Command-grab-lnx-v1-1.zip -

No README . No website. Just 1.2 MB of compiled mystery.

It was elegant. It was also terrifyingly insecure. Here’s the kicker: v1.1 had no authentication . Any packet to port 31337 would trigger the grab. If you ran this on a public server, anyone on the network could ask, “Hey, what commands are running right now?”

And for 20 years, that tiny v1-1.zip sat on a backup drive, waiting for someone curious enough to ask: What’s inside? command-grab-lnx-v1-1.zip

You’ll hear the ghost of 2004 whisper back: ps aux . I never found the original author, tty0n1n3. The domain in the binary is dead. The email address bounces.

But somewhere, on some forgotten IRC log or Slashdot thread from 2004, someone probably said: “Check out this command grabber I made. Works great on my colo box.” No README

So what did it do?

But in 2004, on a trusted LAN? People used this. I know, because I found a second file in the zip: grabber.conf with a single line: It was elegant

Now you know. Have you ever found a weird binary from the early 2000s? Share your story in the comments—or better yet, tell me you still run UDP grabbers in production. I won’t judge. Much.

BLOG ARCHIVED