this post was submitted on 10 Jul 2025
12 points (100.0% liked)

Linux

57080 readers
809 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 6 years ago
MODERATORS
 

Sort of command that would pull a download that is self executed to the host machine?

That's worded a bit fucky, if I need to elaborate, please chime in.

all 17 comments
sorted by: hot top controversial new old
[–] Strit@lemmy.linuxuserspace.show 7 points 4 weeks ago (1 children)

Sounds like you are trying to setup a keylogger of sorts....

[–] whostosay@lemmy.world 3 points 4 weeks ago (1 children)

Not quite, PC gets hacked, on hacked machine someone does something like cd, but on that PC cd has been set up as an alias for some sort of command that downloads a malicious executable to the hackers machine and executed it.

That executable very well could be a keylogger, but doesn't necessarily have to be. It could be be rm -rf --no-preserve-root / or a reverse shell or whatever really.

I imagine cd would be a terrible choice to alias given how much it's used, but maybe something else more obscure could be used that is frequently used when bots/attackers are rummaging through files for stuff to steal.

[–] Strit@lemmy.linuxuserspace.show 4 points 4 weeks ago (1 children)

I mean, I'm sure it's possible, it's just a matter of how to get the honeypot/script on the system and give the downloaded file executable rights.

[–] whostosay@lemmy.world 1 points 4 weeks ago (1 children)

Is there anything that is specific to ssh that would allow for this? Like a command that would allow something to execute back to the other machine similar to downloading? I'm not well versed just kind of a napkin idea I thought of.

[–] DeuxChevaux@lemmy.world 4 points 4 weeks ago* (last edited 4 weeks ago) (2 children)

Something like this?

alias ls="who am i >> /var/log/intruder.log && logout"
alias l="/usr/bin/ls"

[–] whostosay@lemmy.world 2 points 4 weeks ago* (last edited 4 weeks ago) (1 children)

Partially for sure. Other part of this would be somehow executing a command on the attackers machine that originated as their own input, but they wouldn't be privy to that due to the alias.

I've seen some videos where people will willingly let scammers into their machine, and Honeypot them with a file that they execute, typically named like credit card info or bank info or something. But they knowingly click that and open it, I don't know what needs to be done on the "make this code execute on the attackers machine" part.

If someone is ssh'd into your machine, are there any escalated privileges you'd already have back to their machine because they've willingly come to yours?

[–] DeuxChevaux@lemmy.world 1 points 4 weeks ago

Sounds illegal, though...

[–] MonkderVierte@lemmy.zip 2 points 4 weeks ago (1 children)
[–] DeuxChevaux@lemmy.world 5 points 4 weeks ago (1 children)

'whoami' and 'who am i' are two different things. Try it out.

Damn. TIL. knew about the first of course but who am i as three seperate pieces is new to me