
/.acme.sh/www.example.com/www.example.com.cer -noout -issuer -subject -dates -serial
issuer= /C=US/O=Let's Encrypt/CN=R3
subject= /CN=www.example.com
notBefore=Feb 21 13:00:28 2021 GMT
notAfter=May 22 13:00:28 2021 GMT
serial=03B46ADF0F26B94C19443669
10%
09.08.2015
'
sed -n 's/Man//gp' textdata.txt
11
Replace 'Iron' with 'Tin' on line 4
cat textdata.txt | sed -n '4s/Iron/Tin/gp'
12
Replace '0' with '089' on all lines containing
10%
09.01.2013
" = "" ]
17 then
18 echo "$0 error: ID missing." >&2
19 fi
20
21 id=$1
22 shift
23
24 echo "$id $(date +%s) $mode" >> $ACCOUNTING
The VM_HOOK construct can appear more than once in the configuration