🌐
PortSwigger
portswigger.net › web-security › os-command-injection › lab-simple
Lab: OS command injection, simple case | Web Security Academy
This lab contains an OS command injection vulnerability in the product stock checker. The application executes a shell command containing user-supplied ...
🌐
INE
ine.com › blog › command-injection
Lab Walkthrough - Command Injection | INE Internetwork Expert
August 12, 2022 - In this lab, we will learn how a vulnerable lambda function can be leveraged to perform a privileged operation. Objective: Identify the command Injection vulnerability, leverage it to get hold of temporary access credentials and interact with ...
🌐
Awsworkshop
trendmicro-appsec.awsworkshop.io › 30_lambda › 44_command_injection.html
Command Injection :: Self Guided Lab - DevSecOps
HTTP Params: Application Security will detect HTTP GET or POST parameters that result verbatim into a remote command execution in a code location executed during the request.
🌐
PortSwigger
portswigger.net › web-security › os-command-injection
What is OS command injection, and how to prevent it? | Web Security Academy
If you're familiar with the basic concepts behind OS command injection vulnerabilities and want to practice exploiting them on some realistic, deliberately vulnerable targets, you can access labs in this topic from the link below.
🌐
PortSwigger
portswigger.net › web-security › os-command-injection › lab-blind-time-delays
Lab: Blind OS command injection with time delays | Web Security Academy
This lab contains a blind OS command injection vulnerability in the feedback function. The application executes a shell command containing the user-supplied ...
🌐
YouTube
youtube.com › rana khalil
Command Injection - Lab #1 OS command injection, simple case | Long Version - YouTube
In this video, we cover Lab #1 in the Command Injection module of the Web Security Academy. This lab contains an OS command injection vulnerability in the pr...
Published   June 12, 2022
Views   12K
🌐
GitHub
github.com › meltingscales › command-injection-simple
GitHub - meltingscales/command-injection-simple: simple lab to teach devs about command injection
An educational lab demonstrating command injection vulnerabilities using a simple sleep timer implemented in PHP.
Author   meltingscales
🌐
Pluralsight
pluralsight.com › labs › aws › web-attacks-command-injection
Web Attacks: Command Injection
In this lab, you'll practice command injection web attacks. When you're finished, you'll know how to identify and exploit command injection web attacks.
🌐
101Labs
101labs.net › comptia-security › lab-87-owasp-a1-os-command-injection
Lab 87 – OWASP A1 - OS Command Injection - 101Labs.net
February 20, 2025 - This lab will be covering topic A1 of the OWASP Top 10 – Injection. Considering that we have covered SQL Injection in another lab, in this lab, we will be looking at Command Injection and how it works.
Find elsewhere
🌐
GitHub
github.com › PhoenixCatalan › os-command-injection-lab
GitHub - PhoenixCatalan/os-command-injection-lab: 💣 Vulnerable Node.js app to demonstrate OS Command Injection
This lab simulates a real-world vulnerability where a user-controlled field (image format) is directly used in a system command via exec(), opening the door to arbitrary command execution on the server.
Author   PhoenixCatalan
🌐
Securium Solutions
securiumsolutions.com › home › os command injection: step-by-step lab guide
OS Command Injection: Step-by-Step Lab Guide - Securium Solutions
March 27, 2025 - Learn OS command injection with this step-by-step PortSwigger lab guide. Master blind injection techniques and secure your apps!
🌐
PortSwigger
portswigger.net › burp › documentation › desktop › testing-workflow › input-validation › command-injection › testing
Testing for OS command injection vulnerabilities - PortSwigger
December 16, 2025 - Use Burp Repeater to manually test for OS command injection vulnerabilities. You can follow this process using the lab OS command injection, simple case.
🌐
Ranakhalil
academy.ranakhalil.com › courses › 2459901 › lectures › 52040471
Lab #1 OS command injection, simple case | Rana Khalil's Academy
This lab contains an OS command injection vulnerability in the product stock checker. The application executes a shell command containing user-supplied product and store IDs, and returns the raw output from the command in its response.
🌐
Medium
medium.com › @smile09 › portswigger-os-command-injection-lab-os-command-injection-simple-case-83d1fac0c8fe
PortSwigger | OS command injection | Lab: OS command injection, simple case | by Smile09 | Medium
February 12, 2024 - Let’s try injecting a command into the second parameter, ‘storeId,’ to display the OS name. This time, we will use the Linux command ‘uname -a’. ... The result of the response displays the name of the system OS, the OS used is indeed Linux. Finally, we not only completed this lab but also managed to find out the type of OS used.
🌐
GitHub
securitylab.github.com › advisories › GHSL-2020-122-rce-git-diff-apply
GHSL-2020-122: Command injection in git-diff-apply | GitHub Security Lab
June 24, 2020 - / Security Lab · Research Advisories CodeQL Wall of Fame · Resources · Open Source Community Enterprise Events Get Involved · June 24, 2020 · Kevin Backhouse · The diff function has a command injection vulnerability. Clients of the git-diff-apply library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.
🌐
Medium
medium.com › @frank.leitner › writeup-os-command-injection-simple-case-portswigger-academy-f7beb3da7b9f
Writeup: OS command injection, simple case @ PortSwigger Academy | by Frank Leitner | Medium
November 20, 2022 - It is the usual showfront application known from previous labs. The new item here is the ability to check the availability of a product in different stores around the world: ... The request contains two parameter, productID and storeID, and returns a number as plain text in the response. Lets send the request to the repeater and see how it goes. As we have two parameter, I try to inject in both with different commands.
🌐
GitHub
github.com › topics › command-injection
command-injection · GitHub Topics · GitHub
education lfi rfi command-injection cmd-injection-vulns lfi-labs rfi-labs · Updated · Apr 8, 2024 · PHP · Star 330 · Local File Inclusion discovery and exploitation tool · python3 web-application penetration-testing pentesting exploitation lfi rfi command-injection remote-file-inclusion remote-code-execution lfi-exploitation local-file-inclusion ·
🌐
Medium
medium.com › infosecmatrix › 4-1-lab-os-command-injection-simple-case-2023-8d2779f526dc
4.1 Lab: OS command injection, simple case | 2023 | by Karthikeyan Nagaraj | Infosec Matrix | Medium
December 4, 2023 - 4.1 Lab: OS command injection, simple case | 2023 To solve the lab, execute the whoami command to determine the name of the current user | Karthikeyan Nagaraj PDescription This lab contains an OS …