From f12a49410b021f7330bbaee08fbe59b374d7dbe5 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=C4=B0smail=20Ta=C5=9Fdelen?= Date: Sat, 3 Nov 2018 14:57:21 -0400 Subject: [PATCH] Update README.md --- README.md | 14 ++++++++++++++ 1 file changed, 14 insertions(+) diff --git a/README.md b/README.md index a2e12e5..9481bf7 100644 --- a/README.md +++ b/README.md @@ -559,12 +559,26 @@ $(`whoami`) ``` #### References : +###### Testing for Command Injection (OTG-INPVAL-013) + +* 👉 https://www.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013) + +###### OWASP Command Injection + * 👉 https://www.owasp.org/index.php/Command_Injection +###### WE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') + * 👉 http://cwe.mitre.org/data/definitions/77.html +###### WE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection' + * 👉 http://cwe.mitre.org/data/definitions/78.html +###### Portswigger Web Security - OS Command Injection + +* 👉 https://portswigger.net/kb/issues/00100100_os-command-injection + ### Cloning an Existing Repository ( Clone with HTTPS ) ``` root@ismailtasdelen:~# git clone https://github.com/ismailtasdelen/command-injection-payload-list.git