The power cable would like to have a word.
objdump -D * | less
We have squid games at home.
Squid games at home:
while this is not real, something similar in principal very much was! (but not too widespread)
see here or look up “casino dos malware”
uh in short it erases “the disk’s” (unsure which) file allocation table (pretty much the dos/windows version of a superblock). apparently some versions did copy it to memory and give the user a chance though!
There also was Fake DOS back in the day
Reminder that binaries cannot change a shell’s working directory, so the non-mines will do nothing.
(
cdis a shell builtin)Technically they could if run as root by modifying the parent process
it could just reinvoke
$SHELLin the parent dir
Has “let’s play a game” vibes
Reminds me of gameshell, which is a rogue-like game designed to teach you the unix shell. So instead of navigating with NESW, you
cdto locations. At one point you search the “garden”, which is an unmanageable tangle of directories, withfind.There goes my night? Longer?
Cool! Will give this a try for sure! Always forget commands
Based on the responses in this thread, I feel like you could present this screenshot with a “I bet you couldn’t find your way out of this!” and a zip of the directory, and a significant number of users would voluntarily download it and extract it just to “prove that they could”.
Well yeah? And you do it in a vm. But seems like a decently simple problem anyway.
ls -aland compare the sizes.Obvioulsy whoever set this minefield thought about this
Genuinely my first response. What are VMs for?
I run QubesOS BTW. My entire computer is just a bunch of VMs in a trench coat.
Running Qubes as a daily driver is some serious level of privacy enthusiasm
\cd ~what does this change?
Bypasses aliases and uses the original command
When people don’t know normal things we learned in '92, I get worried.
Instead of acting like an asshole, teach us.
Oof. I consider myself a fairly decent Linux Sysadmin (~15 years experience ~10 years professionally) but I actually didn’t know about that. :/
Combat the minefield with a fork bomb. Ain’t no process surviving this engagement.
They never guess the next move: Unplugs pc
loud knocking on the door
Either that or the PC keeps running anyway.
Boston Dynamics: “Either that or the PC keeps running away.”
I can think of a way out:
Just throw the whole PC away. It’s someone else’s problem now!
But that just becomes a Jumanji issue
Maybe something like
find ./ -type f | xargs md5sum, then avoid the one directory where the executable has a different checksum. Heck, evenfind | lsmight suffice.This could be trivially defeated by a program which erases the hard drive unless run using a particular executable name. Then, all twenty entries could simply be hard links to the same executable file on disk, but one of the names would trigger different behavior.
So then you either cat the executable and hope it’s a shell script, you output the binary with a hex viewer and compare, you modify the executable so it’s in a lower permission group and thus wouldn’t have access to erase the drive, there’s like a hundred ways to solve this.
How can you prevent users from leaving a directory?
Magic, I guess, 'cause nothing in the sceenshot would do it, unless the attacker had already replaced
catwith a trojan or something.chroot, and override exit with an alias,could work
AFAIK, there’s no way to without modifying the system tools and shell.
How can you prevent a shutdown using a power key?
There’s an Emacs command to do that
C-x M-c M-minefieldYou could probably install a handler for the event that’s triggered when the power button is pressed. Most OSes do that and pop up a graceful shutdown options window. Most hardware will have a hard shutdown option when you hold the power button for a few seconds. You would probably have to overwrite the BIOS or something at that level to prevent that way out.
cat 1*a single cat is hurled unceremoniously through the window onto your lap*

















