Help
RSS
API
Feed
Maltego
Contact
Domain > vkda.io
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-05-18
52.92.248.211
(
ClassC
)
2024-12-03
52.92.139.123
(
ClassC
)
2025-02-25
52.92.201.227
(
ClassC
)
2025-03-09
3.5.85.240
(
ClassC
)
2025-06-01
52.218.238.42
(
ClassC
)
2026-01-01
52.92.239.75
(
ClassC
)
2026-03-03
52.92.209.115
(
ClassC
)
Port 80
HTTP/1.1 200 OKx-amz-id-2: PZh/MqUihPrnz38dDTL2nsyjWc9FE9tFvNRlMT1+wiJ4VXDsF9iZGLt7azrZVZ/Y2hSxurH7FUox-amz-request-id: WJ1YB60R9NJ8A86BDate: Sat, 18 May 2024 10:25:55 GMTLast-Modified: Thu, 18 Nov 20 #!/bin/bash# Verkada Toolkit# Copyright 2020-2021 Verkada, Inc. All rights reserved.# cannot install ssh via sshif -n ${SSH_CLIENT} ; then echo Running via SSH not supported. Please run via {pico|micro|mini}com. exit 1fi# in case already run...killall -q sshd dropbear# no echo wrapper around pushdpushd () { command pushd $@ > /dev/null}# no echo wrapper around popdpopd () { command popd $@ > /dev/null}# armv7l, aarch64, etc.ARCH$(uname -m)# set pathexport PATH/mnt/ramdisk/vtk/bin:$PATH# setup directoriesmkdir -p /mnt/ramdisk/vtk/binmkdir -p /mnt/ramdisk/vtk/etcmkdir -p /mnt/ramdisk/vtk/root/.ssh# fetch dropbear (ssh client/server) and vtk toolpushd /mnt/ramdisk/vtk/bincurl -s vkda.io/$ARCH/dropbear.tar.gz | tar hxzcurl -sO vkda.io/vtkchmod +x vtkpopd# mount pseudoterminalsif grep -qs /dev/pts /proc/mounts; then echo else mkdir -p /dev/pts mount -t devpts /dev/pts /dev/ptsfi# bind mount writeable filesystemif grep -qs /home/root /proc/mounts; then echo else mount --bind /mnt/ramdisk/vtk/root /home/rootfi# setup pubkeyecho ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYvalsDyCswPuVfyGFrvPsAxHMiTIoXmArmM26V+ALde9BtyMZHBUiWgxp4PHiXf7WYR3gkwgl1r1Hch5R9C4Fl9WKVK36l9k2+knhoglQfit0lK5Au4Nd26uieJAYjPxv6rZMEOUZ+/88brbr5xfGew1ArK++Og0vYPwtxdmwf6e0YG6i0MyvVS18GNRUPat1oeHBZVlIl7oFRK0j/JZhADCxEeXpyag5+NC9M6tfIm//DasjaEDf41bPGCIwAvZW8oqBMhsCxSHkyLfLJ1IqxkShi1fWSKw0OQykcLQVpBPyD9MJPp++nrnHxleJ3EIwTs7nzhMIno9eklSoq0hV root@localhost > /home/root/.ssh/authorized_keys# generate hostkeyif ! -f /mnt/ramdisk/vtk/etc/dropbear_ecdsa_host_key ; then ssh-keygen -t ecdsa -f /mnt/ramdisk/vtk/etc/dropbear_ecdsa_host_keyfi# convenient settings: set path, default to bash, vi editing modeecho alias vvtk > /home/root/.profileecho export PATH/mnt/ramdisk/vtk/bin:$PATH >> /home/root/.profileecho export LD_LIBRARY_PATH/mnt/ramdisk/vtk/lib:$PATH >> /home/root/.profileecho exec /bin/bash >> /home/root/.profileecho set editing-mode vi > /home/root/.inputrc# run sshdsshd -r /mnt/ramdisk/vtk/etc/dropbear_ecdsa_host_key -s > /dev/null 2>&1# open port
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]