From e14f249e624b901d429769d8624ac87ed0f35ff8 Mon Sep 17 00:00:00 2001 From: RelunSec Date: Wed, 24 Dec 2025 10:42:19 -0800 Subject: [PATCH] Add 'Bypass With An Alias' section to README Added section on bypassing command injection using aliases. --- Command Injection/README.md | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/Command Injection/README.md b/Command Injection/README.md index 1c054375..7a188e50 100644 --- a/Command Injection/README.md +++ b/Command Injection/README.md @@ -13,6 +13,7 @@ * [Filter Bypasses](#filter-bypasses) * [Bypass Without Space](#bypass-without-space) * [Bypass With A Line Return](#bypass-with-a-line-return) + * [Bypass With An Alias](#bypass-with-alias) * [Bypass With Backslash Newline](#bypass-with-backslash-newline) * [Bypass With Tilde Expansion](#bypass-with-tilde-expansion) * [Bypass With Brace Expansion](#bypass-with-brace-expansion) @@ -203,6 +204,17 @@ original_cmd_by_server ls ``` +### Bypass With An Alias +In shells you have the ~/.bashrc and ~/.zshrc it contain aliases you can also find custom one by combining with other vulns or just use builtin one like in the examples + +```powershell +~$ la /var/www +~$ l /var/www +~$ ll /var/www +``` + + + ### Bypass With Backslash Newline * Commands can be broken into parts by using backslash followed by a newline