Bypassing Blacklisted Commands
Overview
Understanding Command Blacklists
Basic Command Blacklist Filter
$blacklist = ['whoami', 'cat', 'ls', 'id', 'pwd', ...];
foreach ($blacklist as $word) {
if (strpos($_POST['ip'], $word) !== false) {
echo "Invalid input";
}
}Testing for Command Blacklists
Cross-Platform Obfuscation Techniques
Quote Injection (Linux & Windows)
HTB Academy Lab Example
Linux-Only Obfuscation Techniques
Backslash Escaping
Positional Parameter ($@)
Combined Linux Techniques
Windows-Only Obfuscation Techniques
Caret Character (^)
HTB Academy Lab Solution
Challenge: Command Blacklist Bypass
Step-by-Step Solution
Lab Answer Format
Advanced Obfuscation Examples
File Reading Techniques
Directory Listing Techniques
Detection & Testing Methodology
1. Identify Blacklisted Commands
2. Test Obfuscation Methods
3. Character Combination
Practical Applications
1. Web Application Testing
2. Automated Obfuscation
Key Takeaways
β
Universal Techniques
π― Platform-Specific
π§ Best Practices
Last updated