Ulli Weichert/ Oktober 26, 2021/ hacking, IT-Security/ 0Kommentare
Useful payloads
Here are some valuable payloads for both Linux & Windows command injection on a vulnerable web-application. Feel free!
Linux
| Payload |
Description |
| whoami |
See what user the application is running under. |
| ls |
List the contents of the current directory. You may be able to find files such as configuration files, environment files (tokens and application keys), and many more valuable things. |
| ping |
This command will invoke the application to hang. This will be useful in testing an application for blind command injection. |
| sleep |
This is another useful payload in testing an application for blind command injection, where the machine does not have ping installed. |
| nc |
Netcat can be used to spawn a reverse shell onto the vulnerable application. You can use this foothold to navigate around the target machine for other services, files, or potential means of escalating privileges. |
Windows
| Payload |
Description |
| whoami |
See what user the application is running under. |
| dir |
List the contents of the current directory. You may be able to find files such as configuration files, environment files (tokens and application keys), and many more valuable things. |
| ping |
This command will invoke the application to hang. This will be useful in testing an application for blind command injection. |
| timeout |
This command will also invoke the application to hang. It is also useful for testing an application for blind command injection if the ping command is not installed. |