关于命令执行漏洞深入学习

绕过WAF命令执行技巧  https://www.anquanke.com/post/id/208398#h2-2

   

5位可控字符下的命令执行    https://www.freesion.com/article/8743881775/

浅谈escapeshellarg、escapeshellcmd逃逸与参数注入    https://www.mi1k7ea.com/2019/07/04/%E6%B5%85%E8%B0%88escapeshellarg%E4%B8%8E%E5%8F%82%E6%95%B0%E6%B3%A8%E5%85%A5/

巧用命令注入的N种方式    http://blog.zeddyu.info/2019/01/17/%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C/#

php命令执行绕过  https://www.cnblogs.com/R4v3n/articles/9081202.html

ctf中 preg_match 绕过技术 | 无字母数字的webshell   https://www.cnblogs.com/v01cano/p/11736722.html

原文地址:https://www.cnblogs.com/Xshun-z/p/14284864.html