view paste/paste.27669 @ 2294:70ede24e4f7c

<Jafet> (echo "#!/usr/bin/python"; echo "import random; w=raw_input().split(\' \'); r=[4,7,8,9,2,13,6]; s=random.randrange(0, len(r)); print \' \'.join(chr(3) + str(r[(i+s)%len(r)]) + w[i] for i in range(len(w)))") > bin/rainwords
author HackBot
date Thu, 28 Feb 2013 02:49:19 +0000
parents a06749cc8c7c
children
line wrap: on
line source

2010-08-15.txt:03:00:50: <ais523> script -f >( cat ./ratry_login - | nc -q5 noway.ratry.ru 31337 > /dev/null ) "$@"
2010-08-15.txt:03:00:58: <ais523> where ratry_login contains "hello username password"
2010-08-15.txt:03:12:51: <alise> script -f >(cat ./ratry_login - | nc noway.ratry.ru 31337 >/dev/null) nethack
2010-08-15.txt:03:14:42: <alise> ipt -f >(cat ./ratry_login - | nc noway.ratry.ru 31337 >/dev/null) nethack'
2010-08-15.txt:03:17:15: <alise> ipt -f >(cat ./ratry_login - | nc noway.ratry.ru 31337 >/dev/null) nethack && ex
2010-08-29.txt:22:22:02: <ais523> script -f >( cat ./ratry_login - | nc -q5 noway.ratry.ru 31337 > /dev/null ) "$@"
2010-08-29.txt:22:22:11: <ais523> and ./ratry_login is hello username password
2012-04-21.txt:20:32:26: <ais523> script -f >( cat ./ratry_login - | nc -q5 noway.ratry.ru 31337 > /dev/null ) "$@"
2012-04-21.txt:20:32:41: <elliott> what format is ratry_login again?
2012-04-21.txt:20:34:57: <elliott> [elliott@dinky tmp]$ script -f >( cat ./ratry_login - | nc noway.ratry.ru 31337 > /dev/null ) adom