📄️ Lab 1 - Simple Command Injection
Step-by-step writeup for PortSwigger’s OS Command Injection (Simple Case) lab. Learn how to exploit command injection via the storeId parameter using payloads like `1 & whoami` to reveal the current system user.
📄️ Lab 2 - Blind Command Injection: Time Delays
Detailed writeup for PortSwigger’s Blind OS Command Injection lab with time delays. Learn how to exploit command injection via the email parameter using time-based payloads like `& ping -c 10 127.0.0.1 ||` to confirm execution on the server.
📄️ Lab 3 - Blind Command Injection: Output Redirection
Step-by-step PortSwigger Blind OS Command Injection lab writeup using output redirection. Exploit the email parameter to inject commands like `& whoami > /var/www/images/whoami.txt ||`, redirect output into a file, and retrieve execution results from the server.