1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150
| charlie@hit:/var/log$ grep -Pinr "pass" . |grep -v "access.log" ./auth.log:2:2025-02-03T09:49:56.742982+01:00 hit sshd[665]: Accepted password for charlie from 192.168.1.10 port 46372 ssh2 ./auth.log:14:2025-02-03T09:50:23.932694+01:00 hit sshd[691]: Accepted password for root from 192.168.1.10 port 51268 ssh2 ./auth.log:24:2025-02-03T09:50:54.780164+01:00 hit sshd[701]: pam_unix(sshd:auth): check pass; user unknown ./auth.log:26:2025-02-03T09:50:56.693974+01:00 hit sshd[701]: Failed password for invalid user r00tP4zzw0rd from 192.168.1.10 port 45796 ssh2 ./auth.log:27:2025-02-03T09:50:59.412534+01:00 hit sshd[701]: pam_unix(sshd:auth): check pass; user unknown ./auth.log:28:2025-02-03T09:51:01.010590+01:00 hit sshd[701]: Failed password for invalid user r00tP4zzw0rd from 192.168.1.10 port 45796 ssh2 ./auth.log:31:2025-02-03T09:51:03.164492+01:00 hit sshd[701]: pam_unix(sshd:auth): check pass; user unknown ./auth.log:32:2025-02-03T09:51:04.978253+01:00 hit sshd[701]: Failed password for invalid user r00tP4zzw0rd from 192.168.1.10 port 45796 ssh2 ./auth.log:35:2025-02-03T09:51:26.125143+01:00 hit sshd[712]: Accepted password for root from 192.168.1.10 port 39662 ssh2 ./auth.log:46:2025-02-03T09:52:38.094768+01:00 hit sshd[729]: Accepted password for charlie from 192.168.1.10 port 37192 ssh2 ./kern.log:82:2025-02-03T09:45:46.607149+01:00 hit kernel: [ 0.005276] Unknown kernel command line parameters "BOOT_IMAGE=/boot/vmlinuz-6.1.0-30-amd64", will be passed to user space. ./kern.log:119:2025-02-03T09:45:46.607203+01:00 hit kernel: [ 0.022514] Speculative Store Bypass: Vulnerable ./kern.log:297:2025-02-03T09:45:46.607334+01:00 hit kernel: [ 0.370923] alg: self-tests for CTR-KDF (hmac(sha256)) passed ./kern.log:331:2025-02-03T09:45:46.607354+01:00 hit kernel: [ 0.396807] ima: No TPM chip found, activating TPM-bypass! ./kern.log:350:2025-02-03T09:45:46.607417+01:00 hit kernel: [ 0.489648] x86/mm: Checked W+X mappings: passed, no W+X pages found. ./kern.log:470:2025-02-03T09:45:46.607532+01:00 hit kernel: [ 2.420236] vmwgfx 0000:00:02.0: [drm] Capabilities: rect copy, cursor, cursor bypass, cursor bypass 2, alpha cursor, extended fifo, pitchlock, irq mask, gmr, traces, gmr2, screen object 2, command buffers, ./kern.log:571:2025-02-03T09:46:09.599307+01:00 hit kernel: [ 0.005428] Unknown kernel command line parameters "BOOT_IMAGE=/boot/vmlinuz-6.1.0-30-amd64", will be passed to user space. ./kern.log:608:2025-02-03T09:46:09.599364+01:00 hit kernel: [ 0.022678] Speculative Store Bypass: Vulnerable ./kern.log:786:2025-02-03T09:46:09.599495+01:00 hit kernel: [ 0.368569] alg: self-tests for CTR-KDF (hmac(sha256)) passed ./kern.log:820:2025-02-03T09:46:09.599518+01:00 hit kernel: [ 0.395226] ima: No TPM chip found, activating TPM-bypass! ./kern.log:839:2025-02-03T09:46:09.599569+01:00 hit kernel: [ 0.488888] x86/mm: Checked W+X mappings: passed, no W+X pages found. ./kern.log:959:2025-02-03T09:46:09.611099+01:00 hit kernel: [ 2.481281] vmwgfx 0000:00:02.0: [drm] Capabilities: rect copy, cursor, cursor bypass, cursor bypass 2, alpha cursor, extended fifo, pitchlock, irq mask, gmr, traces, gmr2, screen object 2, command buffers, ./kern.log:1060:2025-02-03T09:59:59.616124+01:00 hit kernel: [ 0.005559] Unknown kernel command line parameters "BOOT_IMAGE=/boot/vmlinuz-6.1.0-30-amd64", will be passed to user space. ./kern.log:1097:2025-02-03T09:59:59.616181+01:00 hit kernel: [ 0.023292] Speculative Store Bypass: Vulnerable ./kern.log:1275:2025-02-03T09:59:59.616312+01:00 hit kernel: [ 0.381849] alg: self-tests for CTR-KDF (hmac(sha256)) passed ./kern.log:1309:2025-02-03T09:59:59.616374+01:00 hit kernel: [ 0.409570] ima: No TPM chip found, activating TPM-bypass! ./kern.log:1328:2025-02-03T09:59:59.616425+01:00 hit kernel: [ 0.505048] x86/mm: Checked W+X mappings: passed, no W+X pages found. ./kern.log:1448:2025-02-03T09:59:59.675470+01:00 hit kernel: [ 2.556606] vmwgfx 0000:00:02.0: [drm] Capabilities: rect copy, cursor, cursor bypass, cursor bypass 2, alpha cursor, extended fifo, pitchlock, irq mask, gmr, traces, gmr2, screen object 2, command buffers, ./kern.log:1549:2025-02-03T10:14:31.844599+01:00 hit kernel: [ 0.005365] Unknown kernel command line parameters "BOOT_IMAGE=/boot/vmlinuz-6.1.0-30-amd64", will be passed to user space. ./kern.log:1586:2025-02-03T10:14:31.844656+01:00 hit kernel: [ 0.022731] Speculative Store Bypass: Vulnerable ./kern.log:1764:2025-02-03T10:14:31.844787+01:00 hit kernel: [ 0.376414] alg: self-tests for CTR-KDF (hmac(sha256)) passed ./kern.log:1798:2025-02-03T10:14:31.844808+01:00 hit kernel: [ 0.402553] ima: No TPM chip found, activating TPM-bypass! ./kern.log:1817:2025-02-03T10:14:31.844897+01:00 hit kernel: [ 0.495626] x86/mm: Checked W+X mappings: passed, no W+X pages found. ./kern.log:1937:2025-02-03T10:14:31.857964+01:00 hit kernel: [ 2.735579] vmwgfx 0000:00:02.0: [drm] Capabilities: rect copy, cursor, cursor bypass, cursor bypass 2, alpha cursor, extended fifo, pitchlock, irq mask, gmr, traces, gmr2, screen object 2, command buffers, ./kern.log:2038:2025-02-03T15:43:33.663469+01:00 hit kernel: [ 0.005697] Unknown kernel command line parameters "BOOT_IMAGE=/boot/vmlinuz-6.1.0-30-amd64", will be passed to user space. ./kern.log:2075:2025-02-03T15:43:33.663526+01:00 hit kernel: [ 0.023053] Speculative Store Bypass: Vulnerable ./kern.log:2253:2025-02-03T15:43:33.663844+01:00 hit kernel: [ 0.377040] alg: self-tests for CTR-KDF (hmac(sha256)) passed ./kern.log:2287:2025-02-03T15:43:33.663937+01:00 hit kernel: [ 0.403737] ima: No TPM chip found, activating TPM-bypass! ./kern.log:2306:2025-02-03T15:43:33.663988+01:00 