Two ways to upload WebShell through SQLi
From SQL injection to RCE Once a MySQL database server has been compromised at the root level, it’s often possible to escalate this access to full system level access. In your penetration testing, it...
Web Exploitation / Web Maintaining Access / WebApp PenTest
by do son · Published April 11, 2017 · Last modified September 12, 2017
From SQL injection to RCE Once a MySQL database server has been compromised at the root level, it’s often possible to escalate this access to full system level access. In your penetration testing, it...