OS Command Injection/Command Injection
- When an application takes OS commands from users and does not sentitize properly before executing.
- In this process attackers can run and access various commands and important files respectively.
- Any application which holds a functionality where we can run the OS commands, can be vulnerable to OS command injection.
- Normally Scenarios as per bWAPP: -
- A functionality where we can dns lookup any URL/IP.
- Now we can add Command injection payloads.
- Use of commix tool: - to automate command injection.
- Open a burp proxy.
- Intercept the request where command injection is.
- Save the request in file as .txt.
- Right click >> save as a file >> .txt
- Go to the commix tool.
- ./commix.py -r << path of the saved request and file name >> -p target --all
- This tool enumerates the system properly and at last asks : for a commix shell open or not.
Comments
Post a Comment