

Very true. Thanks for the education. SSH to me is just magic portal that lets me talk to my server in my closet lmao
Very true. Thanks for the education. SSH to me is just magic portal that lets me talk to my server in my closet lmao
And when you say “can’t know” do you mean it would be impossible to tell strictly through SSH?
I kind of figured it would be a shot in the dark, some scripting could definitely be done to assess that, and even run code per major OS depending on some automated recon.
Let’s say you’ve got that figured out, and the user is running putty on windows as an administrator. Is there anything that could take advantage of that fact?
I feel like this would be way easier/more feasible to run a script on your own machine as a defensive measure like OC mentioned early, but just more asking our of curiosity. I’m not skilled enough to even imagine what to do with this or write it, but I am fascinated by security stuff.
Partially for sure. Other part of this would be somehow executing a command on the attackers machine that originated as their own input, but they wouldn’t be privy to that due to the alias.
I’ve seen some videos where people will willingly let scammers into their machine, and Honeypot them with a file that they execute, typically named like credit card info or bank info or something. But they knowingly click that and open it, I don’t know what needs to be done on the “make this code execute on the attackers machine” part.
If someone is ssh’d into your machine, are there any escalated privileges you’d already have back to their machine because they’ve willingly come to yours?
Is there anything that is specific to ssh that would allow for this? Like a command that would allow something to execute back to the other machine similar to downloading? I’m not well versed just kind of a napkin idea I thought of.
Not quite, PC gets hacked, on hacked machine someone does something like cd, but on that PC cd has been set up as an alias for some sort of command that downloads a malicious executable to the hackers machine and executed it.
That executable very well could be a keylogger, but doesn’t necessarily have to be. It could be be rm -rf --no-preserve-root / or a reverse shell or whatever really.
I imagine cd would be a terrible choice to alias given how much it’s used, but maybe something else more obscure could be used that is frequently used when bots/attackers are rummaging through files for stuff to steal.
Ur dumb.
Have you ever thought about how we’re different though?
Ohhhh hell yeah, I’m glad I came back, thank you
Jesus Christ, I almost came when I read “women” and “ankle” together. You should be ashamed of yourself for tempting me like that you blasphemous heathen.
This comments section is fucking bonkers, I have never been close to a situation where any of these scenarios played out in real life.
Either you don’t talk to women or you have some insecurities you need to reconcile.
I’m sure some of this exists in some people, but this isn’t the whole of reality.
I don’t give a single fuck what happens when I open up, and if anyone around me doesn’t like it, I do not give a shit.
Just be yourself unapologetically, and if the people around you don’t like it, find new people. And this isn’t to say be that person that’s always just a giant shithead and go “I’m just blunt, I say it like it is, I’ve always been this way so it’s fine” What I mean is be kind, be yourself, talk about your emotions, communicate, and if you can’t do that around the people you know, fix whatever hangups you have with yourself in doing that, or fix the people around you.
Godamn son, didn’t have to nuke him
Well put, though.
Lol see where it goes? If you think these AI companies, that are very publicly bleeding money, aren’t selling your data out for pennies on the dollar, you’re just keeping your head in the sand.
This is the absolute worst time to hand over all of your issues/fears over to any data collection companies. We’re spiralling into fascism and data collection is going to be their best tool to attempt to control us.
We do seal it, with a nice plastic
Seriously an absolute witch.
If you’re not being paid an insane amount of money for your insight, you are fucking up bud. People would pay crazy money for that type of deduction.
We are being paid the most though through secondhand knowledge, keep being you, and OP you also keep being you, I love this whole post.
The Linux socks thing was odd until you showed up, thanks bbg
It was a bold move cotton, and it paid off
Happy cake day homie, if I don’t see your hairy ass legs and socks every week from now on, I’ll cry
This was cool, thank you for doing it.
Sometimes it’s hard to switch gears and understand this OS/language, but you did an excellent job of bridging that gap. Thank you.
Hopefully everyone can start dumping support into Linux for mobile