In this video walk-through, we covered finding vulnerabilities in Influx Database in addition to docker exploitation.
Sweettooth Inc. needs your help to find out how secure their system is!.
What is the database user you find?
What is the highest rpm the motor of the mixer reached?
What username do you find in one of the databases?