@hello #!/usr/bin/ruby
require 'socket'
puts Socket.getifaddrs.reject{|i|i.addr.nil?||!i.addr.ip?}.map{|i|"#{i.name} (#{i.ifindex}): #{i.addr.inspect}"}

@boots
lo (1): #<Addrinfo: 127.0.0.1>
lo (1): #<Addrinfo: ::1>

Follow

@lanodan_tmp ruby iirc basically is just calling getifaddrs and abstracting the return
whoever made this bot saw us coming from like a mile away and did a *really good job*

@boots There have to be something that is exploitable.
And well I have too much popcorn, let this admin have some.

@boots I don’t think I have one, but I think I’ll try docker or non-grsecurity failures.

@lanodan_tmp docker can have its own kernel, and i doubt the bot gives enough privilege to allow much poking

Sign in to participate in the conversation
Computer Fairies

Computer Fairies is a Mastodon instance that aims to be as queer, friendly and furry as possible. We welcome all kinds of computer fairies!