lol, this is bad. I've already seen a few machines get rm -rf'd
They use zmap to scan the internet for open VNC hosts (remote control software), then if they find one that does not have a password then they feed it to a script that takes a screenshot of the host and make it available on that website. They are running it from 31c3 as described here: https://news.ycombinator.com/item?id=8810698
Speaking of which
There was this website with a couple of guys running an experiment and letting people upload whatever they like on 6 computers running Win98 and XP, does anyone remember the website? I can't find what to google and all I remember is that they insisted that one not host it in the US
Name: Ben Parker
Address: 2809 Lunetta Street
Name: Ben Parker
Address: 2809 Lunetta Street
delete system32 and install gentoo
but seriously now: use long, complex passwords, try not to use default ports, if you can use a portknocking daemon, keep your systems updated... this way, you'd be "secure" from mass scanners at least.
Nice password, too bad you left the poweroff button on the login screen.
I mean the website can't be opened.
Not the VNCs
http://22.214.171.124:6080/vnc.html?autoconnect=true&token=126.96.36.199-5900-vnc something interesting happening over there
well we could take down a whole network...
This site indexes people's computers running remote control software without any access password, so anyone can just connect and fuck with the user.
Naturally, some or all of these could be FBI traps.
Are you running an unsecured vnc server? You'd probably remember setting it up for access from outside your firewall by forwarding ports on your router, although uPnP could probably do that for you without asking.
Either way if you haven't enabled a remote desktop or vnc solution on your PC then, no, we're not watching your computer activity.
By that method.
Apparently root password is 1488
Also how can I connect to these unsecure ones.. for reasons...
same issue, one of the cirros machines.
>click icon to safely remove drives
>remove some kind of "balloon drive"
>break bondage japs PC
Hacker as fuck.
I bet this is one of you guys. Both the one in control and the one running the host.
>boot into safe mode
not all of these servers are Windows though
they don't need to boot into anything they just need to disconnect their device from the internet until they have removed VNC or given it a password.
Lol they're trying to scan for viruses to prevent us fucking their shit
>log what you do
They would see what website you're visiting even if encrypted, the content isn't specific to anybody.
If they've got access to your network, you have a bigger problem.
This website doesn't really need TLS, just like when you're reading a wikipedia article...
>They would see what website you're visiting even if encrypted, the content isn't specific to anybody.
But they could see what you did on the website.
>If they've got access to your network, you have a bigger problem.
>This website doesn't really need TLS, just like when you're reading a wikipedia article...
They can see what you are reading about.
They can modify the information to misinform you.
They can still inject code.
TLS would only protect you from injected code if the attacker was on your network or somehow was the NSA.
>modify information to misinform you
seriously, do you really think "they" would be doing this to "you", there's no way "they" would be modifying the info for everybody...
Sure TLS should be used even when not really necessary, but in this case there's no real threat if you visit the site.
Dear fuck, I've seen this error happen all the time with Windows on a QEMU VM. It happens when the system is paging so fucking hard the hypervisor freezes entirely and fails to deliver a CPU cycle in time. On a Linux guest this ain't no problem because Linux takes these missed cycles like a fucking boss and keeps on truckin' like nothing happened. Windows, to the contrary, fucking falls into pieces.
Linux will try not to page core allocated to a VM. But If something else bloats on your physical OS, like Firefox with a shitload of Jewtube tabs open, that will get paged. And if your physical OS pages too much, the hypervisor will miss a cycle.
>connect to some server
>see that somebody is already defacing index.php in vi
>start talking to each other
>"Where are you?"
>"I'm at the arcade"
Was talking to a guy that was at CCC, too bad I couldn't meet him, seemed like a cool guy tbh
there are more of them https://srsly.de/hardlink/188.8.131.52-5904-vnc
So if I destroy it, will the russian cyber mafia kill me?
I have none installed, just...what the fuck?
>sorry, I'm not good at this
I dont know if pic related still works, been ages
>ORIO WHY YOU ORDER HUDRED PUSSEE FUT
Windows 2000, dam nostalgia. Have fun.
>Goes to the restaurant.
>Gets in line to order.
>Lady: What do you want to order?
>Pulls out ThinkPad.
>Boots Gentoo GNU/Linux.
>Connects to the cash register's VNC.
>Orders spaghetti for yourself.
>Slips on meatball.
>Falls on woman.
>Lady: W-Would you like anything else Onii-chan?
>Gets all the pussy foot.
>Pants ruined by all the spaghetti sauce.
>No matter, you don't care.
>Remembers last time you shower.
>8 out of 8.8 would hack her salary rate.
I got internet explorer open and nearly got on 4chan with it before they rebooted it again.
Picture related: what they serve.
THAT is how professionals do it.
Browsing this thread from one of the VNCs.
The hell is this
I was having fun with open VNC servers before it was cool!
Does that make me a hipster, /g/ ?
How to pwn a virtualized CentOS box with open VNC guide by Anonymous :
- Connect through VNC
- Send CTRL+ALT+DEL to reboot
- Press e to edit the GRUB boot commands
- add "single" at the end of the "vmlinuz" line
- Press enter to validate, and press b to boot
- You're now root!
- Run "ifup eth0" and "service start sshd" to start SSH
- Run "adduser anon" and "passwd anon" to make an account
- You now have root SSH access!
Have fun, /g/.
If this doesn't raises awarness, I don't know what will.
I think this is a linux POS. Ctrl alt del does nothing, and the cursor is a simple dot. UI is completely custom. Just chill and watch, don't fuck about or it might be shut down or something.
What should I do? I have root access apparently.
>inb4 rm -rf --no-preserve-root /