This video shows how to exploit an SQL injection vulnerability to bypass a login page, then discover and exploit an RCE or a Remote Code Execution vulnerability to hack a target server.
All of the steps shown in this video is done to hack and root he Cronos machine in hackthebox.
Ethical Hacker | Teaching Assistant at zSecurity
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookies enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!