Top Tips For Getting Hacked

Wednesday, 26 October 2016 at 03:02 pm.

Here is a step-by-step tutorial for anyone who would like to get hacked.

Clearly, I would never be so stupid as to try any of the above, but theoretically, if I had, I would perhaps have changed ports, passwords, enabled (and enforced) key-based SSH sign on, and maybe I’d have set up the following in /etc/ssh/sshrc

ip=\`echo $SSH_CONNECTION | cut -d -f 1\`
host=\`hostname\`
ifttt= #IFTTT Maker key
curl -i -s \
-H “Accept: application/json” \
-H “Content-Type:application/json” \
-X POST data ‘{“value1”:”’”$host”’”,”value2":”’”$USER”’”,”value3":”’”$ip”’”}’ \
https://maker.ifttt.com/trigger/login/with/key/$ifttt > /dev/null