[VulnBox] From SQL injection to shell 2. sqlmap + webshell usage

In this video I will show you an example of using nmap to exploit SQL injection. After that I uploaded a simple webshell and got the control of vulnerable machine. Enjoy. The lab may be downloaded from here: ,69/ Official website of an software.
Back to Top