Shellshock: Survival Guide


Details
Shellshock is one the most dangerous security holes that has hit the internet, since heartbleed. BASH is a widely used shell found in Servers and embedded appliances. It allows hackers to run remote code, and potentially take over your servers. The talk is about how you can write secure scripts, and also you can harden your BASH shell for security critical mission/services.
Who is concerned about Shellshock:
• System administrators running Linux and using BASH.
• Students using Linux on their laptops and/or their Virtual servers for their blogs.
• IT managers who rely on Linux for their Infrastructure.
• People who have embedded devices that have Linux (e.g Televisions, Routers, Raspberry Pis)
• Software engineers who write shell scripts using BASH.
• Web designers who write shell scripts for maintenance tasks in Drupal, Joomla, WordPress and other CMSs.
About author:
Loganaden "Logan" Velvindron is involved closely in Internet Disaster Management. He was involved in fighting Heartbleed and started LibreSSL for a more secure replacement for OpenSSL. Recently, he has been involved in technical discussions regarding how to best tackle shellshock with various Open Source Developers & Companies.

Shellshock: Survival Guide