So if you haven't ever heard of the Shellshock vulnerability check this out before you proceed.
Oddly enough, there are obviously a bunch of servers and hosts around the world that are still vulnerable to this vulnerability simply because they choose not to update/patch their respective operating systems accordingly.
Anyway, while I was hanging around that section of the internet where Kitploit stays, I came across an interesting tool they mentioned. It's called Shocker which is basically a tool to "find and exploit servers vulnerable to shellshock". It's available here on github.
So what you do is you clone it onto your kali, move into the directory and launch the program shocker.py. The arguments you include may vary (check the help menu) but just include the IP address of the host you're scanning. In this case we used the Shellshock vulnerable VM from vulnhub.com.
It then shows us the possible options we can use and then we can finally select the commands we want to execute on the target machine. The example command was:
Oddly enough, there are obviously a bunch of servers and hosts around the world that are still vulnerable to this vulnerability simply because they choose not to update/patch their respective operating systems accordingly.
Anyway, while I was hanging around that section of the internet where Kitploit stays, I came across an interesting tool they mentioned. It's called Shocker which is basically a tool to "find and exploit servers vulnerable to shellshock". It's available here on github.
So what you do is you clone it onto your kali, move into the directory and launch the program shocker.py. The arguments you include may vary (check the help menu) but just include the IP address of the host you're scanning. In this case we used the Shellshock vulnerable VM from vulnhub.com.
It then shows us the possible options we can use and then we can finally select the commands we want to execute on the target machine. The example command was:
/bin/cat /etc/passwd
where we called the binary cat to do what it does, which is display stuff. What it is displaying in this case is the passwd file in the etc folder. You can try other linux commands for yourself too.
Comments
Post a Comment