No student devices needed. Know more
5 questions
Once you have identified an SQL injetction and wish to exploit it, what is one of the first steps to take (as presented today)?
Find out the number of columns involved in the original request
Use the SQL Injection to bypass the authentication mechanism
Fire up SQLmap
What is the name of the utility that allows editing of keyboard input for any command?
nikto
ohmyzsh
setxkbmap
rlwrap
What type of vulnerability was not exploited in today's wlakthrough:
SQL Injection
Cross Site Scripting
Command Injection
What is the name of the enumeration tool presented today:
dirbuster
feroxbuster
gobuster
dirb
In what group was the user John, which allowed us to perform privilege escalation to root?
administrative
executive
management
business
Explore all questions with a free account