hit kernel: [ 0.498750] x86/mm: Checked W+X mappings: passed, no W+X pages found. ./kern.log:2426:2025-02-03T15:43:33.732181+01:00 hit kernel: [ 2.610661] vmwgfx 0000:00:02.0: [drm] Capabilities: rect copy, cursor, cursor bypass, cursor bypass 2, alpha cursor, extended fifo, pitchlock, irq mask, gmr, traces, gmr2, screen object 2, command buffers, ./kern.log:2527:2025-02-03T23:04:13.749425+01:00 hit kernel: [ 0.005471] Unknown kernel command line parameters "BOOT_IMAGE=/boot/vmlinuz-6.1.0-30-amd64", will be passed to user space. ./kern.log:2564:2025-02-03T23:04:13.749482+01:00 hit kernel: [ 0.022848] Speculative Store Bypass: Vulnerable ./kern.log:2742:2025-02-03T23:04:13.749665+01:00 hit kernel: [ 0.470047] alg: self-tests for CTR-KDF (hmac(sha256)) passed ./kern.log:2776:2025-02-03T23:04:13.749686+01:00 hit kernel: [ 0.498369] ima: No TPM chip found, activating TPM-bypass! ./kern.log:2795:2025-02-03T23:04:13.749737+01:00 hit kernel: [ 0.593455] x86/mm: Checked W+X mappings: passed, no W+X pages found. ./kern.log:2915:2025-02-03T23:04:13.819111+01:00 hit kernel: [ 2.788234] vmwgfx 0000:00:02.0: [drm] Capabilities: rect copy, cursor, cursor bypass, cursor bypass 2, alpha cursor, extended fifo, pitchlock, irq mask, gmr, traces, gmr2, screen object 2, command buffers, ./kern.log:3016:2025-02-03T23:15:51.823614+01:00 hit kernel: [ 0.005467] Unknown kernel command line parameters "BOOT_IMAGE=/boot/vmlinuz-6.1.0-30-amd64", will be passed to user space. ./kern.log:3053:2025-02-03T23:15:51.823672+01:00 hit kernel: [ 0.024177] Speculative Store Bypass: Vulnerable ./kern.log:3231:2025-02-03T23:15:51.823803+01:00 hit kernel: [ 0.408691] alg: self-tests for CTR-KDF (hmac(sha256)) passed ./kern.log:3265:2025-02-03T23:15:51.823824+01:00 hit kernel: [ 0.436782] ima: No TPM chip found, activating TPM-bypass! ./kern.log:3284:2025-02-03T23:15:51.823875+01:00 hit kernel: [ 0.533063] x86/mm: Checked W+X mappings: passed, no W+X pages found. ./kern.log:3404:2025-02-03T23:15:51.836953+01:00 hit kernel: [ 2.745818] vmwgfx 0000:00:02.0: [drm] Capabilities: rect copy, cursor, cursor bypass, cursor bypass 2, alpha cursor, extended fifo, pitchlock, irq mask, gmr, traces, gmr2, screen object 2, command buffers, ./kern.log:3505:2025-02-03T23:21:56.666268+01:00 hit kernel: [ 0.005415] Unknown kernel command line parameters "BOOT_IMAGE=/boot/vmlinuz-6.1.0-30-amd64", will be passed to user space. ./kern.log:3542:2025-02-03T23:21:56.666325+01:00 hit kernel: [ 0.022919] Speculative Store Bypass: Vulnerable ./kern.log:3720:2025-02-03T23:21:56.666457+01:00 hit kernel: [ 0.399963] alg: self-tests for CTR-KDF (hmac(sha256)) passed ./kern.log:3754:2025-02-03T23:21:56.666478+01:00 hit kernel: [ 0.427440] ima: No TPM chip found, activating TPM-bypass! ./kern.log:3773:2025-02-03T23:21:56.666530+01:00 hit kernel: [ 