Module 13: Command Injection
Discovery of Command Injection
Accessing the Command Injection Sandbox
Familiarizing Ourselves with the Sandbox


Where is Command Injection Most Common?
About the Chaining of Commands & System Calls
Dealing with Common Protections
Typical Input Normalization - Sending Clean Payloads

Typical Input Sanitization - Blocklisted Strings Bypass




Blind OS Command Injection Bypass

Extra Mile
Enumeration and Exploitation
Enumerating Command Injection Capabilities
Obtaining a Shell - Netcat

Obtaining a Shell - Python
Obtaining a Shell - Node.js
Obtaining a Shell - PHP


Obtaining a Shell - Perl
File Transfer

Extra Mile I
Writing a Web Shell




Extra Mile II
Case Study - OpenNetAdmin (ONA)
Accessing OpenNetAdmin
Discovery and Assessment







Exploitation






PreviousModule 12: Server-side Template Injection - Discovery and ExploitationNextModule 14: Server-side Request Forgery
Last updated