SlideShare a Scribd company logo
By Mahesh
Shell Shock is…
• Shellshock, also known as Bashdoor, is a family of security
bugs in the widely used UNIX Bash shell.
• The first of which was disclosed on 24 September 2014.
• An attacker could exploit a machine running Bash by forcing it
to set specially crafted environment variables. This could then
be further exploited to let them execute shell commands, i.e.,
run programs on other people’s computers.
Who discovered
• Stephane Chazelas (Scientist) discovered a vulnerability in bash on
24 Sep 2014 16:05:51(07:30PM IST), Wednesday midnight in
Australia.
• Within hours, hackers had released code that could take over
vulnerable machines and turn them into a malicious botnet.
• Bash is free software, developed collaboratively and overseen since
1992 on a volunteer basis by Chet Ramey and believes that
Shellshock dates back to a new feature.
Hacker scientist
OR
Implementing
Issuing remote commands to the web server
-------------------------------------
(){-------------------------------------
Example:
VAR=() { ignored; }; /bin/id
Related vulnerabilities
CVE-2014-6271—Shell Shock
CVE-2014-6277
CVE-2014-6278
CVE-2014-7169
CVE-2014-7186
CVE-2014-7187
Major exploitation Vectors
CGI-web based server
OpenSSH Server
DHCP
Qmail server
IBM HMC restricted shell
Which systems gets affected
• Stand-alone Web servers
• Unix and Mac OS X systems
• Internet-connected devices
• Smart phones that use the Android operating system
• Every version of CentOS that was released before 31 September 2014 was
impacted
How to test and protect our devices
Test:
Run the following command on
Terminal
env x='() { :;}; echo vulnerable' bash -
c "echo this is a test“
If you’re vulnerable it will print
vulnerable
this is a test
Otherwise it prints only
This is test
Protect:
Initial solutions for Shellshock do
not completely resolve the
vulnerability.
Upgrade to the latest versions of
bash
AcceptEnv line from the default
configuration file
Heartbleed:
Heartbleed could be used to do things like
steal passwords from a server
Heartbleed went unnoticed for two years
and affected an estimated 500,000
machines
It requires more technical knowledge
Worse than Heartbleed
Shellshock:
Shellshock can be used to take over
the entire machine
Shellshock was not discovered for 22
years and sky is the limit on attacks
with Shellshock
it's so easy to exploit
According to NVD both bugs severity is 10 /10
References
http://www.wired.com/2014/09/shellshocked-bash/
http://en.wikipedia.org/wiki/Shellshock_%28software_bug%29
http://www.troyhunt.com/2014/09/everything-you-need-to-know-
about.html
https://shellshocker.net/
http://readwrite.com/2014/10/02/shellshock-bash-bug-faq-explainer
http://www.engadget.com/2014/09/25/what-is-the-shellshock/
http://www.zdnet.com/the-shellshock-faq-heres-what-you-need-to-know-
7000034219/
More….
Thank you….
Any queries….

More Related Content

PDF
ShellShock (Software BASH Bug)
PDF
Shellshock - A Software Bug
PDF
Shellshock bug
PPT
Linux Virus
PPTX
Telehack: May the Command Line Live Forever
PDF
Kali tools list with short description
PDF
BlueHat v18 || The matrix has you - protecting linux using deception
PPTX
Metasploit for Web Workshop
ShellShock (Software BASH Bug)
Shellshock - A Software Bug
Shellshock bug
Linux Virus
Telehack: May the Command Line Live Forever
Kali tools list with short description
BlueHat v18 || The matrix has you - protecting linux using deception
Metasploit for Web Workshop

What's hot (20)

