Remote Code Exploitation through Bash

http://www.infoq.com/news/2014/09/bash-remote-exploit https://www.digitalocean.com/community/tutorials/how-to-protect-your-server-against-the-shellshock-bash-vulnerability http://www.pcweek.ru/foss/blog/foss/6963.php https://launchpad.net/ubuntu/+source/bash/4.3-7ubuntu1.2 https://launchpad.net/ubuntu/+source/bash/4.3-7ubuntu1.3 nodeX:~ # env VAR='() { :; }; echo Bash is vulnerable!' bash -c "echo Bash Test" Bash Test nodeX:~ # ssh nodeY nodeY:~ # env VAR='() { :; }; echo Bash is vulnerable!' bash -c "echo Bash Test" Bash is vulnerable! Bash Test nodeY:~ # http://shellshock.brandonpotter.com/ http://www.shellshocktest.com/ http://bashsmash.ccsir.org/ if...

Postfix: systemd-services – mailgraph.service

File of service: /etc/systemd/system/mailgraph.service Activating service: gate:/etc/systemd/system # systemctl enable mailgraph.service ln -s ‘/etc/systemd/system/mailgraph.service’ ‘/etc/systemd/system/multi-user.target.wants/mailgraph.service’ gate:/etc/systemd/system # Content of unit file:...

Scroll to top