Command Injection - Lab #1 OS command injection, simple case | Long Version

Описание к видео Command Injection - Lab #1 OS command injection, simple case | Long Version

In this video, we cover Lab #1 in the Command Injection module of the Web Security Academy. This lab contains an OS command injection vulnerability in the product stock checker. The application executes a shell command containing user-supplied product and store IDs, and returns the raw output from the command in its response. To solve the lab, we execute the whoami command to determine the name of the current user.

▬ 🌟 Video Sponsor 🌟 ▬▬▬▬▬▬▬▬▬▬
Purchase the Hacking Fundamentals Bundle: https://hackersacademy.com/courses/ha... (affiliate link)

▬ ✨ Support Me ✨ ▬▬▬▬▬▬▬▬▬▬
Buy my course: https://academy.ranakhalil.com/p/web-...

▬ 📖 Contents of this video 📖 ▬▬▬▬▬▬▬▬▬▬
00:00 - Introduction
00:13 - Hackers Academy sponsorship (https://hackersacademy.com/courses/ha...)
02:05 - Navigation to the exercise
02:37 - Understand the exercise and make notes about what is required to solve it
03:20 - Exploit the lab manually
08:03 - Script the exploit in Python
19:38 - Summary
19:52 - Thank You

▬ 🔗 Links 🔗 ▬▬▬▬▬▬▬▬▬▬
Python script: https://github.com/rkhal101/Web-Secur...
Notes.txt document: https://github.com/rkhal101/Web-Secur...
Web Security Academy Exercise Link: https://portswigger.net/web-security/...
Rana's Twitter account:   / rana__khalil  

Комментарии

Информация по комментариям в разработке