United States

Don't Let Your System Become 'Shellshocked'

Jan 05, 2015
From the Advisory Institute

ForensicFocus | January 2015

In nearly every corner of the Internet, systems security professionals are seeing hackers trying to exploit a Bash shell vulnerability dubbed "shellshock". Remote attackers can execute arbitrary code on vulnerable systems using Bash, or Bourne-Again Shell. Bash is the program behind the most popular shell interpreter on Linux-based operating systems.

This article explains how attacks test vulnerability, identifies four apparent hacker purposes, and recommends actions to thwart attacks.

Read Don't Let Your System Become 'Shellshocked'