{"id":43437,"date":"2021-08-27T12:31:12","date_gmt":"2021-08-27T04:31:12","guid":{"rendered":"https:\/\/version-2.com\/?p=43437"},"modified":"2022-02-07T16:38:11","modified_gmt":"2022-02-07T08:38:11","slug":"meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2021\/08\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\/","title":{"rendered":"Meet the new guy on the block: BASHware and its use in the WSL"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"43437\" class=\"elementor elementor-43437\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4da8c5f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4da8c5f9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;decf9c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-133ba185\" data-id=\"133ba185\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc2da8d post-content elementor-widget elementor-widget-text-editor\" data-id=\"fc2da8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2018\/11\/what-is-BASHware-featured.png\" alt=\"\" width=\"958\" height=\"auto\" \/><\/p><div class=\"entry-content\"><h2>Meet the new guy: BASHware and its use in the WSL<\/h2><p align=\"center\"><img decoding=\"async\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2018\/11\/malBASHware-1.png\" alt=\"\" width=\"958\" height=\"auto\" \/><\/p><h2>Antecedents<\/h2><p>In this blog we published last year, an interesting insight of the penguin\u2019s OS in the field of proprietary software, specifically in Microsoft\u00ae Windows\u00ae. Redmond\u2019s company had just finished its beta phase of <strong>\u201cWindows Subsystem for Linux\u201d<\/strong>\u00ae (WSL), and we asked ourselves: \u201c<em>Is there security in that environment?<\/em> \u201d.<br \/>Our rhetorical question was answered at the Rootedcon 2018 Computer Security Congress, held in the city of Madrid in March where the Checkpoint team made a presentation on the subject.<\/p><h2>Approach of the theoretical framework<\/h2><p>Every time a work tool is added to any software, there will always be incidences -or \u201cbugs\u201c- that can even be analyzed to see if they can have sneaky intentions. Originally, Microsoft\u00ae clearly explained the limitations of the<strong> WSL<\/strong>: it was not for production (databases, web servers) nor did it support graphic programs. In short, it was just, as we say, an \u201camusement park\u201d for programmers (both<em> hackers<\/em> and crackers). In the case of us hackers, this feature saves us a lot of time, since the scripts that we have written for GNU\/Linux can be executed in that private environment, but always modifying the environment variables (in any case the work of adaptation is minimal, the unit \u201c<strong>C<\/strong>:\\\u201d is mounted as \u201c\/mnt\/<strong>C<\/strong>\/user\u201d.<\/p><p>In order to enable the \u201cWindows Subsystem for Linux\u201d \u2013 which, has nothing to do with the Linux kernel, since GNU utilities really run on the Windows\u00ae kernel \u2013 you need administrator rights and you need to restart the computer. Although this fact is comforting we must take into account the following: every day<strong> Windows 10\u00ae<\/strong> occupies every new computer, because it comes with that operating system preinstalled. <strong>Who guarantees us that it is disabled, by default?<\/strong> The latter approach is derived from point 15 of the GNU General Public License: \u201cThe entire risk of both the quality and performance of the program is at your own expense,\u201d i.e.<em> the final responsibility for our systems always rests on our shoulders.<\/em><\/p><p>We must clarify that The people from Microsoft have pronounced on the matter and have refuted that this is a vulnerability of Windows\u00ae and that they will not dedicate more time to the matter (nowadays, there are no news about it), but here at Pandora FMS it is our duty to analyze as many scenarios as possible and to provide the tools; Monitoring also includes future events. <em>We\u2019ll write from the point of view of how it might affect our systems.<\/em><\/p><h3>Monitoring with Pandora FMS<\/h3><p>Another very remote possibility, more direct because it is aimed at specific local or virtual networks, is that an actor who has control over some <strong>\u201cActive Directory\u201d<\/strong> orders the <strong>WSL<\/strong> enablement in hundreds or perhaps thousands of machines that connect to that domain (companies and complete branches). All antivirus programs and substitutes <em>will not detect such changes because they are simply Microsoft\u00ae applications, legitimate and digitally signed, hence our responsibility to have knowledge of such an event.