How to do it...

Browse to bee-box over HTTP (http://192.168.56.12/bWAPP/) and log in to start this exercise:

  1. In the Choose your bug: drop-down box, select Shellshock Vulnerability (CGI) and then click on Hack:

In the text, we can see something interesting: Current user: www-data. This may mean that the page is using system calls to get the username. It also gives us a hint to attack the referrer.

  1. Let's see what is happening behind the scenes and use Burp Suite to record the requests and reload the page. If we look at the proxy's history:

We can see that there is an iframe calling a shell script: /cgi-bin/shellshock.sh, which might be ...

Get Kali Linux Web Penetration Testing Cookbook - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.