Advertisement
Guest User

Untitled

a guest
Dec 21st, 2014
152
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.27 KB | None | 0 0
  1. 2013-03-08 14:36:16 Connecting to 127.0.0.1 port 22
  2. 2013-03-08 14:36:16 Server version: SSH-2.0-OpenSSH_6.1
  3. 2013-03-08 14:36:16 Using SSH protocol version 2
  4. 2013-03-08 14:36:16 We claim version: SSH-2.0-PuTTY_Release_0.62
  5. 2013-03-08 14:36:16 Doing Diffie-Hellman group exchange
  6. 2013-03-08 14:36:16 Doing Diffie-Hellman key exchange with hash SHA-256
  7. 2013-03-08 14:36:16 Host key fingerprint is:
  8. 2013-03-08 14:36:16 ssh-rsa 2048 48:e0:21:ce:d7:bc:85:b4:f7:3e:49:08:31:4d:55:5a
  9. 2013-03-08 14:36:16 Initialised AES-256 SDCTR client->server encryption
  10. 2013-03-08 14:36:16 Initialised HMAC-SHA1 client->server MAC algorithm
  11. 2013-03-08 14:36:16 Initialised AES-256 SDCTR server->client encryption
  12. 2013-03-08 14:36:16 Initialised HMAC-SHA1 server->client MAC algorithm
  13. 2013-03-08 14:36:18 Attempting keyboard-interactive authentication
  14. 2013-03-08 14:36:18 Server refused keyboard-interactive authentication
  15. 2013-03-08 14:36:21 Sent password
  16. 2013-03-08 14:36:21 Access granted
  17. 2013-03-08 14:36:21 Opened channel for session
  18. 2013-03-08 14:36:21 Allocated pty (ospeed 38400bps, ispeed 38400bps)
  19. 2013-03-08 14:36:21 Started a shell/command
  20. 2013-03-08 14:36:21 Server sent command exit status 0
  21. 2013-03-08 14:36:43 Disconnected: All channels closed
  22.  
  23. login as: username
  24. username@127.0.0.1's password:
  25. Last login: Fri Mar 8 14:36:21 2013 from 127.0.0.1
  26. debug1: permanently_set_uid: 11625/10513
  27. debug3: Copy environment: ALLUSERSPROFILE=C:\ProgramData
  28. debug3: Copy environment: COMPUTERNAME=QTEC0611
  29. debug3: Copy environment: COMSPEC=C:\Windows\system32\cmd.exe
  30. debug3: Copy environment: OS=Windows_NT
  31. debug3: Copy environment: PATH=/cygdrive/c/Program Files/Common Files/Microsoft Shared/Windows Live:/cygdrive/c/Windows/system32:/cygdrive/c/Windows:/cygdrive/c/Windows/System32/Wbem:/cygdrive/c/Windows/System32/WindowsPowerShell/v1.0:/cygdrive/c/Program Files/NTRU Cryptosystems/NTRU TCG Software Stack/bin:/cygdrive/c/Program Files/Wave Systems Corp/Gemalto/Access Client/v5:/cygdrive/c/Program Files/Common Files/Roxio Shared/DLLShared:/cygdrive/c/Program Files/Common Files/Roxio Shared/10.0/DLLShared:/cygdrive/c/Program Files/ActivIdentity/ActivClient:/cygdrive/c/Program Files/Windows Live/Shared:/cygdrive/c/Program Files/QuickTime/QTSystem:/cygdrive/c/Program Files/Microsoft SQL Server/110/Tools/Binn:/cygdrive/c/Program Files/Microsoft SQL Server/110/DTS/Binn:/cygdrive/c/Cygwin/bin:/cygdrive/c/Program Files/PuTTY:/bin
  32. debug3: Copy environment: PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
  33. debug3: Copy environment: PROGRAMFILES=C:\Program Files
  34. debug3: Copy environment: SYSTEMDRIVE=C:
  35. debug3: Copy environment: SYSTEMROOT=C:\Windows
  36. debug3: Copy environment: WINDIR=C:\Windows
  37. Environment:
  38. ALLUSERSPROFILE=C:ProgramData
  39. COMPUTERNAME=QTEC0611
  40. COMSPEC=C:Windowssystem32cmd.exe
  41. OS=Windows_NT
  42. PATH=/cygdrive/c/Program Files/Common Files/Microsoft Shared/Windows Live:/cygdrive/c/Windows/system32:/cygdrive/c/Windows:/cygdrive/c/Windows/System32/Wbem:/cygdrive/c/Windows/System32/WindowsPowerSh
  43. PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
  44. PROGRAMFILES=C:Program Files
  45. SYSTEMDRIVE=C:
  46. SYSTEMROOT=C:Windows
  47. WINDIR=C:Windows
  48. USER=username
  49. LOGNAME=username
  50. HOME=/home/username
  51. MAIL=/var/spool/mail//username
  52. SHELL=/bin/bash
  53. SSH_CLIENT=127.0.0.1 52075 22
  54. SSH_CONNECTION=127.0.0.1 52075 127.0.0.1 22
  55. SSH_TTY=/dev/pty1
  56. TERM=xterm
  57.  
