Log In Star

Command-grab-lnx-v1-1.zip Link

A few days ago, while digging through an old backup drive labeled “random_2007,” I found it. A single .zip file with a name that felt like a time capsule: command-grab-lnx-v1-1.zip .

You’ll hear the ghost of 2004 whisper back: ps aux . I never found the original author, tty0n1n3. The domain in the binary is dead. The email address bounces.

But in 2004, on a trusted LAN? People used this. I know, because I found a second file in the zip: grabber.conf with a single line:

Now you know. Have you ever found a weird binary from the early 2000s? Share your story in the comments—or better yet, tell me you still run UDP grabbers in production. I won’t judge. Much. command-grab-lnx-v1-1.zip

That’s why the zip file died out by v2.0. Real monitoring tools (Nagios, Zabbix, SNMP) won. And thank goodness.

I couldn’t resist. I unzipped it on an isolated VM. What I found wasn’t malware, nor a game. It was a strange, elegant, and almost forgotten piece of Linux history. Inside the zip was a single 32-bit ELF binary: grab . No man page. Running strings on it revealed a few clues: nc -l -p 31337 , /var/log/cmd.log , and a header: CMDGRAB v1.1 - (c) 2004 tty0n1n3 .

You’d deploy the grabber on your own machines. A tiny cron job would nc -u a query packet to port 31337, and the grabber would whisper back the system state. No SSH overhead. No passwords. Just UDP and a custom protocol. A few days ago, while digging through an

It was elegant. It was also terrifyingly insecure. Here’s the kicker: v1.1 had no authentication . Any packet to port 31337 would trigger the grab. If you ran this on a public server, anyone on the network could ask, “Hey, what commands are running right now?”

No README . No website. Just 1.2 MB of compiled mystery.

But somewhere, on some forgotten IRC log or Slashdot thread from 2004, someone probably said: “Check out this command grabber I made. Works great on my colo box.” I never found the original author, tty0n1n3

And for 20 years, that tiny v1-1.zip sat on a backup drive, waiting for someone curious enough to ask: What’s inside?

So what did it do?

Solutions
Resources
Company
Stay Updated

Get the latest OpenObserve insights

By subscribing, you agree to receive product and marketing related updates from OpenObserve.

ISO 27001 Certification badge
Official AICPA SOC badge

SOC2 Type II

Certified

Upcoming Webinar

Getting Started with OpenObserve

March 12, 2026
12:00 PM ET

OpenObserve Inc. © 2026

3000 Sand Hill Rd Building 1, Suite 260, Menlo Park, CA 94025

slacktwitterlinkdingithubyoutube