• MonkeMischief@lemmy.today
    link
    fedilink
    arrow-up
    90
    ·
    11 months ago

    Did they execute the command on localhost or the remote? Because hey if they had privileges to root-nuke the target that’s gotta count for something right? Lmao

    • Neshura@bookwormstory.social
      link
      fedilink
      English
      arrow-up
      60
      arrow-down
      2
      ·
      11 months ago

      The way this reads I think the company did not actually provide a good sandboxed environemt. So when they rm -rf /'d the thing they actually deleted a lot of stuff the recruiters still needed (likely the pentest environments for other candidates). Because imo that’s the only reason I can think of to just outright ban a candidate from applying for any other role at the company.

      • Hillock@feddit.de
        link
        fedilink
        arrow-up
        39
        arrow-down
        1
        ·
        11 months ago

        You should ban anyone who tries this regardless of the outcome. There is always a small chance they did it on purpose trying to cause damage. There is no benefit by giving them another chance, you just riks giving them the possibility of doing more damage. If the thing was a mistake, the person will learn from it and find another job.

        • Kühe sind toll@feddit.de
          link
          fedilink
          arrow-up
          26
          ·
          11 months ago

          If the task would have been to find general security risks this would have counted. I mean, he did some serious harm, but he was able to find a security issue.

          • bane_killgrind@lemmy.ml
            link
            fedilink
            English
            arrow-up
            3
            ·
            11 months ago

            I think there is kind of an assumption that the scenario is “outside host gains privileged access” so there’s not really a security issue with some attacker deleting root on their own box.

          • joel_feila@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            11 months ago

            Yeah so is tossing a molotov on thier machines, “found a security issue not firproofing everything”

        • Phoenixz@lemmy.ca
          link
          fedilink
          arrow-up
          2
          ·
          11 months ago

          We’ll I’m this case too, if true, the person didn’t know anything about the job they were aplyiyfor and tried to cheat their way into the company. Also not really great.

      • NocturnalEngineer@lemmy.world
        link
        fedilink
        arrow-up
        22
        ·
        11 months ago

        To be honest, considering the role they’re applying for, I would reject their job application too even if it occurred inside a sandboxed environment.

        They should know exactly what rm -rf does. The fact they didn’t and they still arbitrary ran the command anyway… massive red flags. Could even say he failed to twart a social engineering attack.

        • fkn@lemmy.world
          link
          fedilink
          arrow-up
          13
          ·
          11 months ago

          The two cases, they knew what it was and they did it maliciously. They didn’t know what they were doing and got socially engineered in the process. Both cases are cause for failure.

      • extant@lemmy.world
        link
        fedilink
        English
        arrow-up
        12
        ·
        11 months ago

        To me it reads like the recruiter thought the person was a troll and banned them.