  58. # $OpenBSD: ssh_config,v 1.26 2010/01/11 01:39:46 dtucker Exp $
  59.  
  60. # This is the ssh client system-wide configuration file. See
  61. # ssh_config(5) for more information. This file provides defaults for
  62. # users, and the values can be changed in per-user configuration files
  63. # or on the command line.
  64.  
  65. # Configuration data is parsed as follows:
  66. # 1. command line options
  67. # 2. user-specific file
  68. # 3. system-wide file
  69. # Any configuration value is only changed the first time it is set.
  70. # Thus, host-specific definitions should be at the beginning of the
  71. # configuration file, and defaults at the end.
  72.  
  73. # Site-wide defaults for some commonly used options. For a comprehensive
  74. # list of available options, their meanings and defaults, please see the
  75. # ssh_config(5) man page.
  76.  
  77. # Host *
  78. # ForwardAgent no
  79. # ForwardX11 no
  80. # RhostsRSAAuthentication no
  81. # RSAAuthentication yes
  82. # PasswordAuthentication yes
  83. # HostbasedAuthentication no
  84. # GSSAPIAuthentication no
  85. # GSSAPIDelegateCredentials no
  86. # BatchMode no
  87. # CheckHostIP yes
  88. # AddressFamily any
  89. # ConnectTimeout 0
  90. # StrictHostKeyChecking ask
  91. # IdentityFile ~/.ssh/identity
  92. # IdentityFile ~/.ssh/id_rsa
  93. # IdentityFile ~/.ssh/id_dsa
  94. # Port 22
  95. # Protocol 2,1
  96. # Cipher 3des
  97. # Ciphers aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc
  98. # MACs hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160
  99. # EscapeChar ~
  100. # Tunnel no
  101. # TunnelDevice any:any
  102. # PermitLocalCommand no
  103. # VisualHostKey no
  104. # ProxyCommand ssh -q -W %h:%p gateway.example.com
  105.  
  106. # $OpenBSD: sshd_config,v 1.87 2012/07/10 02:19:15 djm Exp $
  107.  
  108. # This is the sshd server system-wide configuration file. See
  109. # sshd_config(5) for more information.
  110.  
  111. # This sshd was compiled with PATH=/bin:/usr/sbin:/sbin:/usr/bin
  112.  
  113. # The strategy used for options in the default sshd_config shipped with
  114. # OpenSSH is to specify options with their default value where
  115. # possible, but leave them commented. Uncommented options override the
  116. # default value.
  117.  
  118. Port 22
  119. #AddressFamily any
  120. #ListenAddress 0.0.0.0
  121. #ListenAddress ::
  122.  
  123. # The default requires explicit activation of protocol 1
  124. #Protocol 2
  125.  
  126. # HostKey for protocol version 1
  127. #HostKey /etc/ssh_host_key
  128. # HostKeys for protocol version 2
  129. #HostKey /etc/ssh_host_rsa_key
  130. #HostKey /etc/ssh_host_dsa_key
  131. #HostKey /etc/ssh_host_ecdsa_key
  132.  
