logo

Shellshock Vulnerability Analysis

   

Added on  2020-05-11

4 Pages486 Words182 Views
 | 
 | 
 | 
1Shellshock vulnerabilityNameCourseProfessorSchoolCityDate
Shellshock Vulnerability Analysis_1

2Description This vulnerability impact majority of models of the Linux along with the UNIX operating systems, along with the Macintosh OS X (Mary, 2015). This vulnerability alter the bash, which is the prevalent parts perceived as shell that appears to numerous models of the Unix and Linux(Mary, 2015). The bash acts like the command language interpreter. It permit the end users to type the command into the basic based window that the OS will certainly run. According to Symantec they regards this vulnerability as extremely dangerous because the bash has been utilized extensively in the Linux and Unix OS running on the web based computers for instance the web servers (Casula, 2014).Has it been exploited?There has been minimal report whether the vulnerability has been utilized by the hackers in the wild. Nevertheless, you can get a testament to notion of scripts that has recently been established by the security analysts (Mary, 2015). Furthermore, there has been modules designed to provide the Metasploit frame-work employed for the penetration testing.How it is exploited This vulnerability could only be manipulated by a remote hacker in a particular situations. For aneffective attack to happen, the hacker ought to compel a software application to transmit a malicious environment adjustable to the bash (Delamore and Ko, 2015). The probably path for an attack could be via internet servers employing the common Gateway interface which is a system that is widely used for development of the dynamic web content (Huang, Liu, Fang and Zuo, 2016). A hacker might use CGI to send out malformed environment variable to the servers
Shellshock Vulnerability Analysis_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents