قالب وردپرس درنا توس
Home / Tips and Tricks / How to Track a Computer with SSH «Null Byte :: WonderHowTo

How to Track a Computer with SSH «Null Byte :: WonderHowTo



While SSH is usually used for hidden backdoor access to a computer, it can sometimes be helpful to do the opposite. If you've ever had to prove that you have remote access to a device, or just want to convince someone to hijack your computer, you can use SSH to set a device to show signs of obsession.

Spooky Action in the Distance

If you have to prove that you have remote access to a computer but you do not want to risk a demonstration that could compromise your data, SSH can be a lot of fun to work with. There are many ways to either create a big distraction or to confirm that you can access a target device via SSH, and most of them are also pretty dramatic if done properly.

While the signs of remote access to your computer are obvious to some, the average person is not looking for clues that suggest that they are attacked and tend to assign strange characteristics to their computer for errors, malfunctions or other reasons beyond their control. With SSH access, a hacker can easily create fake alerts or create behaviors that lead others to do something the hacker demands.

Instead of being subtle, we'll look at things we can do about SSH The maximum impact to hide a user at the other end.

Alarming Things You Can Do About SSH

There are many tools available for creating an alarming SSH experience. To begin with, we can launch applications like Firefox to navigate to any webpage you want by launching either full-screen web pages or several smaller browser windows. Most people associate websites that are started with a virus or adware, especially if most sites are Viagra.

Next we can start making noises. The speakers connected to a computer are a lot of fun, and this can be in the form of an alarming beep or a language that seems to come from nowhere. If someone thinks he's home alone, a computer screaming at him out of nowhere is a very unwelcome surprise. The same goes for your computer, which begins to beep violently as if it were about to explode.

If we want to be more direct, we can create frightening error messages that take up the entire screen and point to dangerous events on the computer. The combination of beeps and error messages can cause fake problems that are very serious and disturbing.

What you need

You need a computer that you have SSH access to continue. This guide is based on an Ubuntu computer, but you can control most Linux computers, including MacOS, with the same commands.

You must be on the same network as the computer you want to control. Once you're signed in to the destination computer via SSH, you can launch apps and perform other actions remotely.

Step 1: Setting up Access & Basic App Launching

To start, we must set everything that we do is displayed on the remote computer where we are logged in via SSH, not on the local computer with which we are logged in. To do this, we first set our display path with the following command:

  export DISPLAY =: 0.0 

If you now run a simple command such as firefox via SSH, a Firefox window will open the remote computer ,

That's not very scary though. For our first example, let's open an eerie-looking xterm window that displays network data that is quite alarming for a beginner. To make matters worse, we do it ten times. If you click on it, a new one will be generated ten times in a row.

First we use the command for i in {1..10}; followed by the code we want to execute, and then at the end .

  for i in {1..10}; do sudo xterm -maximize -e sudo tcpdump; done 

In this case, we open a terminal window of maximum size, and the command -e means that we execute sudo tcpdump in the xterm window we have started. [19659006] For the average user, the computer has now begun to create hacker shells that can not be closed.

Step 2: Bells, Whistles, and Speech

Before we can make any noise, we need to do this Run the following command so that we can remotely control the speaker.

  sudo modprobe pcspkr 

After that we have many options! First, we can use the command say to pronounce any phrase about the computer. We can also use the command espeak to do the same.

  say "I am a Canadian Randomware, I have not encrypted any files, but would welcome a change."
espeak "Please excuse me for disturbing you" 

We can schedule them to periodically expire later in a single chord, or simply make them live.

If we want to be more subtle, we can beep to drive a user mad. To use this, make sure you have it with apt install beep .

If you have it installed, check out what you can do with man beep a grand command

  BEEP (1) General Command Manual BEEP (1)

SURNAME
Beep - The PC speaker can beep in different ways

SUMMARY
Beep [--verbose | --debug] [-e device | --device device] [-f
       N] [-l N] [-r N] [-d N] [-D N] [-s] [-c]

         beep [ OPTIONS ] [-n] [--new] [ OPTIONS ]

         beep [-h] [--help]

         beep [-v] [-V] [--version]

  DESCRIPTION
Beep allows the user to precisely control the PC speaker
This allows different tones to indicate different tones
Events. It can be done quite happily about the command
Line, the intended place of residence is in Shell / Perl
Scripts that notify the user when something interesting happens
occurs. Of course, it has no idea what's interesting
but it is really good in this notification section.

