[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vr / w / wg] [i / ic] [r9k] [s4s] [vip] [cm / hm / lgbt / y] [3 / aco / adv / an / asp / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / qst / sci / soc / sp / tg / toy / trv / tv / vp / wsg / wsr / x] [Settings] [Home]
Board
Settings Home
/g/ - Technology



Thread archived.
You cannot reply anymore.



File: 1497379715430.jpg (367 KB, 927x979)
367 KB
367 KB JPG
paranoid autism kicking in. I was at a cafe on my laptop running Arch and some young woman with an iphone asked if she could use my laptop to charge. I was pretty focused on what I was working on so I said OK, but later realized how retarded that decision was.

When I got home I flipped the network switch and checked the logs and nothing seems out of the ordinary. How possible would it be to compromise linux through something on an iphone? I don't usually go to cafes to work, is this a common thing and I'm just sperging/overreacting?
>>
>>60981823
Flatten and rebuild. You can't possibly know what she did. You probably have to throw the laptop away to truly be free of the rootkit.
>>
>>60981823
I'd be paranoid too, but... Was she hot? If not she may have been flirting with you.
>>
File: 1497517160761.png (120 KB, 1224x972)
120 KB
120 KB PNG
>>60981823
>I said OK
Welcome to the botnet.
>>
>>60981823
You should be both terrified and reassured.

You should be terrified because something plugged in via USB is essentially completely trusted. You can stick malware in the firmware of a USB flash drive that you can't really defend against, short of physically preventing any untrusted USB devices from being plugged in.

You should be reassured because doing this is some Mossad-tier shit, and if you're not an Arab nuclear physicist then you'll never in a million years see a targeted attack like this.
>>
>>60981823
Of the top of my head in not 100 of any attack vectors from there.
If the phone registered as an input device it could maybe acts as a key logger, not sure though,,X is confusing.
Otherwise they would have to be aware of a zero day in a USB driver.
>>
>>60981896
>DerStake
>DerStarke

Which is it?
>>
If it really was an iPhone I doubt you have anything to worry about.

If anything you should have installed itunes real quick and stolen as many pictures and photos from her phone as possible to check for nudes at home later
>>
>>60981896
If a three letter agency is after you there isn't much you could do anyway
>>
>>60981915
nah, she was sitting pretty close to me. She looked at it once-- when I glanced at the screen it seemed like she was just reading some texts
>>
Buy a USB condom or cut data pin connections on the motherboard to prevent future attacks.
>>
>>60981885
She seemed alright looking. Had a slight accent (which makes me more paranoid in retrospect)
>>
File: 1307992515314.jpg (59 KB, 500x667)
59 KB
59 KB JPG
>>60981923
but what about the opportunist cyber thief he just downloaded all of those tools and made a slight modification?

>>60981823
stop being para, you just lost your opportunity to get laid.
>>
>>60981823
serves you well for being an attention whore

>running arch on a cafeteria
really, nigger? did you wear your fedora and sucked on you vape too?
>>
Is there anything specific to look for in my logs for that session that would indicate malicious activity? Or any good utility to run a scan?
>>
File: e72.jpg (22 KB, 540x233)
22 KB
22 KB JPG
>not educating that bitch trying to charge up an iPhone with a max 500mA outlet of a notebook
>>
File: cia-user-image.png (6 KB, 290x290)
6 KB
6 KB PNG
>>60981899
Best post.
Also, nice digits.
>>
I'm gunna masturbate to that picture later.
>>
>>60982275
All the posts are of equal value, fagmotron, except yours. Your post is stupid.
>>
shred /dev/sda
>>
>>60982316
no u
>>
>>60982246
My Dell has power bridge
>>
File: 1488420686916.jpg (26 KB, 500x281)
26 KB
26 KB JPG
>>60981899

>implying the Jews aren't everywhere, constantly tricking every one of us.
>>
>>60982388
orlly?
>>
>>60982441
It isn't really an evil trick when a goy goes up to a jew and says "please take my money and tell me what to do." You can't really take advantage of someone who wants to be taken advantage of.

Most people want to be slaves, and Apple is just one of many companies and governments giving them what they want. I wouldn't even mind if their vast numbers didn't make things so difficult for those of use who don't want to be slaves.
>>
>>60981900
No, you can't use a usb hid device as a keylogger.
You *can* use it to use the keyboard to install a keylogger though (doubt that happened). Also it might have been used for arp poisoning https://www.youtube.com/watch?v=Aatp5gCskvk
>>
>>60982078
look through logs for usb device being plugged in. it'll show you what type of device it was used as. look for hid or ethernet
>>
>>60981823

you fool what if she changed the logs?
>>
Once you believe your system is clean(ed) you can build or buy a USB Condom.

https://www.youtube.com/watch?v=pJAm7-JR_LU
>>
>>60981823
Are you scared that a woman hacked you ????
>>
>>60982741
Dude did you not watch James Bond?
>>
>>60981823
>iphone
>afraid OP was rooted
top fucking kek
best thread all fucking year
>>
>>60981823
You dense fucker, she was clearly asking if you would plug her port.
>>
you were sperging
>>
OP probably just watched Mr. Robot and is now paranoid
>>
>>60981823
Unless she was a CIA nigger then you are fine OP.
>>
>>60981823
Through an iPhone, no. An android device, possibly.
iPhones are pretty securely locked down so are difficult to run arbitrary code on.
>>
I hope you returned the favour with your dongle
>>
reinstall gentoo just to be safe
>>
>>60981823
>Doing work
>Arch

Really come with better story next time. It's not like anyone want to steal your austistic work
>>
at defcon a few years ago someone setup a "charging station". then at a talk they revealed how they owned all the devices attached. yes, defcon is mostly attended by faggots now.




Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.