Lab #1 OS command injection, simple case

In this video, we cover Lab #1 in the Command Injection module of the Web Security Academy. This lab contains an OS command injection vulnerability in the product stock checker. The application executes a shell command containing user-supplied product and store IDs, and returns the raw output from the command in its response. To solve the lab, we execute the whoami command to determine the name of the current user.

▬ 🔗 Links 🔗 ▬▬▬▬▬▬▬▬▬▬

Python script: https://github.com/rkhal101/Web-Security-Academy-Series/blob/main/command-injection/lab-01/command-injection-lab-01.py

Notes.txt document: https://github.com/rkhal101/Web-Security-Academy-Series/blob/main/command-injection/lab-01/notes.txt

Web Security Academy Exercise Link: https://portswigger.net/web-security/os-command-injection/lab-simple

Rana's Twitter account: https://twitter.com/rana__khalil

Complete and Continue