All options have default values, which means you just type
"Beep" will work. If an option is specified more than once
In the command line, the following options overwrite
Dekessoren. "Beep -f 200 -f 300" beeps at 300 Hz.

OPTIONS
--verbose, --debug
Enable the debug output. This option prints a line like
The following before each beep:

[DEBUG] 5 times 200 ms beeps (100 delay between, 0
Delay afterwards) @ ​​1000.00 Hz

-e device, - device device
Use the device as an event device. If the switch is not used,
/ dev / tty0 and / dev / vc / 0 are tried one after the other.

-f N beeps at N Hz, where 0 <N <20000
Ballpark, the regular signal tone at the terminal is 750Hz.
Incidentally, N is not limited to integers.

-l N beeps for N milliseconds.

-r N specifies the number of repetitions (1 by default).

-d N, -Dn
Specify a delay of N milliseconds between repeats.
calculations. Using -d indicates that this delay should occur
Occurs only between beeps, that is, it should not
occur after the last repetition. -D indicates that
the delay should occur after each repetition,
including the last one. Normally -d is what you want
but if, for example, you put several beeps in a row
Commands together to play the Star Wars anthem
You may want to be in control of any delay.

-n, new
This option allows you to break the command line
specify in several beeps. Everytime that
If the option is used, the beep will start to continue treatment
Arguments as if they were for a new beep. So for
Example:

Beep -f 1000 -n -f 2000 -n -f 1500

would produce a sequence of three beeps, the first
with a frequency of 1000Hz (and otherwise standard
Values), then a second beep with a frequency of
2000Hz (again with things like delay and repetitions)
preset), then a third beep at 1500Hz.
This is different from specifying a -r value because
-r repeats the same beep several times while -n
This allows you to set different beeps. After a -n,
The new beep is generated with all default values.
and each of these can be specified without modification
Values ​​for previous (or later) beeps. See the INSPECTION
PLES section if this could confuse you.

-s, -c These options put the beep in the input processing mode.
-s instructs the beep to read from stdin and after each beep
newline, and -c tells you to do so after every character
ter. In both cases, the program also outputs the echo
The input is reset to stdout, which facilitates slipping
Beep in a word processing pipeline
Section PLES.

-h, -help
View and exit usage information

-v, -V, --version
View and exit version information 

With Beep, we can make pretty much any sound. There is even a handy reference table for composing notes included.

  Note Frequency
C 261.6
C # 277.2
D 293.7
D # 311.1
E 329.6
F 349.2
F # 370.0
G 392.0
G # 415.3
A 440.0
A # 466.2
B 493.9
C 523.2 

In our case we will do something terrible. Here, the flag -f sets the frequency to ear-piercing 4000 kHz, the flag -d sets the duration of the delay between beeps to 500 ms and the flag to -l Flag sets the length of the beep to one second. Finally, the flag -r repeats this terrific noise ten times.

  Beep -f 4000 -D 500 -l 1000 -r 10 

This will alert anyone who is thinking about their computer objects to something they have just done.

Step 3: Terrifying Error Messages

Confusing or alarming error messages can be a lot of fun as users generally believe them until they become too absurd. We can send different types, some of which are lame.

The command notify-send allows us to display subtle small messages, with the title in the first place and the message text second.

  notify-send & # 39; WARNING & # 39; I AM CALLING THE INTERNET POLICE & # 39; 

This will give a little warning in the corner. Somehow boring. Instead, we can display this big fat alert message by using Whiptail and launching it in a full-screen window.

  xterm -maximizes -full -fa & # 39; Monospace & # 39; -fs 19.31 -e Whiptail CRITICAL: ACTION CAN NOT BE BROKEN "--msgbox" UNAUTHORIZED LOGIN! SECURITY SYSTEM DESTROYES THIS TERMINAL IN 10 SECONDS, KEEP 30 FEET CLEAR TO AVOID BLASTING. "--Topleft 23 79 

You can replace it with your own content, but that's the way it looks.

