

House fires can’t melt gemstone beams
You heard it here first, these fires were an inside job.
House fires can’t melt gemstone beams
You heard it here first, these fires were an inside job.
But but but he speaks the language
Sir, your /ich_iel is leaking
That’s fully understood, we’re talking about propaganda, and I’m talking about who that propaganda affects.
You’re not wrong though at all. Arm yourself, convince anyone you can to do the same.
Only war is class war and I aim to win this bitch
This is dark, but you fuckin do you gurl. Fuck em.
It’s one guy making the propaganda right now, but I assure you, in a week, everyone in your family that you try not to talk to will be spouting this horseshit.
I’m just baffled because not only is it way easier to not hate people, it’s way more beneficial for everyone.
These people are taking two mile hikes to find the perfect deer shit to shove down their throats.
You’re gonna do it brudduh, don’t stop bettering yourself :)
Always has been, they just stopped polishing the turd.
Unfortunately he does. The aftermath of this regime will take a minimum of 50 years to fix, if it can be.
WHO THE FUCK USED ALL THE HOT WATER, but every nano-second
They’re so close to the truth, but they’ll never see it.
Now that’s a proper legacy
Chapter 6:
People with power have the power to hold on to that power, while people without power lack the power to take that power away. Power powers power.
Well if they’re both not in this picture they must be in a picture together somewhere.
Very true. Thanks for the education. SSH to me is just magic portal that lets me talk to my server in my closet lmao
And when you say “can’t know” do you mean it would be impossible to tell strictly through SSH?
I kind of figured it would be a shot in the dark, some scripting could definitely be done to assess that, and even run code per major OS depending on some automated recon.
Let’s say you’ve got that figured out, and the user is running putty on windows as an administrator. Is there anything that could take advantage of that fact?
I feel like this would be way easier/more feasible to run a script on your own machine as a defensive measure like OC mentioned early, but just more asking our of curiosity. I’m not skilled enough to even imagine what to do with this or write it, but I am fascinated by security stuff.
Partially for sure. Other part of this would be somehow executing a command on the attackers machine that originated as their own input, but they wouldn’t be privy to that due to the alias.
I’ve seen some videos where people will willingly let scammers into their machine, and Honeypot them with a file that they execute, typically named like credit card info or bank info or something. But they knowingly click that and open it, I don’t know what needs to be done on the “make this code execute on the attackers machine” part.
If someone is ssh’d into your machine, are there any escalated privileges you’d already have back to their machine because they’ve willingly come to yours?
I gotta say, three guns per person is starting to sound like a strength and not a weakness.