  133. # Lifetime and size of ephemeral version 1 server key
  134. #KeyRegenerationInterval 1h
  135. #ServerKeyBits 1024
  136.  
  137. # Logging
  138. # obsoletes QuietMode and FascistLogging
  139. #SyslogFacility AUTH
  140. #LogLevel INFO
  141.  
  142. # Authentication:
  143.  
  144. #LoginGraceTime 2m
  145. #PermitRootLogin yes
  146. StrictModes no
  147. #MaxAuthTries 6
  148. #MaxSessions 10
  149.  
  150. #RSAAuthentication yes
  151. #PubkeyAuthentication yes
  152.  
  153. # The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2
  154. # but this is overridden so installations will only check .ssh/authorized_keys
  155. AuthorizedKeysFile .ssh/authorized_keys
  156.  
  157. #AuthorizedPrincipalsFile none
  158.  
  159. # For this to work you will also need host keys in /etc/ssh_known_hosts
  160. #RhostsRSAAuthentication no
  161. # similar for protocol version 2
  162. #HostbasedAuthentication no
  163. # Change to yes if you don't trust ~/.ssh/known_hosts for
  164. # RhostsRSAAuthentication and HostbasedAuthentication
  165. #IgnoreUserKnownHosts no
  166. # Don't read the user's ~/.rhosts and ~/.shosts files
  167. #IgnoreRhosts yes
  168.  
  169. # To disable tunneled clear text passwords, change to no here!
  170. #PasswordAuthentication yes
  171. #PermitEmptyPasswords no
  172.  
  173. # Change to no to disable s/key passwords
  174. #ChallengeResponseAuthentication yes
  175.  
  176. # Kerberos options
  177. #KerberosAuthentication no
  178. #KerberosOrLocalPasswd yes
  179. #KerberosTicketCleanup yes
  180. #KerberosGetAFSToken no
  181.  
  182. # GSSAPI options
  183. #GSSAPIAuthentication no
  184. #GSSAPICleanupCredentials yes
  185.  
  186. # Set this to 'yes' to enable PAM authentication, account processing,
  187. # and session processing. If this is enabled, PAM authentication will
  188. # be allowed through the ChallengeResponseAuthentication and
  189. # PasswordAuthentication. Depending on your PAM configuration,
  190. # PAM authentication via ChallengeResponseAuthentication may bypass
  191. # the setting of "PermitRootLogin without-password".
  192. # If you just want the PAM account and session checks to run without
  193. # PAM authentication, then enable this but set PasswordAuthentication
  194. # and ChallengeResponseAuthentication to 'no'.
  195. #UsePAM no
  196.  
  197. #AllowAgentForwarding yes
  198. #AllowTcpForwarding yes
  199. #GatewayPorts no
  200. #X11Forwarding no
  201. #X11DisplayOffset 10
  202. #X11UseLocalhost yes
  203. #PrintMotd yes
  204. #PrintLastLog yes
  205. #TCPKeepAlive yes
  206. #UseLogin no
  207. UsePrivilegeSeparation sandbox # Default for new installations.
  208. #PermitUserEnvironment no
  209. #Compression delayed
  210. #ClientAliveInterval 0
  211. #ClientAliveCountMax 3
  212. #UseDNS yes
  213. #PidFile /var/run/sshd.pid
  214. #MaxStartups 10
  215. #PermitTunnel no
  216. #ChrootDirectory none
  217. #VersionAddendum none
  218.  
  219. # no default banner path
  220. #Banner none
  221.  
  222. # override default of no subsystems
  223. Subsystem sftp /usr/sbin/sftp-server
  224.  
  225. # Example of overriding settings on a per-user basis
  226. #Match User anoncvs
  227. # X11Forwarding no
  228. # AllowTcpForwarding no
  229. # ForceCommand cvs server
  230.  
  231. ssh 127.0.0.1 /bin/bash
  232.  
  233. ssh 127.0.0.1 ls
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement