Help hacking computer with physical access and without root

I have noticed that some distributions give a root shell if the root partition can’t be recovered at boot-time with fsck -p. I was thinking of a way a user without root, but with physical access to the computer can trigger this behavior. I tried the following script:

function fbomb() {
    dd if=/dev/urandom of=$RANDOM &
    mkdir $RANDOM &
    touch $RANDOM &

    fbomb | fbomb
}

cd /
#or cd /home
fbomb

After letting it fill my terminal with errors I cut the power to my laptop.

If the partition is /home mounted with: type ext4 (rw,relatime,seclabel,block_validity,delalloc,barrier,user_xattr,acl)
The expected behavior is achieved, that is the system is unable to mount the partition.

But if I try it on / mounted with: type ext4 (rw,relatime,seclabel,data=ordered)
The partition is recovered without any trouble.

Can you give me any ideas how I might corrupt(as non-root with physical access) the / partition so that it can’t be automatically fixed?
I’d like to use this method to hack into the ubuntu machines in my universitie’s laboratories, for example

What I want is to develop an exploit out of this. My universities computers are just an example.

Continue reading Help hacking computer with physical access and without root

Found my iPhone 5 somewhat open (possibly right after airport security), what (if anything) might have been done to it?

I was traveling by air very recently, and once I got home I noticed that the button on my iPhone 6 seemed to be more deeply recessed. After a while I realized that this did not make any sense mechanically, so I removed the Rh… Continue reading Found my iPhone 5 somewhat open (possibly right after airport security), what (if anything) might have been done to it?

Refurbishing an infected machine where the attacker had unrestricted physical access

Consider a scenario where the attacker had unlimited and unrestricted access to your desktop or laptop and their goal is to access your encrypted drives or the data on them.

Which steps are necessary or most important in ord… Continue reading Refurbishing an infected machine where the attacker had unrestricted physical access