/l3/trainings/xg-ids/2005-12-19/linux3.linux.nt/user :1 :2 :3 :4 :5 :6 :7 :8 :9 |
|
#/usr/local/bin/honeyd -f /usr/local/etc/honeyd.conf 192.168.15.121-192.168.15.129 -d
Honeyd V1.0 Copyright (c) 2002-2004 Niels Provos honeyd[8335]: started with -f /usr/local/etc/honeyd.conf -d 192.168.15.121-192.168.15.129 Warning: Impossible SI range in Class fingerprint "IBM OS/400 V4R2M0" Warning: Impossible SI range in Class fingerprint "Microsoft Windows NT 4.0 SP3" honeyd[8335]: listening promiscuously on eth0: (arp or ip proto 47 or (udp and src port 67 and dst port 68) or (ip and (dst net 192.168.15.121/32 or dst net 192.168.15.122/31 or dst net 192.168.15.124/30 or dst net 192.168.15.128/31))) and not ether src 00:04:75:75:46:c1 honeyd[8335]: HTTP server listening on port 8800 honeyd[8335]: HTTP server root at /usr/local/share/honeyd/webserver/htdocs honeyd[8335]: Demoting process privileges to uid 32767, gid 32767 honeyd[8335]: exiting on signal 2 |
# Ђройки Правая панель
![]() _0__8089_357T1 18:23:51[root@linux3:etc]# ping 192.168.15.121 PING 192.168.15.121 (192.168.15.121) 56(84) bytes of data. From 192.168.15.3 icmp_seq=1 Destination Host Unreachable From 192.168.15.3 icmp_seq=2 Destination Host Unreachable From 192.168.15.3 icmp_seq=3 Destination Host Unreachable --- 192.168.15.121 ping statistics --- 5 packets transmitted, 0 received, +3 errors, 100% packet loss, time 4000ms , pipe 4 |
#ping 192.168.15.3
PING 192.168.15.3 (192.168.15.3) 56(84) bytes of data. 64 bytes from 192.168.15.3: icmp_seq=0 ttl=64 time=0.071 ms 64 bytes from 192.168.15.3: icmp_seq=1 ttl=64 time=0.052 ms 64 bytes from 192.168.15.3: icmp_seq=2 ttl=64 time=0.049 ms --- 192.168.15.3 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 2000ms rtt min/avg/max/mdev = 0.049/0.057/0.071/0.011 ms, pipe 2 |
#nmap 192.168.15.121
Starting nmap 3.55 ( http://www.insecure.org/nmap/ ) at 2005-12-23 18:24 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -P0 Nmap run completed -- 1 IP address (0 hosts up) scanned in 12.122 seconds |
#ping 192.168.15.121
![]() PING 192.168.15.121 (192.168.15.121) 56(84) bytes of data. From 192.168.15.3 icmp_seq=1 Destination Host Unreachable From 192.168.15.3 icmp_seq=2 Destination Host Unreachable From 192.168.15.3 icmp_seq=3 Destination Host Unreachable --- 192.168.15.121 ping statistics --- 7 packets transmitted, 0 received, +3 errors, 100% packet loss, time 5999ms , pipe 4 |
#/usr/local/bin/honeyd -f /usr/local/etc/honeyd.conf 192.168.15.121-192.168.15.129
Honeyd V1.0 Copyright (c) 2002-2004 Niels Provos honeyd[8419]: started with -f /usr/local/etc/honeyd.conf 192.168.15.121-192.168.15.129 Warning: Impossible SI range in Class fingerprint "IBM OS/400 V4R2M0" Warning: Impossible SI range in Class fingerprint "Microsoft Windows NT 4.0 SP3" honeyd[8419]: listening promiscuously on eth0: (arp or ip proto 47 or (udp and src port 67 and dst port 68) or (ip and (dst net 192.168.15.121/32 or dst net 192.168.15.122/31 or dst net 192.168.15.124/30 or dst net 192.168.15.128/31))) and not ether src 00:04:75:75:46:c1 honeyd[8419]: HTTP server listening on port 8800 honeyd[8419]: HTTP server root at /usr/local/share/honeyd/webserver/htdocs Honeyd starting as background process |
#ps -aux |grep honeyd
Warning: bad syntax, perhaps a bogus '-'? See http://procps.sf.net/faq.html #32767 8420 0.0 0.5 12124 5648 ? S 18:25 0:00 /usr/local/bin/honeyd -f /usr/local/etc/honeyd.conf 192.168.15.121 192.168.15.129 root 8430 0.0 0.0 5628 708 pts/4 R 18:25 0:00 grep honeyd |
#kill 8420
|
# Ђройки Правая панель
![]() ┌<─/usr/local/etc───────────────────────────────────────────v>┐┌<─/etc─────────────────────────────────────────────────────v>┐ │/.. │-ВВЕРХ-│ ││ logrotate.conf │ 505│Июл 13 2004│ │/syslog-ng │ 4096│Дек 21 15:17││ ltrace.conf │ 10815│Июл 13 2004│ │ etter.conf1 link 10.3.0.0/24 │ 8326│Дек 20 15:17││ lynx.cfg.cs │ 129993│Июл 12 2004│ │ swatch3.0.1 add net 10.3.1.0/24 10.3.1.│atency0│Дек 19 15:37││ lynx.cfg.sk │ 129993│Июл 12 2004│ │ │ │ ││ mailcap │ 284│Июл 13 2004│ │ │ │ ││ man.config │ 4522│Ноя 11 2004│ │ │ │ ││ mime-magic.dat │ 99960│Июл 10 2004│ │ │ │ ││ minicom.users │ 1110│Июл 12 2004│ │ate windows │ │ ││ modprobe.conf │ 655│Дек 18 19:57│ ... │ windows udp port 53 proxy 141.211.92.14│3 │ ││ passwd │ 1764│Дек 23 09:32│ │ honeyd.confault tcp action reset ││ passwd │ Совет: Вы можете отменить запросы на подтверждение в Настройки/Подтверждение. _0__8089_Меню 3Просмот4Правк НвКтлог [^] #set router personality "Cisco 1601R router running IOS 12.1(5)" #set router default tcp action reset #add router tcp port 22 "scripts/test.sh" #add router tcp port 23 "scripts/router-telnet.pl" #bind 192.168.15.122 router bind 192.168.15.121 windows |
