GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices tagged with bash

  1. Embed this notice
    Mauricio Teixeira 🇧🇷🇺🇲 (badnetmask@hachyderm.io)'s status on Friday, 06-Jun-2025 08:17:50 JST Mauricio Teixeira 🇧🇷🇺🇲 Mauricio Teixeira 🇧🇷🇺🇲

    On a different note: I was trying something on the size, and was dropped into a ZSH shell (as opposed to Bash), and it was pretty interesting. Made me consider trying it further on my daily driver.

    #HomeLab #bash #zsh

    In conversation 12 days ago from hachyderm.io permalink
  2. Embed this notice
    Pheonix (phoenixx@infosec.exchange)'s status on Wednesday, 04-Jun-2025 04:49:43 JST Pheonix Pheonix

    Okay, so I wanted to share a little incident from a few months back that really hammered home the power of knowing your Linux internals when things go sideways. I got a frantic call, "something weird is going on with our build server, it's acting sluggish and our monitoring is throwing odd network alerts." No fancy EDR on this particular box, just the usual ssh and bash. My heart always sinks a little when it's a Linux box with vague symptoms, because you know it's time to get your hands dirty.

    First thing I did, even before reaching for any specific logs, was to get a quick snapshot of the network. Instead of netstat, which honestly feels a bit dated now, I immediately hit ss -tunap. That p is crucial cause it shows you the process and user ID for each connection. What immediately jumped out was an outbound TCP connection on a high port to a sketchy-looking IP, and it was tied to a process that definitely shouldn't have been making external calls. My gut tightened. I quickly followed up with lsof -i just to be super sure no deleted binaries were clinging on to network connections.

    With that IP and PID in hand, I moved to process investigation. pstree -ap was my next stop. It showed the suspicious process, and more importantly, its parent. It wasn't a child of systemd or a normal service. It was spawned by a build script that shouldn't have been executing anything like this. That hierarchical view was key. Then, to really understand what this thing was doing, I dared to strace -p <PID>. Watching the system calls unfurl was like watching a movie of its malicious intent: it was reading from /etc/passwd, making connect() calls, and trying to write to some odd /tmp directories. Simultaneously, I checked ls -l /proc/<PID>/exe to confirm the actual binary path (it was indeed in /tmp) and /proc/<PID>/cwd to see its working directory. No doubt, this was a rogue process.

    Knowing it was a fresh infection, I immediately shifted to the filesystem. My go-to is always find / -type f -newermt '2 days ago' -print0 | xargs -0 ls -latr. This quickly pulls up any files modified in the last 48 hours, sorted by modification time. It's often where you find dropped payloads, modified configuration files, or suspicious scripts. Sure enough, there were a few more binaries in /tmp and even a suspicious .sh script in a developer's home directory. I also scanned for SUID/SGID binaries with find / -perm /6000 just in case they'd dropped something for privilege escalation. And while stat's timestamps can be tampered with, I always glance at atime, mtime, and ctime on suspicious files; sometimes, a subtle mismatch offers a tiny clue if the attacker wasn't meticulous.

    The final piece of the puzzle, and often the trickiest, is persistence. I checked the usual suspects: crontab -l for root and every other user account I could find. Then I cast a wider net with grep -r "suspect_domain_or_ip" /etc/cron.* /etc/systemd/system/ /etc/rc.d/ and similar common boot directories. Sure enough, a new systemd timer unit had been added that was scheduled to execute the /tmp binary periodically. Finally, I didn't forget the user dotfiles (~/.bashrc, ~/.profile, etc.). It’s surprising how often an attacker will drop a malicious alias or command in there, assuming you won't dig deep into a developer's setup.

    Long story short, we quickly identified the ingress vector, isolated the compromise, and cleaned up the persistence. But what really stuck with me is how quickly you can triage and understand an incident if you're comfortable with these fundamental Linux commands. There's no substitute for getting your hands dirty and really understanding what strace is showing you or why ss is superior to netstat in a high-pressure situation. These tools are your best friends in a firefight.

    #linux #incidentresponse #blueteam #forensics #shell #bash #sysadmin #infosec #threathunting #lessonslearned

    In conversation 14 days ago from infosec.exchange permalink
  3. Embed this notice
    Alfred M. Szmidt (amszmidt@mastodon.social)'s status on Friday, 16-May-2025 01:12:07 JST Alfred M. Szmidt Alfred M. Szmidt
    in reply to
    • Simon Tatham
    • Ponies

    @ponies The solution @simontatham is/was presenting, could possibly (untested) be simplified by putting { and } around all the code. It forces #GNU #bash to read the whole block (storing it in memory, so buffered reading of the file won't be an issue -- in theory) before executing it.

