Command injection
Understanding Command Injection
What is Command Injection?
Vulnerable Code Example
// PHP vulnerable code
$filename = $_GET['file'];
$output = shell_exec("cat /var/logs/" . $filename);
echo $output;How Command Injection Works
Command Execution Flow
Impact and Consequences
Shell Metacharacters and Command Separators
Command Separators
Input/Output Redirection
Command Substitution
Wildcards and Globing
Comment
Detection Methodology
Identifying Vulnerable Parameters
Common Vulnerable Functions
Vulnerable Parameter Types
Basic Detection Techniques
Time-Based Detection
Output-Based Detection
Error-Based Detection
Advanced Detection Techniques
Blind Command Injection
Context-Specific Testing
Operating System Specific Techniques
Linux/Unix Command Injection
Common Commands for Reconnaissance
Data Exfiltration Techniques
Persistence and Backdoors
Windows Command Injection
Common Commands for Reconnaissance
Data Exfiltration Techniques
Persistence and Backdoors
Advanced Command Injection Techniques
Filter Evasion and Bypass
Character Encoding and Obfuscation
Variable Expansion and Substitution
Alternative Command Separators
Blind Command Injection Exploitation
Time-Based Exploitation
Out-of-Band Data Exfiltration
File-Based Communication
Platform-Specific Advanced Techniques
Linux Advanced Techniques
Windows Advanced Techniques
Context-Specific Command Injection
Web Application Contexts
File Upload Handlers
Image Processing Applications
Network Diagnostic Tools
Archive and Compression Tools
API and Service Contexts
REST API Parameters
Database Integration
Configuration File Processing
Advanced Exploitation Scenarios
Multi-Stage Command Injection
Information Gathering Chain
Data Exfiltration Chain
Command Injection in Chained Applications
Application Pipeline Exploitation
Microservice Command Injection
Privilege Escalation via Command Injection
SUID Binary Exploitation
Container Escape Scenarios
Command Injection in Modern Applications
Cloud and Container Environments
Kubernetes Command Injection
Serverless Function Injection
CI/CD Pipeline Injection
Build Script Injection
Docker Build Injection
Language-Specific Command Injection
PHP Command Injection
Common Vulnerable Patterns
PHP-Specific Techniques
Python Command Injection
Common Vulnerable Patterns
Python-Specific Techniques
Node.js Command Injection
Common Vulnerable Patterns
Node.js-Specific Techniques
Java Command Injection
Common Vulnerable Patterns
Java-Specific Techniques
Advanced Payload Techniques
Polyglot Command Injection
Multi-Context Payloads
Time-Based Polyglot
Encoded Payload Techniques
Multi-Stage Encoding
Dynamic Payload Construction
Anti-Detection Techniques
Steganographic Command Hiding
Traffic Obfuscation
Timing Attack Obfuscation
Last updated
Was this helpful?