5 "Deadly" Linux Commands

Jun 8, 2015 04:32 PM
635693115978605651.jpg

Everyday, Null Byte is getting bigger, and most of the newcomers are new to hacking and Linux. Without some knowledge on deadly commands, it is easy to trick a newbie into executing these and destroying their Linux OS. I made a list with some of the deadliest commands from tecmint that either remove files, overwrites them, or freezes your system.

Warning: These commands should NEVER be executed. They will most likely destroy your system (or ruin a major part) before you can stop them, however, if you want to see how they work, you could run them inside a Virtual Machine.

So, let's get started:

  1. "rm -rf /"
  • This command basically means "remove all files (even Read Only files) recursively in the root (top) directory" (can also be written as "shred -rf /)"
  1. ":(){:|:&};:"
  • This command is known as a 'Fork Bomb'. It operates by defining a function called ':', which calls itself twice, once in the foreground and once in the background. It keeps on executing again and again till the system freezes. (Source: tecmint.)
  1. "'command' > /dev/sda"
  • This command writes the output of 'command' to the specified drive. This is considered deadly because it overwrites any data on the drive.
  1. "mkfs.ext3 /dev/sda"
  • This command is known as a format command. It will format the specified drive to an ext3 format, wiping everything on the drive.
  1. "dd if=/dev/random of=/dev/sda"
  • This command writes random data onto the specified drive, and overwrites any data within that drive.

These are a few of the many deadly commands for Linux. This post was made for the newcomers in Linux (and maybe some of the veterans) who are likely to run the commands if told it will fix a problem. I, myself, was tricked into executing the 1st command listed here a while back and it took me FOREVER to get all my data and documents back. Also, if you have any more deadly commands, post them below.

Next post: Social Engineering: Getting the 'keys' to the world.

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!