    In conversation about a month ago from mastodon.social permalink
  4. Embed this notice
    Alfred M. Szmidt (amszmidt@mastodon.social)'s status on Friday, 16-May-2025 01:08:46 JST Alfred M. Szmidt Alfred M. Szmidt
    • Simon Tatham

    @simontatham Sightly code golfier .. but should do the same, since how #GNU #Bash processes blocks.

    #!/bin/bash
    {
    echo "$@"
    #subroutine stuff ...
    exit $?
    }

    In conversation about a month ago from mastodon.social permalink
  5. Embed this notice
    Custard! 🍮:fedora: (flan@bonito.cafe)'s status on Wednesday, 14-May-2025 12:45:54 JST Custard! 🍮:fedora: Custard! 🍮:fedora:

    Vengo a explicar mi maqueta
    Hace rato me aventé un script de bash buenorro, ya tenía rato que no hacía algo así

    TheModArchive es una página que contiene una extensa colección de módulos de música secuenciados en 'secuenciadores' de en su mayoría, computadoras antiguas, desde la Amiga hasta la PC

    Entre ellos, bastantes "chiptunes", sí, esa musiquita que suele venir en generadores de números de serie y cracks para programas conocidos, los cuales disfruto mucho escuchar

    Estos módulos son reproducibles en sus secuenciadores originales, o con ayuda de reproductores de música que soporten estos formatos, sobretodo en PC, ya sea Linux, Mac o PC, pero no son un formato " accesible" como el MP3, FLAC o WAV, de la compu no pasan, ya que su formato tiene su chiste
    El archivo contiene la secuencia musical, con efectos en las notas, su duración etc, y, las muestras de sonido necesarias para que sean tocadas a como se necesita en esa secuencia, son partes separadas, pero trabajan en conjunto para formar una canción.

    Bueno, qué hace este script?

    La tirada es descargar toda esa colección, módulo por módulo, convertirlos a OPUS (MP3 is dead), etiquetarlos correctamente, calcular su ganancia de reproducción e integrarlos a mi biblioteca musical

    El script descarga la página de cada módulo, busca en el marcado HTML la sección correspondiente al mismo, y descarga lo necesario, convierte, etiqueta, archiva

    Todo usando herramientas comunes en Linux: wget, head, cut, y algunas extras: openmpt123, pup, rsgain, opusenc, aubio, exiftool

    Esta funcionando de maravilla! Estoy orgulloso y feliz de esto
    Además, ya tengo para escuchar por horas y horas, días, quizá años (cuando acabe me daré cuenta de la sumatoria del tiempo de reproducción)

    #Chiptune #Mod #TheModArchive #Linux #Bash #Music #OPUS #OpenSource #Scene

    In conversation about a month ago from bonito.cafe permalink

    Attachments


  6. Embed this notice
    Free Software Foundation (fsf@hostux.social)'s status on Friday, 02-May-2025 04:54:38 JST Free Software Foundation Free Software Foundation

    The April #GNU Spotlight by Amin Bandali is now available! Read it here: https://u.fsf.org/46n #FSF #bash #GNUNano #GNUGZip

    In conversation 2 months ago from hostux.social permalink

    Attachments


    1. https://hostux.social/system/media_attachments/files/114/434/326/851/372/476/original/d4580899b8b80d6a.png

  7. Embed this notice
    Dendrobatus Azureus (dendrobatus_azureus@mastodon.bsd.cafe)'s status on Tuesday, 29-Apr-2025 15:24:26 JST Dendrobatus Azureus Dendrobatus Azureus
    • gyptazy

    Don't tell me you still don't have a boxyBSD VM. Request one while they last

    Here's the status of the hypervisors running boxyBSD VMs

    @gyptazy

    https://boxybsd.com/status/

    .🖋️ #bash #freeBSD #boxyBSD #sh #zsh #ksh #csh  #netBSD #openBSD #POSIX

    In conversation 2 months ago from mastodon.bsd.cafe permalink

    Attachments


    1. https://media.bsd.cafe/bsdmmedia01/media_attachments/files/114/418/607/438/600/920/original/cd9458171bb3c031.jpg

  8. Embed this notice
    Mauricio Teixeira 🇧🇷🇺🇲 (badnetmask@hachyderm.io)'s status on Friday, 25-Apr-2025 03:00:05 JST Mauricio Teixeira 🇧🇷🇺🇲 Mauricio Teixeira 🇧🇷🇺🇲

    The hardest part when you switch back and forth between Python and Bash is to remember putting the "fi" and "done". 😭

    #HomeLab #DevOps #SRE #Bash #Python

    In conversation 2 months ago from hachyderm.io permalink
  9. Embed this notice
    CX-7 (cx7@mastodon.social)'s status on Monday, 31-Mar-2025 13:16:25 JST CX-7 CX-7

    Some things are better left unseen... 😅

    #linux #bash #meme #funny

    In conversation 3 months ago from mastodon.social permalink

    Attachments


    1. https://files.mastodon.social/media_attachments/files/114/255/100/279/150/389/original/17a4f628cdaabc5d.jpg
  10. Embed this notice
    me (me@social.jlamothe.net)'s status on Saturday, 29-Mar-2025 02:41:20 JST me me

    I am in urgent job search mode, so I'm gonna throw this out here and see if anything comes of it.

