We covered Practical Command Injection examples with Burp Suite to solve Challenge 008 in OWASP Hackademic free lab.
In command injection, the attacker-injected code gets executed by the underlying OS allowing the attacker to execute system commands to discover sensitive files, navigate through the directory structure, create files and of course plant reverse shells and backdoors.
The Complete Practical Web Application Penetration Testing Course
Video Walkthrough
Show Comments