May 2017
Intermediate to advanced
416 pages
21h 33m
English
Once you have identified a vulnerable application, the obvious next step is to execute some commands. The script http-shellshock uses the script argument http-shellshock.cmd to set specific commands to execute on a vulnerable host:
$ nmap -sV --script http-shellshock --script-args cmd=ls <target>
Read now
Unlock full access