20.05.2013 Views

from_sqli_to_shell

from_sqli_to_shell

from_sqli_to_shell

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Conclusion<br />

PentesterLab.com » From SQL Injection <strong>to</strong> Shell<br />

This exercise showed you how <strong>to</strong> manually detect and exploit SQL injection <strong>to</strong> gain<br />

access <strong>to</strong> the administration pages. Once in the "Trusted zone", more functionnality<br />

is often available which may lead <strong>to</strong> more vulnerabilities.<br />

This exercise is based on the results of a penetration test performed on a website<br />

few years ago, but websites with these kind of vulnerabilities are still available on<br />

Internet <strong>to</strong>day.<br />

40/41

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!