How To Pull Off the Upside-Down Web Pages Prank

Turn the office upside down in confusion with the upside-down web pages prank.


  • Step 1: Sit back and enjoy all of the confused reactions to your prank. The Morgrify program is a tool to resize, blur, crop, despeckle, dither, draw on, flip, join, or re-sample an image. It overwrites the original image with any changes you request.
  • FACT: "The World Stands on its Head" is the name of a house built by two Germans in which everything is upside down – including the exterior, the rooms, and the furniture.
  • TIP: The cgi script to flip pages contains a trivial redirector that downloads images, uses mogrify to turn them upside down, and serves them out of its local web server. It looks like this: #!/usr/bin/perl $|=1; $count = 0; $pid = $$; while (<>) { chomp $_; if ($_ =~ /(.*\.jpg)/i) { $url = $1; system("/usr/bin/wget", "-q", "-O","/space/WebPages/images/$pid-$count.jpg", "$url"); system("/usr/bin/mogrify", "-flip","/space/WebPages/images/$pid-$count.jpg"); print "$pid-$count.jpg\n"; } elsif ($_ =~ /(.*\.gif)/i) { $url = $1; system("/usr/bin/wget", "-q", "-O","/space/WebPages/images/$pid-$count.gif", "$url"); system("/usr/bin/mogrify", "-flip","/space/WebPages/images/$pid-$count.gif"); print "$pid-$count.jpg\n"; } else { print "$_\n";; } $count++; }
  • Step 2: Reroute traffic from the untrusted half through a cgi script that flips pages upside down.
  • Step 3: Split the IP addresses on the network into trusted half and untrusted half, each with different netblocks.
  • TIP: The trusted half will look like this: ddns-updates off; ddns-update-style interim; authoritative; shared-network local { subnet *.*.*.* netmask { range *.*.*.* *.*.*.*; option routers *.*.*.*; option subnet-mask; option domain-name "XXXXX"; option domain-name-servers *.*.*.*; deny unknown-clients; host trusted1 { hardware ethernet *:*:*:*:*:*; fixed-address *.*.*.*; } } And the untrusted half will look like this: subnet netmask { range; option routers; option subnet-mask; option domain-name-servers; allow unknown-clients; } }
  • Step 4: Get local access to your coworker’s or family's computer system.

Popular Categories