hacktricks/pentesting/pentesting-web/python.md

15 lines
446 B
Markdown
Raw Normal View History

# Python
## Server using python
test a possible **code execution**, using the function _str\(\)_:
```python
"+str(True)+" #If the string True is printed, then it is vulnerable
```
You [can find here **several tricks**](../../misc/basic-python/bypass-python-sandboxes.md) to obtain **code executing** in python if you can execute arbitrary code.
### \*\*\*\*[**Python Deserialization**](../../pentesting-web/deserialization/#python)\*\*\*\*