0.523287] x86/mm: Checked W+X mappings: passed, no W+X pages found. ./kern.log:3893:2025-02-03T23:21:56.666684+01:00 hit kernel: [ 2.567433] vmwgfx 0000:00:02.0: [drm] Capabilities: rect copy, cursor, cursor bypass, cursor bypass 2, alpha cursor, extended fifo, pitchlock, irq mask, gmr, traces, gmr2, screen object 2, command buffers, ./kern.log:3994:2025-02-03T23:36:20.545146+01:00 hit kernel: [ 0.005477] Unknown kernel command line parameters "BOOT_IMAGE=/boot/vmlinuz-6.1.0-30-amd64", will be passed to user space. ./kern.log:4031:2025-02-03T23:36:20.545201+01:00 hit kernel: [ 0.022787] Speculative Store Bypass: Vulnerable ./kern.log:4209:2025-02-03T23:36:20.545328+01:00 hit kernel: [ 0.373341] alg: self-tests for CTR-KDF (hmac(sha256)) passed ./kern.log:4243:2025-02-03T23:36:20.545349+01:00 hit kernel: [ 0.399029] ima: No TPM chip found, activating TPM-bypass! ./kern.log:4262:2025-02-03T23:36:20.545434+01:00 hit kernel: [ 0.492292] x86/mm: Checked W+X mappings: passed, no W+X pages found. ./kern.log:4382:2025-02-03T23:36:20.563894+01:00 hit kernel: [ 2.436214] vmwgfx 0000:00:02.0: [drm] Capabilities: rect copy, cursor, cursor bypass, cursor bypass 2, alpha cursor, extended fifo, pitchlock, irq mask, gmr, traces, gmr2, screen object 2, command buffers, ./kern.log:4483:2025-02-03T23:40:14.702804+01:00 hit kernel: [ 0.005297] Unknown kernel command line parameters "BOOT_IMAGE=/boot/vmlinuz-6.1.0-30-amd64", will be passed to user space. ./kern.log:4520:2025-02-03T23:40:14.702861+01:00 hit kernel: [ 0.022499] Speculative Store Bypass: Vulnerable ./kern.log:4698:2025-02-03T23:40:14.702987+01:00 hit kernel: [ 0.373482] alg: self-tests for CTR-KDF (hmac(sha256)) passed ./kern.log:4732:2025-02-03T23:40:14.703008+01:00 hit kernel: [ 0.399198] ima: No TPM chip found, activating TPM-bypass! ./kern.log:4751:2025-02-03T23:40:14.703056+01:00 hit kernel: [ 0.492033] x86/mm: Checked W+X mappings: passed, no W+X pages found. ./kern.log:4871:2025-02-03T23:40:14.735979+01:00 hit kernel: [ 2.610698] vmwgfx 0000:00:02.0: [drm] Capabilities: rect copy, cursor, cursor bypass, cursor bypass 2, alpha cursor, extended fifo, pitchlock, irq mask, gmr, traces, gmr2, screen object 2, command buffers, ./kern.log:4972:2025-02-03T23:47:43.609414+01:00 hit kernel: [ 0.005325] Unknown kernel command line parameters "BOOT_IMAGE=/boot/vmlinuz-6.1.0-30-amd64", will be passed to user space. ./kern.log:5009:2025-02-03T23:47:43.609470+01:00 hit kernel: [ 0.022364] Speculative Store Bypass: Vulnerable ./kern.log:5187:2025-02-03T23:47:43.609623+01:00 hit kernel: [ 0.370600] alg: self-tests for CTR-KDF (hmac(sha256)) passed ./kern.log:5221:2025-02-03T23:47:43.609645+01:00 hit kernel: [ 0.396510] ima: No TPM chip found, activating TPM-bypass! ./kern.log:5240:2025-02-03T23:47:43.609877+01:00 hit kernel: [ 0.489828] x86/mm: Checked W+X mappings: passed, no W+X pages found. ./kern.log:5360:2025-02-03T23:47:43.650479+01:00 hit kernel: [ 2.522706] vmwgfx 0000:00:02.0: [drm] Capabilities: rect copy, cursor, cursor bypass, cursor bypass 2, alpha cursor, extended fifo, pitchlock, irq mask, gmr, traces, gmr2, screen object 2, command buffers, ./kern.log:5462:2025-02-04T16:04:11.842605+01:00 hit kernel: [ 0.013207] Unknown kernel command line parameters "BOOT_IMAGE=/boot/vmlinuz-6.1.0-30-amd64", will be passed to user space. ./kern.log:5497:2025-02-04T16:04:11.842704+01:00 hit kernel: [ 0.121905] Speculative Store Bypass: Vulnerable ./kern.log:5670:2025-02-04T16:04:11.843240+01:00 hit kernel: [ 1.298821] alg: self-tests for CTR-KDF (hmac(sha256)) passed ./kern.log:5704:2025-02-04T16:04:11.843304+01:00 hit kernel: [ 1.370026] ima: No TPM chip found, activating TPM-bypass! ./kern.log:5723:2025-02-04T16:04:11.843371+01:00 hit kernel: [ 1.466810] x86/mm: Checked W+X mappings: passed, no W+X pages found. ./kern.log:5842:2025-02-04T16:04:12.013910+01:00 hit kernel: [ 4.822390] vmwgfx 0000:00:02.0: [drm] Capabilities: rect copy, cursor, cursor bypass, cursor bypass 2, alpha cursor, extended fifo, pitchlock, irq mask, gmr, traces, gmr2, screen object 2, command buffers, grep: ./btmp: Permiso denegado grep: ./journal/6e1aca33dec44fef9ccdccf718c8150a/system@a0742b1a5f354a49a8e5e976590acc0d-0000000000000dd2-00062d2f519cbec6.journal: coincidencia en fichero binario grep: ./journal/6e1aca33dec44fef9ccdccf718c8150a/system@00060a2d81869ff7-950cb9ae29ceea68.journal~: coincidencia en fichero binario grep: ./journal/6e1aca33dec44fef9ccdccf718c8150a/system@00062d44129755a7-2bb01093fe79ff6a.journal~: coincidencia en fichero binario grep: ./journal/6e1aca33dec44fef9ccdccf718c8150a/user-1000.journal: coincidencia en fichero binario grep: ./journal/6e1aca33dec44fef9ccdccf718c8150a/system@00060a2dabf64898-333fc89e8bd4ec01.journal~: coincidencia en fichero binario grep: ./journal/6e1aca33dec44fef9ccdccf718c8150a/system@00062d3786ca6845-442dade4fab6d7c6.journal~: coincidencia en fichero binario grep: ./journal/6e1aca33dec44fef9ccdccf718c8150a/system.journal: coincidencia en fichero binario grep: ./journal/6e1aca33dec44fef9ccdccf718c8150a/system@00062d2f519e07d7-b0bbe5cef5db6c97.journal~: coincidencia en fichero binario grep: ./journal/6e1aca33dec44fef9ccdccf718c8150a/system@00062d52523f2e2a-7ce3e570a7837216.journal~: coincidencia en fichero binario grep: ./journal/6e1aca33dec44fef9ccdccf718c8150a/system@00060a2df63aad18-0f29f983d6f5561b.journal~: coincidencia en fichero binario ./syslog:82:2025-02-03T09:45:46.607149+01:00 hit kernel: [ 0.005276] Unknown kernel command line parameters "BOOT_IMAGE=/boot/vmlinuz-6.1.0-30-amd64", will be passed to user space. ./syslog:119:2025-02-03T09:45:46.607203+01:00 hit kernel: [ 0.022514] Speculative Store Bypass: Vulnerable ./syslog:297:2025-02-03T09:45:46.607334+01:00 hit kernel: [ 0.370923] alg: self-tests for CTR-KDF (hmac(sha256)) passed ./syslog:331:2025-02-03T09:45:46.607354+01:00 hit kernel: [ 0.396807] ima: No TPM chip found, activating TPM-bypass! ./syslog:350:2025-02-03T09:45:46.607417+01:00 hit kernel: [ 0.489648] x86/mm: Checked W+X mappings: passed, no W+X pages found. ./syslog:470:2025-02-03T09:45:46.607532+01:00 hit kernel: [ 2.420236] vmwgfx 0000:00:02.0: [drm] Capabilities: rect copy, cursor, cursor bypass, cursor bypass 2, alpha cursor, extended fifo, pitchlock, irq mask, gmr, traces, gmr2, screen object 2, command buffers, ./syslog:680:2025-02-03T09:46:09.599307+01:00 hit kernel: [ 0.005428] Unknown kernel command line parameters "BOOT_IMAGE=/boot/vmlinuz-6.1.0-30-amd64", will be passed to user space. ./syslog:717:2025-02-03T09:46:09.599364+01:00 hit kernel: [ 0.022678] Speculative Store Bypass: Vulnerable ./syslog:895:2025-02-03T09:46:09.599495+01:00 hit kernel: [ 0.368569] alg: self-tests for CTR-KDF (hmac(sha256)) passed ./syslog:929:2025-02-03T09:46:09.599518+01:00 hit kernel: [ 0.395226] ima: No TPM chip found, activating TPM-bypass! ./syslog:948:2025-02-03T09:46:09.599569+01:00 hit kernel: [ 0.488888] x86/mm: Checked W+X mappings: passed, no W+X pages found. ./syslog:1068:2025-02-03T09:46:09.611099+01:00 hit kernel: [ 2.481281] vmwgfx 0000:00:02.0: [drm] Capabilities: rect copy, cursor, cursor bypass, cursor bypass 2, alpha cursor, extended fifo, pitchlock, irq mask, gmr, traces, gmr2, screen object 2, command buffers, ./syslog:1521:2025-02-03T09:59:59.616124+01:00 hit kernel: [ 0.005559] Unknown kernel command line parameters "BOOT_IMAGE=/boot/vmlinuz-6.1.0-30-amd64", will be passed to user space. ./syslog:1558:2025-02-03T09:59:59.616181+01:00 hit kernel: [ 0.023292] Speculative Store Bypass: Vulnerable ./syslog:1736:2025-02-03T09:59:59.616312+01:00 hit kernel: [ 0.381849] alg: self-tests for CTR-KDF (hmac(sha256)) passed ./syslog:1770:2025-02-03T09:59:59.616374+01:00 hit kernel: [ 0.409570] ima: No TPM chip found, activating TPM-bypass! ./syslog:1789:2025-02-03T09:59:59.616425+01:00 hit kernel: [ 0.505048] x86/mm: Checked W+X mappings: passed, no W+X pages found. ./syslog:1973:2025-02-03T09:59:59.675470+01:00 hit kernel: [ 2.556606] vmwgfx 0000:00:02.0: [drm] Capabilities: rect copy, cursor, cursor bypass, cursor bypass 2, alpha cursor, extended fifo, pitchlock, irq mask, gmr, traces, gmr2, screen object 2, command buffers, ./syslog:2344:2025-02-03T10:14:31.844599+01:00 hit kernel: [ 0.005365] Unknown kernel command line parameters "BOOT_IMAGE=/boot/vmlinuz-6.1.0-30-amd64", will be passed to user space. ./syslog:2381:2025-02-03T10:14:31.844656+01:00 hit kernel: [ 0.022731] Speculative Store Bypass: Vulnerable ./syslog:2559:2025-02-03T10:14:31.844787+01:00 hit kernel: [ 0.376414] alg: self-tests for CTR-KDF (hmac(sha256)) passed ./syslog:2593:2025-02-03T10:14:31.844808+01:00 hit kernel: [ 0.402553] ima: No TPM chip found, activating TPM-bypass! ./syslog:2612:2025-02-03T10:14:31.844897+01:00 hit kernel: [ 0.495626] x86/mm: Checked W+X mappings: passed, no W+X pages found. ./syslog:2785:2025-02-03T10:14:31.857964+01:00 hit kernel: [ 2.735579] vmwgfx 0000:00:02.0: [drm] Capabilities: rect copy, cursor, cursor bypass, cursor bypass 2, alpha cursor, extended fifo, pitchlock, irq mask, gmr, traces, gmr2, screen object 2, command buffers, grep: ./syslog: coincidencia en fichero binario ./dpkg.log:2:2023-11-15 08:56:11 install base-passwd:amd64 <none> 3.6.1 ./dpkg.log:3:2023-11-15 08:56:11 status half-installed base-passwd:amd64 3.6.1 ./dpkg.log:4:2023-11-15 08:56:12 status unpacked base-passwd:amd64 3.6.1 ./dpkg.log:5:2023-11-15 08:56:12 configure base-passwd:amd64 3.6.1 3.6.1 ./dpkg.log:6:2023-11-15 08:56:12 status half-configured base-passwd:amd64 3.6.1 ./dpkg.log:7:2023-11-15 08:56:12 status installed base-passwd:amd64 3.6.1 ./dpkg.log:169:2023-11-15 08:56:17 upgrade base-passwd:amd64 3.6.1 3.6.1 ./dpkg.log:170:2023-11-15 08:56:17 status half-configured base-passwd:amd64 3.6.1 ./dpkg.log:171:2023-11-15 08:56:17 status unpacked base-passwd:amd64 3.6.1 ./dpkg.log:172:2023-11-15 08:56:17 status half-installed base-passwd:amd64 3.6.1 ./dpkg.log:173:2023-11-15 08:56:17 status unpacked base-passwd:amd64 3.6.1 ./dpkg.log:283:2023-11-15 08:56:19 install passwd:amd64 <none> 1:4.13+dfsg1-1+b1 ./dpkg.log:284:2023-11-15 08:56:19 status half-installed passwd:amd64 1:4.13+dfsg1-1+b1 ./dpkg.log:285:2023-11-15 08:56:19 status unpacked passwd:amd64 1:4.13+dfsg1-1+b1 ./dpkg.log:613:2023-11-15 08:56:22 configure base-passwd:amd64 3.6.1 <none> ./dpkg.log:614:2023-11-15 08:56:22 status unpacked base-passwd:amd64 3.6.1 ./dpkg.log:615:2023-11-15 08:56:22 status half-configured base-passwd:amd64 3.6.1 ./dpkg.log:616:2023-11-15 08:56:22 status installed base-passwd:amd64 3.6.1 ./dpkg.log:665:2023-11-15 08:56:22 configure passwd:amd64 1:4.13+dfsg1-1+b1 <none> ./dpkg.log:666:2023-11-15 08:56:22 status unpacked passwd:amd64 1:4.13+dfsg1-1+b1 ./dpkg.log:667:2023-11-15 08:56:22 status half-configured passwd:amd64 1:4.13+dfsg1-1+b1 ./dpkg.log:668:2023-11-15 08:56:22 status installed passwd:amd64 1:4.13+dfsg1-1+b1 grep: ./installer/cdebconf/templates.dat: Permiso denegado grep: ./installer/cdebconf/questions.dat: Permiso denegado grep: ./installer/Xorg.0.log: Permiso denegado grep: ./installer/syslog: Permiso denegado ./installer/status:1912:Description: Set up users and passwords grep: ./installer/partman: Permiso denegado ./installer/hardware-summary:130:/proc/cpuinfo: bugs : spectre_v1 spectre_v2 spec_store_bypass swapgs taa itlb_multihit srbds mmio_stale_data retbleed gds grep: ./private: Permiso denegado
|