• grue@lemmy.world
      link
      fedilink
      arrow-up
      10
      ·
      19 hours ago

      Magic, I guess, 'cause nothing in the sceenshot would do it, unless the attacker had already replaced cat with a trojan or something.

    • hperrin@lemmy.ca
      link
      fedilink
      English
      arrow-up
      12
      ·
      22 hours ago

      AFAIK, there’s no way to without modifying the system tools and shell.

      • Unleaded8163@fedia.io
        link
        fedilink
        arrow-up
        8
        ·
        22 hours ago

        You could probably install a handler for the event that’s triggered when the power button is pressed. Most OSes do that and pop up a graceful shutdown options window. Most hardware will have a hard shutdown option when you hold the power button for a few seconds. You would probably have to overwrite the BIOS or something at that level to prevent that way out.

        • esc@piefed.social
          link
          fedilink
          English
          arrow-up
          2
          ·
          21 hours ago

          alt+sysrq+b bypasses this handler, also switching to another vt should just drop you in a normal shell it as well as long the login shell isn’t modified. There are a lot of ways that can be used to break out.

      • ChaoticNeutralCzech@feddit.org
        link
        fedilink
        English
        arrow-up
        4
        ·
        21 hours ago

        Encrypt hard drive and keep the key in RAM. Could be recovered with a cold boot attack but that’s very advanced. The DOS virus ONEHALF would run as a daemon encrypring a block on the drive on each boot and intercept reads/writes to the encrypted part as if nothing ever happened. Only after encrypting ½ of the disk, it would reveal itself with an ominous

        Dis is one half.
        Press any key to continue...
        

        The decryption was eventually cracked by ESET and they developed a tool to recover the drive.