I set up a quick demonstration to show risks of curl|bash and how a bad-actor could potentially hide a malicious script that appears safe.
It’s nothing new or groundbreaking, but I figure it never hurts to have another reminder.
I set up a quick demonstration to show risks of curl|bash and how a bad-actor could potentially hide a malicious script that appears safe.
It’s nothing new or groundbreaking, but I figure it never hurts to have another reminder.
you’d have to be mad to willingly pipe a script to bash without checking it. holy shit
And you better inspect and execute a downloaded copy, because a malicious actor can serve a different file for curl/wget than to your browser
They can even serve a different file for curl vs curl|bash
Does curl send a different useragent when it’s piped?
Searching for those words just vomits ‘hOW to SeT cUrL’s UseRaGenT’ blog spam.
Its timing based. When piped a script, bash executes each line completly before taking the next line from the input. Curl has a limited output buffer.