My own technique for web sec
- Understanding
- User Input
- Output / Blind
- Escaping / Evasion
- Fuzzing
Understanding
https://www.php.net/manual/en/ref.exec.php
User Input
$_GET / $_POST
Output / Blind
uname -a // showing output
nc // not showing output
Escaping / Evasion
Web for Pentester - Command Execution
Fuzzing Automated test
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Command%20Injection