Evil-Shock
Evil-Shock copied to clipboard
Shock the shell! Exploit many injection method for shellshock
Evil-Shock Description
Evil-Shock is a powerful tool made to exploit Shellshock, what's special with Evil-Shock is that it doesn't base his attacks on one parameter, example another tool might inject a simple "echo Vulnerable" and see if the server executes that. In many case the server wont execute that command but can execute another command ;) Evil-Shock will find the perfect command also known as Injection Point and then execute further commands to gain remote access via the injection point, so far for the first version Evil-Shock can check for 4 different Injection Point:
1 - NSLookup
2 - Echo
3 - LS
4 - Ping
In further version more injections points will be added.
Test / Train with Evil-Shock!
I recommend download and installing in your favorite virtual machine manager the iso file from VulnHub: https://www.vulnhub.com/entry/pentester-lab-cve-2014-6271-shellshock,104/ Which was used to test and develop Evil-Shock!
WINDOWS VERSION WARNING
Netcat normally doesn't exist for Windows, but i had a look into Metasploit windows-libraries and it has a nc.exe program for backdooring. Please report any case of infections while using that nc.exe, thanks!
System Supported:
Linux and Windows! Make sure if running on windows to not remove the nc file, since it contains the nc.exe which allow you to backdoor a server. On linux make sure to have netcat installed.
Screenshots / Examples
Bind Shell / Auto-Point-Injection:

Reverse Shell / Auto-Point-Injection:
WARNING: MY FIREWALL IS BLOCKING CONNECTION SO I CANNOT SHOW THE REVERSE SHELL BUT IT SHOULD WORK FINE IN ANY ANOTHER CASE :)

Features
Evil-Shock is equiped with some useful and interresting command:
t|target=
shell=<reverse / bind> : This will set the shell type.
p|port=
help : Print help menu.
inject=
user-agent=
srv-persistent : When only bind shell is selected and injected this will then injected a persistent backdoor.
inject-only : This will test Injection Points only, not inject anything else.
Shells
Evil-Shock supports 3 different type of shells, reverse, bind and bash shells!
Reverse - Victim will connect back to you.
Bind - You will connect directly to the target (Recommended)
Bash(Reverse Only) - Rather than creating a netcat listener on the victim and bash listener will be injected.
Usage
perl evilshock.pl -help
Examples
perl evilshock -t=http://shellshock.site/cgi-bin/menu --shell=bind --port=1234 --srv-persistent