Course
In this exercise, we dive into a Python application to explore command injection vulnerabilities. By manipulating input data, we demonstrate how to achieve code execution and retrieve valuable information.
Skills covered
Injection
Operating System
CWE-20, CWE-95
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.