Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
If set up properly, this function will theoretically open a port from the stolen computer through any firewalls
When setup correctly and a connection made to the remote server, you can SSH from this server using "ssh -p REMOTE_PORT USER@localhost"
This pull request is intended as a 'proof of concept', and as a place to discuss the idea.
Current caveats:
$ sudo ssh-keygen
since the cron is run as root.My idea is that the prey project could have a 'pro' feature called simply "enable SSH connection" (on/off).
When enabled, the prey servers would send down details of the SSH host, user, ports etc. to the client when it requests the XML status file from prey's servers (the URL that's something like http://panel.preyproject.com/devices/).
The client would then setup the connection to the prey server (using the script in this pull), after which a prey pro user could simply log into the prey control panel and be presented with an SSH prompt from which they can interact with their lost computer (or Prey could just give the user the details to SSH in themselves)
I think this is a good idea (for the expert user) since even if SSH is allowed and you have the IP of the computer, most modern day routers block incoming traffic on port 22. This is the most reliable way of being able to SSH into the stolen computer'