JTCyberTech / Cybersecurity-Home-Labs

5 stars 1 forks source link

3. How To Exploit Command Injection? #68

Open JTCyberTech opened 11 months ago

JTCyberTech commented 11 months ago

Mastering Command Injection Part 3

How To Exploit Command Injection?

Exploiting In-Band Command Injection

Exploiting Blind Command Injection

To prove impact: Output the response of the command in the web root and retrieve the file directly using a browser.

Another way to prove both command injection exists and exploitable is to show impact to open an out-of-band channel back to a server you control.

Automated Exploitation Tools

Web Application Vulnerability Scanner (WAVS), any decent scanner should be able to scan for command injection.