In this video walkthrough, I demonstrated how to compromise and get a reverse connection starting from PhpMyAdmin or MySQL credentials in hand. We also demonstrated how these kinds of weaknesses and misconfigurations could happen and how to mitigate them.

You can also watch my video about Database Pentesting using UDFs for your reference.

 


About the Author

Cybersecurity Trainer MS in Cybersecurity Expertise in Healthcare and Finance Industries Penetration tester and compliance auditor

View Articles