Time’s Up! Congratulations to everyone who completed Lab 3: Web Exploitation from the Human Connection Challenge: Season 1.
Updated 6 months ago
Version 1.0Really enjoyed this one! I actually managed to take an educated guess at the login directory without using dirbuster 😂 To find the password via SQL injection I just entered the username that had been previously found then did the exact same exploit I used for the username in the password field.
Looking forward to the next one!