The Linux🐧 commands you should NEVER use.
Disclaimer DON'T🚫 run these commands.

A thread🧵👇
#CyberSecurity #infosec #Linux Image
1. Recursive Deletion🔁🗑️
This is one of the most dangerous commands. Once this command is run, it deletes all the content of the root directory forcefully and recursively. Thus, all your directories and subdirectories will be deleted and the data will be lost. Image
2. Fork Bomb🍴💣

My personal best😄,this is a simple bash recursive function which once executed creates copies of itself which in turn creates another set of copies of itself. This consumes the CPU time and memory. Thus, it runs recursively until the system freezes. Image
3. Overwrite Hard Drive✍️💿
This command writes raw data (output of the command) to the specified partition. This results in data loss in the hard drive or mentioned partition.
command - this could be any command. Image
4. Implode Hard Drive🕳️
These commands will move all the data to a special location in Linux called the black hole (/dev/null). Anything moved to this location is destroyed. Thus if you accidentally move your data to this folder, your data is not going to be recovered anyway. ImageImage
5. Download and Execute Malicious Script☠️📜
Wget is a very useful Linux command for fetching/downloading files from the internet. But this command can be dangerous if we blindly download and execute a malicious script. Image
6. Format Hard Drive🧹📀
This command will wipe out your hard drive and makes it new. These should only be used in instances when you have either have your data backup on the cloud or external device. Image
7. Write Random Junk to Hard Drive🈳📀
This command will write random junk data into your drive. The after effects of this command are that your system will not be recovered. Image
8. Breach the System🔓
This cmd doesn’t physically affect your system like the other commands do, but this provides a security breach on the system. By executing this command, you are providing all the users of the system to be able to read, write and execute data on your system. Image
9. The Hidden (rm -rf /)
The below command is nothing but the rm -rf / command above. Here the codes are hidden in hex so that an ignorant user may be fooled. Running the below code in your terminal will wipe your root partition. Image
Please DON'T execute any of the above commands in your Linux terminal or shell or of your friend or school computer. If you want to test them, run them in virtual machine. Any in-consistence or data loss, due to the execution of above command will break your system down.
That's it! Thank you for reading today's thread😇. If you have other DON'T run commands I have missed, feel free to add them in the comments. Would love to know them as well. And be sure to rt🔁, like💌 and follow me (@xtremepentest) for more future Linux content.
Here is an explanation for the Fork🍴 Bomb💣 Image
Fork🍴 Bomb 💣 in C-Lang Image

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Xtreme Pentesting

Xtreme Pentesting Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @xtremepentest

19 Nov
Useful Linux🐧 Networking🌐 Commands📜 for Sysadmins/Regular Users🧑‍💻

A thread🧵
Hello everyone👋, Today I'll be doing another quick, easy to follow thread🧵 on some of the most used command-line tools and utilities for network management in Linux

#infosec #CyberSecurity #Linux
1. Ifconfig🌐
Ifconfig stands for Interface Configurator, it is one of the most used commands for finding network details, nitialize an interface, assign IP address, enable or disable an interface. It also display route and network interface.
2. Ip🌐
ip command is the latest version of ifconfig. It is more powerful than ifconfig command as it can perform several other tasks that the ifconfig cannot do. The utility is used for displaying and manipulating routing, network devices, interfaces.
Read 21 tweets
17 Nov
Basic Linux 🐧Commands📜 For Text Manipulation

A thread🧵

Hello everyone👋, Today I'll be doing a quick, easy to follow thread🧵 on basic Linux commands for text manipulation.
#infosec #cybersecurity #Linux
1. Echo🐧
The echo command is used to display line of text to the standard output(stdout).
2. Cat🐧
The cat command is used concatenate files and print their contents on the standard output. In other words it's just used to display the contents of a file.
Read 27 tweets
16 Nov
OSCP (Offensive Security Certified Professional) Pass and Preparation - Tips and Tricks💡

A thread🧵

#oscp #CyberSecurity #infosec
2. [0x4D31/awesome-oscp: A curated list of awesome OSCP resources (github.com)](github.com/0x4D31/awesome…)
Read 16 tweets
15 Nov
BEGINNER👦 LINUX PRIVILEGE 🔐ESCALATION⬆️
Abusing SUDO rights and popping r00t shells

A thread🧵
#infosec #CyberSecurity #bugbountytips Image
In this thread🧵, I will be discussing how you can pop a root shell by abusing SUDO rights misconfiguration and will be demonstrating this using this box: tryhackme.com/room/linuxpriv…
First things first, let’s start with theoretical concepts!!😄
What is SUDO👑?
Sudo (Superuser Do) - is a Unix and Linux based utility that gives users permissions to run commands at the `root` level (most powerful user).
Read 21 tweets
6 Oct
THIS IS LEARN HACKING PART 2🧑‍💻
/A thread🧵👇
There was part one be sure to check it out.


#cybersecurity #infosec #Security
4a) BEGINNER VIDEOS AND SOME INTERMIDIATE

- Corey Schafer (@CoreyMSchafer)- YouTube - youtube.com/c/Coreyms
- code with tim python (@TechWithTimm) - YouTube youtube.com/c/TechWithTim
Read 14 tweets
6 Oct
LEARN HACKING PART 1🧑‍💻

Do yourself a favour and learn to hack🐞.

You just have to START!🏁, you will be good in no time⏱️.

/ A mega thread🧵👇

Here are a few resources for you to get started.
#cybersecurity #CyberAttack #infosec #hacker
#CybersecurityAwarenessMonth
Also, please note that I'm not a professional hacker or pentester. I'm still learning to be, so these are the resources I have found useful along my journey.
THE FUNDAMENTALS SKILLS REQUIRED👇

1) Basic IT skills.👶🍼
If you are brand new to IT, I strongly recommend this course.
This is a FREE course by Professor Messer – professormesser.com/free-a-plus-tr…
Read 24 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Thank you for your support!

Follow Us on Twitter!

:(