0% found this document useful (0 votes)
42 views1 page

Malicious Linux Commands - Stumbleupon

This document discusses some common malicious Linux commands that could damage a system. It warns to be cautious when running any commands, especially those recommended to solve a problem, and to verify commands from multiple sources. Some examples of dangerous commands include those that delete all files, reformat storage devices, manipulate block devices maliciously, or contain forkbombs, tarbombs, decompression bombs, or malicious code in shell scripts. The document encourages enabling screen locks and being wary of commands that seem suspicious.

Uploaded by

Gerson Santos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views1 page

Malicious Linux Commands - Stumbleupon

This document discusses some common malicious Linux commands that could damage a system. It warns to be cautious when running any commands, especially those recommended to solve a problem, and to verify commands from multiple sources. Some examples of dangerous commands include those that delete all files, reformat storage devices, manipulate block devices maliciously, or contain forkbombs, tarbombs, decompression bombs, or malicious code in shell scripts. The document encourages enabling screen locks and being wary of commands that seem suspicious.

Uploaded by

Gerson Santos
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Malicious Linux Commands - - StumbleUpon

Sign up with:
(/)
Share this page: Malicious Linux Commands -

http://www.stumbleupon.com/su/1aL6vk/ubuntug...

Facebook (/signup?fbclick)
Email (/signup)

Login (/login)

(https:/
(http:/
/plus.google.com/share?
/pinterest.com/pin/
(http://www.tumblr.

Malicious Linux Commands


From
(This article was originally published in Ubuntu Forums but was removed there. Ubuntuguide
feels that knowledge about these risks is more important than any misguided attempts to
"protect the public" by hiding their potential dangers or protect the (K)Ubuntu/Linux image.
The original article has therefore been re-created (and subsequently edited) here.)
ATTENTION:
It is worthwhile to have some basic awareness about malicious commands in Linux. Always be
cautious when running one of these (or similar) commands (or downloaded scripts) that have
been "recommended" as a solution to a problem you may have with your computer.
It is also worthwhile to always enable a Kubuntu screensaver or Ubuntu screensaver with a
password so that a casual passerby is not able to maliciously execute one of these commands
from your keyboard while you are away from your computer.
When in doubt as to the safety of a recommended procedure or command, it is best to verify
the command's function from several sources, such as from readily available documentation on
Linux commands (e.g. manpages).
Here are some common examples of dangerous commands that should raise a red ag. Again,
these are extremely dangerous and should not be attempted on any computer that has any
physical connection to valuable data. Many of the commands and techniques will cause just as
much damage from a LiveCD environment, as well.
This is far from an exhaustive list, but should give some clues as to what kind of things people
may try to trick you into doing. Remember these can always be disguised as some obfuscated
command or as a part of a long procedure, so the bottom line is to take appropriate caution
when executing something that just doesn't "feel right".

Contents
1
2
3
4
5
6
7
1 of 1

Delete all les, delete current directory, or delete visible les in current directory
Reformat Data on device
Block device manipulation
Forkbomb
Tarbomb
Decompression bombs
Malicious code in Shell scripts
02/20/2015 11:46 PM

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy