Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

A gyrobus; what is its principle and how it is exploited?

user-image
Question added by عبد السلام هلال , TECHNIQUE EDUCATION , EDUCATION
Date Posted: 2015/10/31
Thabet Almezwk
by Thabet Almezwk , QC/QA Engineer , Alfanar Electrical system

thanks for invitation

I don't have answer

did you mean by gyrobus   gear box?

principle is a law or rule that has to be, or usually is to be followed, or can be desirably followed, or is an inevitable consequence of something, such as the laws observed in nature or the way that a system is constructed. The principles of such a system are understood by its users as the essential characteristics of the system, or reflecting system's designed purpose, and the effective operation or use of which would be impossible if any one of the principles was to be ignored.[1][dead link]

Examples of principles are descriptive comprehensive and fundamental law, doctrine, or assumption, the normative rule or code of conduct, and the law or fact of nature underlying the working of an artificial device.

As cause The principle of any effect is the cause that produces it.

Depending on the way the cause is understood, the basic law governing that cause may acquire some distinction in its expression.

 

The Shellshock problem is an example of an arbitrary code execution (ACE) vulnerability. Typically, ACE vulnerability attacks are executed on programs that are running, and require a highly sophisticated understanding of the internals of code execution, memory layout, and assembly language—in short, this type of attack requires an expert.

Attacker will also use an ACE vulnerability to upload or run a program that gives them a simple way of controlling the targeted machine. This is often achieved by running a "shell". A shell is a command-line where commands can be entered and executed.

The Shellshock vulnerability is a major problem because it removes the need for specialized knowledge, and provides a simple (unfortunately, very simple) way of taking control of another computer (such as a web server) and making it run code.

Suppose for a moment that you wanted to attack a web server and make its CD or DVD drive slide open. There's actually a command on Linux that will do that: /bin/eject. If a web server is vulnerable to Shellshock you could attack it by adding the magic string () { :; }; to /bin/eject and then sending that string to the target computer over HTTP. Normally, the User-Agent string would identify the type of browser you are using, but, in in the case of the Shellshock vulnerability, it can be set to say anything.

For example, if example.com was vulnerable then

More Questions Like This

Do you need help in adding the right keywords to your CV? Let our CV writing experts help you.