parent
2b65a991d4
commit
1373bdcddd
@ -1,20 +1,2 @@
|
||||
prompt=root@mail.vidconnect.cyou$
|
||||
5BAABD7C4581F90088133C0E945302C2=\t0\t0\t0 -
|
||||
uname=Linux
|
||||
9DD46246144D353C914D7572AEDF8EA6=Linux mail.vidconnect.cyou 4.15.0-70-generic #79-Ubuntu SMP Tue Nov 12 10:36:10 UTC 2019 aarch64 aarch64 aarch64 GNU/Linux
|
||||
whoami=root
|
||||
4DE8A3B5E72E54D9D2A70BD43CB5EA9E=Model:\t\t0
|
||||
99EFF9F4022855955653078ECB2B4CE4=1.9G
|
||||
39B28F3F76277A5E25665A3DBB12CC5B=3942 2493 512 9 936 1275
|
||||
B9B7DA613BBB90640EB8E5F657E41E6B=-rwxr-xr-x 1 root root 123K Jan 18 2018 /bin/ls
|
||||
F806FB8A02384A22ECC110F111367FF7=crontabs/root/: fopen: Permission denied
|
||||
C1B46A786F0DD463D37DF505EA57FCE4=Permission denied
|
||||
36CAB7DA5AB930336E239DD8008DCBBD=Permission denied
|
||||
w= 12:28:36 up 654 days, 1:37, 1 user, load average: 0.00, 0.00, 0.00\r\nUSER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT\r\nroot pts/0 58.176.72.32 10:46 1.00s 13.14s 0.00s w
|
||||
top=Permission denied
|
||||
43AEB525EBC517BAF8C01E7AC83F63CE=aarch64
|
||||
3AA823F5C5095BD60BE4AA37D603BBA4= 0 0 0 -
|
||||
8B456C4EB5A75DA148EAD2E83B334E5E=Permission denied
|
||||
FE5B6F84E749B84114423D5AD1A11034=
|
||||
83809E84C1396C58D4156E8FF7782299=[ Uname ] Linux mail.vidconnect.cyou 4.15.0-70-generic #79-Ubuntu SMP Tue Nov 12 10:36:10 UTC 2019 aarch64 aarch64 aarch64 GNU/Linux\r\n[ Uptime ] 15:23:06 up 655 days, 4:32, 1 user, load average: 0.00, 0.00, 0.00\r\n
|
||||
prompt=$
|
||||
chpasswd=Password updated
|
@ -0,0 +1,11 @@
|
||||
## Introduction
|
||||
|
||||
This is a dummy SSH server created using MINA SSHD Library and springboot 3.
|
||||
The point is for me to learn the SSH hacker bots command patterns around the world.
|
||||
I share this project so that others can learn this as well.
|
||||
|
||||
## How to build
|
||||
mvn clean package
|
||||
|
||||
## How to run
|
||||
java -jar echo-sshd-server-<version>.jar
|
Loading…
Reference in new issue