🌐
Fastly
fastly.com › blog › back-to-basics-os-command-injection
Back to Basics: OS Command Injection | Fastly
September 26, 2025 - It’s also using a blind command injection technique in that it does not rely on retrieving output from the command in order to detect the injection. First, the payload uses the & metacharacter to execute the second command while the first command runs in the background. The payload contains the ping command with the -c flag which tells ping to send 25 packets, one every second.
🌐
PortSwigger
portswigger.net › web-security › os-command-injection
What is OS command injection, and how to prevent it? | Web Security Academy
This command causes the application to ping its loopback network adapter for 10 seconds. You can redirect the output from the injected command into a file within the web root that you can then retrieve using the browser.
Discussions

What does this do? [Java deserialization Command Injection]
ASP.net with a Java vuln? I dont think so. If what you're saying is true then the deserialization happens elsewhere in the backend, not in the .net application. If you can ping via RCE that should be sufficient for the report, no need to actually gain a shell More on reddit.com
🌐 r/bugbounty
3
0
October 29, 2023
How is this PHP script vulnerable to command injection?
From the top of my head, setting $ip to ;echo More on reddit.com
🌐 r/Hacking_Tutorials
19
185
September 27, 2022
An ACT plugin show ping and pkt loss

Hmm...

Damn NA server move!

More on reddit.com
🌐 r/ffxiv
70
96
November 19, 2017
NETCODE & DLL INJECTION & PING

We understand it all. Because it harms everyone and nobody wins in such conditions

