From 2fa4a3e96bc66bc1998482e60b73af93e187a67e Mon Sep 17 00:00:00 2001
From: AbdullahRizwan101 <60057481+AbdullahRizwan101@users.noreply.github.com>
Date: Sun, 8 Nov 2020 07:07:49 -0500
Subject: [PATCH] Update Shellshock.md
---
BsidesIslamabad 2020/Shellshock.md | 7 +------
1 file changed, 1 insertion(+), 6 deletions(-)
diff --git a/BsidesIslamabad 2020/Shellshock.md b/BsidesIslamabad 2020/Shellshock.md
index a22418f..f8340c5 100644
--- a/BsidesIslamabad 2020/Shellshock.md
+++ b/BsidesIslamabad 2020/Shellshock.md
@@ -1,5 +1,3 @@
-
-
Looking at the source code we find base64 encoded text
@@ -12,12 +10,9 @@ On decoding
-I did a `nikto` scan and found that this is vulnerable to `shellshock`
-
-
I search on google about `cgi-bin` and found that they are mostly vulnerable to `shellshock` that allows execution of bash commands
-On refering to this blog post
+On refering to this blog post
`https://wywyit.medium.com/ritsec-fall-2018-ctf-week-6-45d414035c76`