#ping 192.168.15.121
![]() PING 192.168.15.121 (192.168.15.121) 56(84) bytes of data. From 192.168.15.3 icmp_seq=1 Destination Host Unreachable From 192.168.15.3 icmp_seq=2 Destination Host Unreachable From 192.168.15.3 icmp_seq=3 Destination Host Unreachable --- 192.168.15.121 ping statistics --- 7 packets transmitted, 0 received, +3 errors, 100% packet loss, time 6000ms , pipe 4 |
#ps -aux |grep honeyd
Warning: bad syntax, perhaps a bogus '-'? See http://procps.sf.net/faq.html root 8459 0.0 0.0 4812 720 pts/4 S 18:27 0:00 grep honeyd |
#/usr/local/bin/honeyd -f /usr/local/etc/honeyd.conf 192.168.15.121-192.168.15.129 -d
honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:814) honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:61440) honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:34) honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:854) honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:283) honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:920) honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:611) honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:1438) honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:882) honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:562) ... honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:8080) honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:9090) honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:665) honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:733) honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:3999) honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:279) honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:813) honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:22370) honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:778) honeyd[8468]: Killing attempted connection: tcp (192.168.15.22:44749 - 192.168.15.121:2401) |
#ping 192.168.15.122
![]() PING 192.168.15.122 (192.168.15.122) 56(84) bytes of data. From 192.168.15.3 icmp_seq=1 Destination Host Unreachable From 192.168.15.3 icmp_seq=2 Destination Host Unreachable From 192.168.15.3 icmp_seq=3 Destination Host Unreachable --- 192.168.15.122 ping statistics --- 4 packets transmitted, 0 received, +3 errors, 100% packet loss, time 2999ms , pipe 4 |
#arping 192.168.15.121
![]() ARPING 192.168.15.121 from 192.168.15.3 eth0 Sent 15 probes (15 broadcast(s)) Received 0 response(s) |
#arping 192.168.15.121
![]() ARPING 192.168.15.121 60 bytes from 00:04:75:75:46:c1 (192.168.15.121): index=0 time=9.956 msec 60 bytes from 00:04:75:75:46:c1 (192.168.15.121): index=1 time=9.954 msec 60 bytes from 00:04:75:75:46:c1 (192.168.15.121): index=2 time=9.979 msec 60 bytes from 00:04:75:75:46:c1 (192.168.15.121): index=3 time=9.956 msec 60 bytes from 00:04:75:75:46:c1 (192.168.15.121): index=4 time=9.954 msec 60 bytes from 00:04:75:75:46:c1 (192.168.15.121): index=5 time=9.970 msec ^C --- 192.168.15.121 statistics --- 8 packets transmitted, 6 packets received, 25% unanswered |
#ping 192.168.15.121
PING 192.168.15.121 (192.168.15.121): 56 data bytes 64 bytes from 192.168.15.121: icmp_seq=0 ttl=128 time=0.636 ms 64 bytes from 192.168.15.121: icmp_seq=1 ttl=128 time=0.471 ms 64 bytes from 192.168.15.121: icmp_seq=2 ttl=128 time=0.447 ms 64 bytes from 192.168.15.121: icmp_seq=3 ttl=128 time=0.443 ms 64 bytes from 192.168.15.121: icmp_seq=4 ttl=128 time=0.416 ms ^C --- 192.168.15.121 ping statistics --- 5 packets transmitted, 5 packets received, 0% packet loss round-trip min/avg/max/stddev = 0.416/0.483/0.636/0.079 ms |
#ssh m02
![]() |
#nmap 192.168.15.121
Starting nmap 3.81 ( http://www.insecure.org/nmap/ ) at 2005-12-23 18:28 EET Interesting ports on 192.168.15.121: (The 1661 ports scanned but not shown below are in state: closed) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http MAC Address: 00:04:75:75:46:C1 (3 Com) Nmap finished: 1 IP address (1 host up) scanned in 1.295 seconds |
#ping 192.168.15.22
![]() PING 192.168.15.22 (192.168.15.22) 56(84) bytes of data. --- 192.168.15.22 ping statistics --- 3 packets transmitted, 0 received, 100% packet loss, time 1998ms |
#nmap 192.168.15.121 -O
Starting nmap 3.81 ( http://www.insecure.org/nmap/ ) at 2005-12-23 18:28 EET Interesting ports on 192.168.15.121: (The 1661 ports scanned but not shown below are in state: closed) PORT STATE SERVICE 22/tcp open ssh 80/tcp open http MAC Address: 00:04:75:75:46:C1 (3 Com) Device type: general purpose Running: Microsoft Windows NT/2K/XP OS details: Microsoft Windows XP SP1 Nmap finished: 1 IP address (1 host up) scanned in 3.230 seconds |
#ping 192.168.15.21
PING 192.168.15.21 (192.168.15.21) 56(84) bytes of data. 64 bytes from 192.168.15.21: icmp_seq=0 ttl=64 time=0.712 ms 64 bytes from 192.168.15.21: icmp_seq=1 ttl=64 time=0.226 ms --- 192.168.15.21 ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 1001ms rtt min/avg/max/mdev = 0.226/0.469/0.712/0.243 ms, pipe 2 |
#ping 192.168.15.22
![]() PING 192.168.15.22 (192.168.15.22) 56(84) bytes of data. --- 192.168.15.22 ping statistics --- 7 packets transmitted, 0 received, 100% packet loss, time 5998ms |
#ping 192.168.15.22
![]() PING 192.168.15.22 (192.168.15.22) 56(84) bytes of data. --- 192.168.15.22 ping statistics --- 2 packets transmitted, 0 received, 100% packet loss, time 999ms |
#nmap 192.168.15.121 -O
Starting nmap 3.81 ( http://www.insecure.org/nmap/ ) at 2005-12-23 18:29 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -P0 Nmap finished: 1 IP address (0 hosts up) scanned in 2.218 seconds |
#ssh m02
![]() |
#ssh m02
Password: Last login: Fri Dec 23 18:18:11 2005 from linux3.linux.nt Copyright (c) 1980, 1983, 1986, 1988, 1990, 1991, 1993, 1994 The Regents of the University of California. All rights reserved. FreeBSD 6.0-RELEASE (GENERIC) #0: Thu Nov 3 09:36:13 UTC 2005 Welcome to FreeBSD! Before seeking technical support, please use the following resources: o Security advisories and updated errata information for all releases are at http://www.FreeBSD.org/releases/ - always consult the ERRATA section for your release first as it's updated frequently. o The Handbook and FAQ documents are at http://www.FreeBSD.org/ and, along with the mailing lists, can be searched by going to http://www.FreeBSD.org/search/. If the doc distribution has been installed, they're also available formatted in /usr/share/doc. If you still have a question or problem, please take the output of `uname -a', along with any relevant error messages, and email it as a question to the questions@FreeBSD.org mailing list. If you are unfamiliar with FreeBSD's directory layout, please refer to the hier(7) manual page. If you are not familiar with manual pages, type `man man'. You may also use sysinstall(8) to re-enter the installation and configuration utility. Edit /etc/motd to change this login announcement. |
#exit
exit Connection to m02 closed. |
#/usr/local/bin/honeyd -f /usr/local/etc/honeyd.conf 192.168.15.121-192.168.15.129 -d
Honeyd V1.0 Copyright (c) 2002-2004 Niels Provos honeyd[8810]: started with -f /usr/local/etc/honeyd.conf -d 192.168.15.121-192.168.15.129 Warning: Impossible SI range in Class fingerprint "IBM OS/400 V4R2M0" Warning: Impossible SI range in Class fingerprint "Microsoft Windows NT 4.0 SP3" honeyd[8810]: listening promiscuously on eth0: (arp or ip proto 47 or (udp and src port 67 and dst port 68) or (ip and (dst net 192.168.15.121/32 or dst net 192.168.15.122/31 or dst net 192.168.15.124/30 or dst net 192.168.15.128/31))) and not ether src 00:04:75:75:46:c1 honeyd[8810]: HTTP server listening on port 8800 honeyd[8810]: HTTP server root at /usr/local/share/honeyd/webserver/htdocs honeyd[8810]: Demoting process privileges to uid 32767, gid 32767 honeyd[8810]: pyextend_accept: new request from 127.0.0.1 honeyd[8810]: 127.0.0.1 - - [23/Dec/2005 18:45:30] code 404, message File not found ... honeyd[8810]: 127.0.0.1 - - [23/Dec/2005 18:50:30] "GET /config.py?add_ip=true HTTP/1.1" 200 - honeyd[8810]: pyextend_accept: new request from 127.0.0.1 honeyd[8810]: 127.0.0.1 - - [23/Dec/2005 18:50:30] code 404, message File not found honeyd[8810]: 127.0.0.1 - - [23/Dec/2005 18:50:30] "GET /favicon.ico HTTP/1.1" 404 - honeyd[8810]: pyextend_accept: new request from 127.0.0.1 honeyd[8810]: 127.0.0.1 - - [23/Dec/2005 18:50:36] "GET /index.py HTTP/1.1" 200 - honeyd[8810]: pyextend_accept: new request from 127.0.0.1 honeyd[8810]: 127.0.0.1 - - [23/Dec/2005 18:50:36] code 404, message File not found honeyd[8810]: 127.0.0.1 - - [23/Dec/2005 18:50:36] "GET /favicon.ico HTTP/1.1" 404 - honeyd[8810]: exiting on signal 2 |
#arpd -d -i eth0 192.168.15.121-192.168.15.129/32
arpd[9191]: listening on eth0: arp and (dst net 192.168.15.121/32 or dst net 192.168.15.122/31 or dst net 192.168.15.124/30 or dst net 192.168.15.128/31) and not ether src 00:04:75:75:46:c1 arpd[9191]: arpd_lookup: no entry for 192.168.15.121 arpd[9191]: arpd_send: who-has 192.168.15.121 tell 192.168.15.3 arpd[9191]: arpd_send: who-has 192.168.15.121 tell 192.168.15.3 arpd[9191]: arpd_recv_cb: 192.168.15.121 still discovering (2) arpd[9191]: arp reply 192.168.15.121 is-at 00:04:75:75:46:c1 arpd[9191]: arpd_lookup: no entry for 192.168.15.122 arpd[9191]: arpd_send: who-has 192.168.15.122 tell 192.168.15.3 arpd[9191]: arpd_send: who-has 192.168.15.122 tell 192.168.15.3 arpd[9191]: arpd_recv_cb: 192.168.15.122 still discovering (2) arpd[9191]: arp reply 192.168.15.122 is-at 00:04:75:75:46:c1 arpd[9191]: arpd_timeout: expiring 192.168.15.121 arpd[9191]: arpd_timeout: expiring 192.168.15.122 arpd[9191]: exiting on signal 2 |
# ÐÑойки ÐÑÐ°Ð²Ð°Ñ Ð¿Ð°Ð½ÐµÐ»Ñ
Файл: honeyd.c Фа СÑ. 0 ° ´Ð° 82403 Ð±Ð°Ð¹Ñ 5 0% int honeyd_webserver_port = 8800; â ÐÐ¼Ñ âÐ Ð°Ð·Ð¼ÐµÑ âÐÑÐµÐ¼Ñ Ð¿Ñавкиââ ÐÐ¼Ñ âÐ Ð°Ð·Ð¼ÐµÑ âÐÑемÑÑ Ð¿Ñавкиâ "/webserver/htdocs"; â ethernet.c â19148837â31 20041 2004ââ lsb-release â 18âÐÑл 1 14 2004â c â ethernet.o â23686825âÐек 23 18:11ââ lynx.cfg â 138134âÐÑл 1 12 2004â /* can be used by unittests to do bad stuff */ â void (*honeyd_delay_callback)(int, short, void *) = honeyd_delay_cb;ify ... * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ #include <sys/param.h> #include <sys/types.h> #ifdef HAVE_CONFIG_H #include "config.h" #endif |
#mc
![]() |
#/usr/local/bin/honeyd -f /usr/local/etc/honeyd.conf 192.168.15.121-192.168.15.129 -d --web-server 8888
![]() Honeyd V1.0 Copyright (c) 2002-2004 Niels Provos /usr/local/bin/honeyd: unrecognized option `--web-server' Usage: honeyd [OPTIONS] [net ...] where options include: -d Do not daemonize, be verbose. -P Enable polling mode. -l logfile Log packets and connections to logfile. -s logfile Logs service status output to logfile. -i interface Listen on interface. -p file Read nmap-style fingerprints from file. ... --webserver-port=port Port on which webserver listens. --webserver-root=path Root of document tree. --fix-webserver-permissions Change ownership and permissions. --rrdtool-path=path Path to rrdtool. --disable-webserver Disables internal webserver --disable-update Disables checking for security fixes. -V, --version Print program version and exit. -h, --help Print this message and exit. For plugin development: --include-dir Prints out header files directory and exits. |
#/usr/local/bin/honeyd -f /usr/local/etc/honeyd.conf 192.168.15.121-192.168.15.129 -d --webserver-port 8888
Honeyd V1.0 Copyright (c) 2002-2004 Niels Provos honeyd[8866]: started with -f /usr/local/etc/honeyd.conf -d --webserver-port 8888 192.168.15.121-192.168.15.129 Warning: Impossible SI range in Class fingerprint "IBM OS/400 V4R2M0" Warning: Impossible SI range in Class fingerprint "Microsoft Windows NT 4.0 SP3" honeyd[8866]: listening promiscuously on eth0: (arp or ip proto 47 or (udp and src port 67 and dst port 68) or (ip and (dst net 192.168.15.121/32 or dst net 192.168.15.122/31 or dst net 192.168.15.124/30 or dst net 192.168.15.128/31))) and not ether src 00:04:75:75:46:c1 honeyd[8866]: HTTP server listening on port 8888 honeyd[8866]: HTTP server root at /usr/local/share/honeyd/webserver/htdocs honeyd[8866]: Demoting process privileges to uid 32767, gid 32767 honeyd[8866]: pyextend_accept: new request from 127.0.0.1 honeyd[8866]: 127.0.0.1 - - [23/Dec/2005 18:52:25] "GET / HTTP/1.1" 200 - ... honeyd[8866]: 127.0.0.1 - - [23/Dec/2005 18:56:56] "GET /config.py?add_ip=true HTTP/1.1" 200 - honeyd[8866]: pyextend_accept: new request from 127.0.0.1 honeyd[8866]: 127.0.0.1 - - [23/Dec/2005 18:56:56] code 404, message File not found honeyd[8866]: 127.0.0.1 - - [23/Dec/2005 18:56:56] "GET /favicon.ico HTTP/1.1" 404 - honeyd[8866]: pyextend_accept: new request from 127.0.0.1 honeyd[8866]: 127.0.0.1 - - [23/Dec/2005 18:56:57] "GET /config.py?add_ip=true HTTP/1.1" 200 - honeyd[8866]: pyextend_accept: new request from 127.0.0.1 honeyd[8866]: 127.0.0.1 - - [23/Dec/2005 18:56:57] code 404, message File not found honeyd[8866]: 127.0.0.1 - - [23/Dec/2005 18:56:57] "GET /favicon.ico HTTP/1.1" 404 - honeyd[8866]: exiting on signal 2 |
#ls -la
итого 104 drwxr-xr-x 3 root root 4096 Дек 23 18:12 . drwxr-xr-x 6 root root 4096 Дек 23 18:43 .. drwxr-xr-x 6 root root 4096 Дек 23 12:36 htdocs -rw-r--r-- 1 1000 root 58705 Сен 19 2004 htmltmpl.py -rw-r--r-- 1 1000 root 6658 Окт 20 2004 server.py -rw-r--r-- 1 root root 9522 Дек 23 18:12 server.pyc -rw-r--r-- 1 1000 root 5828 Дек 6 2004 support.py |
# Ђройки Правая панель
_0__8623_357T1 18:53:35[root@linux3:webserver]# ls -la итого 104 drwxr-xr-x 3 root root 4096 Дек 23 18:12 . drwxr-xr-x 3 root root 4096 Дек 23 18:11 .. drwxrwxrwx 6 root root 4096 Дек 23 18:12 htdocs -rw-r--r-- 1 1000 root 58705 Сен 19 2004 htmltmpl.py -rw-r--r-- 1 1000 root 6658 Окт 20 2004 server.py -rw-r--r-- 1 root root 10050 Дек 23 17:05 server.pyc -rw-r--r-- 1 1000 root 5828 Дек 6 2004 support.py |
#pwd
/usr/local/share/honeyd/webserver |
#man chmod
![]() |
# Ђройки Правая панель
_0__8623_357T1 18:57:29[root@linux3:etc]# exit exit read (subshell_pty...): Input/output error (5) |
#/usr/local/bin/honeyd -f /usr/local/etc/honeyd.conf 192.168.15.121-192.168.15.129 -d --webserver-port 8888
honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:273) honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:591) honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:7000) honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:593) honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:13721) honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:682) honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:875) honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:3128) honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:290) honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:433) ... honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:654) honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:844) honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:3900) honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:759) honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:613) honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:1761) honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:2111) honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:22370) honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:1488) honeyd[9183]: Killing attempted connection: tcp (192.168.15.22:58051 - 192.168.15.122:2241) |
#ping 192.168.15.121
PING 192.168.15.121 (192.168.15.121): 56 data bytes 64 bytes from 192.168.15.121: icmp_seq=2 ttl=128 time=1.122 ms ^C --- 192.168.15.121 ping statistics --- 3 packets transmitted, 1 packets received, 66% packet loss round-trip min/avg/max/stddev = 1.122/1.122/1.122/0.000 ms |
#ping 192.168.15.122
PING 192.168.15.122 (192.168.15.122): 56 data bytes 64 bytes from 192.168.15.122: icmp_seq=2 ttl=64 time=0.943 ms 64 bytes from 192.168.15.122: icmp_seq=3 ttl=64 time=0.446 ms ^C --- 192.168.15.122 ping statistics --- 4 packets transmitted, 2 packets received, 50% packet loss round-trip min/avg/max/stddev = 0.446/0.695/0.943/0.249 ms |
#nmap -O 192.168.15.122
