#Shellshock #bash
CGI runs bash as their default request handler and this attack does not require any authentication that's why most of the attack is taken place on CGI pages to exploit this vulnerability.
Links :
Netcat:-
1.https://en.wikipedia.org/wiki/Netcat
2.http://netcat.sourceforge.net/
() { :; }; Shellshock
1.https://www.symantec.com/connect/blogs/shellshock-all-you-need-know-about-bash-bug-vulnerability
2.https://www.owasp.org/images/1/1b/Shellshock_-_Tudor_Enache.pdf
3.https://github.com/opsxcq/exploit-CVE-2014-6271
==================================================
For more information:
Medium :- https://medium.com/@hackbotone
Facebook : - https://www.facebook.com/hackbotone/
Twitter:- https://twitter.com/anspattnaik
Linkedin:- https://www.linkedin.com/in/anshuman123
Github:- https://github.com/anshumanpattnaik
Download
0 formats
No download links available.
Shellshock attack on a remote web server - Part 2 | NatokHD