From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Exploiting with Python

Exploiting with Python

- [Instructor] Let's look at how we use Python exploits. In 2014, the Shellshock exploit was detected. Shellshock is an HTTP exploit, which is able to force execution of Bash commands, and so achieve remote code execution. It was given the code CVE-2014-6271, It was given the code CVE-2014-6271, and known more formerly, as the "Bash Environment Variable Code Injection." Let's find this exploit in Exploit DB. Searchsploit shellshock. Searchsploit shellshock. The second line down is our Shellshock attack. We'll copy this into our home directory. Copy /usr/share/exploitdb/exploits/ Copy /usr/share/exploitdb/exploits/ and it's in Linux remote, and it's called 34900.py. and it's in Linux remote, and it's called 34900.py. We'll copy that into shellshock.py. We'll copy that into shellshock.py. Let's take a look at it. Nano shellshock.py. Nano shellshock.py. Nano shellshock.py. The first thing we can see is a comment…

Contents