2021-12-29 at 12:28 PM UTC
Was heading home yesterday and was thinking..
How much damage could i cause if i write a small bash script that manipulates niceness, and also change the stack size and processes limits for the kernel. That way it will to prevent any user/group or root that i choose from executing certain functions to their system..
It would basically be like backdooring the GNU coreutils with rust or C, but different?
Obviously the obfuscation would be seriously lacking in this department, but i actually never seen it done, before indulging in this small projects, i was curious if anyone has seen this done with documentation, or in the wild before?
2021-12-29 at 3:09 PM UTC
Sudo
Black Hole
[my hereto riemannian peach]
You can literally cause more damage with a 2liter of gas and a book of matches. Aim higher
2021-12-29 at 6:28 PM UTC
Op, you have penis don't you.
2021-12-29 at 6:38 PM UTC
Buffers, and why they overflow. A tentative step towards your goals.
Alright, ok.
Any particular procs particularly sensitive to having their NICE values changed? I'd imagine anything userland shouldn't have that much of an impact.
2021-12-30 at 2:05 AM UTC
i just set a few random processes to -20, changed limits of a few groups. created a forkbomb and down it does.
random variables for these dont seem to work everytime, but every couple of dozen runs, it seems to get janky and likes to fall on its face.
ill start hard coding values and see if i can get a more accurate measure on what is being changed.