<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Hands-on_Command_Injection_Attack</id>
	<title>Hands-on Command Injection Attack - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Hands-on_Command_Injection_Attack"/>
	<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Hands-on_Command_Injection_Attack&amp;action=history"/>
	<updated>2026-04-13T19:02:56Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.4</generator>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=Hands-on_Command_Injection_Attack&amp;diff=70782&amp;oldid=prev</id>
		<title>Onnowpurbo: Created page with &quot; ==Setting Up the Environment:==  ===Install DVWA:===  * Download DVWA ZIP file dari [https://github.com/digininja/DVWA](https://github.com/digininja/DVWA). * Extract ke direc...&quot;</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Hands-on_Command_Injection_Attack&amp;diff=70782&amp;oldid=prev"/>
		<updated>2024-10-14T01:07:45Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot; ==Setting Up the Environment:==  ===Install DVWA:===  * Download DVWA ZIP file dari [https://github.com/digininja/DVWA](https://github.com/digininja/DVWA). * Extract ke direc...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;
==Setting Up the Environment:==&lt;br /&gt;
&lt;br /&gt;
===Install DVWA:===&lt;br /&gt;
&lt;br /&gt;
* Download DVWA ZIP file dari [https://github.com/digininja/DVWA](https://github.com/digininja/DVWA).&lt;br /&gt;
* Extract ke directory di Ubuntu server.&lt;br /&gt;
* Install dependency:&lt;br /&gt;
&lt;br /&gt;
 sudo apt install ap&lt;br /&gt;
 ache2 mysql-server php libapache2-mod-php php-mysql&lt;br /&gt;
&lt;br /&gt;
===Konfigurasi Apache:===&lt;br /&gt;
* Buat file konfigurasi Apache baru (misal, `dvwa.conf`) di `/etc/apache2/sites-available/`.&lt;br /&gt;
* Isi dengan&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;VirtualHost *:80&amp;gt;&lt;br /&gt;
     ServerName dvwa.local&lt;br /&gt;
     DocumentRoot /path/to/dvwa/&lt;br /&gt;
 &lt;br /&gt;
     &amp;lt;Directory /path/to/dvwa/&amp;gt;&lt;br /&gt;
          AllowOverride All&lt;br /&gt;
          Require all granted&lt;br /&gt;
     &amp;lt;/Directory&amp;gt;&lt;br /&gt;
 &amp;lt;/VirtualHost&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Ubah `/path/to/dvwa/` dengan path / directory DVWA.&lt;br /&gt;
* Enable konfigurasi:&lt;br /&gt;
&lt;br /&gt;
 sudo a2ensite dvwa.conf&lt;br /&gt;
&lt;br /&gt;
* Restart Apache:&lt;br /&gt;
&lt;br /&gt;
 sudo systemctl restart apache2&lt;br /&gt;
&lt;br /&gt;
===Konfigurasi MySQL:===&lt;br /&gt;
&lt;br /&gt;
* Buat database DVWA:&lt;br /&gt;
&lt;br /&gt;
 mysql -u root -p&lt;br /&gt;
 CREATE DATABASE dvwa;&lt;br /&gt;
&lt;br /&gt;
* Import DVWA database schema:&lt;br /&gt;
&lt;br /&gt;
 mysql dvwa &amp;lt; /path/to/dvwa/dvwa.sql&lt;br /&gt;
&lt;br /&gt;
==Exploit Command Injection:==&lt;br /&gt;
&lt;br /&gt;
===Access DVWA:===&lt;br /&gt;
* Buka web browser dan masuk ke `http://dvwa.local`.&lt;br /&gt;
* Log in menggunakan default credential (`admin`/`password`).&lt;br /&gt;
&lt;br /&gt;
===Pilih &amp;quot;Command Injection&amp;quot; Page:===&lt;br /&gt;
* Klik &amp;quot;Command Injection&amp;quot; link&lt;br /&gt;
&lt;br /&gt;
===Identifikasi Vulnerable Input:===&lt;br /&gt;
* Di &amp;quot;Command Injection&amp;quot; page akan menampilkan form dengan text input field. Input field ini vulnerable untuk command injection.&lt;br /&gt;
&lt;br /&gt;
===Inject Command:===&lt;br /&gt;
* Masukan payload berikut di text input field:&lt;br /&gt;
&lt;br /&gt;
 ; cat /etc/passwd;&lt;br /&gt;
&lt;br /&gt;
 Payload akan menjalankan `cat` command untuk mendisplay isi file `/etc/passwd`.&lt;br /&gt;
&lt;br /&gt;
===Submit Form:===&lt;br /&gt;
* Klik &amp;quot;Submit&amp;quot; button.&lt;br /&gt;
&lt;br /&gt;
'''Jika attack berhasil, kita akan melihat isi `/etc/passwd`.'''&lt;br /&gt;
&lt;br /&gt;
==Additional Notes:==&lt;br /&gt;
&lt;br /&gt;
* Kita dapat berexperimen dengan payload lainnya untuk explorasi berbagai vulnerability lainnya.&lt;br /&gt;
* Selalu menggunakan controlled environment dengan explicit permission dari pemilik sistem.&lt;br /&gt;
* Ingat bahwa exploiting vulnerabilities adalah illegal dan tidak ethis.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
&lt;br /&gt;
* [[Forensic: IT]]&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>