from_sqli_to_shell
from_sqli_to_shell
from_sqli_to_shell
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Conclusion<br />
PentesterLab.com » From SQL Injection <strong>to</strong> Shell<br />
This exercise showed you how <strong>to</strong> manually detect and exploit SQL injection <strong>to</strong> gain<br />
access <strong>to</strong> the administration pages. Once in the "Trusted zone", more functionnality<br />
is often available which may lead <strong>to</strong> more vulnerabilities.<br />
This exercise is based on the results of a penetration test performed on a website<br />
few years ago, but websites with these kind of vulnerabilities are still available on<br />
Internet <strong>to</strong>day.<br />
40/41