← Back to Index

LetsDefend - Shellshock Attack

Created: 12/01/2024 12:13 Last Updated: 16/01/2024 14:15


**Shellshock Attack** ![5b8815e97ea59e43289532d0cc7cfab2.png](/resources/5b8815e97ea59e43289532d0cc7cfab2.png)

You must to find details of shellshock attacks

Log file: https://files-ld.s3.us-east-2.amazonaws.com/shellshock.zip Pass: 321

Note: pcap file found public resources.


Start Investigation

Let's open this pcap file in Wireshark

![cd21034328076f37ea60a893ed755e16.png](/resources/cd21034328076f37ea60a893ed755e16.png) At first sight, There were some SSH,TCP,HTTP and ICMP packets in this pcap file

I followed HTTP/TCP stream to find out about some basic server information

![eb1a4ee4df8b41d3575ba742dbfa7a95.png](/resources/eb1a4ee4df8b41d3575ba742dbfa7a95.png) And jackpot! We also found all the answers including payload that trying to exploit shellshock vulnerability.

What is the server operating system?

ubuntu

What is the application server and version running on the target system?

Apache/2.2.22

What is the exact command that the attacker wants to run on the target server?

/bin/ping -c1 10.246.50.2

Summary

This pcap file captured a moment where system 10.246.50.2 tried to use shellshock vulnerability to exploit an Apache server hosted on Ubuntu system (10.246.50.6)

![c963f0eee00291c29df25e42ab5e183a.png](/resources/c963f0eee00291c29df25e42ab5e183a.png) Badge Acquired