<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.sarg.dev/index.php?action=history&amp;feed=atom&amp;title=Devnull</id>
	<title>Devnull - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.sarg.dev/index.php?action=history&amp;feed=atom&amp;title=Devnull"/>
	<link rel="alternate" type="text/html" href="https://wiki.sarg.dev/index.php?title=Devnull&amp;action=history"/>
	<updated>2026-04-22T12:32:25Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.44.2</generator>
	<entry>
		<id>https://wiki.sarg.dev/index.php?title=Devnull&amp;diff=196865&amp;oldid=prev</id>
		<title>imported&gt;InsertCoolNameHere78: Added short description</title>
		<link rel="alternate" type="text/html" href="https://wiki.sarg.dev/index.php?title=Devnull&amp;diff=196865&amp;oldid=prev"/>
		<updated>2025-02-10T11:54:35Z</updated>

		<summary type="html">&lt;p&gt;Added short description&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Short description|Linux computer worm}}&lt;br /&gt;
{{for|the Unix null device|/dev/null}}&lt;br /&gt;
{{No footnotes|date=March 2010}}&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Devnull&amp;#039;&amp;#039;&amp;#039; is a [[computer worm]] for the [[Linux]] [[operating system]] that was named after {{mono|[[/dev/null]]}}, [[Unix]]&amp;#039;s null device. This worm was found on 30 September 2002.&lt;br /&gt;
&lt;br /&gt;
This worm, once the host has been compromised, downloads and executes a [[shell script]] from a web server. This script downloads a [[gzip]]ped executable file named {{mono|k.gz}} from the same address, and then decompresses and runs the file.&lt;br /&gt;
&lt;br /&gt;
This downloaded file appears to be an [[IRC]] client. It connects to different channels and waits for commands to process on the infected host. &lt;br /&gt;
&lt;br /&gt;
Then the worm checks for presence of the [[GNU Compiler Collection|GCC]] compiler on the local system and, if found, creates a directory called {{mono|.socket2}}. Next, it downloads a compressed file called {{mono|devnull.tgz}}. After decompressing, two files are created: an [[Executable and Linkable Format|ELF]] binary file called {{mono|devnull}} and a source script file called {{mono|sslx.c}}. The latter gets compiled into the ELF binary {{mono|sslx}}.&lt;br /&gt;
&lt;br /&gt;
The executable will scan for vulnerable hosts and use the compiled program to exploit a known [[OpenSSL]] vulnerability.{{which|date= November 2020}}&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
*[[Linux malware]]&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
*[http://www.f-secure.com/v-descs/devnull.shtml F-Secure&amp;#039;s Website: Linux/Devnull]&lt;br /&gt;
&lt;br /&gt;
[[Category:Computer worms]]&lt;br /&gt;
[[Category:Linux malware]]&lt;br /&gt;
&lt;br /&gt;
{{malware-stub}}&lt;/div&gt;</summary>
		<author><name>imported&gt;InsertCoolNameHere78</name></author>
	</entry>
</feed>