From SQL Injection to Shell III: Exploitation

Return to Exercise
image of exercise From SQL Injection to Shell III: Exploitation

This video requires PentesterLab PRO

GO PRO
Spoiler
From SQL Injection to Shell III: Exploitation

In this video, we explore the process of exploiting a web application vulnerability, transitioning from SQL Injection to gaining shell access. This exercise is part of the green badge series on PentesterLab.

video duration icon10:16 number of views icon3091