Step 4: Cron Jobs from Hell

Now we can combine these and schedule them to run automatically we can check if there are jobs with the mark -l in the crontab, and then a new one with the mark -e .

  crontab -l
crontab -e 

In the configuration window that appears, you can add a job that runs every 60 seconds using the following formula.

  * * * * * (your code here) 

The computer beeps every 60 seconds we can add this entry and then press Ctrl x and y to view the file save.

  * * * * * Beep -f 300.7 -r 10 - d 50 -l 400 

Once the file has been saved, the computer beeps every 60 seconds.

Step 5: Ending Tasks

If someone is on the computer you have backdoor access to, you can do it Deletively purge the process ID of an application you are using. This will cause the application to crash immediately, potentially preventing anyone from doing something effective on the computer.

To determine the process ID, you can use top or htop to display a list of processes running on the computer. If you have not installed htop you can do so with the following command.

  apt install htop
above
Tasks: 219 total, 1 running, 178 sleeping, 0 stopped, 0 zombie
% Cpu (s): 3.0 μs, 0.4 μs, 0.0 ni, 95.6 μs, 0.9 μs, 0.0 hi, 0.0 si, 0.0 sts
KiB Mem: 4968836 total, 1431244 free, 1104324 used, 2433268 buff / cache
KiB Swap: 5138428 total, 5138428 for free, 0 used. 3367804 avail

PID USER PR NI VIRT RES SHR S% CPU% MEM TIME + COMMAND
31906 root 20 0 0 0 0 I 6.2 0.0 0: 00.59 kworker / u16: 1
32560 toor 20 0 41928 3880 3192 R 6.2 0.1 0: 00.02 top
1 root 20 0 160212 9592 6816 S 0.0 0.2 0: 02.35 systemd
2 root 20 0 0 0 0 S 0.0 0.0 0: 00.01 kthreadd
4 root 0 -20 0 0 0 I 0.0 0.0 0: 00.00 kworker / 0: 0H
6 root 0 -20 0 0 0 I 0.0 0.0 0: 00.00 mm_percpu_wq
7 root 20 0 0 0 0 S 0.0 0.0 0: 01.33 ksoftirqd / 0
8 root 20 0 0 0 0 I 0.0 0.0 0: 09.13 rcu_sched
9 root 20 0 0 0 0 I 0.0 0.0 0: 00.00 rcu_bh
10 root rt 0 0 0 0 S 0.0 0.0 0: 00.00 migration / 0
11 root rt 0 0 0 0 S 0.0 0.0 0: 00.03 watchdog / 0
12 root 20 0 0 0 0 S 0.0 0.0 0: 00.00 cpuhp / 0
13 root 20 0 0 0 0 S 0.0 0.0 0: 00.00 cpuhp / 1
14 root rt 0 0 0 0 S 0.0 0.0 0: 00.03 watchdog / 1 

If I want to end the process top I just take the PID and execute the following command.

  kill PID # 

In the above example, I would execute kill 32560 to crash the top process.

Step 6: Merging: Rickswarm

We want to combine everything we've learned into creating vibrant experiences for anyone on the computer we have access to. Let's take our alarming random beeping and combine it with some bash commands to open a whole series of Firefox windows every 60 seconds, all navigating to "Never Gonna Give You Up."

 ; Beep -f 4000 -D 500 -l 1000 -r 10 & Firefox new window "https://www.youtube.com/watch?v=dQw4w9WgXcQ"; done 

SSH access makes hacking on a computer easier

While maximum distraction and disruption occurs over SSH , it can not come to it Every day is a lot of fun and is very useful for social engineering. While this is an entertaining prank, it is obviously a very bad idea to do this on a computer you do not have permission for, as people who are not tech savvy probably think something worse than a joke and act out of fear. It is not legal to access a device for which you have no authorization. Keep your SSH pranks and devices for which you have permission!

I hope you liked this guide to finding a computer with SSH! If you have any questions or comments about this SSH prank tutorial, please contact me at Twitter @KodyKinzie .

Cover picture about 123RF




Source link