PPTX
Security Onion Conference - 2016
PDF
Di shen pacsec_final
PDF
Intrusion Techniques
PDF
Алексей Старов - Как проводить киберраследования?
PDF
Ch8-Computer Security
PPTX
Hot potato Privilege Escalation
PDF
2015.10.05 Updated > Network Device Development - Part 2: Firewall 101
PDF
How to-simulate-network-devices
PDF
2015.10.05 Updated > Network Device Development - Part 1: Switch
PDF
Shutdown agent for_v_mware_esx
PDF
Network Device Development - Part 5: Firewall 104 ~ Packet Splitter
PDF
Nessus v6 command_line_reference
ODP
Stealthy, Hypervisor-based Malware Analysis
PDF
Network Device Development - Part 4: Firewall 103 ~ Protocol Filter & Payload...
PDF
Awesome_fuzzing_for _pentester_red-pill_2017
PPTX
metaploit framework
PPTX
Apache Struts2 CVE-2017-5638
PPTX
Owning computers without shell access 2
PPTX
Owning computers without shell access dark
Security Onion Conference - 2016
Di shen pacsec_final
Intrusion Techniques
Алексей Старов - Как проводить киберраследования?
Ch8-Computer Security
Hot potato Privilege Escalation
2015.10.05 Updated > Network Device Development - Part 2: Firewall 101
How to-simulate-network-devices
2015.10.05 Updated > Network Device Development - Part 1: Switch
Shutdown agent for_v_mware_esx
Network Device Development - Part 5: Firewall 104 ~ Packet Splitter
Nessus v6 command_line_reference
Stealthy, Hypervisor-based Malware Analysis
Network Device Development - Part 4: Firewall 103 ~ Protocol Filter & Payload...
Awesome_fuzzing_for _pentester_red-pill_2017
metaploit framework
Apache Struts2 CVE-2017-5638
Owning computers without shell access 2
Owning computers without shell access dark
Ad

Similar to Shell Shock (Bash Bug) (20)

DOCX
Article on shellshock
PPTX
The bash vulnerability practical tips to secure your environment
DOCX
The Bash Bug explained !
PPT
Threats, Vulnerabilities & Security measures in Linux
PPTX
computer viruses
PDF
Bash Code-Injection Briefing
PPS
Workshop on BackTrack live CD
PPT
Kunal - Introduction to backtrack - ClubHack2008
PPT
Kunal - Introduction to BackTrack - ClubHack2008
PPTX
Virtualization
PDF
LXC, Docker, security: is it safe to run applications in Linux Containers?
ODP
Open Source Virtualization Hacks
PDF
Docker, Linux Containers (LXC), and security
PPT
Presentation Prepared By: Mohamad Almajali
PDF
The Duqu 2.0: Technical Details
PPT
Maemo Development Environment
PDF
Automating Compliance with InSpec - Chef Singapore Meetup
PDF
Docker, Linux Containers, and Security: Does It Add Up?
PPT
aws.ppt
Article on shellshock
The bash vulnerability practical tips to secure your environment
The Bash Bug explained !
Threats, Vulnerabilities & Security measures in Linux
computer viruses
Bash Code-Injection Briefing
Workshop on BackTrack live CD
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
Virtualization
LXC, Docker, security: is it safe to run applications in Linux Containers?
Open Source Virtualization Hacks
Docker, Linux Containers (LXC), and security
Presentation Prepared By: Mohamad Almajali
The Duqu 2.0: Technical Details
Maemo Development Environment
Automating Compliance with InSpec - Chef Singapore Meetup
Docker, Linux Containers, and Security: Does It Add Up?
aws.ppt
Ad

Recently uploaded (20)

PPTX
UNIT 4 Total Quality Management .pptx
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
PPT on Performance Review to get promotions
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Digital Logic Computer Design lecture notes
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Construction Project Organization Group 2.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPT
Project quality management in manufacturing
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Well-logging-methods_new................
UNIT 4 Total Quality Management .pptx
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPT on Performance Review to get promotions
Embodied AI: Ushering in the Next Era of Intelligent Systems
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Digital Logic Computer Design lecture notes
Foundation to blockchain - A guide to Blockchain Tech
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Construction Project Organization Group 2.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Project quality management in manufacturing
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
CH1 Production IntroductoryConcepts.pptx
Well-logging-methods_new................

Shell Shock (Bash Bug)