Shellshock Attacks in Cyber Security
Shellshock Attacks in Cyber Security
Ok, friends, I really wanted to make a video about this one.
Today is about shellshock attacks.
Sometimes, this is referred to as a shellshock bash bug.
Actually, most of the time, it is referred to as the Shellshock bash bug.
Shellshock is a vulnerability in the bash shell.
Bash stands for Bourne Again Shell, which is a command-line window where users run commands that cause actions in the Unix system.
Bash is a basic component of any Unix-based environment.
It is like a smart robot that you can talk to by typing words or commands. No graphics. Well, somethings you can create your own if you choose to.
It has many tools that you can use to run commands, execute scans, list what is on a system, and so on.
What this bug does is change the Unix environment variables to allow a hacker to manipulate these variables to inject malicious code into Bash and basically execute code remotely on any target system that would use Unix.
Umm, sorry, I know that was boring.
Ok, let’s explain this using analogy.
But, first, did you know that you can support my content any buy me coffee on the following link: buymeacoffee
Imagine your computer is like a very fancy house, and the commands you give it are like telling the house what to do and how to do it.
Many people like to buy this type of house because it has many functions and is basically a smart house.
So, people love it.
Now, think of Bash as a special butler inside your house.
May be like a robot butler.
This robot takes your commands and does what you want.
One of this robot’s tools is a bucket.
Let’s call this robot Bash. Remember Bourne Again Shell.
But there was a problem with this robot, Bash!
It had a weakness, more like a hole in his bucket. You know one of the tools it came with.
Bad guys found out they could sneak in through this hole and tell this robot to do things the owner of the house didn’t want.
So, for example, the robot, Bash, can now do naughty stuff, like open the door for them when it wasn’t supposed to. or when the owner is not in the house.
Remember, the fancy house is your computer.
And if this happens, bad people can just run things remotely inside your house, or in this case, your computer.
Now because people liked this type of smart houses, a.k.a., the computers that run bash, this meant that a lot of houses were not safe when this bug was discovered because many people owned this type of house.
Now the good people who take care of such houses quickly fixed the hole by giving the robot a special patch, like fixing the hole in the bucket.
And then they told everyone to update their robot, you know (Bash), so that the bad guys couldn’t use the hole anymore.
So, what do we learn from this?
The lesson here is that sometimes the tools we use to talk to our computers can have problems, but the good people who take care of our computers are always working to keep us safe.
And just like we lock our front doors to keep our real houses safe, we need to always update our computer robots to keep our digital environment safe as well.
Thank you for watching the video all the way to the end.
I hope you found it useful.
Stay safe, and I will see you in the next one.
You can watch more videos on my channel by following this link: My YouTube Channel
Comments
Post a Comment