OS command injection
Aim of the experiment
To understand how OS Command Injection vulnerabilities occur and how to mitigate them. This involves exploring how malicious users can inject arbitrary commands into a system and execute them with unintended privileges.