4:14 when you say is any host in the internal network vuln to shellshock, internal network meaning origin server or would you also have to bypass a CDN like CloudFlare or AWS in order to exploit?
@intigriti Жыл бұрын
Once you've found and exploited the SSRF, it's the web server scanning the internal network which is unlikely to be protected.
@SrRunsis3 жыл бұрын
THanks so much for this video Intigriti!!!! You guys are awesomee
@intigriti3 жыл бұрын
Our pleasure!
@lol-hz9mc3 жыл бұрын
That's an interesting explanation!!! Thanks
@intigriti3 жыл бұрын
Glad you liked it!
@mohmino4532 Жыл бұрын
Awesome as usual ma man 🤩 but why did u put this { foo;} ? and what is his role in this process 🙃
@intigriti Жыл бұрын
Thank you! The "foo" bit isn't needed, shellshock payloads often just use "() {:;}" to declare the bash function.
@mohmino4532 Жыл бұрын
@@intigriti i see thanks again ❤
@hackersguild84452 жыл бұрын
Thanks for sharing. Nice video :)
@intigriti2 жыл бұрын
Thank you!
@huuloc87193 жыл бұрын
Nice.
@intigriti3 жыл бұрын
Thanks.
@itsm3dud392 жыл бұрын
i used other commands like id, /etc/passwd .. they are not working.why only whoami command working?
@intigriti2 жыл бұрын
There could be a number of measures in place preventing you from running other commands.
@shpockboss38343 жыл бұрын
On every target ,do we have to try same IP? or where can we get IP?
@intigriti3 жыл бұрын
This is something you'd have to guess. Read up on private IP ranges and then you'll see which to scan!