Sort of command that would pull a download that is self executed to the host machine?

That’s worded a bit fucky, if I need to elaborate, please chime in.

  • DeuxChevaux@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    1 day ago

    Something like this?

    alias ls=“who am i >> /var/log/intruder.log && logout”
    alias l=“/usr/bin/ls”

    • chingadera@lemmy.worldOP
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      1 day ago

      Partially for sure. Other part of this would be somehow executing a command on the attackers machine that originated as their own input, but they wouldn’t be privy to that due to the alias.

      I’ve seen some videos where people will willingly let scammers into their machine, and Honeypot them with a file that they execute, typically named like credit card info or bank info or something. But they knowingly click that and open it, I don’t know what needs to be done on the “make this code execute on the attackers machine” part.

      If someone is ssh’d into your machine, are there any escalated privileges you’d already have back to their machine because they’ve willingly come to yours?