OS Command Injection
Testing for OS Command Injection example
# Below is an example of a specific scenario.
# Visit the page at:
http://192.168.209.189:8000/
# You will see that we are allowed to run the 'git clone repo_url' command.
# For tring, Run any git clone command
git clone https://github.com/gouravkhator/temp-git.git
# Intercept the request using burp suite.
# See if your request worked successfully or not.
# In my case i am seeing that value is passed using variable named "Archive="
# We can experiment using burp suite or curl.
# I know how to use burp or i will use curl command.

Checking which is underlying OS.
Blind Command Injection
Last updated
