Skip to content

Automation script to exploit the Shellshock vulnerability.

Notifications You must be signed in to change notification settings

YunchoHang/CVE-2014-6271-SHELLSHOCK

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

CVE-2014-6271-SHELLSHOCK

🐚 Shellshock Exploitation Script 🎯💻🔍

This Python script exploits the Shellshock vulnerability (CVE-2014-6271) to execute commands remotely or establish a reverse shell on a vulnerable target. 🛠️⚠️


⚠ Disclaimer 🚨❗

This script is intended for educational and authorized penetration testing purposes only. Unauthorized use against systems you do not have explicit permission to test is illegal and unethical. Always obtain proper authorization before conducting any security testing. ⚠️🛑🚔


🔥 Features

  • Execute arbitrary commands on a vulnerable system using the Shellshock exploit.
  • Establish a reverse shell connection to the attacker's machine.

📌 Prerequisites 🎓

  • A system vulnerable to Shellshock (e.g., an outdated Apache server with CGI enabled).
  • Python 3 installed.
  • curl installed on your system.

📥 Installation

Clone the repository:

git clone https://github.com/YunchoHang/CVE-2014-6271-SHELLSHOCK.git
cd CVE-2014-6271-SHELLSHOCK

🚀 Usage

Run the script:

python3 AutoShocker.py

🔘 Options

  1. Run commands using curl – Allows execution of arbitrary commands on the target machine.
  2. Get a reverse shell – Establishes a reverse shell connection to your attacker machine.

💡 Example Usage

Command Execution:

python3 AutoShocker.py
Enter the target IP: 192.168.1.100
Choose an option (1 or 2): 1
Enter the commands you want to execute: whoami && id

Reverse Shell:

python3 AutoShocker.py
Enter the target IP: 192.168.1.100
Choose an option (1 or 2): 2
Enter your IP (listener): 192.168.1.200
Enter the port for reverse shell (e.g., 4444): 4444

Start your listener on your machine:

nc -lvnp 4444

⚠ Warning

  • Do not use this tool for unauthorized access.
  • Running this on a machine you do not have permission to test is illegal.
  • Ensure you have explicit authorization before running security tests.

📜 License

This project is for educational purposes only. The author is not responsible for any misuse. 📖⚠️🔍

About

Automation script to exploit the Shellshock vulnerability.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages