Tweet

Command Injection Example

If the application supports commands to be executed, then the the remote attacker try to pass the command in the form POST method or GET request to check whether the application is vulnerable to command injection or not

Ping Statistics Without Command Execution
Ping