By the end of this lab exercise, you will be able to:
● Understand how command injection vulnerabilities arise in web applications.
● Identify and exploit command injection points on the Metasploitable server (IP: 192.168.1.5) from the Kali-Attacker machine (IP: 192.168.1.8).
● Use command injection techniques to gather system-level information from the vulnerable server.
In this exercise, you will:
● Explore the concept of command injection, where user input is improperly handled and executed as system commands.
● Execute safe commands (e.g., whoami, uname -a, ifconfig) to gather system information.
● Understand how attackers can escalate privileges or pivot within a network using command injection.