You are attacking an application that employs two different servers: an application server and a database server. You have discovered a vulnerability that allows you to execute arbitrary operating system commands on the application server. Can you exploit this vulnerability to retrieve sensitive application data held within the database?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here