Command injection — filtering bypass [on hold]
I am testing a python script that provides a ping function
os.system(‘ping ‘ + command)
all of this characters are filtered
‘&’, ‘;’, ‘-‘, ‘`’ , ‘||’, ‘|’
i can’t use null bytes like %0A i’m passing arguments scri… Continue reading Command injection — filtering bypass [on hold]