Created: 12/01/2024 12:13 Last Updated: 16/01/2024 14:15
You must to find details of shellshock attacks
Log file: https://files-ld.s3.us-east-2.amazonaws.com/shellshock.zip Pass: 321
Note: pcap file found public resources.
Let's open this pcap file in Wireshark
I followed HTTP/TCP stream to find out about some basic server information
What is the server operating system?
ubuntu
What is the application server and version running on the target system?
Apache/2.2.22
What is the exact command that the attacker wants to run on the target server?
/bin/ping -c1 10.246.50.2
This pcap file captured a moment where system 10.246.50.2 tried to use shellshock vulnerability to exploit an Apache server hosted on Ubuntu system (10.246.50.6)