so i dunno if you knew you could do this, but its helpful in a lot of hilarious/dumb scenarios

if the network goes down, the parrot stops dancing.

if the parrot doenst appear, there is a connectivity issue, or it'll throw an error

if you want to know WHEN the network goes down, you curl parrot.live and wait for the parrot to stop dancing, now you know the network has gone down.

also, if you want to host your own dancing command line party parrot, whoever wrote it put it on github, so you can just clone it

https://github.com/hugomd/parrot.live

GitHub - hugomd/parrot.live: 🐦 Bringing animated parrots to terminals everywhere

🐦 Bringing animated parrots to terminals everywhere - hugomd/parrot.live

GitHub

@Viss

So the parrot is like a miner's canary?

@Uair a nework miners canary, yeah :D
@Viss what's even more fun is that if you have root on a device, you can pipe it out to local tty terminals and remote pts terminals and effectively DOS the box.

@da_667 hahahaha dude for a talk i did at securityfest last year, i think i even pointed out that you can change the shell of a user to a bash script instead of /bin/bash or whatever..

you can like
echo "curl parrot.live" > /tmp/fucktardia.sh
chmod +x /tmp/fucktardia.sh
chsh loser
(aim it at /tmp/fucktardia.sh)
user loser now sshes into a box and gets party parrot.

control c? connection drops.
i am currently unaware of a way to bypass that, but if we find one, we should tell @bagder

@Viss @bagder command execution on ssh login

ssh [username]@box /bin/sh

[auth to box]

get a a shell with no pty, that doesn't show up in w or who output.

@Viss @bagder this is also an effective way to bypass appliances that use restricted shells if they are too stupid to leave sh, bash, etc. reachable and don't disable the ssh config option that allows command exec on SSH auth.
@Viss @bagder fun fact: I used this to solve an over the wire challenge some time ago. I'm not sure it was the right way, but yolo.
@marczak @da_667 is this example setup using a shellscript as the users shell?
@Viss I will test that during this week. (But my best guess is yes, it will still work in that case.)
@Viss tested, and the specified shell still runs first. So, your method is useful for keeping people out/screwing around. The authorized_keys command is useful if you’re actually trying to restrict a valid user. @da_667

@Viss this sent me down a rabbit hole:

https://cultofthepartyparrot.com/

Cult of the Party Parrot

THE PARROT INSISTS

@pft oh ive seen this on before! someone spent a lot of time on these, hahaha
@Viss if I was that dedicated to anything in my life, i would've been way happier/more successful.