OS Command Injection

OS Command Injection attacks occur when the hacker attempts to execute system level commands through a vulnerable web application. A�These high impact server/application injections help the hacker to bypass administrator privileges and execute malicious OS commands. Just like SQL injections, OS Command injections can be blind or error-based.

Meta-characters (&, |, /;) are usually used to merge commands and create malicious OS Command Injections, that can be used to exploit vulnerable applications.

Read More

 

The following two tabs change content below.

Dina Shkolnik

Latest posts by Dina Shkolnik (see all)

Jump to Category