<\/em><\/p><p align=\"center\"><img decoding=\"async\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2018\/11\/malBASHware-2.jpg\" alt=\"\" width=\"958\" height=\"auto\" \/><\/p><p>This is when Pandora FMS and its flexibility can help us in our work: we publish an introduction to log monitoring (includes link to check the approach under Pandora FMS), as well as an article in which we explain the difference between filtering and selecting \u201csyslogs\u201d (that are generated <strong>even when we activate some Windows\u00ae feature), which<\/strong> are part of the common monitoring metrics in modern operating systems. That\u2019s why the flexibility, we insist, is patent: we can configure Pandora FMS so that it informs if some characteristic is incorporated to some computer monitored by us.<\/p><p>This is used to suggest that antivirus applications start taking an \u201cinventory\u201d when they are installed and show a warning -or block it \u2013 of possible weaknesses. We also distinguish between what is already installed and the changes made: the first is the task of the antivirus, the second are events that can -and should- detect the monitoring tools.<\/p><h2>Terminology: BASHware<\/h2><p>\u201cMalware\u201d comes from the contraction of <em>\u201cmalicious software<\/em>\u201d and as the first word comes from Latin malitiosus. But here\u2019s our point:<em> massifying the term \u201cBASHware\u201d with malignant denotation is incorrect, \u201cmalware\u201d exists applied in different ways because the tools that we, the network administrators, migrate are entirely innocent.<\/em> Now, if a person with malicious intentions develops scripts in BASH then we are talking about <strong>\u201cbadBASHware\u201d<\/strong>.<\/p><h2>Steps to use BASHware<\/h2><p>Windows\u00ae has always integrated its own command line, but from Windows Vista\u00ae onwards it has a more powerful tool created to match the BASH\/GNU features: <a href=\"https:\/\/docs.microsoft.com\/en-us\/previous-versions\/technet-magazine\/ff700227(v=msdn.10)\" target=\"_blank\" rel=\"noopener nofollow noindex noreferrer\">Powershell<\/a>\u00ae.<\/p><p align=\"center\"><img decoding=\"async\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2018\/11\/malBASHware-3.jpg\" alt=\"\" width=\"958\" height=\"auto\" \/><\/p><p>With this tool (Powershell\u00ae) we explain the next steps:<\/p><h3>Enabling WSL in Windows 10\u00ae<\/h3><p>Yes, WSL is only for Windows 10\u00ae, although in the last one we enabled the remote tools for a virtual machine with Windows 7\u00ae. Powershell is active by default, we run it with administrator rights and enter the following command (we must then restart the computer or simply wait for some other frequent Windows Update\u00ae task to do it):<\/p><pre>Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Windows-Subsystem-Linux<\/pre><p>It is also possible to enable it through a Windows terminal window:<\/p><pre>dism \/Online \/Enable-Feature \/All \/FeatureName:Microsoft-Windows-Subsystem-Linux \/NoRestart<\/pre><h3>WSL: enabling developer mode<\/h3><p>The second thing we have to enable \u2013 and that makes the process we are proposing even more difficult \u2013 is the developer mode and making it permanent. This is accomplished by modifying (or adding) a key in the Windows\u00ae registry.<\/p><p>Warning: mishandling the Windows registry can lead to system corruption and even prevent system startup and even recovery. Please always test on disposable virtual machines.<\/p><p>In order to do this we use the command \u201cNew-Item\u201c, to add the following key:<\/p><pre>New-Item -Path \"HKLM:\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\AppModelUnlock\" -ItemType Directory -Force<\/pre><p>and define its property with this one, a little longer:<\/p><pre>New-ItemProperty -Path \"HKLM:\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\AppModelUnlock\" -Name \nAllowDevelopmentWithoutDevLicense -PropertyType DWORD -Value 1<\/pre><p>Since we must check if such a key exists before setting the property to a value other than zero, system administrators like to develop scripts to save us from repeating the task again and automating everything. In this link you will be able to read a complete script ahead of its time -year 2016- and the only objection it is that it doesn\u2019t capture the response of the <strong>New-Item<\/strong> command and then register in the syslog the work done with its own function intended for that purpose, called <strong>Write-CMLogEntry.<\/strong> A hacker cares to record for the audit logs we mentioned in section 2.1, a <strong>\u201c<em>cracker<\/em>\u201d is not aware of this as it boasts about not leaving a trace!<\/strong><\/p><h3>Choosing Favorite BASH<\/h3><p>Not many to choose from, but Microsoft has behaved democratically by adding more GNU distributions in addition to Ubuntu, which is the default. To date there is support for:<\/p><ul><li>openSUSE Leap<\/li><li>SUSE Linux Enterprise Server<\/li><li>Debian GNU\/Linux<\/li><li>Kali Linux<\/li><li>Short-term: Fedora<\/li><li>And many more are on the way<\/li><\/ul><p>The most logical thing is to write for Debian and its son, Ubuntu. In any case, if we want to know which we have available we introduce:<\/p><pre>wslconfig \/l<\/pre><p>If Ubuntu is listed, without further delay:<\/p><pre>wslconfig \/setdefault Ubuntu<\/pre><p>Or the one you need or want, changing the last word for one of the ones that appears in the list. We are already halfway towards achieving our BASHware test!<\/p><h3>Configuring the default user<\/h3><p>The goal here will be to guarantee the necessary privilege, another setback for the reason of the statements of the personnel of the software of the popular window; we execute it in a sale of Windows 10\u00ae commands:<\/p><ul><li>Ubuntu: <strong>\u00abubuntu config \u2013default-user root\u00bb<\/strong><\/li><li>openSUSE Leap 42:<strong> \u00abopensuse-42 \u2013default-user root\u00bb<\/strong><\/li><li>SUSE Linux Enterprise Server 12:<strong> \u00absles-12 \u2013default-user root\u00bb<\/strong><\/li><\/ul><p>Needless to say that since we are here we will be able to create our users for different tasks, that is, each user will leave different registers according to the <strong>BASHware assigned to execute<\/strong>. With the famous command to add users:<\/p><pre>sudo adduser new_user_name<\/pre><p>The icing on the cake: <strong>syslog<\/strong>, the event logger, although preinstalled, is not enabled by default in<strong> WSL<\/strong>. That problem is still open on the Github page at the time of writing and that is out of our reach and it\u2019s a good thing we always keep it in mind.<\/p><h3>Installing Wine<\/h3><p>We quickly explained that Wine is software that, installed on GNU\/Linux, allows certain Windows\u00ae applications to run. <strong>This is where the very remote possibility presents itself: to be able to run programs beyond the reach of antivirus programs or Windows\u00ae itself.<\/strong> Precisely, monitoring takes care of keeping track of these situations, although the line separating the tasks of security and monitoring <em>is extremely thin<\/em>. To illustrate this point we will say that, by way of example, data is one thing and information is another: the latter is obtained from the former by means of a process or algorithm (monitoring); this information is <strong>converted back into data when requested by the personnel in charge of security.<\/strong><\/p><p>To install <strong>Wine<\/strong>, if we choose Debian or Ubuntu:<\/p><pre>apt-get install wine<\/pre><p align=\"center\"><img decoding=\"async\" src=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2018\/11\/malBASHware-4.jpg\" alt=\"\" width=\"958\" height=\"auto\" \/><\/p><p>We may well install a graphical system for<strong> WSL<\/strong> and run <strong>Wine<\/strong> but we don\u2019t want to go that far; in Wikipedia there are instructions on how to do it.<\/p><h2>Final recommendations<\/h2><p>While this article is written from the point of view of <em>a possible vulnerability, we have also focused on the antivirus defenses and the control mechanisms of the OS itself against possible <strong>malBASHware<\/strong><\/em>. Also remember at all times that Pandora FMS is always and will be a useful tool due to its flexibility, which we can adapt to our work and the personalized alarms we have created. We can add your possible results to the Integria IMS incident management software, since it has the ability to take hardware inventory, as well as to record and categorize the requests of your users in your technical support center. Ten, a hundred or even thousands of computers: both <strong>programs are capable of satisfying the demands of your work!<\/strong><\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8085a61 post-content elementor-widget elementor-widget-shortcode\" data-id=\"8085a61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"38636\" class=\"elementor elementor-38636\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7400e5a2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"7400e5a2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;58112d0&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-131f5cf2\" data-id=\"131f5cf2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1114ae95 elementor-widget elementor-widget-text-editor\" data-id=\"1114ae95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About PandoraFMS<\/strong><br>\nPandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.<br>\nOf course, one of the things that Pandora FMS can control is the hard disks of your computers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Meet the new guy: BASHware and its use in the WSL Antec [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[474,461,61],"tags":[475,462],"class_list":["post-43437","post","type-post","status-publish","format-standard","hentry","category-pandorafms","category-year2021","category-press-release","tag-pandorafms","tag-462"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Meet the new guy on the block: BASHware and its use in the WSL - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/en\/2021\/08\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Meet the new guy on the block: BASHware and its use in the WSL - Version 2\" \/>\n<meta property=\"og:description\" content=\"Meet the new guy: BASHware and its use in the WSL Antec [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/en\/2021\/08\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-27T04:31:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-07T08:38:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2018\/11\/what-is-BASHware-featured.