Hacking Kioptrix Level 2 (#1.1) – Part 2 – SQL Injection
In the previous post, we tried to identify the possible vulnerabilities of the target machine. In this post, we will be trying to exploit the system. Up to now, we have visited the IP address of the target machine in firefox which gave us two input fields. Now, if we try some random username and … Read more