Hacksplaining
  • For Teams
Log in Start Learning

Command Execution

Imagine you run a simple site that performs DNS lookups. Your site shells out to the nslookup command, then prints the result. Notice how the 'domain' parameter is taken in from the GET request, and immediately interpolated into a command string.

search-o-bot.com
A speech bubble
A robot icon
Hacksplaining

Defend your code.

Learn

All Lessons AI Prompt Injection SQL Injection XSS CSRF

Teams

For Teams Features Pricing FAQ

Resources

Glossary OWASP Top 10 PCI Compliance Book

Legal

Privacy Terms DPA Subprocessors

© 2026 Hacksplaining. Built with in Seattle, WA, USA

Need help? Reach out to support@hacksplaining.com