tag:blogger.com,1999:blog-5948768001255972621.post5334306393639093909..comments2024-03-01T18:43:45.267-08:00Comments on consolecowboys: The curious case of the ninjamonkeypiratelaser backdoorsomeLuserhttp://www.blogger.com/profile/16124941373996159409noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-5948768001255972621.post-18225134928891863112014-03-18T14:15:40.732-07:002014-03-18T14:15:40.732-07:00Don't attribute malice when ignorance may very...Don't attribute malice when ignorance may very well be the culprit.<br /><br />I would not be surprised if this is just stupid code.Brandon Perryhttps://www.blogger.com/profile/04227634714412263524noreply@blogger.comtag:blogger.com,1999:blog-5948768001255972621.post-50211439386710574942014-03-10T20:56:41.821-07:002014-03-10T20:56:41.821-07:00Amazing work.
Question... I have a piggybacking p...Amazing work.<br /><br />Question... I have a piggybacking persistent infection using Debian as base and that reverse root exploit with REMOTEHOST (used as pseduo-network even on machines even with no network interface) you just showcased for escalation and control on home systems. Is that a common methodology for exploiting access control these days?<br />Spazhttps://www.blogger.com/profile/00375980044726036083noreply@blogger.com