- turn on the speakers at maximum volume - fart in a Russian manner, way loudly - wait milliseconds until the entire fart audio data goes wrecking their speakers - ... - profit !!
Jayden Gutierrez
anyone tried this?
Parker Richardson
404
Dominic Morales
remove the cgi-bin bit
Christopher Russell
>96.230.105.224:8080/cgi-bin/ works well all the files are there, but it's only bullshit, at least I didn't see anything interesting
Nolan Sanchez
I already erased the "interesting" ones.
Brayden Nelson
What os is that bro
Nathan Foster
some storage box you keeps files on
Noah Perez
it's the NAS interface
Grayson Garcia
Like what?
Jonathan Gutierrez
Anyone horny?
Connor Gomez
Post wins fgt.
Gavin Reed
which fgt is from Barmundu, Queensland?
Noah Rodriguez
You know that IP is probably a redirect spoof right?
Jacob Phillips
what is that? go back to Sup Forums
Bentley Thomas
please give me the set
Nolan Evans
It means you probably "broke" into someones' NAS that had zero to do with those brute force attempts.
FYI those QNAS's run a 3.1X kernel with a full GNU Utilities and busybox toolkit. You should be able to SSH into it.
Gabriel Garcia
My IP shows that location
Alexander Gray
Kek, Russian woman
Asher Flores
>Got an nmap scan from my server cause someone was trying to brute force the SSH password.
>Browsed to their IP and it's a QNAP NAS box with default admin password.
ah
Ayden Diaz
No, definitely the right IP. Like I said, there were a huge amount of SSH connections as admin. File system is probably littered with connections to botnets.
Christopher Nelson
If you know the admin password you can gain root access to it (they're the same if I recall). So go do it fgt.
Let's see what he's doing in there, if it actually is him doing it. Sounds like he's just a zombie NAS though.
Landon Taylor
if you get into it can you put this picture on it for me.