mirror of
https://github.com/carlospolop/hacktricks
synced 2025-01-06 10:18:55 +00:00
15 lines
446 B
Markdown
15 lines
446 B
Markdown
|
# Python
|
||
|
|
||
|
## Server using python
|
||
|
|
||
|
test a possible **code execution**, using the function _str\(\)_:
|
||
|
|
||
|
```python
|
||
|
"+str(True)+" #If the string True is printed, then it is vulnerable
|
||
|
```
|
||
|
|
||
|
You [can find here **several tricks**](../../misc/basic-python/bypass-python-sandboxes.md) to obtain **code executing** in python if you can execute arbitrary code.
|
||
|
|
||
|
### \*\*\*\*[**Python Deserialization**](../../pentesting-web/deserialization/#python)\*\*\*\*
|
||
|
|