{"id":3898,"date":"2015-04-04T04:21:39","date_gmt":"2015-04-03T20:21:39","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3898"},"modified":"2015-09-09T19:36:39","modified_gmt":"2015-09-09T11:36:39","slug":"commix-command-injection-attack-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2015\/04\/commix-command-injection-attack-tool\/","title":{"rendered":"Commix – Command Injection Attack Tool"},"content":{"rendered":"

Commix (short for [comm]and [i]njection e[x]ploiter) has a simple environment and it can be used by web developers, penetration testers or even security researchers to test web applications with the view to find bugs, errors or vulnerabilities related to command injection attacks.<\/p>\n

\"Commix<\/p>\n

By using this command injection attack tool, it is very easy to find and exploit a command injection vulnerability in a certain vulnerable parameter or string.<\/p>\n

Commix is written in Python programming language.<\/p>\n

Usage<\/h3>\n