Command Injection
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)
Get a hacker's perspective on your web apps, network, and cloud
Find and report critical, exploitable vulnerabilities with real business impact. Use our 20+ custom tools to map the attack surface, find security issues that let you escalate privileges, and use automated exploits to collect essential evidence, turning your hard work into persuasive reports.
What is command Injection?
A command injection permits the execution of arbitrary operating system commands by an attacker on the server hosting an application. As a result, the application and all its data can be fully compromised. The execution of these commands typically allows the attacker to gain unauthorized access or control over the application's environment and underlying system.
Context
Depending on where your input is being injected you may need to terminate the quoted context (using " or ') before the commands.
Command Injection/Execution
Limition Bypasses
If you are trying to execute arbitrary commands inside a linux machine you will be interested to read about this Bypasses:
Bypass Linux RestrictionsExamples
Parameters
Here are the top 25 parameters that could be vulnerable to code injection and similar RCE vulnerabilities (from link):
Time based data exfiltration
Extracting data: char by char
DNS based data exfiltration
Based on the tool from https://github.com/HoLyVieR/dnsbin also hosted at dnsbin.zhack.ca
Online tools to check for DNS based data exfiltration:
dnsbin.zhack.ca
pingb.in
Filtering bypass
Windows
Linux
Bypass Linux RestrictionsBrute-Force Detection List
References
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:
HackTricks Training GCP Red Team Expert (GRTE)
Get a hacker's perspective on your web apps, network, and cloud
Find and report critical, exploitable vulnerabilities with real business impact. Use our 20+ custom tools to map the attack surface, find security issues that let you escalate privileges, and use automated exploits to collect essential evidence, turning your hard work into persuasive reports.
Last updated