    I am a #Canadian, fluent in both #English and #French. I have experience with several programming languages. My strongest proficiency is with #Haskell and #C. I also have a reasonable grasp of #HTML, #JavaScript, #SQL, #Python, #Lua, #Linux system administration, #bash scripting, #Perl, #AWK, some #Lisp (common, scheme, and emacs), and probably several others I've forgotten to mention.

    I am not necessarily looking for something in tech. I just need something stable. I have done everything from software development, to customer support, to factory work, though my current circumstances make in-person work more difficult than remote work. I have been regarded as a hard worker in every job I have ever held.

    #GetFediHired

    In conversation 3 months ago from social.jlamothe.net permalink
  11. Embed this notice
    Francesco Yoshi Gobbo :linux: (frayoshi@qoto.org)'s status on Saturday, 08-Mar-2025 09:12:34 JST Francesco Yoshi Gobbo :linux: Francesco Yoshi Gobbo :linux:

    #furaUtils added a script to easily clone disks/partitions using #dd.
    Written in #bash , works on #Linux and is not perfect, but works :abloblamp:

    https://github.com/FraYoshi/fura-utils/commits/main/?since=2025-03-08&until=2025-03-08

    In conversation 3 months ago from qoto.org permalink

    Attachments


    1. https://media.social.qoto.org/media_attachments/files/114/123/868/678/417/336/original/c234c58c113102e5.png
    2. Domain not in remote thumbnail source whitelist: opengraph.githubassets.com
      Commits · FraYoshi/fura-utils
      A series of personal tools that aim to aid in unusual or repetitive tasks - Commits · FraYoshi/fura-utils
  12. Embed this notice
    Luke T. Shumaker (lukeshu@fosstodon.org)'s status on Monday, 03-Mar-2025 07:10:13 JST Luke T. Shumaker Luke T. Shumaker

    A few years ago I did a quick analysis of my #Bash histfile and horrified my coworkers that `#git rebase` was my most frequently used command.

    It's not on top, but It's still in the top 10. (I think gitk getting so much higher up is that I want to look at gitk so much, but with #Emacs #EXWM I loose track of windows more than I did with #WMII, so I just open a new one, and end up with 15 open gitk windows before I realize this and run `killall wish`.

    In conversation 4 months ago from fosstodon.org permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      command.it

    2. https://cdn.fosstodon.org/media_attachments/files/114/095/066/982/541/701/original/2eae6e6bf9ee8afb.png
  13. Embed this notice
    daltux (daltux@snac.daltux.net)'s status on Monday, 24-Feb-2025 01:43:24 JST daltux daltux
    A slightly improved revision of apt-upgrade is now available at https://git.disroot.org/daltux/apt-upgrade/

    This is a small personal collection of :gnu: #GNU #Bash scripts I’ve put together to simplify everyday updates for all the common stuff on :debian: Debian GNU/Linux-based systems. It has been available under the #GPLv3+ for a while, so you are free to use, study, modify, and share it however you see fit—following #Copyleft principles, always preserving the users' freedoms. If you improve it, consider sharing back your changes to help keep the spirit of #FreeSoftware alive. 🤝

    I’d love to hear if it ends up being useful for you! If you run into any issues or have suggestions, please report them directly on Disroot Forgejo or just drop a comment here.

    #apt #nala #shell #script #Debian #GNUlinux #FreeAsInFreedom #Disroot #SoftwareLivre
    In conversation 4 months ago from snac.daltux.net permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: git.disroot.org
      apt-upgrade
      from daltux
      Shell script for easier upgrading the system using apt and, when present, snap, flatpak and fwupdmgr.
  14. Embed this notice
    Dendrobatus Azureus (dendrobatus_azureus@mastodon.bsd.cafe)'s status on Thursday, 06-Feb-2025 07:11:20 JST Dendrobatus Azureus Dendrobatus Azureus
    • Altbot

    Are you just like me? Do you want to make fantastically beautiful posts and not be limited by a silly 500 character fence, but want to BANG intricate stories of 10.000 characters?

    Don't be limited by those silly 500 character servers!

