From 729739859ef4cedd9f1101d5d5c95047b51b9059 Mon Sep 17 00:00:00 2001 From: fide0 <7241441+fide0@users.noreply.github.com> Date: Sat, 16 May 2020 13:24:30 +0100 Subject: [PATCH] Update README.md Former URL went to wrong page of the blog --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 41fbd6e..ece4ecf 100644 --- a/README.md +++ b/README.md @@ -88,7 +88,7 @@ _will segfault if vulnerable_ + Metasploit Exploit Module - [Dhclient Bash Environment Variable Injection (Shellshock)](https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/dhcp/bash_environment.rb) + Metasploit Auxiliary Module - https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/server/dhclient_bash_env.rb + Perl Script - http://pastebin.com/S1WVzTv9 -+ using a Wi-Fi pineapple to force people to join the network - http://d.uijn.nl/?p=32 ++ using a Wi-Fi pineapple to force people to join the network - https://d.uijn.nl/2014/10/01/combining-shellshock-with-my-wi-fi-pineapple/ ## SSH + Stack Overflow - http://unix.stackexchange.com/questions/157477/how-can-shellshock-be-exploited-over-ssh