Here I will kick off my section on hacking web applications. This section will be more like the reverse engineering section, and not like the x86-32 linux or linux kernel hacking sections, in that it will not be laid out in a course format and will instead include single tutorials for certain applications or situations.
This tutorial will be regarding the first challenge in the
Pentesting Challenges section of the Pentester Academy website. It is a virtualbox virtual machine labelled
Command Injection ISO. This virtual machine has been loaded with a number of web applications that are vulnerable to command injection.