![]() ![]() ![]() What this does is sets up a cron job - a “chronological job” that reruns tasks at certain times - to ping the /env/live endpoint every minute and pipes the result to sh. When you’re running the server locally, this will be localhost:5000 and when you deploy to Heroku, it will be something like. ROOT_URL is the specific path to your application. The beauty of this program is that to start hacking someone, you just need to run a single command on their machine. You can start up the server locally if you want to hack yourself and test things out. This way the server can inject the app url into the shell scripts. All it’s really doing is getting the root url for your Heroku website and putting it in your package.json. Then you need to run a command to do a little setup. Now inside the hack repo, create a Heroku app with an easy name to remember. If you’ve never used Heroku before, signup here (it’s free!) and set up their CLI tool on your machine. Next, you need to setup Heroku to host the scripts that will be running on your friends machine. git clone remote remove origincd hacknpm installnpm link Getting SetupĪll of the code for this project lives in this repository if you want to jump right in, but I’ll explain how it all works below.įirst, you just need to clone the repo, install its dependencies, and symlink the hack command line interface (CLI) tool. It doesn’t take some hacker genius to wreck your life - any “script kiddy” who can gain physical access to your computer can compromise you by downloading a script containing just 50 lines of code. So keep in mind that the purpose of this article is to show you just how easy it would be for someone with bad intentions to hack you so you can avoid getting hacked yourself. Specifically: “intentionally access a computer without authorization or exceed authorized access” - The Computer Fraud and Abuse Act (18 U.S.C. Pretty sweet, right? Or perhaps shocking? That’s it! Their computer is now infected and I can run whatever commands I want on this computer remotely. So I’ve created a simple project to hack my friends and show them the importance of computer security.Īll I need to do is wait for them to leave their computer unlocked for a few seconds, open up their terminal, and type a single, short command. I tell them they should probably get in the habit of locking their computers, but they don’t listen to me. ![]() My friends often leave their computers open and unlocked. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |