In this room, we’re going to be covering the web vulnerability that is command injection. Once we understand what this vulnerability is, we will then showcase its impact and the risk it imposes on an application.

Task1: Introduction (What is Command Injection?)

Task2: Discovering Command Injection

Task3: Exploiting Command Injection

Task4: Remediating Command Injection

Task5: Practical: Command Injection (Deploy)