• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Im In Your Leenucks Box Changing Your Password

September 18, 2007

Views: 4,735

[ad]

More hacker humour – this is a good one!

—

So I’ve been a professor at this ‘little school’ for a while now. I love my job. My classes contain students from all age groups. I have a few 17 year old high schoolers that are here because they are bored during the summer. I have a few seasoned folks that have IT experience. I also have a few people that are clearly here just for the three credit hours.

The classroom is set up in a ‘lab’ environment. Each student has a PC in front of them that netboots linux from a central box located near my desk at the front of the classroom. This setup works great because the students come into the classroom every day, power on their PC, and they get the exact OS load and lesson they need for our session. Not to gloat, but I designed it this way and I’m the envy of a few other professors *cough* windows instructors *cough*.

I have this one student that I’ll call “Pima”. Yes, that’s an acronym.

Pima is one of the 17 year olds in the class and considers himself an uber-hax0r. He constantly interrupts me during my lessons trying to make valid points that are somewhere between “WTF?” and “OMG YOU ARE NOT USING TEH DEBIAN!”. For those of you that listen to the podcasts and remember my story about training some folks over in another country and some dude put my kevlar vest over top his… well let’s say if we were in combat and this kid dropped his kevlar I think I’d dig a hole and bury it so he couldn’t find it.

This kid has the attention span of me at a Hooters restaurant. He’s always doing “something” on his PC during class. Most of the time he’s constructing poorly written bash scripts and trying to download stuff from an internet connection that really doesn’t exist. I didn’t say he was bright did I? Right.

One day recently we had a special saturday class that was very lab intensive. Right before the lunch break I informed everyone that I’d be going around to each PC and “breaking” something that they’d have to fix when they got back. Usually I do something silly like screw with their /etc/resolv.conf file, comment out some things in a service’s configuration file, or some other type of fun.

During the lunch hour I wander around and start breaking stuff. I get to Pima’s machine and I can’t login to the machine as root. My little uber-hax0r had changed the root password.

[Note from Scrap: All students have the root password to their workstations as part of their lesson]

Let’s keep in mind that this kid is NOT the ripest banana in the bunch by a long shot. Let’s think about this, shall we?

1) The PC neboots to an image. Changing the root password is effective for the current ’session’ only. I reboot the machine, I get a fresh load. Kapisch?

2) SSH is running on all of these boxes. Did I mention that I authenticate using a certificate to all of these machines? I don’t NEED the password.

3) In /etc/passwd, there’s this really cool user called (and I kid you not) “backdoor”. Backdoor is authorized for ’su’.

Curiosity was killing me. I tried to login as “backdoor” and sure enough it worked and I could issue commands as root. Duh.

I wandered back to my instructor workstation and ssh’d to his box as root with no problems.

I had a decision to make. Do I just reboot the machine and carry on? Or do I teach this kid a lesson?

Oh yeah, he’s getting a lesson.

I whipped out my microphone from my laptop bag and plugged it into my workstation. I recorded a few choice sound files and scp’d them to his workstation in a directory I made called “/tmp/…/lmao”.

I then made sure that ’sox’ was installed on the workstation. It was. I ran back over to Pima’s workstation and made sure that the speaker volume was turned to 75% on his speakers. Just to be a jerk I used my trusty pocketknife to pry the volume knob off of the speakers. There will be no adjusting these bad boys!

The clock said that I had half an hour left before the students returned, so I quickly returned to breaking the rest of the students’ workstations.

A half hour later it was show time.

The students filed back into the classroom. Pima was five minutes late as usual.

I instructed the class not to touch their keyboards until I gave them their instructions.

After I prattled on for five minutes with the assignment I sat back down at my workstation and acted like I was busy. I noticed that Pima had a big grin on his face after he logged into his machine with his root password. The grin said “haha you didn’t break MY stuff!”.

I brought up the xterm that was ssh’d into Pima’s workstation and issued the following commands:

$ cd /tmp/…/lmao
$ play haha1.wav

At that moment a loud booming voice commanded its way from Pima’s speakers:

YOU SHOULDNT HAVE CHANGED MY ROOT PASSWORD BOY!

There was dead silence in the room. Pima jumped back about half a foot from his PC.

Laughter ensued.

I glanced up from my screen and glared at Pima.

“Is there a problem? You should be working on your assignment and not goofing around.”

Pima squeaked out a “It wasn’t MEEEEE!”

I glanced back down at my screen and waited another few minutes.

I then issued this:
$ play haha2.wav

The class was treated to a very high-pitched chimpmunk version of “MY HUMPS! MY HUMPS! MY ITTY BITTY HUMPS!”

At this point the class was dying in laughter.

I continued with my straight man act.

“Pima, if you interrupt this class one more time I’m walking you out. Have some respect.”

He sat there and didn’t say A WORD.

A few more minutes go by and Pima is typing like a mad man on his keyboard trying to figure out what the heck is going on.

It was now time for “Le Finale Grande”.

$ play haha3.wav

Pima’s speakers blared the following in my own God-like voice:

“ATTENTION CLASS. THIS IS WHAT HAPPENS WHEN YOU DONT PAY ATTENTION TO THE INSTRUCTOR, CHANGE YOUR ROOT PASSWORD AND COMPLETELY DISREGARD YOUR ASSIGNED WORK. THAT IS ALL.”

At that moment Pima figured it out and was treated to his classmates (and me) laughing hysterically at him. He stood up, put his arms up in the air and proclaimed “YOU GOT ME. YOU GOT ME. OKAY.”

Pima has been a perfect gentleman since.

He even shows up to class five minutes early every day.

From: IT Tool Box

Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Hacking News



Reader Interactions

Comments

  1. Sir Henry says

    December 14, 2007 at 7:46 pm

    I love this story. I still laugh out loud every time I read it. Sounds like something that Goodpeople would have fun doing.

  2. Etagy says

    March 4, 2008 at 9:10 am

    Hehe, very amusing story *giggle*

    More hacker humour, please!

    Etagy

  3. Andy90 says

    March 4, 2008 at 10:58 pm

    Great story :)
    Tried something similar when I was back at school (though not nearly as complicated (trust me, was simple)) and got suspended form IT for two weeks haha

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 87

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 319

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

AI-Powered Cybercrime in 2025 - The Dark Web’s New Arms Race

AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Views: 515

In 2025, the dark web isn't just a marketplace for illicit goods—it's a development lab. … ...More about AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Upload_Bypass - Bypass Upload Restrictions During Penetration Testing

Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Views: 504

Upload_Bypass is a command-line tool that automates discovering and exploiting weak file upload … ...More about Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Shell3r - Powerful Shellcode Obfuscator for Offensive Security

Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Views: 695

If antivirus and EDR vendors are getting smarter, so are the tools that red teamers and penetration … ...More about Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Views: 8,674

Introduction: How Much of the Internet Can You See? You're only scratching the surface when you … ...More about Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (227)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (229)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (233)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,291,924)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,071)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,614)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,675)
  • Password List Download Best Word List – Most Common Passwords (933,464)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,130)
  • Hack Tools/Exploits (673,287)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,143)

Search

Recent Posts

  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025
  • AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race May 7, 2025
  • Upload_Bypass – Bypass Upload Restrictions During Penetration Testing May 5, 2025
  • Shell3r – Powerful Shellcode Obfuscator for Offensive Security May 2, 2025
  • Understanding the Deep Web, Dark Web, and Darknet (2025 Guide) April 30, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy