Feb 28 · 4 min read · A Command Injection Investigation | LetsDefend SOC Lab Today’s alert immediately caught my attention: Whoami Command Detected in Request Body At first glance, it may look like a harmless Linux command
Join discussion
Dec 31, 2025 · 2 min read · The Mission: Decoding the Drone Disturbance The town's drone scheduler started behaving erratically, receiving strange, unusually long HTTP requests containing Base64 chunks. The goal for this "Boss Rush" stage was to act as a Blue Teamer (defender) ...
Join discussion
Oct 2, 2025 · 1 min read · Vulnerability Command injection vulnerability exists in index.php of pfBlockerNG. Host header, which is user input, is entered into exec. <?php /* index.php pfBlockerNG (DNSBL) Copyright (c) 2015-2016 BBcan177@gmail.com All rights re...
Join discussionAug 30, 2025 · 3 min read · 📝 Quick Summary: Commix is an open-source penetration testing tool written in Python that automates the detection and exploitation of command injection vulnerabilities. It allows security professionals and researchers to identify and exploit command...
Join discussionJul 25, 2025 · 2 min read · Scenario You are contracted to perform a penetration test for a company, and through your pentest, you stumble upon an interesting file manager web application. As file managers tend to execute system commands, you are interested in testing for comma...
Join discussion
Jul 18, 2025 · 7 min read · The Chill Hack machine on TryHackMe is an easy-level CTF focused on web exploitation, privilege escalation, and creative command injection techniques. The challenge starts with a seemingly harmless website, but deeper inspection reveals vulnerable PH...
Join discussion
Jun 8, 2025 · 5 min read · We should now have a solid understanding of how command injection vulnerabilities occur and how certain mitigations like character and command filters may be passed. This section will discuss methods we can use to prevent command injection vulnerabil...
Join discussionMar 28, 2025 · 4 min read · Injections vulnerabilities are considered the number 3 risk in OWASP’s Top 10 Web App Risks, given their high impact and how common they are. Injection occurs when user-controlled input is misinterpreted as part of the web query or code being execute...
Join discussion