If the other traffic is already correlated to your IP, then what additional info does an ICMP echo leak?
ICMP doesn’t reveal any personal details. As opposed to say when you visit with the web browser where you can be fingerprinted, and perhaps have that tied to the rest of your browsing history or real world identity.
BOFH: hooked up the mains to the doorknob and asked a luser to bring their laptop over for personal attention and repair.
dmesg | less
should allow you to scroll the output. You should use forward slash in less
to search for the devices (hit enter), see if the modules are being loaded or if there some errors.
check lsmod
before and after see what kernel modules are changing.
also look at dmesg
for interesting kernel messages as you attempt to use / not use the offending hardware.
tcpdump, wireshark can capture packets.
haproxy can be a proxy of many networking protocols
mitmproxy can help see encrypted traffic by acting as a literal man in the middle.
ssh with certain parameters can become a SOCKS5 proxy to encrypt and tunnel traffic out of a hostile network
Charlton Heston Bonus Round: