Exploitation
Upon exploitation of the SQL injection and the generation of a malicious exe I was able to get a reverse shell.
Last updated
Upon exploitation of the SQL injection and the generation of a malicious exe I was able to get a reverse shell.
Last updated