OS command injection

Aim of the experiment

To understand how OS Command Injection vulnerabilities occur and how to mitigate them. This involves exploring how malicious users can inject arbitrary commands into a system and execute them with unintended privileges.