More on reddit.com
🌐 r/EscapefromTarkov
23
0
August 18, 2016
People also ask

How to detect command injection?
Dynamic application security testing (DAST) tools are the best way to detect command injection vulnerabilities in web applications. They provide the best coverage and some of them, like Invicti, are able to prove that the vulnerability is real and not a false positive. · Find out more about dynamic application security testing (DAST).
🌐
invicti.com
invicti.com › learn › os-command-injection
OS Command Injection
What is OS command injection?
OS command injection is a vulnerability that lets a malicious hacker trick an application into executing operating system commands. OS command injection is also known as command injection or shell injection. · Read an article that explains command injection in detail.
🌐
invicti.com
invicti.com › learn › os-command-injection
OS Command Injection
How to prevent OS command injection?
The best way to prevent OS command injection is to follow secure coding practices. One of them is to use filtering for all user input and apply context-sensitive output encoding to input data controlled by the user. · Read more about fostering secure coding practices.
🌐
invicti.com
invicti.com › learn › os-command-injection
OS Command Injection
🌐
CTF Handbook
ctf101.org › web-exploitation › command-injection › what-is-command-injection
Command Injection - CTF Handbook
Command Injection is a vulnerability that allows an attacker to submit system commands to a computer running a website. This happens when the application fails to encode user input that goes into a system shell. It is very common to see this vulnerability when a developer uses the system() ...
🌐
GitHub
github.com › swisskyrepo › PayloadsAllTheThings › blob › master › Command Injection › README.md
PayloadsAllTheThings/Command Injection/README.md at master · swisskyrepo/PayloadsAllTheThings
In the above code, the PHP script ... 8.8.8.8; cat /etc/passwd, the actual command that gets executed would be: ping -c 4 8.8.8.8; cat /etc/passwd....
Author   swisskyrepo
🌐
Hackviser
hackviser.com › command injection
Command Injection Attack Guide | Hackviser
# Linux delay commands ping -c 10 127.0.0.1 # 10 second delay using ping sleep 10 # Direct delay command perl -e "sleep 10" # Perl based delay python -c "import time; time.sleep(10)" # Python delay # Windows delay commands ping -n 10 127.0.0.1 # Windows ping delay timeout 10 # Windows timeout command Start-Sleep -s 10 # PowerShell sleep · To learn how to use Nuclei in detail, you can go to our related tactic page by click here. # Run command injection templates nuclei -u http://target.com -t cmd-injection/ # Run with custom templates nuclei -u http://target.com -t custom-cmd.yaml # Severity based scanning nuclei -u http://target.com -t cmd-injection/ -severity critical,high
🌐
Cobalt
cobalt.io › blog › introduction-to-command-injection-vulnerability
Introduction to Command Injection Vulnerability
October 3, 2024 - Using an injected command that ... to respond. This can be accomplished using the ping command, which allows you to specify how many ICMP packets to send....
🌐
Medium
medium.com › csg-govtech › a-simple-os-command-injection-challenge-5acf92799f74
A “Simple” OS Command Injection Challenge | by Eileen Tay | CSG @ GovTech | Medium
October 29, 2020 - Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. The application was a simple PHP ping webpage that accepts IP addresses utilising an underlying ...
Find elsewhere
🌐
HackerOne
hackerone.com › ethical-hacker › how-command-injections
Command Injection Vulnerabilities
July 7, 2017 - The script will now execute the command ping -c 4 8.8.8.8 && sleep 5. Notice the execution time again: it jumped from ~3 seconds to ~8 seconds, which is an increase of exactly 5 seconds. There can still be unexpected delays on the internet, so it’s important to repeat the injection and play with the amount of seconds to make sure it’s not a false positive.
🌐
Securecodewarrior
securecodewarrior.com › guidelines › command-injection
Command Injection
So, as a quick refresher, Command Injection vulnerabilities occur when user input uses part of an operating system command, like the following function: If a user provides the IP address, we’ll use `8.8.8.8` as an example, the command that gets executed will be `ping 8.8.8.8`, which does exactly what one would expect.
🌐
Invicti
invicti.com › learn › os-command-injection
OS Command Injection
Pinging 8.8.8.8 with 32 bytes of ... (...) In the case of OS command injection vulnerabilities, the attacker is able to execute operating system commands with the privileges of the vulnerable application....
🌐
Security Innovation
blog.securityinnovation.com › how-to-test-for-command-injection-v2
How to Test for Command Injection v2
November 4, 2020 - 64 bytes from localhost (127.0.0.1): icmp_seq=1 ttl=64 time=0.031 ms --- localhost ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.031/0.031/0.031/0.000 ms · The output when the test string ;echo COMMAND INJECTION IS PRESENT; is passed to the script looks like this:
🌐
GitHub
github.com › swisskyrepo › PayloadsAllTheThings › tree › master › Command Injection
PayloadsAllTheThings/Command Injection at master · swisskyrepo/PayloadsAllTheThings
In the above code, the PHP script ... 8.8.8.8; cat /etc/passwd, the actual command that gets executed would be: ping -c 4 8.8.8.8; cat /etc/passwd....
Author   swisskyrepo
🌐
PortSwigger
portswigger.net › support › using-burp-to-test-for-os-command-injection-vulnerabilities
Using Burp to Test for OS Command Injection Vulnerabilities - PortSwigger
You can normally use the ping command as a means of triggering a time delay by causing the server to ping its loopback interface for a specific period. There are minor differences between how Windows and UNIX-based platforms handle command separators and the ping command.
🌐
GitBook
viperone.gitbook.io › pentest-everything › everything › everything-web › command-injection
Command Injection | Pentest Everything - GitBook
The semicolon in Linux / Unix is used to run a command directly after another. Command injection can potentially be abused to run the required input then a semicolon can be used to execute a trailing command. Below the IP was pinged then a semicolon used to execute two commands one after another.
🌐
Infosec Institute
infosecinstitute.com › resources › secure-coding › command-injection-vulnerabilities-exploitation-case-study
Command Injection Vulnerabilities Exploitation Case Study
In the real world, Command injection vulnerabilities may not always be found that easily. They often require completing the existing command and adding additional commands by using a command separator. Let us consider the following example. ... As we can notice in the preceding code snippet, the application takes an IP address as input and appends it to ping -c 4 command on a Linux host.
🌐
Exploit-DB
exploit-db.com › exploits › 41499
NetGain Enterprise Manager 7.2.562 - 'Ping' Command Injection - JSP webapps Exploit
February 23, 2017 - https://www.owasp.org/index.php/Command_Injection Vulnerable Menu: =========================================================================== [+] Tools – Ping Proof of Concept: =========================================================================== POST /u/jsp/tools/exec.jsp HTTP/1.1 Host: 192.168.0.13:8081 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:18.0) Gecko/20100101 Firefox/18.0 Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Referer: http://19
🌐
Samsclass
attack3214.samsclass.info › ping.htm
Ping Command Injection Challenge
May 4, 2018 - The form below lets you send pings to a remote host.
🌐
Invicti
invicti.com › blog › web-security › command-injection-vulnerability
What is the command injection vulnerability?
August 14, 2016 - 64 bytes from 127.0.0.1: icmp_seq=1 ttl=64 time=0.023 ms 64 bytes from 127.0.0.1: icmp_seq=2 ttl=64 time=0.074 ms 64 bytes from 127.0.0.1: icmp_seq=3 ttl=64 time=0.074 ms 64 bytes from 127.0.0.1: icmp_seq=4 ttl=64 time=0.072 ms 64 bytes from 127.0.0.1: icmp_seq=5 ttl=64 time=0.037 ms--- 127.0.0.1 ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 3999ms rtt min/avg/max/mdev = 0.023/0.056/0.074/0.021 ms uid=0(root) gid=0(root) groups=0(root) During an OS command injection attack, the attacker can also set up an error-based attack.
🌐
Rangeforce
rangeforce.com › blog › how-to-prevent-blind-command-injection
How to Prevent Blind Command Injection
July 26, 2021 - However, if the inputIpAddress is $(sleep 5; echo 8.8.8.8), then the command will look like this: ping $(sleep 5; echo 8.8.8.8), and after the $() expression evaluates (which will take 5 seconds), then the evaluated command will look like this: ping 8.8.8.8. Of course, if $() doesn’t work (because of blacklisting, for example), we can also try to inject ;sleep 5 or `sleep 5` or…
🌐
Nature
nature.com › scientific reports › articles › article
Detecting command injection attacks in web applications based on novel deep learning methods | Scientific Reports
July 7, 2025 - An attacker could exploit this by crafting a malicious command injection, thereby executing the attack. In the above example, the attacker uses logical operators “ &&” in the address parameter to stitch the address parameter and ls commands ...