PortSwigger
portswigger.net › web-security › os-command-injection › lab-simple
Lab: OS command injection, simple case | Web Security Academy
This lab contains an OS command injection vulnerability in the product stock checker. The application executes a shell command containing user-supplied ...
Videos
07:49
Command Injection - Lab #3 Blind OS command injection with output ...
07:16
Command Injection - Lab #5 Command injection with out-of-band data ...
06:17
Command Injection - Lab #4 Blind OS command injection with ...
21:44
Command Injection - Lab #2 Blind OS command injection with time ...
05:55
Command Injection - Lab #1 OS command injection, simple case | ...
Awsworkshop
trendmicro-appsec.awsworkshop.io › 30_lambda › 44_command_injection.html
Command Injection :: Self Guided Lab - DevSecOps
HTTP Params: Application Security will detect HTTP GET or POST parameters that result verbatim into a remote command execution in a code location executed during the request.
PortSwigger
portswigger.net › web-security › os-command-injection
What is OS command injection, and how to prevent it? | Web Security Academy
If you're familiar with the basic concepts behind OS command injection vulnerabilities and want to practice exploiting them on some realistic, deliberately vulnerable targets, you can access labs in this topic from the link below.
PortSwigger
portswigger.net › web-security › os-command-injection › lab-blind-time-delays
Lab: Blind OS command injection with time delays | Web Security Academy
This lab contains a blind OS command injection vulnerability in the feedback function. The application executes a shell command containing the user-supplied ...
YouTube
youtube.com › rana khalil
Command Injection - Lab #1 OS command injection, simple case | Long Version - YouTube
In this video, we cover Lab #1 in the Command Injection module of the Web Security Academy. This lab contains an OS command injection vulnerability in the pr...
Published June 12, 2022 Views 12K
GitHub
github.com › meltingscales › command-injection-simple
GitHub - meltingscales/command-injection-simple: simple lab to teach devs about command injection
An educational lab demonstrating command injection vulnerabilities using a simple sleep timer implemented in PHP.
Author meltingscales
Pluralsight
pluralsight.com › labs › aws › web-attacks-command-injection
Web Attacks: Command Injection
In this lab, you'll practice command injection web attacks. When you're finished, you'll know how to identify and exploit command injection web attacks.
GitHub
github.com › PhoenixCatalan › os-command-injection-lab
GitHub - PhoenixCatalan/os-command-injection-lab: 💣 Vulnerable Node.js app to demonstrate OS Command Injection
This lab simulates a real-world vulnerability where a user-controlled field (image format) is directly used in a system command via exec(), opening the door to arbitrary command execution on the server.
Author PhoenixCatalan
PortSwigger
portswigger.net › burp › documentation › desktop › testing-workflow › input-validation › command-injection › testing
Testing for OS command injection vulnerabilities - PortSwigger
December 16, 2025 - Use Burp Repeater to manually test for OS command injection vulnerabilities. You can follow this process using the lab OS command injection, simple case.
GitHub
github.com › frank-leitner › portswigger-websecurity-academy › blob › main › 04-os_command_injection › OS_command_injection,_simple_case › README.md
portswigger-websecurity-academy/04-os_command_injection/OS_command_injection,_simple_case/README.md at main · frank-leitner/portswigger-websecurity-academy
Learning path: Server-side topics → OS command injection · Lab-Link: https://portswigger.net/web-security/os-command-injection/lab-simple Difficulty: APPRENTICE Python script: script.py
Author frank-leitner
Medium
medium.com › @smile09 › portswigger-os-command-injection-lab-os-command-injection-simple-case-83d1fac0c8fe
PortSwigger | OS command injection | Lab: OS command injection, simple case | by Smile09 | Medium
February 12, 2024 - Let’s try injecting a command into the second parameter, ‘storeId,’ to display the OS name. This time, we will use the Linux command ‘uname -a’. ... The result of the response displays the name of the system OS, the OS used is indeed Linux. Finally, we not only completed this lab but also managed to find out the type of OS used.
GitHub
securitylab.github.com › advisories › GHSL-2020-122-rce-git-diff-apply
GHSL-2020-122: Command injection in git-diff-apply | GitHub Security Lab
June 24, 2020 - / Security Lab · Research Advisories CodeQL Wall of Fame · Resources · Open Source Community Enterprise Events Get Involved · June 24, 2020 · Kevin Backhouse · The diff function has a command injection vulnerability. Clients of the git-diff-apply library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.
Medium
medium.com › @frank.leitner › writeup-os-command-injection-simple-case-portswigger-academy-f7beb3da7b9f
Writeup: OS command injection, simple case @ PortSwigger Academy | by Frank Leitner | Medium
November 20, 2022 - It is the usual showfront application known from previous labs. The new item here is the ability to check the availability of a product in different stores around the world: ... The request contains two parameter, productID and storeID, and returns a number as plain text in the response. Lets send the request to the repeater and see how it goes. As we have two parameter, I try to inject in both with different commands.
GitHub
github.com › topics › command-injection
command-injection · GitHub Topics · GitHub
education lfi rfi command-injection cmd-injection-vulns lfi-labs rfi-labs · Updated · Apr 8, 2024 · PHP · Star 330 · Local File Inclusion discovery and exploitation tool · python3 web-application penetration-testing pentesting exploitation lfi rfi command-injection remote-file-inclusion remote-code-execution lfi-exploitation local-file-inclusion ·