A vulnerability where an attacker can execute arbitrary operating system commands on a server through a vulnerable application input.
Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free