Back to Browse

Command Injection - Lab #3 Blind OS command injection with output redirection | Short Version

21.9K views
Jun 26, 2022
7:48

In this video, we cover Lab #3 in the Command Injection module of the Web Security Academy. This lab contains a blind OS command injection vulnerability in the feedback function. The application executes a shell command containing the user-supplied details. The output from the command is not returned in the response. However, you can use output redirection to capture the output from the command. There is a writable folder at: /var/www/images/. The application serves the images for the product catalog from this location. You can redirect the output from the injected command to a file in this folder, and then use the image loading URL to retrieve the contents of the file. To solve the lab, we execute the whoami command and retrieve the output. ▬ 🔗 Links 🔗 ▬▬▬▬▬▬▬▬▬▬ Lab #3 long video: https://www.youtube.com/watch?v=Gf2_UWsYrpM&feature=youtu.be&ab_channel=RanaKhalil Notes.txt document: https://github.com/rkhal101/Web-Security-Academy-Series/blob/main/command-injection/lab-03/notes.txt Web Security Academy Exercise Link: https://portswigger.net/web-security/os-command-injection/lab-blind-output-redirection Rana's Twitter account: https://twitter.com/rana__khalil

Download

1 formats

Video Formats

360pmp411.3 MB

Right-click 'Download' and select 'Save Link As' if the file opens in a new tab.

Command Injection - Lab #3 Blind OS command injection with output redirection | Short Version | NatokHD