Moderator: Secure Software Development
- Beiträge: 64
- Registriert: 18. Okt 2014 11:11
Could anyone help me understanding this question in Lab Exercise 2 (Shell Shock) ?
Log in as a normal user. Can you use the Shellshock vulnerability to get a root console? Document your approach.
What we are actually supposed to write in answer for 15 points ?
- Beiträge: 29
- Registriert: 23. Okt 2014 15:33
In our group we answered the details step-by-step approach to the problem and how exactly attacks are being done.
Although it seems we forgot to add screenshot what we took during the lab.