Lab 13: OS command injection, simple case

 This lab contains an OS command injection vulnerability in the product stock checker.



I start by going to a product and then trying to request the stock. Since this deals with the backend I can use this to inject an OS command and get information.



Here I changed the values of the productId to the whoami command and it became URL-encoded







I found out that I could’ve also done the OS injection like this.



This would have also worked

Comments

Popular posts from this blog

Vulnerability Management(Nessus)

Active Directory Home Lab

TightVNC and Colasoft Packet Builder Lab

Wireshark Mini Lab