Problem
Explain how you'd identify a webserver vulnerable to Shellshock (CVE-2014-6271), and subsequently exploit that system. To get you started, consider Lab 3: specifically how we used reverse-tcp in Metasploit to connect to a target via a vulnerable service. Your steps should be reproducible (well ordered step-by-step instructions), with clear explanations of your reasons and ideal outcomes. Reference all sources.