Note This write-up is still in its early development phase.
Intro TBD. Note Be sure to set the DVWA Security setting to Low before starting the challenge.
About Command Injection
According to the OWASP definition, command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. In this attack, the attacker-supplied operating system commands are usually executed with the privileges of the vulnerable application. Command injection attacks are possible largely due to insufficient input validation.
Information Gathering & Analysis
http://www.fuzzysecurity.com/tutorials/4.html https://pentestlab.blog/2012/12/19/command-execution-dvwa/ http://www.computersecuritystudent.com/SECURITY_TOOLS/DVWA/DVWAv107/lesson2/index.html http://www.computersecuritystudent.com/SECURITY_TOOLS/DVWA/DVWAv107/lesson3/index.html http://www.computersecuritystudent.com/SECURITY_TOOLS/DVWA/DVWAv107/lesson4/index.html https://www.owasp.org/index.php/Command_Injection