To see how the Shellshock bug can be used to exploit a SSH server, we need to first configure our SSH server as a vulnerable system. To do so, we will follow these steps:
-
The first step is to add a new user account called user1 on the SSH server system. We must also add /home/user1 as its home directory and /bin/bash as its shell:
Once the account is added, we cross check it by checking the /etc/passwd file.
- Next, we create a directory for user1 in /home and grant the ownership of this directory to the user1 account: