July 2018
Beginner
564 pages
12h 22m
English
In this chapter, we learned about basic file uploads using file vulnerabilities. We also looked at how to execute OS code under code vulnerabilities. Furthermore, we learned about local and remote file inclusion using Metasploitable. Finally, we learned about the problem-solving takeaways that should be considered when working with these vulnerabilities. The next chapter will dive deep into SQL injection vulnerabilities.