Re: Stolen laptop
On Mon, 23 Jun 2003 19:15:57 -0400
Joseph Barillari <email@example.com> wrote:
> >>>>> "SM" == Steve McIntyre <firstname.lastname@example.org> writes:
> SM> Good point, yes. Any suggestions on how to improve it?
> As for PPP connections, given that it takes a non-trivial amount of
> time to bring one up, I suspect there is little chance of bringing one
> up clandestinely. Better to take advantage of any connection that the
> user initiates.
It's a Linux box - It's probably running X windows by default,
and hopefully [xgk]dm isn't doing an auto-login... So
on the login panel have a "username: fred password: 34sjdsfy8" message
When this user logs in it will be the 'bad guy', cause it sure
as hell isn't going to be you..
Then you know you are in 'bad boy mode' and you can launch some eye-candy,
to keep them distracted and send the machine into defensive mode in the
background ( tar -zcf - /home | gpg -blah )
Pop up a nice "dial internet to download porn/bank account details/
whatever" window, and then trigger the dial.... A little bit of social
engineering and they'll do the dialin for you... even get them to
plug in the phone line :-)
Once you know you are in bad-boy mode, you can then do what you want
to the box - your data should end up encrypted, so if you ever recover
the machine you don't lose the data since your last backup ( you are
backing things up aren't you ).. ,... then gather everything you can
about the network and email the world.
 Note to self - do backup :-)
> Best, --Joe
> Joseph Barillari -- http://barillari.org
Darach Technology Ltd
email: chris.higgins at hts.horizon.ie