Starting nmap 3.81 ( http://www.insecure.org/nmap/ ) at 2005-12-23 19:00 EET Interesting ports on 192.168.15.122: (The 1661 ports scanned but not shown below are in state: closed) PORT STATE SERVICE 22/tcp open ssh 23/tcp open telnet MAC Address: 00:04:75:75:46:C1 (3 Com) Device type: router Running: Cisco IOS 11.X|12.X OS details: Cisco IOS 11.3 - 12.0(11) Nmap finished: 1 IP address (1 host up) scanned in 3.251 seconds |
#exit
exit Connection to m02 closed. |
#ssh m02
Password: Last login: Fri Dec 23 18:27:28 2005 from linux3.linux.nt Copyright (c) 1980, 1983, 1986, 1988, 1990, 1991, 1993, 1994 The Regents of the University of California. All rights reserved. FreeBSD 6.0-RELEASE (GENERIC) #0: Thu Nov 3 09:36:13 UTC 2005 Welcome to FreeBSD! Before seeking technical support, please use the following resources: o Security advisories and updated errata information for all releases are at http://www.FreeBSD.org/releases/ - always consult the ERRATA section for your release first as it's updated frequently. o The Handbook and FAQ documents are at http://www.FreeBSD.org/ and, along with the mailing lists, can be searched by going to http://www.FreeBSD.org/search/. If the doc distribution has been installed, they're also available formatted in /usr/share/doc. If you still have a question or problem, please take the output of `uname -a', along with any relevant error messages, and email it as a question to the questions@FreeBSD.org mailing list. If you are unfamiliar with FreeBSD's directory layout, please refer to the hier(7) manual page. If you are not familiar with manual pages, type `man man'. You may also use sysinstall(8) to re-enter the installation and configuration utility. Edit /etc/motd to change this login announcement. |
#mc
![]() |
#./cowsay --help
![]() ./cowsay: line 9: syntax error near unexpected token `(' ./cowsay: line 9: `use Text::Tabs qw(expand);' |
# Ђройки Правая панель
_0__9249_357T1 19:04:50[root@linux3:cowsay-3.03]# cowsay fdghrdhr gtdsfgfds [1]+ Stopped cowsay |
#cowsay
![]() rstertretyretre |
#cowsay
eartesre __________ < eartesre > ---------- \ ^__^ \ (oo)\_______ (__)\ )\/\ ||----w | || || |
# Ђройки Правая панель
_0__9249_357T1 19:05:17[root@linux3:cows]# cowsay -beavis.zen.cow wegwret _________ < wegwret > --------- \ ^__^ \ (==)\_______ (__)\ )\/\ ||----w | || || |
# Ђройки Правая панель
![]() cowsay -bunny.cow wegwret Unknown option: u Unknown option: . Unknown option: c Unknown option: o cow{say,think} version 3.03, (c) 1999 Tony Monroe Usage: cowsay [-bdgpstwy] [-h] [-e eyes] [-f cowfile] [-l] [-n] [-T tongue] [-W wrapcolumn] [message] |
# Ђройки Правая панель
![]() cowsay -bunny.cow wegwret Unknown option: u Unknown option: . Unknown option: c Unknown option: o cow{say,think} version 3.03, (c) 1999 Tony Monroe Usage: cowsay [-bdgpstwy] [-h] [-e eyes] [-f cowfile] [-l] [-n] [-T tongue] [-W wrapcolumn] [message] |
# Ђройки Правая панель
![]() |
# Ђройки Правая панель
cowsay -daemon.cow wegwret Unknown option: a _________ < wegwret > --------- \ ^__^ \ (xx)\_______ (__)\ )\/\ U ||----w | || || |
# Ђройки Правая панель
![]() cowsay -satanic.cow wegwret Unknown option: a Unknown option: a Unknown option: i Unknown option: c Unknown option: . Unknown option: c Unknown option: o cow{say,think} version 3.03, (c) 1999 Tony Monroe Usage: cowsay [-bdgpstwy] [-h] [-e eyes] [-f cowfile] [-l] [-n] [-T tongue] [-W wrapcolumn] [message] |
#cowsay -daemon.cow wegwret
Unknown option: a _________ < wegwret > --------- \ ^__^ \ (xx)\_______ (__)\ )\/\ U ||----w | || || |
#cowsay -satanic.cow wegwret
![]() Unknown option: a Unknown option: a Unknown option: i Unknown option: c Unknown option: . Unknown option: c Unknown option: o cow{say,think} version 3.03, (c) 1999 Tony Monroe Usage: cowsay [-bdgpstwy] [-h] [-e eyes] [-f cowfile] [-l] [-n] [-T tongue] [-W wrapcolumn] [message] |
# Ђройки Правая панель
cowsay www.cow drthrety __________________ < www.cow drthrety > ------------------ \ ^__^ \ (oo)\_______ (__)\ )\/\ ||----w | || || |
#cowsay satanic.cow wegwret
_____________________ < satanic.cow wegwret > --------------------- \ ^__^ \ (oo)\_______ (__)\ )\/\ ||----w | || || |
#cowsay -satanic.cow wegwret
![]() Unknown option: a Unknown option: a Unknown option: i Unknown option: c Unknown option: . Unknown option: c Unknown option: o cow{say,think} version 3.03, (c) 1999 Tony Monroe Usage: cowsay [-bdgpstwy] [-h] [-e eyes] [-f cowfile] [-l] [-n] [-T tongue] [-W wrapcolumn] [message] |
#cowsay -www.cow drthrety
Unknown option: . Unknown option: c Unknown option: o __________ < drthrety > ---------- \ ^__^ \ (OO)\_______ (__)\ )\/\ ||----w | || || |
#q
![]() bash: q: command not found |
# ÐÑойки ÐÑÐ°Ð²Ð°Ñ Ð¿Ð°Ð½ÐµÐ»Ñ
Ð5CÐаÑÑÑойки ÐÑÐ°Ð²Ð°Ñ Ð¿Ð°Ð½ÐµÐ»Ñ IPTABLES_SAVE_ON_STOP="no" â ÐÐ¼Ñ âÐ Ð°Ð·Ð¼ÐµÑ âÐÑÐµÐ¼Ñ Ð¿Ñавкиââ ÐÐ¼Ñ âÐ Ð°Ð·Ð¼ÐµÑ âÐÑÐµÐ¼Ñ Ð¿Ñавкиââââââââââââââââââââââââââââv>â â/.. â-ÐÐÐРХ-â ââ/.. â-ÐÐÐРХ-â â â/cowsay-3.03 â 0âÐек 23 19:04ââ/apm-scripts â 4096âÐек 18 09:07â â restart. â â ââ/cbq â 4096âÐек 18 09:20â â â â ââ/console â 4096âÐÐ¾Ñ 10 2004â â Value: yes|no, default: no â â ââ/htb â 4096âÐÑл 12 2004â â â â ââ/networking â 4096âÐек 18 09:07â â /sysconfiâptablesâ firewall geââ/network-scripts â 4096âÐек 18 20:12â ... â â â ââ keyboard â 31âÐек 18 09:56â â â â ââ kudzu â 168âÐÐºÑ 25 2004â â â â ââ lm_sensors â 134âÐÐºÑ 20 2004â â â â ââ mouse â 115âÐек 18 19:57â â Value: yes|no, default: yes â â ââ netdump â 1469âÐÑл 12 2004â ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ â/cowsay-3.03 ers in numeric format in the sââ iptables-config â ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ СовеÑ: ÐожалÑйÑÑа, ÑлиÑе лÑбÑе ÑообÑÐµÐ½Ð¸Ñ Ð¾Ð± оÑÐ¸Ð±ÐºÐ°Ñ Ð½Ð° mc-devel@gnome.org ÐеÐеÑен3ÐÑÑ Ð¾Ð´ 4Hex 5СÑÑока 6РегÐÑÑ 7ÐоиÑк 8СÑÑой 9ÐеФоÑÐ¼Ñ |
#nmap -O 192.168.15.27
Starting nmap 3.55 ( http://www.insecure.org/nmap/ ) at 2005-12-24 11:01 EET Note: Host seems down. If it is really up, but blocking our ping probes, try -P0 Nmap run completed -- 1 IP address (0 hosts up) scanned in 12.192 seconds You have new mail in /var/spool/mail/root |
#ping 192.168.15.27
![]() PING 192.168.15.27 (192.168.15.27) 56(84) bytes of data. --- 192.168.15.27 ping statistics --- 3 packets transmitted, 0 received, 100% packet loss, time 1999ms |
$лдорлрлдрлр
![]() bash: лдорлрлдрлр: command not found |
$loijhkhjkgjkghhjkgjkhgjhghjk
![]() bash: loijhkhjkgjkghhjkgjkhgjhghjk: command not found |
$mc
|
#chmod -w prefs.js
|
#ls -la
итого 2284 drwx------ 7 user user 4096 Дек 24 11:39 . drwxrwxr-x 3 user user 4096 Дек 19 10:25 .. -rwxr-xr-x 1 user user 13552 Дек 24 11:38 bookmarks.bak -rwxr-xr-x 1 user user 13552 Дек 24 11:38 bookmarks.html drwxrwxr-x 2 user user 12288 Дек 24 11:39 Cache drwxrwxr-x 2 user user 4096 Дек 21 09:26 Cache.Trash -rw------- 1 user user 65536 Дек 24 11:38 cert8.db drwxr-xr-x 2 user user 4096 Дек 19 10:25 chrome -rw-r--r-- 1 user user 65 Дек 19 10:25 compatibility.ini ... -rw-r--r-- 1 user user 6535 Дек 24 11:38 localstore.rdf lrwxrwxrwx 1 user user 17 Дек 24 11:39 lock -> 192.168.15.3:5911 -rw-r--r-- 1 user user 2019 Дек 20 10:20 mimeTypes.rdf -r-xr-xr-x 1 user user 5439 Дек 24 11:38 prefs.js -rw-r--r-- 1 user user 752 Дек 19 10:25 search.rdf -rw------- 1 user user 16384 Дек 19 10:26 secmod.db -rw------- 1 user user 59 Дек 21 16:23 signons.txt drwxr-xr-x 2 user user 4096 Дек 19 10:25 US -rw-rw-r-- 1 user user 77147 Дек 20 14:58 xpti.dat -rw-r--r-- 1 user user 1412319 Дек 24 11:26 XUL.mfasl |
# Ђройки Правая панель
exit exit read (subshell_pty...): Input/output error (5) |
#mc
|
Время первой команды журнала | 18:22:56 2006-12-23 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Время последней команды журнала | 12:45:19 2006-12-24 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Количество командных строк в журнале | 82 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Процент команд с ненулевым кодом завершения, % | 25.61 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Процент синтаксически неверно набранных команд, % | 8.54 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Суммарное время работы с терминалом *, час | 1.51 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Количество командных строк в единицу времени, команда/мин | 0.91 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Частота использования команд |
|
В журнал автоматически попадают все команды, данные в любом терминале системы.
Для того чтобы убедиться, что журнал на текущем терминале ведётся, и команды записываются, дайте команду w. В поле WHAT, соответствующем текущему терминалу, должна быть указана программа script.
Команды, при наборе которых были допущены синтаксические ошибки, выводятся перечёркнутым текстом:
$ l s-l bash: l: command not found |
Если код завершения команды равен нулю, команда была выполнена без ошибок. Команды, код завершения которых отличен от нуля, выделяются цветом.
$ test 5 -lt 4 |
Команды, ход выполнения которых был прерван пользователем, выделяются цветом.
$ find / -name abc find: /home/devi-orig/.gnome2: Keine Berechtigung find: /home/devi-orig/.gnome2_private: Keine Berechtigung find: /home/devi-orig/.nautilus/metafiles: Keine Berechtigung find: /home/devi-orig/.metacity: Keine Berechtigung find: /home/devi-orig/.inkscape: Keine Berechtigung ^C |
Команды, выполненные с привилегиями суперпользователя, выделяются слева красной чертой.
# id uid=0(root) gid=0(root) Gruppen=0(root) |
Изменения, внесённые в текстовый файл с помощью редактора, запоминаются и показываются в журнале в формате ed. Строки, начинающиеся символом "<", удалены, а строки, начинающиеся символом ">" -- добавлены.
$ vi ~/.bashrc
|
Для того чтобы изменить файл в соответствии с показанными в диффшоте изменениями, можно воспользоваться командой patch. Нужно скопировать изменения, запустить программу patch, указав в качестве её аргумента файл, к которому применяются изменения, и всавить скопированный текст:
$ patch ~/.bashrc |
Для того чтобы получить краткую справочную информацию о команде, нужно подвести к ней мышь. Во всплывающей подсказке появится краткое описание команды.
Если справочная информация о команде есть, команда выделяется голубым фоном, например: vi. Если справочная информация отсутствует, команда выделяется розовым фоном, например: notepad.exe. Справочная информация может отсутствовать в том случае, если (1) команда введена неверно; (2) если распознавание команды LiLaLo выполнено неверно; (3) если информация о команде неизвестна LiLaLo. Последнее возможно для редких команд.
Большие, в особенности многострочные, всплывающие подсказки лучше всего показываются браузерами KDE Konqueror, Apple Safari и Microsoft Internet Explorer. В браузерах Mozilla и Firefox они отображаются не полностью, а вместо перевода строки выводится специальный символ.
Время ввода команды, показанное в журнале, соответствует времени начала ввода командной строки, которое равно тому моменту, когда на терминале появилось приглашение интерпретатора
Имя терминала, на котором была введена команда, показано в специальном блоке. Этот блок показывается только в том случае, если терминал текущей команды отличается от терминала предыдущей.
Вывод не интересующих вас в настоящий момент элементов журнала, таких как время, имя терминала и других, можно отключить. Для этого нужно воспользоваться формой управления журналом вверху страницы.
Небольшие комментарии к командам можно вставлять прямо из командной строки. Комментарий вводится прямо в командную строку, после символов #^ или #v. Символы ^ и v показывают направление выбора команды, к которой относится комментарий: ^ - к предыдущей, v - к следующей. Например, если в командной строке было введено:
$ whoami
user
$ #^ Интересно, кто я?в журнале это будет выглядеть так:
$ whoami
user
Интересно, кто я? |
Если комментарий содержит несколько строк, его можно вставить в журнал следующим образом:
$ whoami
user
$ cat > /dev/null #^ Интересно, кто я?
Программа whoami выводит имя пользователя, под которым мы зарегистрировались в системе. - Она не может ответить на вопрос о нашем назначении в этом мире.В журнале это будет выглядеть так:
$ whoami user
|
Комментарии, не относящиеся непосредственно ни к какой из команд, добавляются точно таким же способом, только вместо симолов #^ или #v нужно использовать символы #=
1 2 3 4Группы команд, выполненных на разных терминалах, разделяются специальной линией. Под этой линией в правом углу показано имя терминала, на котором выполнялись команды. Для того чтобы посмотреть команды только одного сенса, нужно щёкнуть по этому названию.
LiLaLo (L3) расшифровывается как Live Lab Log.
Программа разработана для повышения эффективности обучения Unix/Linux-системам.
(c) Игорь Чубин, 2004-2008