From 2fa4a3e96bc66bc1998482e60b73af93e187a67e Mon Sep 17 00:00:00 2001 From: AbdullahRizwan101 <60057481+AbdullahRizwan101@users.noreply.github.com> Date: Sun, 8 Nov 2020 07:07:49 -0500 Subject: [PATCH] Update Shellshock.md --- BsidesIslamabad 2020/Shellshock.md | 7 +------ 1 file changed, 1 insertion(+), 6 deletions(-) diff --git a/BsidesIslamabad 2020/Shellshock.md b/BsidesIslamabad 2020/Shellshock.md index a22418f..f8340c5 100644 --- a/BsidesIslamabad 2020/Shellshock.md +++ b/BsidesIslamabad 2020/Shellshock.md @@ -1,5 +1,3 @@ - - Looking at the source code we find base64 encoded text @@ -12,12 +10,9 @@ On decoding -I did a `nikto` scan and found that this is vulnerable to `shellshock` - - I search on google about `cgi-bin` and found that they are mostly vulnerable to `shellshock` that allows execution of bash commands -On refering to this blog post +On refering to this blog post `https://wywyit.medium.com/ritsec-fall-2018-ctf-week-6-45d414035c76`