Welcome to Learning at Lambert Labs session #20. This week, Tom discusses the Shellshock vulnerability, an exploit which allowed arbitrary code execution on target machines.

In today’s Learning session:

  • What is the Shellshock vulnerability, and which technologies did it affect?
  • A discussion of the Bash command interpreter and a little about how it works
  • An overview of environment functions and how they were exploited
  • Live demonstration of the exploit in Django
  • Using a reverse shell to assist with the exploit
  • Q&A from our developers!

Learn more about our Django expertise here: https://lambertlabs.com/technologies/python-software-development/django-services-company/

Read more about the work we do with Python here: https://lambertlabs.com/technologies/python-software-development/

🔊 Subscribe to our channel for weekly learning sessions! https://www.youtube.com/channel/UCi7G5sY0IWqSNUMnRptuJm

🔗 Lambert Labs Links 🔗 :

🌎 Website: https://lambertlabs.com/​​

📱 Twitter: https://twitter.com/lambertlabs​

📝 LinkedIn: https://www.linkedin.com/company/lambertlabs/

📂 GitHub: https://github.com/lambertlabs​​

⚡ Please leave a LIKE and SUBSCRIBE for more content! ⚡

⭐ Tags ⭐

  • Security
  • Django
  • Python
  • Development
  • Software Engineering