In this video, we demonstrated the basic exploitation of the Drupal content management system to gain a limited shell on the remote host. We escalated our privileges by generating a custom DLL payload and replace the target DLL file with our payload. We used a lab machine called ‘Hijack’.

Receive video documentation, QA and request special video training

https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join

CyberSecurity Consultation

 


About the Author

Cybersecurity Trainer MS in Cybersecurity Expertise in Healthcare and Finance Industries Penetration tester and compliance auditor

View Articles