JTCyberTech / Cybersecurity-Home-Labs

3 stars 1 forks source link

4. How to Prevent Command Injection? #69

Open JTCyberTech opened 8 months ago

JTCyberTech commented 8 months ago

Mastering Command Injection Part 4

How to Prevent Command Injection?

Preventing Command Injection Vulnerabilities

Key Takeaways

Primary defense/most effective is:

AVOID CALLING OS COMMANDS DIRECTLY.

INSTEAD YOU SHOULD USE THE BUILT IN LIBRARY FUNCTION THAT ONLY PERFORM THE SPECIFIC TASK THAT YOU INTENDED FOR THEM TO PERFORM.