Screenshots from the blog posts
Summary
In this post, we aim to understand an SQLi exploit for Moodle and demystify some of the unknowns that the public exploit sources leave out. That makes the currently discussed exploit more viable and feasible to be used during your next pentest engagements.
Description
Tags
Comments (0)