Avatar
⚡️🌱🌙
7560e065bdfe91872a336b4b15dacd2445257f429364c10efc38e6e7d8ffc1ff
Former Youngest Person in the World!! stuartellison.com fantactico.com knostr.io zairk.com 🪴

Heading to US in the morning, interesting times.

Replying to Avatar rabble

Nah, people are not the stupid sheep you claim they are, and are more than capable of thinking for themselves.

It’s only once you realise you don’t need permission, that you’re finally free.

I do not.

I’m hoping for a massive reversal of recent form and some sort of divine intervention.

I’m super sensitive to anything red and yellow this weekend.

Basically…

1) turn off a PC / laptop.

2) plug this plain looking lightning cable in

3) turn on PC / laptop

4) rather than boot up as normal it will boot from cable (if USB boot enabled)

5) prompts for a web URL

6) you enter a specific URL

7) PC / laptop boots an OS from the URL, boots a shell into RAM only

8) You now have an OS shell running on the PC / laptop in RAM (volatile), it doesn’t touch the disc and it loads all this from an OS image that you do not even possess.

Why bother?

This leaves no trace of your session on the host, no logs, the host never even booted.

The only trace that a session happened is on the rooter logs where the host machine IP will appear, but it always appears there so doesn’t look odd.

If you are caught with the hardware, it just looks like a charger and not a flash drive it’s overlooked, if someone does trys plugging it into a machine anyway, it has no data on it, no credentials, no applications, no operating system.

Just a boot.ini package that boots to an iPXE prompt.

My plan is to see if I can squeeze a mag switch into the connector so that I can wire it as a cable and then use magnet (in the lighting end) to switch it to the hidden flash.

It’s just a fun little project.

Turning an old iPhone cable into a USB boot device that boots iPXE, and on boot requests an http address for RAM only OS image.

The computer that doesn’t exist.