    Browse over here, find an instance that's suitable to you and go there. The list doesn't have everyone who has that massive 5,000 character size, but the list has a lot of servers, so pick one choose one and go be the literary giant that you are

    And yes there are servers which have a fantastically glorious 10,000 character limit!

    @altbot @FediTips

    https://fedi.garden/tag/larger-post-size/

    #Fediverse #SocialMedia #bash #sh #zsh #ksh #csh #PostLimit #WomenWhoCode  #100DaysOfCode #1000DaysOfCode #POSIX #Programming

    In conversation 4 months ago from mastodon.bsd.cafe permalink

    Attachments


    1. https://media.bsd.cafe/bsdmmedia01/media_attachments/files/113/953/246/394/639/392/original/820235182f2b7a70.jpg
    2. Domain not in remote thumbnail source whitelist: fedi.garden
      Larger Post Size | Fedi.Garden
      Highlighting nice servers on Mastodon and the Fediverse
  15. Embed this notice
    Dendrobatus Azureus (dendrobatus_azureus@mastodon.bsd.cafe)'s status on Monday, 27-Jan-2025 15:07:08 JST Dendrobatus Azureus Dendrobatus Azureus

    Learning en orienting myself into the code of snac

    Snac is fascinating

    https://codeberg.org/grunfink/snac2

    🖋️ #bash #sh #zsh #ksh #csh #freeBSD #FediVerse #OpenRelay #openBSD #netBSD #ZFS #Filesystems #Linux #POSIX #Programming #snac

    In conversation 5 months ago from mastodon.bsd.cafe permalink

    Attachments


    1. https://media.bsd.cafe/bsdmmedia01/media_attachments/files/113/896/982/832/560/296/original/d796ff1e9190f820.jpg
  16. Embed this notice
    Aaron Toponce ⚛️:debian: (atoponce@fosstodon.org)'s status on Saturday, 11-Jan-2025 05:22:52 JST Aaron Toponce ⚛️:debian: Aaron Toponce ⚛️:debian:

    Happy Birthday #GNU #Bash.

    #linux

    In conversation 5 months ago from fosstodon.org permalink

    Attachments


    1. https://cdn.fosstodon.org/media_attachments/files/113/805/215/782/305/123/original/b044d4c31f7df443.png
  17. Embed this notice
    Kushal Das :python: :tor: 🇵🇸 (kushal@toots.dgplug.org)'s status on Wednesday, 08-Jan-2025 01:45:05 JST Kushal Das :python: :tor: 🇵🇸 Kushal Das :python: :tor: 🇵🇸

    Is there any #bash for #kids book?

    In conversation 5 months ago from toots.dgplug.org permalink
  18. Embed this notice
    br00t4c (br00t4c@mastodon.social)'s status on Saturday, 04-Jan-2025 12:13:29 JST br00t4c br00t4c

    "Hopefully she has learned her lesson": Trump bashes envoy in announcement of her nomination

    #HopefullySheHasLearnedHerLesson #Bash #PoliticalCommentary #DiplomaticAppointment #WashingtonDCNews

    https://www.salon.com/2025/01/03/hopefully-she-has-learned-her-lesson-bashes-envoy-in-announcement-of-her-nomination/

    In conversation 5 months ago from mastodon.social permalink
  19. Embed this notice
    GNU/Linux.ch (gnulinux@social.anoxinon.de)'s status on Saturday, 28-Dec-2024 15:28:28 JST GNU/Linux.ch GNU/Linux.ch

    Ein Menü für Terminalbefehle

    Ein Menü für Terminalbefehle: Für Menschen mit Terminalphobie oder bequeme Admins.

    #CLI_Tools #bash #Bash_Shell #Konsole #Linux

    https://gnulinux.ch/ein-menue-fuer-terminalbefehle

    In conversation 6 months ago from social.anoxinon.de permalink
  20. Embed this notice
    Kur0den0010(幼女:sabakan:もどき) (kur0den0010@chpk.kur0den.net)'s status on Friday, 20-Dec-2024 16:07:58 JST Kur0den0010(幼女:sabakan:もどき) Kur0den0010(幼女:sabakan:もどき)

    『ANSIエスケープシーケンス チートシート #Bash - Qiita』 - https://qiita.com/PruneMazui/items/8a023347772620025ad6

    In conversation 6 months ago from chpk.kur0den.net permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      ANSIエスケープシーケンス チートシート - Qiita
      from @PruneMazui
      ANSIエスケープシーケンスを駆使すれば、こんな感じでターミナルの出力に色を付けたり出力した内容を書き換えたりできる。[PHP]ゲーム作成初心者がPHPでテト〇ス風ゲームを作ってみた上記記事…
  • Before

Feeds

  • Activity Streams
  • RSS 1.0
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.

Embed this notice