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Meet the new guy on the block: BASHware and its use in the WSL\",\"datePublished\":\"2021-08-27T04:31:12+00:00\",\"dateModified\":\"2022-02-07T08:38:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\\\/\"},\"wordCount\":1618,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/what-is-BASHware-featured.png\",\"keywords\":[\"Pandorafms\",\"2021\"],\"articleSection\":[\"PandoraFMS\",\"2021\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\\\/\",\"name\":\"Meet the new guy on the block: BASHware and its use in the WSL - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/what-is-BASHware-featured.png\",\"datePublished\":\"2021-08-27T04:31:12+00:00\",\"dateModified\":\"2022-02-07T08:38:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/what-is-BASHware-featured.png\",\"contentUrl\":\"https:\\\/\\\/pandorafms.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/what-is-BASHware-featured.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/08\\\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Meet the new guy on the block: BASHware and its use in the WSL\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Meet the new guy on the block: BASHware and its use in the WSL - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/en\/2021\/08\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\/","og_locale":"en_US","og_type":"article","og_title":"Meet the new guy on the block: BASHware and its use in the WSL - Version 2","og_description":"Meet the new guy: BASHware and its use in the WSL Antec [&hellip;]","og_url":"https:\/\/version-2.com\/en\/2021\/08\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\/","og_site_name":"Version 2","article_published_time":"2021-08-27T04:31:12+00:00","article_modified_time":"2022-02-07T08:38:11+00:00","og_image":[{"url":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2018\/11\/what-is-BASHware-featured.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/zh\/2021\/08\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2021\/08\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Meet the new guy on the block: BASHware and its use in the WSL","datePublished":"2021-08-27T04:31:12+00:00","dateModified":"2022-02-07T08:38:11+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2021\/08\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\/"},"wordCount":1618,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/version-2.com\/zh\/2021\/08\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\/#primaryimage"},"thumbnailUrl":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2018\/11\/what-is-BASHware-featured.png","keywords":["Pandorafms","2021"],"articleSection":["PandoraFMS","2021","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2021\/08\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\/","url":"https:\/\/version-2.com\/zh\/2021\/08\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\/","name":"Meet the new guy on the block: BASHware and its use in the WSL - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/version-2.com\/zh\/2021\/08\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\/#primaryimage"},"image":{"@id":"https:\/\/version-2.com\/zh\/2021\/08\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\/#primaryimage"},"thumbnailUrl":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2018\/11\/what-is-BASHware-featured.png","datePublished":"2021-08-27T04:31:12+00:00","dateModified":"2022-02-07T08:38:11+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/zh\/2021\/08\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/zh\/2021\/08\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/2021\/08\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\/#primaryimage","url":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2018\/11\/what-is-BASHware-featured.png","contentUrl":"https:\/\/pandorafms.com\/blog\/wp-content\/uploads\/2018\/11\/what-is-BASHware-featured.png"},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/zh\/2021\/08\/meet-the-new-guy-on-the-block-bashware-and-its-use-in-the-wsl\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Meet the new guy on the block: BASHware and its use in the WSL"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-biB","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/43437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=43437"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/43437\/revisions"}],"predecessor-version":[{"id":43446,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/43437\/revisions\/43446"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=43437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=43437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=43437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}