1) If you want to prove to someone that you have remote access to the device, or just want to convince someone that their computer is vulnerable, you can use SSH.
2) Distance action
If for you the fact that a PC can be hacked is clear and obvious, then for an average user it is not. Rather, he is inclined to attribute the strange behavior of his computer to errors, crashes, or other reasons independent of the attackers. Although with the help of SSH access, a hacker can easily create fake alerts and in every way mask his activity.
What can be done through SSH access
1) For example, we can run applications such as Firefox to go to any web page, working in full screen mode, or use several small browser windows. Most people associate spontaneous web page launching with a virus or adware, especially if most websites are about Viagra or casino, for example.
2) Then we can begin to "make noise." You can use speakers connected to a computer. If the victim thinks she is alone at home, then unexpectedly turned on sound from the computer can frighten her greatly. The same can be said of a computer that begins to squeak violently, as if it was about to explode.
3) If this is not enough, you can activate error messages that occupy the entire screen. By combining beeps and error messages, we can create fake problems that look very serious.
What do you need
1) You will need ready-made SSH-access to any computer. We will take an example for Ubuntu, but you can control most computers, including MacOS, using the same commands.
2) You also need to be connected to the same network as the computer you want to control. After you logged in to the target computer through SSH, you can start launching applications and perform any other actions remotely.
1) Configure Access and Launch Basic Applications
First you need to register a command so that everything we do appears on the remote computer that we logged in through SSH, and not on the local computer on which we logged in. Configure the display path with the following command:
> export DISPLAY =: 0.0
2) Now, by writing a simple firefox command via SSH, you will open a Firefox browser window on the remote computer.
But for our first example, let's open the xterm window , displaying network data that looks pretty troubling for a beginner. To make the situation worse, we will do it 10 times. Accordingly, there will be 10 open windows.
3) To do this, we will execute the command in a loop:
for i in {1..10}; do sudo xterm -maximize -e sudo tcpdump; done
In this case, we open the terminal window of the maximum size, and the -e command means that we execute sudo tcpdump in the xterm window that we run.
4) Calling, Whistling and Speech
Before we can reproduce any noise, we need to execute the following command in order to be able to control the speakers remotely.
>sudo modprobe pcspkr
5) Now we have many options! First, we can say any phrase through the computer using the say or espeak command .
say "I am a canadian randomware, I have not encrypted any files but would appreciate some change"
espeak "please give me quarters sorry to bother you"
We can schedule such messages so that they periodically go to chrontab.
6) We can use the beep to drive the user crazy. To use beep , install it with apt install beep .
7) After installation, look at the manual using man beep to evaluate its capabilities:
BEEP(1) General Commands Manual BEEP(1)
NAME
beep - beep the pc speaker any number of ways
🦑We can generate almost any noise with Beep. The following table with frequencies may come in handy:
Note Frequency
C 261.6
C# 277.2
D 293.7
D# 311.1
E 329.6
F 349.2
F# 370.0
G 392.0
G# 415.3
A 440.0
A# 466.2
B 493.9
C 523.2
In our case, we are going to do something terrible for the end user. The -f flag sets the frequency to 4000 kHz, the d flag sets the delay between the audio signals at 500 ms, and the -l flag sets the length of the audio signal per second. Finally, the -r flag repeats this terrible noise 10 times.
beep -f 4000 -D 500 -l 1000 -r 10
9) Awesome Error Messages
> notify-send 'WARNING' 'I AM CALLING THE INTERNET POLICE'
This message will pop up in the corner. Kinda boring. Instead, we can display a large bold alarm message with the whiptail command and run it in a full-screen window.
xterm -maximized -fullscreen -fa 'Monospace' -fs 19.31 -e whiptail --title "CRITICAL: ACTION CANNOT BE UNDONE" --msgbox "UNAUTHORIZED LOGIN! DATA SAFEGUARD SYSTEM WILL DESTROY THIS TERMINAL IN 10 SECONDS, STAY 30 FEET CLEAR TO AVOID BLAST" --topleft 23 79
NOW
10) Cron Tasks from Hell
Now we can start combining tasks and plan their automatic launch. We can check if there are any existing jobs in crontab with the -l flag, and then add a new job with the -e flag.
crontab -l
crontab -e
11) In the configuration window that opens, you can add a task for execution every 60 seconds according to the following formula.
12) In order for the computer to beep every 60 seconds, we can add this record and then press ctrl x and y to save the file.
* * * * * beep -f 300.7 -r 10 -d 50 -l 400
13) As soon as the file is saved, the computer will emit a sound signal with the given parameters every 60 seconds.
14) Completing Custom Tasks
If you have access to someone else’s computer using SSH, you can turn off any running process. This will lead to a sudden stop of the used application, and accordingly, the user will not be able to effectively use the computer. To find the process ID, we can use the top or htop commands . If you do not have htop installed , you can do this with the command below.
apt install htop
top
Tasks: 219 total, 1 running, 178 sleeping, 0 stopped, 0 zombie
%Cpu(s): 3.0 us, 0.4 sy, 0.0 ni, 95.6 id, 0.9 wa, 0.0 hi, 0.0 si, 0.0 st
KiB Mem : 4968836 total, 1431244 free, 1104324 used, 2433268 buff/cache
KiB Swap: 5138428 total, 5138428 free, 0 used. 3367804 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
31906 root 20 0 0 0 0 I 6.2 0.0 0:00.59 kworker/u16:1
32560 toor 20 0 41928 3880 3192 R 6.2 0.1 0:00.02 top
1 root 20 0 160212 9592 6816 S 0.0 0.2 0:02.35 systemd
2 root 20 0 0 0 0 S 0.0 0.0 0:00.01 kthreadd
4 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/0:0H
6 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 mm_percpu_wq
7 root 20 0 0 0 0 S 0.0 0.0 0:01.33 ksoftirqd/0
8 root 20 0 0 0 0 I 0.0 0.0 0:09.13 rcu_sched
9 root 20 0 0 0 0 I 0.0 0.0 0:00.00 rcu_bh
10 root rt 0 0 0 0 S 0.0 0.0 0:00.00 migration/0
11 root rt 0 0 0 0 S 0.0 0.0 0:00.03 watchdog/0
12 root 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/0
13 root 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/1
14 root rt 0 0 0 0 S 0.0 0.0 0:00.03 watchdog/1
15) If I want to kill the process from above, I just take the PID and run the following command.
16) kill PID#
In the above example, I would run kill 32560 to terminate the top running process.
17) Putting It All Together
Now let's combine all that we have learned so that the end user gets a “vivid impression” from using their PC. Take a random beep and combine it with some bash commands to create many Firefox browser windows that open every 60 seconds and go to “Never Gonna Give You Up.”
for i in {1..10}; do beep -f 4000 -D 500 -l 1000 -r 10 & firefox -new-window
written by undercode +96170307765:
Enjoy! Follow us for more...
No comments:
Post a Comment