Automate Recon and scanning process with Vidoc. All security teams in one place
The "Shell History" module is designed to detect misconfigurations related to shell history files. It targets the bash, ksh, sh, and zsh shells. This module has a low severity level and was authored by pentest_swissky and geeknik.
The "Shell History" module helps identify potential security risks associated with shell history files. By analyzing the contents of these files, the module can detect commands that may indicate unauthorized access or malicious activity. This information can be used to assess the overall security posture of the system and take appropriate actions to mitigate any identified risks.
The "Shell History" module works by sending HTTP requests to specific paths associated with shell history files, such as
/.zsh_history. It then applies a series of matching conditions to determine if any misconfigurations or vulnerabilities are present.
The module uses two types of matchers: word matchers and status matchers. Word matchers analyze the response content for specific keywords, such as
ps aux. If any of these keywords are found, it indicates potential misconfigurations.
Status matchers check the HTTP response status code, and in this case, it looks for a status code of 200. If the response meets all the defined matching conditions, the module reports a potential misconfiguration or vulnerability.
It's important to note that the module also considers the response content type. If the response contains any of the following words:
image/, it will not report a misconfiguration or vulnerability.
By analyzing the shell history files and applying these matching conditions, the "Shell History" module helps identify potential security risks and provides valuable insights for further investigation and remediation.