Advertisement
Guest User

All About Bash Bug - CVE-2014-6271

a guest
Sep 25th, 2014
1,611
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.69 KB | None | 0 0
  1. ' ██████ ██░ ██ ▓█████ ██▓ ██▓ ██████ ██░ ██ ▒█████ ▄████▄ ██ ▄█▀
  2. ' ▒██ ▒ ▓██░ ██▒▓█ ▀ ▓██▒ ▓██▒ ▒██ ▒ ▓██░ ██▒▒██▒ ██▒▒██▀ ▀█ ██▄█▒
  3. ' ░ ▓██▄ ▒██▀▀██░▒███ ▒██░ ▒██░ ░ ▓██▄ ▒██▀▀██░▒██░ ██▒▒▓█ ▄ ▓███▄░
  4. ' ▒ ██▒░▓█ ░██ ▒▓█ ▄ ▒██░ ▒██░ ▒ ██▒░▓█ ░██ ▒██ ██░▒▓▓▄ ▄██▒▓██ █▄
  5. ' ▒██████▒▒░▓█▒░██▓░▒████▒░██████▒░██████▒▒██████▒▒░▓█▒░██▓░ ████▓▒░▒ ▓███▀ ░▒██▒ █▄
  6. ' ▒ ▒▓▒ ▒ ░ ▒ ░░▒░▒░░ ▒░ ░░ ▒░▓ ░░ ▒░▓ ░▒ ▒▓▒ ▒ ░ ▒ ░░▒░▒░ ▒░▒░▒░ ░ ░▒ ▒ ░▒ ▒▒ ▓▒
  7. ' ░ ░▒ ░ ░ ▒ ░▒░ ░ ░ ░ ░░ ░ ▒ ░░ ░ ▒ ░░ ░▒ ░ ░ ▒ ░▒░ ░ ░ ▒ ▒░ ░ ▒ ░ ░▒ ▒░
  8. ' ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░░ ░░ ░ ░ ▒ ░ ░ ░░ ░
  9. ' ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
  10. ' ░
  11. ' *********************** All About Bash Bug - CVE-2014-6271 ************************
  12.  
  13.  
  14. ' ╔═╗ ┬ ┬┬┌─┐┬┌─ ╔═╗┬ ┬┌─┐┌─┐┬┌─
  15. ' ║═╬╗│ │││ ├┴┐ ║ ├─┤├┤ │ ├┴┐
  16. ' ╚═╝╚└─┘┴└─┘┴ ┴ ╚═╝┴ ┴└─┘└─┘┴ ┴
  17. ' See if you still vulnerable or not.
  18.  
  19.  
  20. Usage: Via bash terminal just type the following command.
  21. Command: $ env x='() { :;}; echo Your system is vulnerable update ASAP' bash -c "echo Visit svieg.wordpress.com"
  22.  
  23. Usage: Get the URL that need to be tested (Remember don't put any critical URL in services provided by others)
  24. URL: http://shellshock.brandonpotter.com/
  25.  
  26.  
  27. ' ╔═╗┌┬┐┌┬┐┌─┐┌─┐┬┌─
  28. ' ╠═╣ │ │ ├─┤│ ├┴┐
  29. ' ╩ ╩ ┴ ┴ ┴ ┴└─┘┴ ┴
  30. ' Some attack techniques in the wild.
  31.  
  32.  
  33. URL: https://gist.github.com/anonymous/929d622f3b36b00c0be1
  34. Description: Malware in the Wild.
  35.  
  36. URL: http://pastebin.com/166f8Rjx
  37. Description: Python PoC.
  38.  
  39. URL: http://www.exploit-db.com/exploits/34766/
  40. Description: PHP PoC
  41.  
  42. URL: https://github.com/rapid7/metasploit-framework/pull/3882
  43. Description: root on OSX+VMWare.
  44.  
  45.  
  46. ' ╔═╗┌┬┐┬ ┬┌─┐┬─┐┌─┐
  47. ' ║ ║ │ ├─┤├┤ ├┬┘└─┐
  48. ' ╚═╝ ┴ ┴ ┴└─┘┴└─└─┘
  49. ' Random Stuff
  50.  
  51.  
  52. Description: Sample C code.
  53. URL: http://pastebin.com/kQ5ppEZD
  54.  
  55. Description: GitHub Dork.
  56. Search: #!/bin/bash extension:cgi
  57.  
  58. Description: Google Dork.
  59. Search: filetype:sh inurl:cgi-bin
  60.  
  61.  
  62. ' ╔═╗┌─┐┌┬┐┌─┐┬ ┬
  63. ' ╠═╝├─┤ │ │ ├─┤
  64. ' ╩ ┴ ┴ ┴ └─┘┴ ┴
  65. ' Get it fix ASAP.
  66.  
  67.  
  68. URL: http://www.circl.lu/pub/tr-27/
  69. Description: The Computer Incident Response Center Luxembourg (CIRCL) Helper.
  70.  
  71.  
  72. ' ╦═╗┌─┐┌─┐┌─┐┬─┐┌─┐┌┐┌┌─┐┌─┐┌─┐
  73. ' ╠╦╝├┤ ├┤ ├┤ ├┬┘├┤ ││││ ├┤ └─┐
  74. ' ╩╚═└─┘└ └─┘┴└─└─┘┘└┘└─┘└─┘└─┘
  75. ' Useful links to grab valid information.
  76.  
  77.  
  78. URL: http://garage4hackers.com/entry.php?b=3087
  79. Description: Everything you need to know about CVE-2014-6271.
  80.  
  81. URL: https://community.rapid7.com/community/infosec/blog/2014/09/25/bash-ing-into-your-network-investigating-cve-2014-6271
  82. Description: Bash-ing Into Your Network – Investigating CVE-2014-6271.
  83.  
  84. URL: http://lcamtuf.blogspot.pt/2014/09/quick-notes-about-bash-bug-its-impact.html
  85. Description: Quick notes about the bash bug, its impact, and the fixes so far.
  86.  
  87. URL: https://access.redhat.com/security/cve/CVE-2014-6271
  88. Description: RedHat CVE information.
  89.  
  90.  
  91. ' ╔═╗┬─┐┌─┐┌┬┐┬┌┬┐┌─┐
  92. ' ║ ├┬┘├┤ │││ │ └─┐
  93. ' ╚═╝┴└─└─┘─┴┘┴ ┴ └─┘
  94.  
  95.  
  96. All Internet Scene and Security Experts
  97. Information Compilation by SiMpS0N 25-09-2014
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement