Course
In this exercise, we dive into a Python application to explore command injection vulnerabilities. By manipulating input data, we demonstrate how to achieve code execution and retrieve valuable information.
Skills covered
Injection
Operating System
CWE-20, CWE-95
Included with PRO
Full course content
2 videos
Common mistakes
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.