Skip to Main Content
Hands-On Application Penetration Testing with Burp Suite
book

Hands-On Application Penetration Testing with Burp Suite

by Carlos A. Lozano, Dhruv Shah, Riyaz Ahemed Walikar
February 2019
Beginner to intermediate content levelBeginner to intermediate
366 pages
7h 49m
English
Packt Publishing
Content preview from Hands-On Application Penetration Testing with Burp Suite

The vulnerability

The command injection vulnerabilities into SQL injections usually occur because the DBMS has a stored procedure or an allowed native option, which interacts directly with the OS. For example, xp_cmdshell on SQL Server, or a specially stored procedure developed in Java for Oracle.

In some cases, it is also possible that the application stores the database strings that are extracted by a query and executed; so, if we can update the database, we could inject a command into the server. However, as I mentioned, this is not a common case.

Once we have detected a vulnerability related to command injection, we can use Burp Suite to exploit it. For example, let's examine the following request from an application:

This request was ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Burp Suite: Web Application Penetration Testing

Burp Suite: Web Application Penetration Testing

Sunil Gupta
Penetration Testing

Penetration Testing

Georgia Weidman
Penetration Testing

Penetration Testing

James Hayes, Nick Furneaux, Jims Marchang, Rob Ellis, Jason Charalambous, Moinuddin Zaki, Peter Taylor, Roderick Douglas, Felix Ryan, Ceri Charlton, Gemma Moore, Tylor Robinson, Sharif Gardner

Publisher Resources

ISBN: 9781788994064OtherErrata PagePurchase Link