Command injections
1 h 45 min
One of the scariest places where an injection vulnerability can hit is operating system commands. The consequence is almost always the complete takeover of the server by the attacker. However, these vulnerabilities are quite often found when an application uses command-line tools behind the scenes.
Ready to become an ethical hacker?
Start today.
As a member of Hakatemia you get unlimited access to Hakatemia modules, exercises and tools, and you get access to the Hakatemia Discord channel where you can ask for help from both instructors and other Hakatemia members.