In this video, we demonstrated the basic exploitation of the Drupal content management system to gain a limited shell on the remote host. We escalated our privileges by generating a custom DLL payload and replace the target DLL file with our payload. We used a lab machine called ‘Hijack’.

Receive video documentation, QA and request special video training

CyberSecurity Consultation


About the Author

Cybersecurity Trainer MS in Cybersecurity Expertise in Healthcare and Finance Industries Penetration tester and compliance auditor

View Articles