From 2e9ae87d6093070e9285f47cc5e146bd1d2c2a74 Mon Sep 17 00:00:00 2001 From: Mehdi Date: Thu, 22 Aug 2024 13:08:52 +0330 Subject: [PATCH] Update Command Injection.md --- Command Injection.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/Command Injection.md b/Command Injection.md index f0de014..4b71e28 100644 --- a/Command Injection.md +++ b/Command Injection.md @@ -240,7 +240,11 @@ Here are the top 25 parameters that could be vulnerable to code injection and si ``` * Example ```bash +# method 1 cat target_all_url.txt | grep -E "?print=|?run=|?payload=|?module=|?exe=|?feature=|?req=|?function=|?read=|?step=|?process=|?load=|?option=|?arg=|?func=|?do=|?reg=|?code=|?jump=|?query=|?ping=|?execute=|?command=|?exec=|?cmd=" + +# method 2 +grep -F -f command-injection-params.txt all-urls.txt ``` ### Command Injection/Execution ```bash