What did the minefield directory do here to hijack cd?
Can an alias be applied upon cd?
on termux it works:
~ $ alias 'cd=echo' ~ $ cd ~ $ cd hi hi ~ $
The power cable would like to have a word.
it removed your disc encryption keys and the only way to recover it is finding it in memory through the minefield
objdump -D * | less
while this is not real, something similar in principal very much was! (but not too widespread)
see here or look up “casino dos malware”
uh in short it erases “the disk’s” (unsure which) file allocation table (pretty much the dos/windows version of a superblock). apparently some versions did copy it to memory and give the user a chance though!
There also was Fake DOS back in the day
We have squid games at home.
Squid games at home:
Based on the responses in this thread, I feel like you could present this screenshot with a “I bet you couldn’t find your way out of this!” and a zip of the directory, and a significant number of users would voluntarily download it and extract it just to “prove that they could”.
Genuinely my first response. What are VMs for?
I run QubesOS BTW. My entire computer is just a bunch of VMs in a trench coat.
Running Qubes as a daily driver is some serious level of privacy enthusiasm
I do it mainly cos it makes managing lots of different environments easy. I can have windows and different Linux distros and different packages and cool shit all from one display manager.
Doesn’t virtualization eat away a lot of performance? Or do you not care much about it?
1-2% is the overhead of virtualization. Hardware virtualization is Goated. And QubesOS uses Zen under the hood same as what’s used by aws etc so its well optimised.
Nice
@Allero Not if it’s hardware-accelerated. You’ll be hard-pressed to find a CPU without hardware virtualization, though.
And for GPU? For all I understand, everything but dom0 should still require GPU Passthrough to have any decent GPU performance. Does passthrough perform well? Also, am I right in understanding that if you have 2 GPUs or APU/GPU mix, you can only have GPU passed through to one VM, leaving other VMs on the mercy of the same device that renders dom0?
Well yeah? And you do it in a vm. But seems like a decently simple problem anyway.
ls -aland compare the sizes.Obvioulsy whoever set this minefield thought about this
I mean they didn’t, cause you can just open another terminal window or pull the plug on the computer, but like someone else said, a binary can’t change the directory for you
cdis a shell built in, so I’m pretty sure this would be trivial to get past.The greatest trick is to make your opponent think you thought of everything. Powering off might just straight up work and they’re just bluffing, might as well try
Reminder that binaries cannot change a shell’s working directory, so the non-mines will do nothing.
(
cdis a shell builtin)Technically they could if run as root by modifying the parent process
I mean, you can just write a whole custom shell for this
it could just reinvoke
$SHELLin the parent dirGood point. Also it wouldn’t stop you from just opening another terminal window haha.
\cd ~what does this change?
Bypasses aliases and uses the original command
When people don’t know normal things we learned in '92, I get worried.
Instead of acting like an asshole, teach us.
Oof. I consider myself a fairly decent Linux Sysadmin (~15 years experience ~10 years professionally) but I actually didn’t know about that. :/
Reminds me of gameshell, which is a rogue-like game designed to teach you the unix shell. So instead of navigating with NESW, you
cdto locations. At one point you search the “garden”, which is an unmanageable tangle of directories, withfind.There goes my night? Longer?
Cool! Will give this a try for sure! Always forget commands
Combat the minefield with a fork bomb. Ain’t no process surviving this engagement.
Has “let’s play a game” vibes
They never guess the next move: Unplugs pc
loud knocking on the door
Either that or the PC keeps running anyway.
Boston Dynamics: “Either that or the PC keeps running away.”
How can you prevent users from leaving a directory?
chroot, and override exit with an alias,could work
Magic, I guess, 'cause nothing in the sceenshot would do it, unless the attacker had already replaced
catwith a trojan or something.AFAIK, there’s no way to without modifying the system tools and shell.
How can you prevent a shutdown using a power key?
There’s an Emacs command to do that
C-x M-c M-minefieldYou could probably install a handler for the event that’s triggered when the power button is pressed. Most OSes do that and pop up a graceful shutdown options window. Most hardware will have a hard shutdown option when you hold the power button for a few seconds. You would probably have to overwrite the BIOS or something at that level to prevent that way out.
You could also just unplug it.
alt+sysrq+b bypasses this handler, also switching to another vt should just drop you in a normal shell it as well as long the login shell isn’t modified. There are a lot of ways that can be used to break out.
You can’t, lol. Think it’s just a joke
Encrypt hard drive and keep the key in RAM. Could be recovered with a cold boot attack but that’s very advanced. The DOS virus ONEHALF would run as a daemon encrypring a block on the drive on each boot and intercept reads/writes to the encrypted part as if nothing ever happened. Only after encrypting ½ of the disk, it would reveal itself with an ominous
Dis is one half. Press any key to continue...The decryption was eventually cracked by ESET and they developed a tool to recover the drive.
If you are using KDE

I can think of a way out:
Just throw the whole PC away. It’s someone else’s problem now!
But that just becomes a Jumanji issue
But it’s on a dedicated server you have already paid for, which also hosts your own Minecraft game server with active players (mission-critical process which can never be allowed to stop).
cat 1*a single cat is hurled unceremoniously through the window onto your lap*





















