In this scenario we will utilize a command injection vulnerability to obtain a linux reverse shell prompt on the victim webserver. The command injection vulnerability we will be using has been demonstrated in a previous blog post found here. Before we do this, we will need a some kind of shell script or command to […]