linux

1
Malicious Linux Commands From (This article was originally published in Ubuntu Forums but was removed there. Ubuntuguide feels that knowledge about these risks is more important than any misguided attempts to "protect the public" by hiding their potential dangers or protect the (K)Ubuntu/Linux image. The original article has therefore been re-created (and subsequently edited) here.) ATTENTION: It is worthwhile to have some basic awareness about malicious commands in Linux. Always be cautious when running one of these (or similar) commands (or downloaded scripts) that have been "recommended" as a solution to a problem you may have with your computer. It is also worthwhile to always enable a Kubuntu screensaver or Ubuntu screensaver with a password so that a casual passerby is not able to maliciously execute one of these commands from your keyboard while you are away from your computer. When in doubt as to the safety of a recommended procedure or command, it is best to verify the command's function from several sources, such as from readily available documentation on Linux commands (e.g. manpages). Here are some common examples of dangerous commands that should raise a red flag. Again, these are extremely dangerous and should not be attempted on any computer that has any physical connection to valuable data. Many of the commands and techniques will cause just as much damage from a LiveCD environment, as well. This is far from an exhaustive list, but should give some clues as to what kind of things people may try to trick you into doing. Remember these can always be disguised as some obfuscated command or as a part of a long procedure, so the bottom line is to take appropriate caution when executing something that just doesn't "feel right". Contents 1 Delete all files, delete current directory, or delete visible files in current directory 2 Reformat Data on device 3 Block device manipulation 4 Forkbomb 5 Tarbomb 6 Decompression bombs 7 Malicious code in Shell scripts (/) Sign up with: Facebook (/signup?fbclick) Email (/signup) Login (/login) Share this page: Malicious Linux Commands - (https://plus.google.com/shar (http://pinterest.com/p (http://www.tum Malicious Linux Commands - - StumbleUpon http://www.stumbleupon.com/su/1aL6vk/ubuntug... 1 of 1 02/20/2015 11:46 PM

Upload: gerson-santos

Post on 17-Nov-2015

212 views

Category:

Documents


0 download

DESCRIPTION

Programming

TRANSCRIPT

  • Malicious Linux CommandsFrom

    (This article was originally published in Ubuntu Forums but was removed there. Ubuntuguidefeels that knowledge about these risks is more important than any misguided attempts to"protect the public" by hiding their potential dangers or protect the (K)Ubuntu/Linux image.The original article has therefore been re-created (and subsequently edited) here.)

    ATTENTION:It is worthwhile to have some basic awareness about malicious commands in Linux. Always becautious when running one of these (or similar) commands (or downloaded scripts) that havebeen "recommended" as a solution to a problem you may have with your computer.

    It is also worthwhile to always enable a Kubuntu screensaver or Ubuntu screensaver with apassword so that a casual passerby is not able to maliciously execute one of these commandsfrom your keyboard while you are away from your computer.

    When in doubt as to the safety of a recommended procedure or command, it is best to verifythe command's function from several sources, such as from readily available documentation onLinux commands (e.g. manpages).

    Here are some common examples of dangerous commands that should raise a red flag. Again,these are extremely dangerous and should not be attempted on any computer that has anyphysical connection to valuable data. Many of the commands and techniques will cause just asmuch damage from a LiveCD environment, as well.

    This is far from an exhaustive list, but should give some clues as to what kind of things peoplemay try to trick you into doing. Remember these can always be disguised as some obfuscatedcommand or as a part of a long procedure, so the bottom line is to take appropriate cautionwhen executing something that just doesn't "feel right".

    Contents1 Delete all files, delete current directory, or delete visible files in current directory2 Reformat Data on device3 Block device manipulation4 Forkbomb5 Tarbomb6 Decompression bombs7 Malicious code in Shell scripts

    (/)

    Sign up with: Facebook (/signup?fbclick)Email (/signup) Login (/login)

    Share this page: Malicious Linux Commands - (https://plus.google.com/share?url=http%3A%2F%2 (http://pinterest.com/pin/create/button/?u (http://www.tumblr.com/share/link?u

    Malicious Linux Commands - - StumbleUpon http://www.stumbleupon.com/su/1aL6vk/ubuntug...

    1 of 1 02/20/2015 11:46 PM