Only war is class war.
chingadera
- 8 Posts
- 1.37K Comments
- chingadera@lemmy.worldtoAsklemmy@lemmy.ml•Why didn't the Democrats release the Epstein client list?4·1 day ago
- chingadera@lemmy.worldtoAsklemmy@lemmy.ml•Why didn't the Democrats release the Epstein client list?33·1 day ago
This is also the same thing that makes them vastly different.
We call for the heads of the corrupt on our side instead of worship them.
- chingadera@lemmy.worldtoTechnology@lemmy.ml•Evidence of cell phone surveillance detected at anti-ICE protest3·2 days ago
Sometimes you just gotta draxlum sclountszts
- chingadera@lemmy.worldOPtoLinux@lemmy.ml•[Question] Is it possible or has it been done, can a Honeypot be created with bash aliases that would use a very common command someone would run if they were in your system but it aliases to some3·2 days ago
Very true. Thanks for the education. SSH to me is just magic portal that lets me talk to my server in my closet lmao
- chingadera@lemmy.worldOPtoLinux@lemmy.ml•[Question] Is it possible or has it been done, can a Honeypot be created with bash aliases that would use a very common command someone would run if they were in your system but it aliases to some1·2 days ago
And when you say “can’t know” do you mean it would be impossible to tell strictly through SSH?
- chingadera@lemmy.worldOPtoLinux@lemmy.ml•[Question] Is it possible or has it been done, can a Honeypot be created with bash aliases that would use a very common command someone would run if they were in your system but it aliases to some1·2 days ago
I kind of figured it would be a shot in the dark, some scripting could definitely be done to assess that, and even run code per major OS depending on some automated recon.
Let’s say you’ve got that figured out, and the user is running putty on windows as an administrator. Is there anything that could take advantage of that fact?
I feel like this would be way easier/more feasible to run a script on your own machine as a defensive measure like OC mentioned early, but just more asking our of curiosity. I’m not skilled enough to even imagine what to do with this or write it, but I am fascinated by security stuff.
- chingadera@lemmy.worldOPtoLinux@lemmy.ml•[Question] Is it possible or has it been done, can a Honeypot be created with bash aliases that would use a very common command someone would run if they were in your system but it aliases to some3·2 days ago
Partially for sure. Other part of this would be somehow executing a command on the attackers machine that originated as their own input, but they wouldn’t be privy to that due to the alias.
I’ve seen some videos where people will willingly let scammers into their machine, and Honeypot them with a file that they execute, typically named like credit card info or bank info or something. But they knowingly click that and open it, I don’t know what needs to be done on the “make this code execute on the attackers machine” part.
If someone is ssh’d into your machine, are there any escalated privileges you’d already have back to their machine because they’ve willingly come to yours?
- chingadera@lemmy.worldOPtoLinux@lemmy.ml•[Question] Is it possible or has it been done, can a Honeypot be created with bash aliases that would use a very common command someone would run if they were in your system but it aliases to some1·2 days ago
Is there anything that is specific to ssh that would allow for this? Like a command that would allow something to execute back to the other machine similar to downloading? I’m not well versed just kind of a napkin idea I thought of.
- chingadera@lemmy.worldOPtoLinux@lemmy.ml•[Question] Is it possible or has it been done, can a Honeypot be created with bash aliases that would use a very common command someone would run if they were in your system but it aliases to some2·2 days ago
Not quite, PC gets hacked, on hacked machine someone does something like cd, but on that PC cd has been set up as an alias for some sort of command that downloads a malicious executable to the hackers machine and executed it.
That executable very well could be a keylogger, but doesn’t necessarily have to be. It could be be rm -rf --no-preserve-root / or a reverse shell or whatever really.
I imagine cd would be a terrible choice to alias given how much it’s used, but maybe something else more obscure could be used that is frequently used when bots/attackers are rummaging through files for stuff to steal.
Yeah, that wouldve been a great opportunity to get me further interested.
I have never been in a job where “I don’t know” is an acceptable answer, but I’ve always been in a job where “I don’t know, but I can find out for you” always is.
I do friend, I ended up looking into a few years later/have other teachers explain it but I never had that spark about it again
Yeah, turned me off to science at that age too which sucks because I was pretty into it.
I asked my science teacher why and how the periodic table was setup like it was, I got “that’s how it’s setup”
But why, there as to be a reason
That’s just the way they made it
Yeah because they have to have gone by something what is that something
That’s just the way they did, stop asking questions (please don’t fucking learn in here)
Godamn that pissed me off.
- chingadera@lemmy.worldtoScience@mander.xyz•Genetic evidence that our brains make new neurons in adulthood may close a century-old debate81·6 days ago
To answer that question, all you need to do is meet some adults.
- chingadera@lemmy.worldtoScience@lemmy.ml•Scientists can 'play God' by building human DNA from scratch5·9 days ago
I think they’re actually playing science it seems like
Touche salesman
I’ve got a hint for you, look at their username. It’s sick as fuck.
I wish the d was capitalized but still awesome.
For sure, we could all be so much more than this though.
It’s a godamn shame.
Forgive may be a bit generous, at least in a lot of cases, I’d even argue most cases. We knew it was an inevitability with the only choices we had.