Skip Navigation
76 comments
  • I'd be amazed if this works, since these sorts of tricks have been around since dinosaurs ruled the Earth, and most bots will use pretty modern zip libraries which will just return "nope" or throw an exception, which will be treated exactly the same way any corrupt file is - for example a site saying it's serving a zip file but the contents are a generic 404 html file, which is not uncommon.

    Also, be careful because you could destroy your own device? What the hell? No. Unless you're using dd backwards and as root, you can't do anything bad, and even then it's the drive contents you overwrite, not the device you "destroy".

  • Funny part is many of us crusty old sysadmins were using derivatives of this decades ago to test RAID-5/6 sequencial reads and write speeds.

  • let me try..

    • Looks fine to me. Only 1 CPU core I think was 100%.

       
          
      10+0 records in
      10+0 records out
      10737418240 bytes (11 GB, 10 GiB) copied, 28,0695 s, 383 MB/s
      
        
      • ow.. now the idea is to unzip it right?

        nice idea:

         
            
        if (ipIsBlackListed() || isMalicious()) {
            header("Content-Encoding: deflate, gzip");
            header("Content-Length: "+ filesize(ZIP_BOMB_FILE_10G)); // 10 MB
            readfile(ZIP_BOMB_FILE_10G);
            exit;
        }
        
          
76 comments