You need to write a report and only first 4 tasks are required. (screenshots required same as in the helpful tips file). tips are almost the same for what you will go through.
Please answer these questions and include the answers in your report as well:
1. Other than the two scenarios described above (CGI and Set-UID program), is there any other scenario that could be affected by the Shellshock attack?
2. What is the fundamental problem of the Shellshock vulnerability? What can we learn from this vulnerability
Here is the link for this lab: http://www.cis.syr.edu/~wedu/seed/Labs_16.04/Softw…