Sept. 15, 2023, 4 p.m. | The Cyber Mentor

The Cyber Mentor www.youtube.com

In Today's Video, Alex will guide you on how to exploit Command Injection! While not the most common vulnerability, Command Injection is still a very dangerous vulnerability. Command Injection surfaces when untrusted input is passed into a function that executes that input as code.

00:00 Intro
00:46 Primer
03:40 Code review
06:56 Labs
12:56 Outro

#commandinjection #evalisevil

Pentests & Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com
Sponsorship Inquiries: info@thecybermentor.com

📱Social Media📱
___________________________________________
Twitter: https://twitter.com/thecybermentor
Twitch: https://www.twitch.tv/thecybermentor …

alex code code review command command injection exploit function guide injection input labs review today untrusted video vulnerability

Principal - Cyber Risk and Assurance - Infra/Network

@ GSK | Bengaluru Luxor North Tower

Staff Security Engineer

@ Airwallex | AU - Melbourne

Chief Information Security Officer

@ Australian Payments Plus | Sydney, New South Wales, Australia

TW Test Automation Engineer (Access Control & Intrusion Systems)

@ Bosch Group | Taipei, Taiwan

Consultant infrastructure sécurité H/F

@ Hifield | Sèvres, France

SOC Analyst

@ Wix | Tel Aviv, Israel