Automated vulnerability scanning and exploitation
Automated vulnerability scanning and exploitation - Index of
Automated vulnerability scanning and exploitation - Index of
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Exploit vulnerabilitiesRequest the pagehttp://localhost/myscript/admin.php?id=hack’luLog functionWrite the function arguments to a logfileLogfileadmin.php:137 mysql_querySELECT * FROM users WHERE id =’hack’lu’Dennis Pellikaan, Thijs Houtenbos <strong>Automated</strong> <strong>vulnerability</strong> <strong>scanning</strong> <strong>and</strong> <strong>exploitation</strong> 19 / 40