Would it be possible to make a worm that

Would it be possible to make a worm that
a.) partitions itself a little space on a HDD
b.) writes and deletes and reformats the rest of the disk over and over and over until the disk physically starts to degrade
Would that partition the worm resides in eventually start to degrade? Would the motor die before the plates, meaning you could just transfer them and making the whole thing pointless? Would it be easier to make a root kit that forces the OS to force the hardware to basically spin itself to death?
Purely hypothetical ofc
killer usb's got me all hard thinking about software that attacks hardware

Attached: 407.png (960x1200, 849K)

Other urls found in this thread:

incompleteideas.net/IncIdeas/BitterLesson.html
attack.mitre.org/techniques/T1067/
twitter.com/NSFWRedditGif

GOD

Attached: images(3).jpg (250x208, 4K)

God I wish that were me

god i wish that were me

post more wokada miku

That is a very interesting idea, please explain more.

Top 5 best anime deaths.

Attached: giwtwm.png (224x225, 72K)

if the reserved space on disk is too small, it will be accessed as well, thus that part of the hardware will downgrade as well.
Also, in a RAID system it's very likely that part will be damaged equally.

that's not a worm
your OS won't give you the permission to delete open files and system files without administrator permission
supposing you had a rootkit which loaded your malware instead of or below the OS then sure why not
the malware would delete itself eventually, which is not an issue until the machine is restarted
I'm sure that hard drives have protections against being overdriven.

It would be smarter to use machine learning to determine access patterns, resulting in head movement and spin-up that cause vibrations approaching a resonance frequency
t. big blue ai

Its a visual representation of software attacking hardware
Well in a killer usb it charges up capacitors in the usb device (usually disguised as a flash stick) and shoots it into the port, attempting to fry the circuitry in the target device. Got me thinking about other types of attacks that could be possible.

I don't think the system will run for long enough to actually damage the hardware.
Either killed by itself or shut down by the owner.

I hadn't thought about RAID architecture. I suppose it still bricks it but it would be as soon as the OS partitions became corrupt ong before any physical damage would occur. What if instead of the whole disk its just one or 2 specific sectors of the HDD? This would accommodate for RAID and would ensure the required files remain intact long enough for damage maybe?
>machine learning to determine access patterns, resulting in head movement and spin-up that cause vibrations approaching a resonance frequency
>it speed wobbles itself to death
That sounds so fucking rad. But evey disk is going to be different, so even if the malware runs tests to identify the dimensions and patterns of the HDD, how is it going to measure vibration to see if its working?

>…OS to force the hardware to basically spin itself to death?
yeah, it's called windows telemetry

Attached: 6765-custom-ribbon-magnet-sticker-EAT SHIT MOTHERFUCKER! - George Carlin.png (455x350, 25K)

If it already has root access it can boot itself up at 1am to 5am every day and spin. It wouldn't necessarily have to happen all at once, this is an attack that targets durability after all.

The problem is, depending on the type of RAID, that not only sectors can be spread across different disks, but also logical sectors may be split across different physical sectors.
That means the reserved space can be spread across different sectors on different disks.
This is mainly done for having parallel reading/writing.
It also means that the reserved space on disk is read simultaneously with other parts of the disk, thus is damaged equally.

it exists and is called Microsoft's Windows

> writes and deletes and reformats the rest of the disk over and over

Doesn't this mean it breaks the system, the first night?

>how is it going to measure vibration to see if its working
You can use a microphone if one is available, but for technical demonstration purposes I would just attach a microphone to a hard drive.
>every disk is going to be different
I also doubt that it works on RAID arrays.

Just exclude the partitions containing system files at well as its own partition.

>just exclude the entire drive for 99% of cases

Attached: 084.png (600x512, 298K)

I don't think you can make it work using the microphone and machine learning reliably.
Every system is different and you know almost nothing about the systems you're attacking.
Wanna add blockchain too btw?

>reliably
incompleteideas.net/IncIdeas/BitterLesson.html
Search powered through an excess in computation has universally proven to be more generalizable and more effective than other "more satisfying" techniques.
A piece of malware that trains itself to maximize a certain signal (audio) using disk access can easily generalize to different systems, and you're beside the point, because Etherkiller and USB Killer are technical demonstrations, not something actually meant to be used.

...

digits wasted on consumerism

Wait I see what you are saying. If it wipes userdata the user is going to know and its going to get corrected anyway after the first night. I suppose change the target to be unallocated space. Maybe create other temporary partitions to fill and empty during its active time.

Raid is tough. Is there know way to force it to write to a specific location on a specific disk? If its the logical algorithm decideding location couldn't you manipulate it to do it anyway, or does fucking with it brick the device anyway?

I think the best way to break computer from inside out, would be flashing some chips
ofc, that is not something that can be done in every system
you could OC cpu and screen tho

Ok. What about rootkit that turns off the CPU fan and forces it to run a shit ton of algorithms? Same kind of timing thing as . Some CPUs fry themselves under normal circumstances, what happens when you force the worst environment you can?

Attached: __hatsune_miku_vocaloid_drawn_by_wokada__c84f37ac2b9b3978552234a6e18060f3.png (1200x1200, 880K)

The CPU literally turns itself off.

I mean... Sure?

But there's a ton of issues
first of which
>what's the point
backups are extraordinarily easy to create, anyone that matters is going to have backups. plus harddrives are cheap
>its obvious as fuck
your harddrive constantly rewriting itself is going to be literally noisy as fuck.
>writes and reformats the disk over and over
you'll probably kill the operating system, and thus whatever your worm is running from long before you actually cause physical damage.
>obvious
anyone who opens the tasklist will see something sketchy going on. and when your computer starts making funny noises for no reason, most people will look in the task list.
>time
rewriting an entire harddrive would take ages with current sizes, especially enough times to degrade the disk itself.
>easy to identify
once you see it in the wild doing this, its extremely easy to identify. i'd be surprised if someone didn't already make one and its already be added to every anti-virus out there.

so i would say you could, but its a giant waste of time and effort and why bother?

This might help you
attack.mitre.org/techniques/T1067/

Just a fun idea to think about. Literally making the machine remember itself to death.

The biggest practical issue is probably just overwriting the OS then.

Yeah quite literally this

Attached: 5806368583.jpg (280x200, 12K)

Killer USBs are not an example of software attacking hardware. They are not normal USB sticks. They just have a shitload of capacitors in them that collect energy and then dump it back into the USB port to fry the board.
You have good taste when it comes to porn though.

A CPU can still suffer irreparable damage before it shuts off though.

Attached: miku newspaper rustle.jpg (1083x851, 549K)

>ywn be facesat into oblivion by a qt with thick buns

Attached: 1522705148638.webm (432x240, 2.36M)

Heh us gamers amirite

Attached: ch.webm (478x338, 1.62M)

Yes, you would have to write to unused space or at least try not to change/destroy anything significant.

No. If a RAID exists that splits logical sections to different physical sections, there is nothing you can do about it.
The disk controller totally hides that from you.
You could only try to gain access over the disk controller and thus decide which physical sections you want to write to.
But that seems like a unnecessary thing to do.

S-sauce?

heaven

braaaaaaaapppppppppp

AAAAAAAAAAAAAA

Attached: IMG-20190506-WA0012.jpg (944x404, 56K)

>facesitting AND interlocking handholding

Attached: 1512529717575.gif (500x281, 139K)