Jan 05, 2015
From the Advisory Institute
ForensicFocus | January 2015
In nearly every corner of the Internet, systems security professionals are seeing hackers trying to exploit a Bash shell vulnerability dubbed "shellshock". Remote attackers can execute arbitrary code on vulnerable systems using Bash, or Bourne-Again Shell. Bash is the program behind the most popular shell interpreter on Linux-based operating systems.
This article explains how attacks test vulnerability, identifies four apparent hacker purposes, and recommends actions to thwart attacks.