[VulnBox] From SQL injection to shell 2. sqlmap + webshell usage
In this video I will show you an example of using nmap to exploit SQL injection. After that I uploaded a simple webshell and got the control of vulnerable machine. Enjoy.
The lab may be downloaded from here:
,69/
Official website of an software.
9 views
2390
880
6 years ago 00:03:29 9
[VulnBox] From SQL injection to shell 2. sqlmap + webshell usage